期刊文献+

Internet中支配延迟的特征行为研究 被引量:7

Research on the Characteristic Behavior of Internet Dominant Delay
下载PDF
导出
摘要 通过对CAIDA机构授权的原始海量样本数据处理得到单向链路延迟,在此基础上计算了路径上最大的链路延迟对端到端延迟的比例以及路径上链路个数分布,基于此定义了支配延迟.针对链路延迟对端到端延迟的影响进行分析,表明支配延迟之间的差异是导致端到端延迟呈现多峰分布的主要原因.支配延迟更多地出现在路径的中间部分和AS自治域内部,说明延迟瓶颈从网络的接入部分向传输部分转移,得出传输延迟在总延迟中的影响逐渐减小,路径中的支配延迟将主要由传播延迟决定的结论. By dealing with the raw giant data samples authorized by CAIDA, we obtain one-way link delay. Together with the ratio of the biggest link delay to the end-to-end delay and the distribution of the Intemet hops, the dominant delay is defined. Analysis on the impact of link delay on the end-to-end delay reviews that discrepancy of dominant delay primarily accounts for the multi-modal distribution of end-to-end delay. Besides, dominant delay tends to position more preferentially on the middle part of paths and inside the AS, which indicates that the delay bottleneck was shifted from access part to transmission part. At last, conclusion is draw that propagation delay is the major composition of the dominant delay as the effect of transmission delay declined.
出处 《电子学报》 EI CAS CSCD 北大核心 2008年第6期1063-1067,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.69873007)
关键词 Internet测量 链路延迟 支配延迟 跳数 Intemet measurement link delay dominant delay hops
  • 相关文献

参考文献10

  • 1Zeitoun A, Chuah CN, Bhattacharyya S. An AS-level study of Internet path delay characteristics [ A ]. Proceedings of IEEE, GLOBECOM 2004 [ C]. Dallas, USA: IEEE, 2004. 1480 - 1484.
  • 2毕经平,吴起,李忠诚.Internet延迟瓶颈的测量与分析[J].计算机学报,2003,26(4):406-416. 被引量:21
  • 3张宏莉,方滨兴,胡铭曾,姜誉,詹春艳,张树峰.Internet测量与分析综述[J].软件学报,2003,14(1):110-116. 被引量:109
  • 4CAIDA skitter Project [ EB/OL]. http://www. caida. org.
  • 5Paxson V. End-to-end Intemet packet dynamics [ J]. IEEE/ ACM Transactions on Networking, 1999,7(3) :277 - 292.
  • 6BRADLEY H, MARINA F, Daniel J. Distance metrics in the Intemet [ A ] .Proceedings of the IEEE International Telecommunications Symposium 2002[ C]. Natal, Brazil:IEEE,2002.
  • 7HOOGHIEMSTRA G, Van P. Delay Distributions on fixed Intemet Paths[ R ]. Delft, Netherlands: Delft University of Technology, 2001.
  • 8Gao L. On inferring autonomous system relationships in the Intemet[ J ]. IEEE/ACM Transactions on Networking, 2001, 9 (6) :733 - 745,
  • 9Merit IRR Services [EB/OL] .http://www.irr.net/
  • 10Halabi S, McPherson D. Intemet Routing Architectures [ M ].北京:清华大学出版社,2000.

二级参考文献22

  • 1[1]Paxson V. End-to-End routing behavior in the Internet. IEEE/ACM Transactions on Networking, 1997,5(5):601~615.
  • 2[2]Kalidindi S, Zekauskas MJ. Surveyor: an infrastructure for Internet performance measurements. In: Proceedings of the INET'99. San Jose, 1999. http://www.isoc.org/inet99/proceedings/4h/4h_2.htm.
  • 3[3]Claffy K, Monk TE, McRobb D. Internet tomography. Nature, 1999, January 7. http://www.nature.com/nature/webmatters/tomog/ tomog.html.
  • 4[4]Burch H, Cheswick B. Mapping the Internet. IEEE Computer, 1999,32(4):97~98.
  • 5[5]Wolski R, Spring N, Hayes J. The network weather service: a distributed resource performance forecasting service for metacomputing. Journal of Future Generation Computing Systems, 1999,15(5):757~768.
  • 6[6]Chang H, Jamin S, Willinger W. Inferring AS-level Internet topology from router-level path traces. In: Proceedings of the SPIE ITCom 2001. 2001. http://citeseer.nj.nec.com/chang01inferring.html.
  • 7[7]Govindan R, Tangmunarunkit H. Heuristics for Internet map discovery. In: Proceedings of the IEEE INFOCOM 2000, Vol 3. 2000. 1371~1380. http://citeseer.nj.nec.com/govindan00heuristics.html.
  • 8[8]Munzner T. Interactive visualization of large graphs and networks [Ph.D. Thesis]. Stanford University, 2000.
  • 9[9]Tauro SL, Palmer C, Siganos G, Faloutsos M. A simple conceptual model for the Internet topology. In: Proceedings of the IEEE Conference of Global Telecommunications. 2001. http://www.cs.ucr.edu/~michalis/PAPERS/jellyfish-GI.pdf.
  • 10[1]Downey A B. Using pathchar to estimate Internet link characteristics. In: Proceedings of ACM SIGCOMM'99, Cambridge, 1999.241~250

共引文献125

同被引文献80

  • 1苏威积,赵海,徐野,张文波.基于hops的Internet复杂网络分割度分析[J].通信学报,2005,26(9):1-8. 被引量:6
  • 2DITTRICH D. Distributed denial of service attacks/tools [ EB/OL ]. (2010-10-18 ) [ 2010-11 - 20 ]. http ://portal. acre. org,/.
  • 3DIETRICH S, LONG N, DITYRICH D. Analyzing distributed denial of service tools: the shaft case[ C]//Proc of USENIX LISA. 2000.
  • 4NICHOLAS W, ROBIN S, VERN P. Detecting forged TCP reset packets[ C]//Proc of the 16th Annual Network and Distributed System Security Symposium. 2009.
  • 5THOMAX K. Traceroute[ EB/OL] . ( 2009- 02- 18 ) [ 2010-11- 20 ]. http :/fwww. traeeroute, org/.
  • 6KHAMPHAO S, DAISUKE M. Source address validation support for network forensics[ C ]//Proc of the 1 st Joint Workshop on Information Security. 2006.
  • 7SNOEREN A, PARTRIDGE C. Hash-based IP trace-back [ C ]//Proc of ACM SIGCOMM Conference. 2001:3-14.
  • 8JUN L, MINHO S, JUN X,et al. Large-scale IP traceback in high- speed Internet : practical techniques and theoretical foundation [ J ]. IEEE/ACM Trans on Networking, 2008,16 (6) : 1253-1266.
  • 9WANC Hai-ning, JIN Cheng, SHIN K G. Defense against spoofed IP traffic using hop-count filtering[ J]. Journal of IEEE/ACM Trans on Networking,2007,15( 1 ) :40-53.
  • 10JIN Cheng, WANG Hai-ning, SHIN K G. Hop-count filtering: an effective defense against spoofed traffic [ C]//Proc of the 10th ACM Conference on Computer and Communieations Security. 2003:30-41.

引证文献7

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部