共查询到20条相似文献,搜索用时 22 毫秒
1.
Andrea Cardaci Luca Caviglione Erina Ferro Alberto Gotta 《International Journal of Satellite Communications and Networking》2017,35(4):307-321
During the last decade, the Web has grown in terms of complexity, while the evolution of the HTTP (Hypertext Transfer Protocol) has not experienced the same trend. Even if HTTP 1.1 adds improvements like persistent connections and request pipelining, they are not decisive, especially in modern mixed wireless/wired networks, often including satellites. The latter play a key role for accessing the Internet everywhere, and they are one of the preferred methods to provide connectivity in rural areas or for disaster relief operations. However, they suffer of high‐latency and packet losses, which degrade the browsing experience. Consequently, the investigation of protocols mitigating the limitations of HTTP, also in challenging scenarios, is crucial both for the industry and the academia. In this perspective, SPDY, which is a protocol optimized for the access to Web 2.0 contents over fixed and mobile devices, could be suitable also for satellite links. Therefore, this paper evaluates its performance when used both in real and emulated satellite scenarios. Results indicate the effectiveness of SPDY if compared with HTTP, but at the price of a more fragile behavior when in the presence of errors. Besides, SPDY can also reduce the transport overhead experienced by middleboxes typically deployed by service providers using satellite links. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
2.
3.
文章提出了采用多种流量加速技术,比如流量压缩和缓存技术、应用协议优化技术、区分业务和用户的带宽控制技术等,对移动数据流量进行管控、优化和疏导。多种流量加速技术的结合使用,可以减少流量增加对网络容量的冲击,提高用户体验。其中,流量压缩技术可以使得文本和图片的流量大大减少,并同时适配终端,满足移动用户的体验;流量缓存技术可以在本网内缓存热点内容,减少网间拥塞、用户访问时延及晚间的结算费用;超文本传输协议(HTTP)优化技术可以改善HTTP协议的性能,在不扩容的情况下提高移动网络的吞吐量。实验室测试和现网试点证明,上述技术和方法的应用可以取得比较好的移动数据流量管控、优化效果。 相似文献
4.
Haifeng Zhou Liansheng Tan Fei Ge Sammy Chan 《International Journal of Communication Systems》2015,28(10):1709-1728
Traffic matrix (TM) is extremely important in many networking operations. This paper proposes a novel approach of TM estimation in large‐scale IP networks, termed as Advanced‐Tomogravity method, which is based on a precise gravity model and the tomography method. First, the precise gravity model is proposed on the basis of the existing generalized gravity model by introducing a relativity factor vector parameter, which defines the relativity between the solution of the existing generalized gravity model and its real TM. The solution obtained from this precise gravity model is then refined by the basic model of the tomography method. By mathematical analysis, we give the explicit expression of the relativity factor vector parameter in the proposed precise gravity model by the Moore–Penrose inverse and the minimum‐norm least‐square solution. The vector parameter is subsequently determined with the aid of small amount of historical real data of TM. A general algorithm of the proposed approach is therefore designed. Finally, our approach is validated by simulation using the real data of the Abilene Network. The simulation results indicate that it reduces the relative errors to less than one‐half, better tracks not only the dynamic fluctuations but also the overall mean behavior of traffic flow. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
5.
In this paper, we propose a novel method to detect encrypted botnet traffic. During the traffic preprocessing stage, the proposed payload extraction method can identify a large amount of encrypted applications traffic. It can filter out a large amount of non-malicious traffic, greatly improving the detection efficiency. A Sequential Probability Ratio Test (SPRT)-based method can find spatial-temporal correlations in suspicious botnet traffic and make an accurate judgment. Experimental results show that the false positive and false negative rates can be controlled within a certain range. 相似文献
6.
7.
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
This paper shows a configuration scheme for networks with WFQ schedulers. It guarantees maximum revenue for the service provider in the worst case of network congestion. We focus on best effort traffic and select those flows that maximize the benefit while keeping the network utilization high. We show that optimum network configuration is feasible based only on knowledge of the topology. Its dependence on the pricing scheme can be reduced and even eliminated. We offer a formulation that reaches a tradeoff between network utilization, fairness, and user satisfaction. 相似文献
8.
基于SIP通信的安全性研究 总被引:6,自引:0,他引:6
本文简要说明了SIP协议内容,分析了基于SIP协议的通信网络所面临的安全威胁,通过对IETF公布的草案和标准的研究,总结并提出了一些解决SIP网络安全问题的方案。 相似文献
9.
移动设备加密流量分析可以用主动或被动的方式获取多种类型的用户信息,为网络安全管理和用户隐私保护提供保障.重点分析、归纳了用户信息探测所涉及的数据采集、特征选择、模型与方法以及评价体系的基本原理和关键方法.总结了现有方案中存在的问题,以及未来研究方向和面临的挑战. 相似文献
10.
基于确定性抽样数据分组序列的位置、方向、分组长度和连续性、有序性等流统计特征和典型的分组长度统计签名,并结合带数据分组位置、方向约束和半流关联动作的提升型DPI,提出了一种基于假设检验的加密流量应用识别统计决策模型,包括分组长度统计签名决策模型和DFI决策模型,并给出了相应的分组长度统计签名匹配算法以及基于DPI和DFI混合方法的加密流量应用识别算法。实验结果表明,该方法能够成功捕获加密应用在流坐标空间中独特的统计流量行为,并同时具有极高的加密识别精确率、召回率、总体准确率和极低的加密识别误报率、总体误报率。 相似文献
11.
随着基于IP的各类增值业务的迅猛发展,P2P、网络视频、网络游戏等应用在消耗了大量网络资源的同时,却仅仅带来了极其有限的收入,此外VoIP等应用还培养了大量的虚拟运营商,进一步分流了电信运营商的业务收入.电信运营商在单位流量中所获取的利润逐年下降,处在IP网价值链的底部.基于IP网运营中面临的"增量不增收"和"管道运营商"的困境,如何实现网络承载应用的可管可控,实现网络价值最大化成为运营商最为关心的问题.本文针对IP网流量管理的相关方面进行了分析,并提出了相应的应对策略及举措. 相似文献
12.
简要介绍了目前我国长话网的典型话务环境与话务特征,重点探讨了网管话务控制定义、目标、应用场合及启用话务控制原则、实施要素、分类,提出了对今后异常大话务环境下网络管理及网络安全的建议。 相似文献
13.
This paper proposes a network‐adaptive mechanism for HTTP‐based video streaming over wireless/mobile networks. To provide adaptive video streaming over wireless/mobile networks, the proposed mechanism consists of a throughput estimation scheme in the time‐variant wireless network environment and a video rate selection algorithm used to increase the streaming quality. The adaptive video streaming system with proposed modules is implemented using an open source multimedia framework and is validated over emulated wireless/mobile networks. The emulator helps to model and emulate network conditions based on data collected from actual experiments. The experiment results show that the proposed mechanism provides higher video quality than the existing system provides and a rate of video streaming almost void of freezing. 相似文献
14.
对等网络流量检测技术研究 总被引:1,自引:0,他引:1
P2P流量检测技术可分为基于流量特征的识别方法(TLI)和基于深层数据包识别方法(DPI)。TLI通过对传输层数据包进行分析并结合P2P系统所表现出来的流量特征,来识别某个网络流是否属于P2P。DPI采用协议分析与还原技术,提取P2P应用层数据,通过分析其载荷所包含的协议特征值,来判断网络流量是否属于P2P应用。DPI由于具有准确性高、健壮性好、具有分类功能,是P2P流量识别的主要方法。如果能够结合TLI和DPI的优点,就有可能设计出一个准确、高效的P2P流量实时识别算法。 相似文献
15.
16.
对简单对象访问协议SOAP进行了简要说明,介绍了SOAP消息结构以及SOAP协议的系统框架。通过对SOAP协议的分析,将SOAP系统划分为应用客户、SOAP客户和SOAP服务3部分,分别描述了3部分的功能、组成,并给出了具体的设计实现方法。与公共对象请求代理体系结构CORBA和分布式组件对象模型DCOM相比,简单对象访问协议SOAP具有简单、与平台无关、利于互操作和易于维护等特点,SOAP协议具有广阔的应用前景。 相似文献
17.
18.
传统的应用层协议识别方法均从改进匹配算法的角度来提高识别率,但是随着P2P协议的发展,其特征呈现多维化的趋势,算法复杂度也随之提高.鉴于此,在对P2P流量的多维特征进行分析并提取后,采用主成分分析(PCA)算法将提取到的特征降维处理,并通过实验证明了该方法在网络流量识别上的可行性和有效性. 相似文献
19.
20.
首先回顾了IP网络流量工程的概念和所面临的挑战,然后讨论了MPLS(多协议标记交换)的基本概念和发展,指出了MPLS巨大的流量工程能力和主要功能,最后着重分析了MPLS在IP网络流量工程中的应用. 相似文献