期刊文献+

基于动态TCP代理的并行网络模拟性能研究

Research of Dynamic TCP Agent in Parallel Network Simulator
下载PDF
导出
摘要 通过分析原始网络模拟器PDNS中TCP Agent层的静态架构,发现其存在的端口冲突、空占现象和服务无效问题。提出了基于动态TCP Agent策略的模型,通过对TCP数据的分流与动态创建和绑定TCP Agent的方法成功的解决了静态架构中出现的问题,同时有效的降低了内存占用量。通过模拟蠕虫扩散表明,动态策略实际产生的TCP Agent数目不到静态绑定策略的10%,模拟时间与静态策略近似。通过释放TCP Agent,实际存在的连接数目只占创建总数的70%左右。 By analyzing the original and static frame of TCP Agent in network simulator PDNS,problems of Port-Clash/RedundantMemory/Service-Invalid appeared.This paper presents a new frame using dynamic agent which can solve the problems and limitations by switching stream of different TCP connections and dynamically creating-binding agent.Experimental results of worm spreading show that dynamic method can decrease the amount of TCP Agents to less than 10% comparing to static method.Time cost is similar to the static method.By freeing TCP Agent,the amount of existing agents is more or less 70% of the created ones.
出处 《微计算机信息》 2011年第1期175-177,共3页 Control & Automation
基金 基金申请人:张兆心 项目名称:高性能大规模网络行为模拟系统 基金颁发部门:中华人民共和国科学技术部(2007AA010503)
关键词 网络模拟 PDNS TCP AGENT 动态生成与绑定 Network Simulator PDNS TCP Agent Dynamic create and bind
  • 相关文献

参考文献7

  • 1PDNS-Parallel/Distributed NS. http://www.cc.gatech.edu/ computing/compass/pdns/. 2004.
  • 2Libsynk. http://www.cc.gatech.edu/fac/kalyan/libsynk.htm. 2005.
  • 3冯丽媛,祁红岩.基于NS2的UDP性能仿真研究[J].微计算机信息,2008,24(15):263-265. 被引量:3
  • 4K. Fall and S. Floyd. Simulation-based comparisons of Tahoe, Reno, and SACK TCP. Computer Communication Review[C]. 1996, 26-3:5-21.
  • 5K. Fall, S. Floyd, and T. Henderson. Ns simulator tests for Reno Fulltcp. URL http://www.aciri.org/floyd/papers/fulltcpsims.ps. Jul. 1997.
  • 6王方伟,张运凯,王长广,马建峰.网络蠕虫的扫描策略分析[J].计算机科学,2007,34(8):105-108. 被引量:7
  • 7郝志宇,云晓春,张宏莉.基于PDNS的蠕虫扩散行为模拟[C].2006北京地区高校研究生学术交流会一通信现信息技术会议论文集(下)?.2006,1979-1983.

二级参考文献15

  • 1田夏利,汪继军,薛胜军.嵌入式Internet中UDP协议的实现[J].计算机与数字工程,2006,34(2):104-105. 被引量:5
  • 2李波,杜德慧,刘飞.无线网络站点隐藏问题在NS2下的模拟和分析[J].微计算机信息,2006,22(07X):122-125. 被引量:6
  • 3王铁君,吴辰文,邬开俊,李继文.基于NS2的TCP性能仿真研究[J].兰州理工大学学报,2006,32(5):100-103. 被引量:6
  • 4Weaver N.Warhol worms:the potential for very fast Internet plagues[EB/OL].http://www.cs.berkeley.edu/-nweaver/warhol.html.
  • 5Weaver N.How many ways to own the Internet? Towards viable worm defenses[EB/OL].http://www.cs.berkeley.edu/-nweaver/wormdefense.ppt.2003.1
  • 6Staniford S,Paxson V,Weaver N.How to own the Internet in your spare time[A].In:Proc.of the USENIX Security Symposium[C].San Francisco,ACM Press,2002.8.149-167.http://www.icir.org/vern/papers/cdc-usenix-sec02/cdc.pdf
  • 7Zou C C,Towsley D,Gong W.On the performance of Internet worm scanning strategies[J].Performance Evaluation,2006,63(7):700-723
  • 8Chen Z,Gao L,Kwiat K.Modeling the spread of active worms[A].In:Proc.of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies[C].Francisco,IEEE Press,2003,4:890-1900
  • 9Wang Yang,Chakrabarti D,Wang Chenxi,et al.Epidemic spreading in real networks:an eigenvalue viewpoint[A].In:Proc.of the 22nd International Symposium on Reliable Distributed Systems (SRDS'03)[C],Florence,Italy,ACM Press,2003.10:25-34
  • 10Kephart J O,White S R.Measuring and modeling computer virus prevalence[A].In:Proc.of the 1993 IEEE Symposium on Security and Privacy[C].Oakland California IEEE Press,1993.5:2-15

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部