期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Coordinated and Balanced Growth Between Telecom Networks and Internet
1
作者 Xu Heyuan (Institute of Communication Standards Research, China Academy of Telecommunication Research, MIIT, Beijing 100045, P.R.China) 《ZTE Communications》 2008年第4期6-10,共5页
As two existing networks, the telecom network and the Internet differ greatly in terms of business patterns, service quality, security and regulations, whilst technical development makes services provided by the two n... As two existing networks, the telecom network and the Internet differ greatly in terms of business patterns, service quality, security and regulations, whilst technical development makes services provided by the two networks penetrate each other. This article describes the status quo of the telecom network and the Internet as well as the problems faced by each of them, analyzes the causes of those problems, and makes suggestions on coordinated and balanced development of the telecom network and the Internet. 展开更多
关键词 NGN ITU As Coordinated and Balanced Growth Between Telecom networks and internet
下载PDF
Analysis of Mobile and Internet Network Coverage: Propagation of Electromagnetic Waves and Concept of Digital Divide in Burundi
2
作者 Apollinaire Bigirimana Jérémie Ndikumagenge +2 位作者 Sami Tabbane Romeo Nibitanga Hassan Kibeya 《Open Journal of Antennas and Propagation》 2024年第1期1-18,共18页
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti... Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services. 展开更多
关键词 Coverage of Mobile networks and internet Digital Divide Rural and Isolated Areas Antenna Connectivity and Digital Inclusion
下载PDF
Determination of Threshold for Energy Detection in Cognitive Radio Sensor Networks 被引量:4
3
作者 郝建军 黎晋 《China Communications》 SCIE CSCD 2011年第1期14-19,共6页
The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization effici... The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result. 展开更多
关键词 internet of Sensor networks energy Things Cognitive Radio detection THRESHOLD
下载PDF
An Internet of Energy Things Based on Wireless LPWAN 被引量:25
4
作者 Yonghua Song Jin Lin +1 位作者 Ming Tang Shufeng Dong 《Engineering》 SCIE EI 2017年第4期460-466,共7页
Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM) of energy systems has drawn consid... Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM) of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the lnternet of Energy Things (IoET) in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN). The primary advantage of LPWAN over general packet radio service (GPRS) and area Internet of Things (loT) is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN tech- nologies of narrow-band Internet of Things (NB-IoT) and Long Range (LORa) technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios. 展开更多
关键词 Low-power wide-area network internet of Things Narrow-band lnternet of Things LoRa technology Demand-side management
下载PDF
Smart Service System(SSS):A Novel Architecture Enabling Coordination of Heterogeneous Networking Technologies and Devices for Internet of Things 被引量:6
5
作者 yongan guo hongbo zhu longxiang yang 《China Communications》 SCIE CSCD 2017年第3期130-144,共15页
In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the col... In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the collocated devices which employ different communication technologies. Consequently, the communication between these devices will be realized only by using the gateway nodes. This will cause the inefficient use of wireless resources. Therefore, in this paper, a smart service system(SSS) architecture is proposed, which consists of smart service terminal(SST), and smart service network(SSN), to realize the Io T in a general environment with diverse communication networks, devices, and services. The proposed architecture has the following advantages: i) the devices in this architecture cover multiple types of terminals and sensor-actuator devices; ii) the communications network therein is a converged network, and will coordinate multiple kinds of existing and emerging networks. This converged network offers ubiquitous access for various sensors and terminals; iii) the architecture has services and applications covering all smart service areas. It also provides theadaptability to new services and applications. A SSS architecture-based smart campus system was developed and deployed. Evaluation experiments of the proposed smart campus system demonstrate the SSS's advantages over the existing counterparts, and verify the effectiveness of the proposed architecture. 展开更多
关键词 internet of Things network architecture clean slate evolutionary approach network heterogeneity reconfiguration
下载PDF
Internet and Telecom Network Technologies Study
6
作者 Jiang Lintao (China Academy of Telecommunication Research of MIIT, Beijing 100083, P. R. China) 《ZTE Communications》 2008年第4期1-5,共5页
The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tr... The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tremendous transformation of the Internet external environment. The Internet is at a development crossroad; and its direction of development has attracted great attention from the world. On the other hand, the telecom industry is in a rather passive position as the result of the great impact the Internet technology has posted on it. The telecom industry has failed in defining its own developing direction and technology breakthrough; therefore, it is also at a crossroad. The development of both the Internet and the telecom networks will lead to the development of Next Generation Network (NGN) technologies. Industrial attention and research should be focused on the key NGN technologies, solutions to problems in the development of these technologies, and their commercialization in a short term. 展开更多
关键词 internet and Telecom Network Technologies Study
下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
7
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial internet of Things(IIoT)network IIoT service mobile edge computing(MEC) edge cloud selection MEC-aided application
下载PDF
Research on the Propagation Models and Defense Techniques of Internet Worms
8
作者 Tian-Yun Huang 《Journal of Electronic Science and Technology of China》 2008年第1期32-38,共7页
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give... Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out. 展开更多
关键词 Defense system internet worm network security propagation model
下载PDF
Saving Environment Using Internet of Things: Challenges and the Possibilities
9
作者 Praneet Sah 《Advances in Internet of Things》 2016年第4期55-64,共10页
The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mai... The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mainstream market due to its “cryptic” nature which requires technical knowledge prior to its use. Lack of strong business model (by companies) and inability to adapt to new rapid changes (by consumers) are the two primary factors contributing to the fact that IoT is well ahead of its times but it need no longer be. In this paper, I’ve created a setup for smart home that allows the users to control their electrical appliances from internet and even makes the appliances smart enough to react to the environmental conditions on their own. Using this setup, I observed the pattern in which electricity consumption and carbon footprints reduced as compared to the conventional setup i.e. without IoT. Analyzing this data provided me a solid proof that IoT definitely helps us to save electricity and environment. Since IoT is beneficial for all, I, then focused on the challenges that are hampering the penetration of IoT into the daily lives of consumers and how the consumer is overlooking the benefits that it has to offer, which even includes a primary concern for many, i.e. saving money. This paper is overall aimed to change the way a consumer thinks about IoT and to provide a solid ground to how it is beneficial. 展开更多
关键词 Arduino Based Projects Embedded Devices internet of Things Home Area Network RELAY Smart Homes
下载PDF
Digital Literacy in the Rural Environment of Rivers State, Nigeria
10
作者 Priye E.Iyalla-Amadi 《Sino-US English Teaching》 2024年第2期83-88,共6页
While literacy can generally be defined as the basic ability to read,write,and also count,digital literacy can be described as the ability to perform all these tasks using electronic means.These means would include mo... While literacy can generally be defined as the basic ability to read,write,and also count,digital literacy can be described as the ability to perform all these tasks using electronic means.These means would include modern electronic gadgets,such as mobile phones,tablets,computers,kindle books,and the like.To be digitally literate would therefore require the existence of modern technologies such as internet facilities that would make it possible to access online reading and writing.The rural environment,particularly in developing areas,is usually characterised by a seeming lack of modern amenities and even worse,digital internet networks.Yet,those who live in the rural areas of Rivers State belong to the modern digital era and deserve to be digitally literate.This paper examines the prerequisites for digital literacy and explores how these can be achieved for citizens who inhabit the rural areas of an industrially-nascent state like Rivers State. 展开更多
关键词 digital literacy electronic means internet networks rural areas
下载PDF
The Quantitative Law of Network Information Growth 被引量:1
11
作者 Jingehuan Hou Tingxiao Wen Junping Qiu 《Chinese Business Review》 2004年第2期10-19,共10页
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab... Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information. 展开更多
关键词 webmetrics law of network information growth network information multiplier internet economy central information base
下载PDF
Data Fusion-Based Machine Learning Architecture for Intrusion Detection
12
作者 Muhammad Adnan Khan Taher M.Ghazal +1 位作者 Sang-Woong Lee Abdur Rehman 《Computers, Materials & Continua》 SCIE EI 2022年第2期3399-3413,共15页
In recent years,the infrastructure of Wireless Internet of Sensor Networks(WIoSNs)has been more complicated owing to developments in the internet and devices’connectivity.To effectively prepare,control,hold and optim... In recent years,the infrastructure of Wireless Internet of Sensor Networks(WIoSNs)has been more complicated owing to developments in the internet and devices’connectivity.To effectively prepare,control,hold and optimize wireless sensor networks,a better assessment needs to be conducted.The field of artificial intelligence has made a great deal of progress with deep learning systems and these techniques have been used for data analysis.This study investigates the methodology of Real Time Sequential Deep Extreme LearningMachine(RTS-DELM)implemented to wireless Internet of Things(IoT)enabled sensor networks for the detection of any intrusion activity.Data fusion is awell-knownmethodology that can be beneficial for the improvement of data accuracy,as well as for the maximizing of wireless sensor networks lifespan.We also suggested an approach that not only makes the casting of parallel data fusion network but also render their computations more effective.By using the Real Time Sequential Deep Extreme Learning Machine(RTSDELM)methodology,an excessive degree of reliability with a minimal error rate of any intrusion activity in wireless sensor networks is accomplished.Simulation results show that wireless sensor networks are optimized effectively to monitor and detect any malicious or intrusion activity through this proposed approach.Eventually,threats and a more general outlook are explored. 展开更多
关键词 Wireless internet of sensor networks machine learning deep extreme learning machine artificial intelligence data fusion
下载PDF
Design of Enterprise Storage Architecture for Optimal Business Continuity
13
作者 Rekha Singhal Prasad Pawar +2 位作者 Shreya Bokare Rashmi Kale Yogendra Pal 《Journal of Electronic Science and Technology》 CAS 2010年第3期206-214,共9页
This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol s... This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which will ensure zero data loss and quick recovery. The solution makes use of Internet protocol storage area network (IPSAN), which is used for data management without burdening the application server, as well as mix of synchronous and semi-synchronous replication techniques to replicate data to remote disaster recovery site. We have presented the detailed design of both synchronous and semi-synchronous with case study of using open source database postgres to prove our point for optimal business continuity. The theoretical presentation is also given for the same. 展开更多
关键词 Business continuity disaster recovery internet protocol storage area network (IPSAN) semi-synchronous replication synchronous replication.
下载PDF
Comprehensive Analysis of Caching Performance under Probabilistic Traffic Patterns for Content Centric Networking
14
作者 Dabin Kim Young-Bae Ko Sung-Hwa Lim 《China Communications》 SCIE CSCD 2016年第3期127-136,共10页
The phenomenon of data explosion represents a severe challenge for the upcoming big data era.However,the current Internet architecture is insufficient for dealing with a huge amount of traffic owing to an increase in ... The phenomenon of data explosion represents a severe challenge for the upcoming big data era.However,the current Internet architecture is insufficient for dealing with a huge amount of traffic owing to an increase in redundant content transmission and the end-point-based communication model.Information-centric networking(ICN)is a paradigm for the future Internet that can be utilized to resolve the data explosion problem.In this paper,we focus on content-centric networking(CCN),one of the key candidate ICN architectures.CCN has been studied in various network environments with the aim of relieving network and server burden,especially in name-based forwarding and in-network caching functionalities.This paper studies the effect of several caching strategies in the CCN domain from the perspective of network and server overhead.Thus,we comprehensively analyze the in-network caching performance of CCN under several popular cache replication methods(i.e.,cache placement).We evaluate the performance with respect to wellknown Internet traffic patterns that follow certain probabilistic distributions,such as the Zipf/Mandelbrot–Zipf distributions,and flashcrowds.For the experiments,we developed an OPNET-based CCN simulator with a realistic Internet-like topology. 展开更多
关键词 content-centric networking probabilistic internet traffic patterns caching performance analysis OPNET
下载PDF
Optimized Consensus for Blockchain in Internet of Things Networks via Reinforcement Learning
15
作者 Yifei Zou Zongjing Jin +2 位作者 Yanwei Zheng Dongxiao Yu Tian Lan 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第6期1009-1022,共14页
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumpt... Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumption of computing/communication resources and usually require reliable communications with bounded delay.However,these protocols may be unsuitable for Internet of Things(IoT)networks because the IoT devices are usually lightweight,battery-operated,and deployed in an unreliable wireless environment.Therefore,this paper studies an efficient consensus protocol for blockchain in IoT networks via reinforcement learning.Specifically,the consensus protocol in this work is designed on the basis of the Proof-of-Communication(PoC)scheme directly in a single-hop wireless network with unreliable communications.A distributed MultiAgent Reinforcement Learning(MARL)algorithm is proposed to improve the efficiency and fairness of consensus for miners in the blockchain system.In this algorithm,each agent uses a matrix to depict the efficiency and fairness of the recent consensus and tunes its actions and rewards carefully in an actor-critic framework to seek effective performance.Empirical results from the simulation show that the fairness of consensus in the proposed algorithm is guaranteed,and the efficiency nearly reaches a centralized optimal solution. 展开更多
关键词 consensus in blockchain Proof-of-Communication(PoC) MultiAgent Reinforcement Learning(MARL) internet of Things(IoT)networks
原文传递
Towards Next Generation Internet Management:CNGI-CERNET2 Experiences 被引量:2
16
作者 杨家海 张辉 +1 位作者 张金祥 安常青 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第3期482-494,共13页
Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 netwo... Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 networks' management need is necessary, it is more urgent to coin a new network management architecture to accommodate the scalability and extensibility requirements of next generation Internet management. The paper proposes a novel network management architecture, IMN (Internet Management Network), which creates an overlay network of management nodes. While each management node can perform management tasks autonomously and independently, it can finish more sophisticated management tasks by collaboratively invoking management operations or sharing information provided by other management nodes. P2P-based communication services are introduced in IMN to enable such collaboration. The paper presents a prototyping implementation based on the Web service related technology, as well as some of the key technologies, especially solutions to those issues arising from the management practice of CERNET2. Experiences of deployment of CERNET2 operation and lessons learned from the management practice are discussed. 展开更多
关键词 network management internet management network IPV6 SNMP Web service
原文传递
Distributed Algorithms for Event Reporting in Mobile-Sink WSNs for Internet of Things 被引量:5
17
作者 Catalina Aranzazu-Suescun Mihaela Cardei 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第4期413-426,共14页
Wireless Sensor Networks(WSNs) have many applications, such as climate monitoring systems, fire detection, smart homes, and smart cities. It is expected that WSNs will be integrated into the Internet of Things(IoT... Wireless Sensor Networks(WSNs) have many applications, such as climate monitoring systems, fire detection, smart homes, and smart cities. It is expected that WSNs will be integrated into the Internet of Things(IoT)and participate in various tasks. WSNs play an important role monitoring and reporting environment information and collecting surrounding context. In this paper we consider a WSN deployed for an application such as environment monitoring, and a mobile sink which acts as the gateway between the Internet and the WSN. Data gathering is a challenging problem in WSNs and in the IoT because the information has to be available quickly and effectively without delays and redundancies. In this paper we propose several distributed algorithms for composite event detection and reporting to a mobile sink. Once data is collected by the sink, it can be shared using the IoT infrastructure. We analyze the performance of our algorithms using WSNet simulator, which is specially designed for event-based WSNs. We measure various metrics such as average residual energy, percentage of composite events processed successfully at the sink, and the average number of hops to reach the sink. 展开更多
关键词 composite events distributed algorithm energy efficiency event-based clustering internet of Things mobile sink wireless sensor networks
原文传递
IoT-Based Cost Saving Offloading System for Cellular Networks 被引量:1
18
作者 Zhuojun Duan Mingyuan Yan +2 位作者 Qilong Han Lijie Li Yingshu Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第4期379-388,共10页
Nowadays, with the new techniques available in hardware and software, data requests generated by applications of mobile devices have grown explosively. The large amount of data requests and their responses lead to hea... Nowadays, with the new techniques available in hardware and software, data requests generated by applications of mobile devices have grown explosively. The large amount of data requests and their responses lead to heavy traffic in cellular networks. To alleviate the transmission workload, offloading techniques have been proposed, where a cellular network distributes some popular data items to other wireless networks, so that users can directly download these data items from the wireless network around them instead of the cellular network.In this paper, we design a Cost Saving Offloading System(CoSOS), where the Internet of Things(IoT) is used to undertake partial data traffic and save more bandwidth for the cellular network. Two types of algorithms are proposed to handle the popular data items distribution among users. The experimental results show that CoSOS is useful in saving bandwidth and decreasing the cost for cellular networks. 展开更多
关键词 internet of Things(IoT) cellular networks cost minimization
原文传递
A Survey of Bitmap Index Compression Algorithms for Big Data 被引量:5
19
作者 Zhen Chen Yuhao Wen +6 位作者 Junwei Cao Wenxun Zheng Jiahui Chang Yinjun Wu Ge Ma Mourad Hakmaoui Guodong Peng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第1期100-115,共16页
With the growing popularity of Internet applications and the widespread use of mobile Internet, Internet traffic has maintained rapid growth over the past two decades. Internet Traffic Archival Systems(ITAS) for pac... With the growing popularity of Internet applications and the widespread use of mobile Internet, Internet traffic has maintained rapid growth over the past two decades. Internet Traffic Archival Systems(ITAS) for packets or flow records have become more and more widely used in network monitoring, network troubleshooting, and user behavior and experience analysis. Among the three key technologies in ITAS, we focus on bitmap index compression algorithm and give a detailed survey in this paper. The current state-of-the-art bitmap index encoding schemes include: BBC, WAH, PLWAH, EWAH, PWAH, CONCISE, COMPAX, VLC, DF-WAH, and VAL-WAH. Based on differences in segmentation, chunking, merge compress, and Near Identical(NI) features, we provide a thorough categorization of the state-of-the-art bitmap index compression algorithms. We also propose some new bitmap index encoding algorithms, such as SECOMPAX, ICX, MASC, and PLWAH+, and present the state diagrams for their encoding algorithms. We then evaluate their CPU and GPU implementations with a real Internet trace from CAIDA. Finally, we summarize and discuss the future direction of bitmap index compression algorithms. Beyond the application in network security and network forensic, bitmap index compression with faster bitwise-logical operations and reduced search space is widely used in analysis in genome data, geographical information system, graph databases, image retrieval, Internet of things, etc. It is expected that bitmap index compression will thrive and be prosperous again in Big Data era since 1980s. 展开更多
关键词 internet traffic big data traffic archival network security bitmap index bitmap compression algorithm
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部