期刊文献+

一种新的SCTP对ST检测机制

New detection algorithm for SCTP to ST
下载PDF
导出
摘要 针对无线网络高误码率、时延抖动大等特点,提出了一种新的SCTP检测算法一FRTO(快速重发超时),该算法使用了TCP中的基本思想,其主要改进是:①当收到第一个确认信息后,只发送一个新的数据报;②改进了SCTP的慢启动和拥塞避免算法。对算法进行了仿真研究,仿真结论证明了带有FRTO的SCTP在性能上优于现有的Eifel检测机制和复制的最高传输序列号(DHPTSN)检测机制。 Big delay spikes and higher bit error rates in wireless network, leading to ST, performance of SCTP in wireless network is badly depressed and been extravagant plenty of network resource. Detection algorithm for SCTP are Eifel detection algorithm and DUPTSN algorithm. Their flaws are that Eifel algorithm need 12 bytes at least timestamp to expends data grams of SCTP and DUPTSN algorithm absences functions when ACK losing. The paper advances a new detection algorithm for SCTP, FRTO (fast retransmission timeouts), and processes simulation study simulation conclusion proves that FRTO has higher performance than two in existence.
作者 何利 陶洋
机构地区 重庆邮电学院
出处 《重庆邮电大学学报(自然科学版)》 2006年第z1期190-192,共3页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 重庆市科技公关重点项目(D2002-19) 重庆市教育科学技术研究基金项目(040503)
关键词 无线网络 流控制传榆协议 假设超时 检测机制 wireless network SCTP ST detection algorithm
  • 相关文献

参考文献8

  • 1[1]STEWART R,MORNEAULT K,SHARP C,et al.RFC2960,Stream Control Transmission Protocol Proposed Standard[EB/OL].(2003-02-02)[2005-11-24].http://bgp.potaroo.net/ietf/rfc/rfc2960.txt.
  • 2[2]LUDWIG R,MEYER M.RFC3522,The Eifel Detection Algorithm for TCP[EB/OL].(2003-12-28)[2005-12-25].http://www.potaroo.net/ietf/idref/rfc3522/.
  • 3[3]FLOYD S,MAHDAVI J,MATHIS M,et al.FRC 2883,An Extension to the Selective Acknowledgement(SACK) Option for TCP[EB/OL].(2000-01-01)[2005-12-20].http://www.faqs.org/rfcs/rfc2883.html.
  • 4[4]SAROLAHTI P,MARKKU K,RAATIKAINEN K.RFC4015:A new recovery algorithm for TCP retransmission timeouts[EB/OL].(2002-08-01)[2005-12-12].http://citeseer.ist.psu.edu/sarolahti03frto.html.
  • 5[5]LUDWIG R,MEYER M.RFC3522,Eifel Detection Algorithm for TCP.[EB/OL].(2003-02-01)[2005-12-25].http://mailman.postel.org/pipermail/rfcdist/2003-May/000263.html.
  • 6[6]LUDWIG R,GURTOV A.The Eifel Response Algorithm for TCP[EB/OL].(2004-02-01)[2005-12-15].http://www1.ietf.org/mail-archive/web/ietf-announce/current/msg00940.html04.
  • 7[7]SCHLAGER M.NS TCP Eifel Page.[EB/OL].[2005-12-22].http://iceberg.cs.berkeley.edu/downloads/tcp-eifel/.
  • 8付国瑜,黄贤英,李刚.带入侵检测系统的网络安全研究[J].重庆工学院学报,2004,18(2):23-25. 被引量:5

二级参考文献3

  • 1JoelScambray 钟向群译.黑客大曝光[M].北京:清华大学出版社,2002..
  • 2刘宝旭 许榕生.黑客防范技术揭密[M].北京:机械工业出版社,2002.54-57.
  • 3张慧敏,何军,黄厚宽.入侵检测系统[J].计算机应用研究,2001,18(9):38-41. 被引量:22

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部