Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 5 papers published in subject: > since this site started. |
Results per page: |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Reducing Web Latency with Coding-Based Fast Multi-Path Loss Recovery | |||
LIU Yi,CHEN Guo | |||
Computer Science and Technology 14 May 2020 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:TCP latency is critical to the performance of web services. However, packet loss greatly impairs the TCP performance due to its poor loss recovery mechanisms. Recent work FUSO addressed this problem by leveraging multi-path diversity for proactive loss recovery, it used "good" paths to proactively retransmit the potentially lost packet on "bad" paths. However, because it's impossible to predict which packet is truly lost, FUSO tended to retransmit the oldest unACKed packet. Through analysis and comprehensive experiments, this paper shows that in the Internet scenario, such simple proactive retransmission of the oldest unACKed packet is not accurate enough to recover the lost packets, which causes performance penalty. To address the problem, this paper presents \name, a \fullname. Different from FUSO, when there is a chance for proactive loss recovery, \name generates a coding packet that codes all (or multiple) unACKed packets together. As such, \name can always proactively retransmit the ``right'' lost packet, since the receiver side can decode the lost packet by combining the coding packet with other received packets. \name is implemented in Linux kernel with \approx2K lines of code.Testbed and simulation results show that, under lossy condition, \name can greatly decrease the average and $99^{th}$ percentile flow completion time (FCT) by \approx12\% and \approx59\% in the testbed, and up to \approx16.9\% and \approx54.5\% in the simulation, respectively. | |||
TO cite this article:LIU Yi,CHEN Guo. Reducing Web Latency with Coding-Based Fast Multi-Path Loss Recovery[OL].[14 May 2020] http://en.paper.edu.cn/en_releasepaper/content/4752040 |
2. Space Partitioned AFDX Switch Design Based on Shared Memory Architecture | |||
Hu Jingfei,Li Jian,Hu Fei | |||
Computer Science and Technology 30 November 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:As a new generation of aviation network communication standard, AFDX has been applied to the A380 and other large civil aircraft due to its advantages of full-duplex, high-bandwidth, low latency, low packet loss and low cost. Switches are key devices influencing the overall performance of an AFDX network. A shared memory architecture is widely used but this has imperfect reliability and scalability, because all the output ports share only one memory and one scheduler, which can lead to severe resource contention and scheduling latency. This article employs space partition techniques to isolate the memory space for each output port, and proposes a new space partitioned shared memory switch (SPSMS) architecture for AFDX networks. This architecture reduces the competition for resources and avoid conflicts, thereby decreasing the latency of packets through the switch. Simulation of the architecture with OPNET shows significant performance improvement over a classic shared memory switch in terms of switch overall packet latency, queuing delay and queue size. | |||
TO cite this article:Hu Jingfei,Li Jian,Hu Fei. Space Partitioned AFDX Switch Design Based on Shared Memory Architecture[OL].[30 November 2012] http://en.paper.edu.cn/en_releasepaper/content/4496819 |
3. Protocol Security Testing with SPIN and TTCN-3 | |||
Zhou Li,Wang Zhiliang,Yin Xia | |||
Computer Science and Technology 14 December 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Protocol security testing is an important technique to ensure the security of communication protocols. However, methods considering both effective detection to specification vulnerabilities and efficient testing on protocol implementations are not well developed. In this paper, we present a general method for protocol security testing including protocol verification with SPIN model checker and protocol testing with formal testing language TTCN-3. We use threat model to model malicious entities and import the classification of information security to achieve a complete analysis of security requirements for protocol verification. We also develop a SPIN Trail to TTCN-3(st2ttcn) convention tool to generate testcases automatically from counter examples obtained from model checking. As a case study, we apply our approach to the security testing of Source Address Validation Improvements (SAVI) protocol. We test two versions of SAVI-DHCP protocol. The result indicates that our method is effective and efficient. | |||
TO cite this article:Zhou Li,Wang Zhiliang,Yin Xia. Protocol Security Testing with SPIN and TTCN-3[OL].[14 December 2010] http://en.paper.edu.cn/en_releasepaper/content/4396471 |
4. Location-aware Routing for Pocket Switched Networks | |||
Ye Tian,Jiang Li | |||
Computer Science and Technology 26 January 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, we seek to understand the reasons causing failures and delays of message delivery in Pocket Switched Networks (PSN), and to use this understanding for improving the network. By studying two real-world datasets, we find that node isolation is prevalent in PSN networks, which largely accounts for the inefficiencies in message delivery. In addition, by analyzing nodes’ contact-location relationship, we find that individual and system-wide key locations exist and their existence suggests potential improvements in message routing. Motivated by our observation, we design a location assisted routing scheme for PSN networks. With simulation-based experiments using real-world and synthetic contact traces, we compare the proposal with other representative routing schemes, and show that with the awareness of the location information, the proposed solution could deliver more messages within shorter delays, thus improves the network remarkably. | |||
TO cite this article:Ye Tian,Jiang Li. Location-aware Routing for Pocket Switched Networks[OL].[26 January 2010] http://en.paper.edu.cn/en_releasepaper/content/39480 |
5. Energy-Efficient Time Synchronization Algorithm for Wireless Sensor Networks | |||
Wu Wanrong ,Wang Qianping ,Wang Wei ,Su Yu-e ,Hao Li | |||
Computer Science and Technology 11 September 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In wireless sensor networks, energy efficiency is an important standard for evaluating the effectiveness of the time synchronization protocols. Hence, energy should be conserved as much as possible provided that algorithm can achieve a certain accuracy. In this paper, we propose an energy efficient time synchronization algorithm in which each layer of the network can be synchronized merely by receiving broadcast messages rather than relying on two-way message exchange. Simulation result shows that our improved strategy reduced the energy consumption and prolonged the lifetime of network compared with TPSN | |||
TO cite this article:Wu Wanrong ,Wang Qianping ,Wang Wei , et al. Energy-Efficient Time Synchronization Algorithm for Wireless Sensor Networks[OL].[11 September 2009] http://en.paper.edu.cn/en_releasepaper/content/35128 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated