随者互联网时代的到来,如何提升互联网应用的交互性能逐渐成为时下的研究热点;而在当今的互联网环境中,网络带宽已经不是瓶颈,网络时延成为影响应用交互性能的关键因素.作为互联网时代的主要应用,Web应用的网络时延受到TCP尾部丢包现象...随者互联网时代的到来,如何提升互联网应用的交互性能逐渐成为时下的研究热点;而在当今的互联网环境中,网络带宽已经不是瓶颈,网络时延成为影响应用交互性能的关键因素.作为互联网时代的主要应用,Web应用的网络时延受到TCP尾部丢包现象的严重影响.Tail Loss Probe算法是一种通过发送探针包来触发恢复的高效易部署的TCP尾部丢包恢复算法,但其需要修改现有的TCP加速机制,存在影响互联网稳定性的风险.针对Tail Loss Probe算法存在的不足,提出一种Double Tail Loss Probe算法,该算法对不同的尾部丢包模式进行细化处理且在适当时机下发送两个探针包以加速恢复并实现与现有TCP机制的友好兼容,从而保证互联网数据流通的稳定性.实验表明,在不同的丢包粒度和传播时延下,Double Tail Loss Probe算法都展现出更快的恢复速度;尤其在丢包粒度较大时,相比Tail Loss Probe,该算法取得了约20%的性能提升.展开更多
The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future I...The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future Internet Testbeds, and DPDK is a network packet accelerated platform, so we can use DPDK to improve performance. Meanwhile, green computing is advocated for in the fu- ture of the internet. Most existing efforts have contributed to improving either performance or accuracy. We, however, shifted the focus to energy-efficiency. We find that high per- formance comes at the cost of high energy consumption. Therefore, we started from a widely used high performance schema, deeply studying the multi-core platform, especially in terms of parallelism, core allocation, and fre- quency controlling. On this basis, we proposed an AFfinity-oriented Fine-grained CONtrolling (AFFCON) mechanism in order to improve energy efficiency with desirable performance. As clearly demonstrated through a series of evaluative experiments, our proposal can reduce CPU power consumption by up to 11% while maintaining throughput at the line rate.展开更多
Due to the broadcast nature of wireless transmission medium,security threats may hinder propagation of cognitive radio systems for commercial and military data application. This paper sets a channel error analytical f...Due to the broadcast nature of wireless transmission medium,security threats may hinder propagation of cognitive radio systems for commercial and military data application. This paper sets a channel error analytical framework and studies the joint impact of estimation errors and feedback delay on secrecy performance in cognitive radio networks. Under the assumption that system applies beamforming and jamming scheme,a multi-antenna cognitive base station( CBS) sends confidential signals to a secondary user( SU) in the presence of M primary users( PUs) and an eavesdropper. Assuming only imperfect channel state information( CSI) about the receivers is available,secrecy rate,outage probability,secrecy throughput are deduced to obtain a closed-form expression. It is shown that while the transmit power increases,secrecy throughput would reach to a constant. Simulation results show that feedback delay adversely impacts on secrecy rate,connection outage probability and secrecy throughput,while estimation error causes more impact on secrecy outage probability. Furthermore,the secrecy rate could increase progressively with the transmit power only if there exists no feedback delay.展开更多
In the promising cooperative communication systems,network performance is mainly affected by interference instead of noise.In this paper,we consider the performance degraded by the Poisson filed interference in the du...In the promising cooperative communication systems,network performance is mainly affected by interference instead of noise.In this paper,we consider the performance degraded by the Poisson filed interference in the dual-hop relay channels.We focus on the discussions of error outage probability (EOP) performance with a selective-decode-and-forward (SDF),amplify-and-forward (AF),or fixed-decode-and-forward (DF) cooperation protocol.Finally,the simulation results present the performance with different cooperation protocols with interference in a Poisson field.展开更多
Fast growth of mobile internet and internet-of-things has propelled the concept formation and research on 5G wireless communications systems which are to be standardized around 2020(IMT-2020).There will be diverse app...Fast growth of mobile internet and internet-of-things has propelled the concept formation and research on 5G wireless communications systems which are to be standardized around 2020(IMT-2020).There will be diverse application scenarios expected for 5G networks.Hence,key performance indicators(KPIs) of 5G systems would be very diverse,not just the peak data rate and average/edge spectral efficiency requirements as in previous generations.For each typical scenario,multiple technologies may be used independently or jointly to improve the transmission efficiency,to lower the cost,and to increase the number of connections,etc.Key enabling technologies are discussed which include massive MIMO,ultradense deployment specific techniques,nonorthogonal transmission,high frequency communications,etc.展开更多
This paper analyzes the possibility and benefits of interconnection of Northwest Power Grid with North China and Shangdong power grids. With different energy resources and power demand patterns, these three power grid...This paper analyzes the possibility and benefits of interconnection of Northwest Power Grid with North China and Shangdong power grids. With different energy resources and power demand patterns, these three power grids have large potential benefits in future interconnection.展开更多
With the rapid development of Internet of Things (IoT),the issue of trust in distributed routing systems has attracted more research attention.The existing trust management frameworks,however,suffer from some possible...With the rapid development of Internet of Things (IoT),the issue of trust in distributed routing systems has attracted more research attention.The existing trust management frameworks,however,suffer from some possible attacks in hostile environments,such as false accusation,collusion,on-off,and conflicting behavior.Therefore,more comprehensive models should be proposed to predict the trust level of nodes on potential routes more precisely,and to defeat several kinds of possible attacks.This paper makes an attempt to design an attack-resistant trust management model based on beta function for distributed routing strategy in IoT.Our model can evaluate and propagate reputation in distributed routing systems.We first describe possible attacks on existing systems.Our model is then proposed to establish reliable trust relations between self-organized nodes and defeat possible attacks in distributed routing systems.We also propose a theoretical basis and skeleton of our model.Finally,some performance evaluations and security analyses are provided to show the effectiveness and robustness of our model compared with the existing systems.展开更多
As for the factors affecting the heat transfer performance of complex and nonlinear oscillating heat pipe (OHP),grey relational analysis (GRA) was used to deal with the relationship between heat transfer rate of a loo...As for the factors affecting the heat transfer performance of complex and nonlinear oscillating heat pipe (OHP),grey relational analysis (GRA) was used to deal with the relationship between heat transfer rate of a looped copper-water OHP and charging ratio,inner diameter,inclination angel,heat input,number of turns,and the main influencing factors were defined.Then,forecasting model was obtained by using main influencing factors (such as charging ratio,interior diameter,and inclination angel) as the inputs of function chain neural network.The results show that the relative average error between the predicted and actual value is 4%,which illustrates that the function chain neural network can be applied to predict the performance of OHP accurately.展开更多
Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order ...Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.展开更多
文摘随者互联网时代的到来,如何提升互联网应用的交互性能逐渐成为时下的研究热点;而在当今的互联网环境中,网络带宽已经不是瓶颈,网络时延成为影响应用交互性能的关键因素.作为互联网时代的主要应用,Web应用的网络时延受到TCP尾部丢包现象的严重影响.Tail Loss Probe算法是一种通过发送探针包来触发恢复的高效易部署的TCP尾部丢包恢复算法,但其需要修改现有的TCP加速机制,存在影响互联网稳定性的风险.针对Tail Loss Probe算法存在的不足,提出一种Double Tail Loss Probe算法,该算法对不同的尾部丢包模式进行细化处理且在适当时机下发送两个探针包以加速恢复并实现与现有TCP机制的友好兼容,从而保证互联网数据流通的稳定性.实验表明,在不同的丢包粒度和传播时延下,Double Tail Loss Probe算法都展现出更快的恢复速度;尤其在丢包粒度较大时,相比Tail Loss Probe,该算法取得了约20%的性能提升.
基金supported by the National Science Foundation of China (No. 61472130, Research on Graphic Processing Units-based High-performance Packet Processing)the China Postdoctoral Science Foundation funded project (No. 61702174)
文摘The packet generator (pktgen) is a fundamental module of the majority of soft- ware testers used to benchmark network pro- tocols and functions. The high performance of the pktgen is an important feature of Future Internet Testbeds, and DPDK is a network packet accelerated platform, so we can use DPDK to improve performance. Meanwhile, green computing is advocated for in the fu- ture of the internet. Most existing efforts have contributed to improving either performance or accuracy. We, however, shifted the focus to energy-efficiency. We find that high per- formance comes at the cost of high energy consumption. Therefore, we started from a widely used high performance schema, deeply studying the multi-core platform, especially in terms of parallelism, core allocation, and fre- quency controlling. On this basis, we proposed an AFfinity-oriented Fine-grained CONtrolling (AFFCON) mechanism in order to improve energy efficiency with desirable performance. As clearly demonstrated through a series of evaluative experiments, our proposal can reduce CPU power consumption by up to 11% while maintaining throughput at the line rate.
基金Supported by the National Natural Science Foundation of China(No.61371122,61471393)the China Postdoctoral Science Foundation under a Special Financial Grant(No.2013T60912)
文摘Due to the broadcast nature of wireless transmission medium,security threats may hinder propagation of cognitive radio systems for commercial and military data application. This paper sets a channel error analytical framework and studies the joint impact of estimation errors and feedback delay on secrecy performance in cognitive radio networks. Under the assumption that system applies beamforming and jamming scheme,a multi-antenna cognitive base station( CBS) sends confidential signals to a secondary user( SU) in the presence of M primary users( PUs) and an eavesdropper. Assuming only imperfect channel state information( CSI) about the receivers is available,secrecy rate,outage probability,secrecy throughput are deduced to obtain a closed-form expression. It is shown that while the transmit power increases,secrecy throughput would reach to a constant. Simulation results show that feedback delay adversely impacts on secrecy rate,connection outage probability and secrecy throughput,while estimation error causes more impact on secrecy outage probability. Furthermore,the secrecy rate could increase progressively with the transmit power only if there exists no feedback delay.
基金supported by the joint state key program of the NSFC of China and the national railway ministry of China (Grant No.6083001)program for Changjiang scholars and innovative research team in University (Grant No.IRT0949)the programs of state key laboratory of traffic control and safety (RCS2008ZZ006 and RCS2008ZZ007)
文摘In the promising cooperative communication systems,network performance is mainly affected by interference instead of noise.In this paper,we consider the performance degraded by the Poisson filed interference in the dual-hop relay channels.We focus on the discussions of error outage probability (EOP) performance with a selective-decode-and-forward (SDF),amplify-and-forward (AF),or fixed-decode-and-forward (DF) cooperation protocol.Finally,the simulation results present the performance with different cooperation protocols with interference in a Poisson field.
文摘Fast growth of mobile internet and internet-of-things has propelled the concept formation and research on 5G wireless communications systems which are to be standardized around 2020(IMT-2020).There will be diverse application scenarios expected for 5G networks.Hence,key performance indicators(KPIs) of 5G systems would be very diverse,not just the peak data rate and average/edge spectral efficiency requirements as in previous generations.For each typical scenario,multiple technologies may be used independently or jointly to improve the transmission efficiency,to lower the cost,and to increase the number of connections,etc.Key enabling technologies are discussed which include massive MIMO,ultradense deployment specific techniques,nonorthogonal transmission,high frequency communications,etc.
文摘This paper analyzes the possibility and benefits of interconnection of Northwest Power Grid with North China and Shangdong power grids. With different energy resources and power demand patterns, these three power grids have large potential benefits in future interconnection.
基金supported by the National Natural Science Foundation of China under Grant No.61100219the Fundamental Research Funds for the Central Universities under Grant No.2012JBM010the Key Program of National Natural Science Foundation of China under Grant No.60833002
文摘With the rapid development of Internet of Things (IoT),the issue of trust in distributed routing systems has attracted more research attention.The existing trust management frameworks,however,suffer from some possible attacks in hostile environments,such as false accusation,collusion,on-off,and conflicting behavior.Therefore,more comprehensive models should be proposed to predict the trust level of nodes on potential routes more precisely,and to defeat several kinds of possible attacks.This paper makes an attempt to design an attack-resistant trust management model based on beta function for distributed routing strategy in IoT.Our model can evaluate and propagate reputation in distributed routing systems.We first describe possible attacks on existing systems.Our model is then proposed to establish reliable trust relations between self-organized nodes and defeat possible attacks in distributed routing systems.We also propose a theoretical basis and skeleton of our model.Finally,some performance evaluations and security analyses are provided to show the effectiveness and robustness of our model compared with the existing systems.
基金Project(531107040300) supported by the Fundamental Research Funds for the Central Universities in ChinaProject(2006BAJ04B04) supported by the National Science and Technology Pillar Program during the Eleventh Five-year Plan Period of China
文摘As for the factors affecting the heat transfer performance of complex and nonlinear oscillating heat pipe (OHP),grey relational analysis (GRA) was used to deal with the relationship between heat transfer rate of a looped copper-water OHP and charging ratio,inner diameter,inclination angel,heat input,number of turns,and the main influencing factors were defined.Then,forecasting model was obtained by using main influencing factors (such as charging ratio,interior diameter,and inclination angel) as the inputs of function chain neural network.The results show that the relative average error between the predicted and actual value is 4%,which illustrates that the function chain neural network can be applied to predict the performance of OHP accurately.
基金supported by the project"the Cross Layer Optimization Technique for IMT-Advanced " under Grant No.2010ZX03003-001-01-03
文摘Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.