期刊文献+

异构计算环境下的网络模拟性能估计模型 被引量:2

Performance Evaluation Model for Network Simulation in Heterogeneous Computing Environment
下载PDF
导出
摘要 为深入研究异构计算环境下的网络模拟性能,提出了一种针对异构计算环境的网络模拟性能估计模型。首先分析了影响异构计算环境下网络模拟性能的各种因素,包括同步开销、远程通信开销、路由模拟开销和数据包转发模拟开销等,并提出了异构计算环境下的网络模拟性能估计模型;然后提出了对模型中的影响因素具体分析与测试的方法。实验结果表明,该估计模型能准确地评估异构计算环境下大规模网络模拟任务的性能,与真实实验值相比,其平均误差率为3.2%,相对于现有性能估计模型,误差率有明显的降低。 For the further research of network simulation performance in heterogeneous computing environment,this paper introduces evaluation model for the performance of network simulation in heterogeneous computing environment.At first,this paper analyzes the factors affecting network simulation task in heterogeneous computing environment,including synchronization overhead,remote communication overhead,routing simulation overhead,packet forwarding and simulation overhead.Then,this paper puts forward evaluation model for the performance of network simulation in heterogeneous computing environment.Afterwards,this paper proposes the corresponding analysis and test methods on its model influence factors.The experimental results indicate that the evaluation model can accurately estimate the performance of large-scale network simulation task in heterogeneous computing environment.Compared with the real value,the average error coefficient is 3.2%;there is an obvious decrease in the average error coefficient relative to the current evaluation model for performance.
出处 《计算机科学与探索》 CSCD 北大核心 2015年第11期1335-1343,共9页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金No.61103223 江苏省自然科学基金重点研究专项No.BK2011003~~
关键词 网络模拟 异构计算环境 网络模拟性能 性能评估 network simulation heterogeneous environment performance of network simulation performance evaluation
  • 相关文献

参考文献7

二级参考文献60

  • 1王晓锋,方滨兴,云晓春,张宏莉.并行网络模拟中的一种拓扑划分方法[J].通信学报,2006,27(2):16-21. 被引量:14
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 3王晓锋,方滨兴,云晓春,张宏莉.并行网络蠕虫模拟中任务优化划分的研究[J].计算机学报,2006,29(8):1367-1374. 被引量:10
  • 4尤洪涛,姜小成,陈左宁.基于动态任务划分的降级机制[J].微计算机信息,2006,22(10X):72-75. 被引量:9
  • 5Onwubiko C. Functional requirements of situational awareness in computer network security [C]// Proceedings of the IEEE International Conference on Intelligence and Security lnformatics, 2009. Washington, DC, USA: 1EEE Computer Society, 2010:209-213.
  • 6Xia W W, Wang R F. Prediction model of network security situation based on regression analysis [C]// Proceedings of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS). Washington, DC, USA: IEEE Computer Society, 2010: 616-619.
  • 7Zhang Y, Tan X B, Xi H S. A novel approach to network security situation awareness based on multi-perspective analysis [C]// Proceedings of the 2007 International Conference on Computational Intelligence and Security (CIS 2007). Washington, DC, USA: IEEE Computer Society, 2007: 768-772.
  • 8Shi Yuanquan, Li Tao, Chen Wen, Fu Yanming. Network security situation prediction using artificial immune system and phase space reconstruction [J]. Applied Mechanics and Materials (S1662-7482), 2011, 44-47: 3662-3666.
  • 9Perumalla K S, Sundaragopalan S. High-Fidelity Modeling of Computer Network Worms [C]// Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC). Washington, DC, USA: IEEE Computer Society, 2004: 126-135.
  • 10Dagon D, Zou Cc, Lee W. Modeling botnet propagation using time zones [J/OL]. 2006. Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006). (2006) [2011]. http://www.isoc.org/isoc/ deling_botnet propagation.pdf mo.

共引文献49

同被引文献3

引证文献2

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部