With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu...With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network.展开更多
It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a signific...It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a significant issue for wireless communication networks with massive antennas and ultra-dense cell. This paper proposes a learning- based channel model, which can estimate, refine, and manage CSI for a synergetic transmission system. It decomposes the channel impulse response into multiple paths, and uses a learning-based algorithm to estimate paths' parameters without notable degradation caused by sparse pilots. Both indoor measurement and outdoor measurement are conducted to verify the feasibility of the proposed channel model preliminarily.展开更多
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat...With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.展开更多
E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of ...E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication.展开更多
基金Sponsored by the National High Technology Development Program of China (Grant No. 2002AA142020).
文摘With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network.
基金supported by National Basic Research Program of China (NO 2012CB316002)China’s 863 Project (NO 2014AA01A703)+2 种基金National Major Projec (NO. 2014ZX03003002-002)Program for New Century Excellent Talents in University (NCET-13-0321)Tsinghua University Initiative Scientific Research Program (2011THZ02-2)
文摘It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a significant issue for wireless communication networks with massive antennas and ultra-dense cell. This paper proposes a learning- based channel model, which can estimate, refine, and manage CSI for a synergetic transmission system. It decomposes the channel impulse response into multiple paths, and uses a learning-based algorithm to estimate paths' parameters without notable degradation caused by sparse pilots. Both indoor measurement and outdoor measurement are conducted to verify the feasibility of the proposed channel model preliminarily.
文摘With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.
基金sponsored by the National Natural Science Foundation of China under grant number No. 61100008, 61201084the China Postdoctoral Science Foundation under Grant No. 2013M541346+3 种基金Heilongiiang Postdoctoral Special Fund (Postdoctoral Youth Talent Program) under Grant No. LBH-TZ0504Heilongjiang Postdoctoral Fund under Grant No. LBH-Z13058the Natural Science Foundation of Heilongjiang Province of China under Grant No. QC2015076Funds for the Central Universities of China under grant number HEUCF100602
文摘E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication.