浏览全部资源
扫码关注微信
1. 国防科学技术大学计算机学院 长沙 410073
2. 西北工业大学计算机学院 西安 710072
[ "刘保健,男,国防科学技术大学硕士研究生,主要研究方向为广域网服务质量。" ]
[ "黄杰,男,博士,国防科学技术大学副研究员,主要研究方向为高性能存储网络、卫星导航信息处理。" ]
[ "王宝生,男,博士,国防科学技术大学研究员,主要研究方向为新型网络体系结构、天基网络技术、系统软件及应用、网络与信息安全。" ]
[ "张潇晓,男,西北工业大学博士研究生,主要研究方向为人工智能、网络安全。" ]
网络出版日期:2013-09,
纸质出版日期:2013-09-20
移动端阅览
刘保健, 黄杰, 王宝生, 等. 骨干网冗余数据消除系统的研究与实现[J]. 电信科学, 2013,29(9):8-13.
Baojian Liu, Jie Huang, Baosheng Wang, et al. Research and Achievement of Redundancy Elimination of Backbone Network[J]. Telecommunications science, 2013, 29(9): 8-13.
刘保健, 黄杰, 王宝生, 等. 骨干网冗余数据消除系统的研究与实现[J]. 电信科学, 2013,29(9):8-13. DOI: 10.3969/j.issn.1000-0801.2013.09.002.
Baojian Liu, Jie Huang, Baosheng Wang, et al. Research and Achievement of Redundancy Elimination of Backbone Network[J]. Telecommunications science, 2013, 29(9): 8-13. DOI: 10.3969/j.issn.1000-0801.2013.09.002.
摘 要:当今的广域网传输过程中存在着大量的重复数据,这些重复数据使得广域网带宽被严重浪费。针对这一问题,提出了一种基于应用层协议识别的冗余数据消除策略。通过将数据缓存及应用层协议识别技术相结合,找出广域网传输过程中的冗余数据,尽可能使广域网中的相同数据只传输一次,从而降低冗余数据传输对广域网带宽的过度浪费。
Nowadays
WAN transmission process has a lot of duplicate data
these duplicate data make bandwidth of WAN to be serious wasted. In order to solve this problem
a redundant data elimination strategy based on application layer protocol identification(PI-RE)was put forward. Using the combination of data caching and the application layer protocol identification technology
the redundant data of WAN during transmission were found out
so that the same data transferred only once in WAN as much as possible
to reduce the redundant data transmission excessive waste of WAN bandwidth.
Anand A , Muthukrishnan A , Ramjee A R . Redundancy in network traffic: findings and implications . Proceedings of ACM SIGMETRICS , Seattle,WA,USA , 2009 : 37 ~ 48
Squid web proxy cache . http://www.squid-cache.org http://www.squid-cache.org
PeerApp:P2P and media caching . http://www.peerapp.com http://www.peerapp.com
Ziv J , Lempel A . A universal algorithm for sequential data compression . IEEE Transactions on Information Theory , 1977 , 23 ( 3 ): 337 ~ 343
Gupta A , Akella A , Seshan S , et al . Understanding and Exploiting Network Traffic Redundancy . Technical Report #1592, University of Wisconsin , 2007
Halepovic E , Williamson C , Ghaderi M . Low-overhead dynamic samplingforredundanttrafficelimination . JournalofCommunications , 2012 , 7 ( 1 ): 28 ~ 38
Aronovich L , Asher R , Bachmat E , et al . The design of a similarity based reduplication system . Proceedings of the Israeli Experimental Systems Conference , Israel , 2009 : 1 ~ 14
Spring N , Wetherall D . A protocol-independent technique for eliminating redundant network traffic . Proceedings of ACM SIGCOMM , Stockholm, Sweden , 2008 : 87 ~ 95
Bjorner N , Blass A , Gurevich Y . Content-Dependent Chunking for Differential Compression, the Local Maximum Approac . Technical Report 109,Microsoft Research , 2007
Halepovic E , Williamson C , Ghaderi M . Enhancing redundant network traffic elimination . Computer Networks , 2012 , 56 ( 2 ): 795 ~ 809
陈曙辉 . 基于内容分析的高速网络协议识别技术研究 . 国防科学技术大学博士学位论文 , 2007
Rabin M O . Fingerprinting by Random Polynomials . Technical Report TR-15-81, Department of Computer Science,Harvard University , 1981
Rivest R . The MD5 Message-Digest Algorithm, Networking Working Group Requests for Comment . MIT Laboratory for Computer Science and RSA Data Security, Inc, RFC-1321 , 1992
National Institute of Standards and Technology . Specications for Secure Hash Standard , 1995
0
浏览量
422
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构