期刊文献+

基于数据去重的广域网络传输优化系统研究 被引量:2

下载PDF
导出
摘要 信息技术不断的更新和发展推动全球进入大数据时代。传统型广域网传输方案伴随通信量的急剧增长已经很难满足用户的数据传输要求。面对广域网遇到的现状,主要研究了一种数据去重算法,并将其用于广域网优化系统中。重点研究了数据分块算法,采用一种新型的滑动块检测技术,并利用时间淘汰算法选出重复的数据块,从而提高重复数据削减率,可以有效节约网络带宽并加快广域网传输速率。
出处 《中国新通信》 2016年第19期56-60,共5页 China New Telecommunications
基金 国家自然科学基金资助项目(61401030)
  • 相关文献

参考文献15

  • 1Mcknight J, Asaro T, Babineau B. Digital archiving: end-user survey and market forecast 2006-2010[J]. Milford, MA, USA: Enterprise StrategyGroup,2006.
  • 2Santry D S, Feeley M J, Hutchinson N C, et al. Deciding when to forget in the Elephant file system[J]. In Proceedings of the 17th ACM Symposiumon Operating System Principles(SOS’99). New York, USA: ACM Press,1999:1 10-123.
  • 3Tolia N, Kaminsky M, Andersen D G, et al. An architecture for internet data transfer[J]. In Proceedings of the 3rd Symposium on NetworkedSystems Dsign and Implementation (NSDI’06).San Jose, CA,USA:USENIX Association,1006:253-266.
  • 4Mogu J C, Chan Y M, Kelly T. Design, implementation, and evaluation of duplicate transfer detection in HTTP[J].In Proceedings of the 1stConference on Symposiums on Networked Systems Design and Implementation(NSDI’04).Berkeley, USA:USENIX Association,2004:4-4.
  • 5Shivakumar N, Garcia-Molina H. Finding near-replicas of documents on the Web[J]. In Proceeding of the 2nd International Workshop on theWorld Wide Web and Databases(WebDB’99).Berlin,Germany:Springer-Verlag,1999:204-212.
  • 6敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929. 被引量:119
  • 7Chuanyi Liu, Yingping Lu, Chunhui Shi, et al. ADMAD: Application Driven Metadata Aware De-duplication Arc hival Storage System[J]. DigitalObject Indetifier, September 2008.29-35.
  • 8Bobbarjung Dr, Jagannathan S, Dubnicki C. Improving duplicate elimination in storage systems[J]. ACM Trans. on Storage,2006,424-448.
  • 9Jain N, Dahlin M, Tew ari R. Taper: Tiered approach for eliminating redundancy in replica synchronization[J]. In: Proc. Of the 4th usenix Conf. onFile and Storage Technologies(FAST 2005). Berkeley: USENIX Association,2005.
  • 10Broder AZ. Identifying and filtering near-duplicate documents[J]. In: Giancarlo R, Sankof D, eds. Proc. of the 11th annual Symp. OnCombinatorial Pattern Matching.London: Springer-Verlag,2000.1-10.

二级参考文献42

  • 1Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 2Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 3Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 4You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 5Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 6Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 7Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 8Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 9U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-2:Secure Hash Standard.2002.http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.

共引文献118

同被引文献6

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部