In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ...In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.展开更多
With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management cond...With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction.展开更多
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g...Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.展开更多
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ...With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.展开更多
After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set o...After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set ofparameters for performance evaluation are proposed.展开更多
The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key pro...The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key projects:a scientific database project and a national computing and networking facility of China (NCFC).展开更多
The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main ob...The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main objective of the course is to train students to have various skills,including those of enterprise scale network construction,network management,and network maintenance.Influenced by traditional teaching for a long time,the existing teaching of the course in colleges and universities urgently needs reform;otherwise,it will not be able to meet the social demand for talents in the new era.This paper focuses on the practical problems of the Computer Network teaching reform and proposes some efiective reform suggestions,hoping to engender an efficient link among the Computer Network course teaching,talent training,and the social needs in colleges and universities.展开更多
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2...In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.展开更多
This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then t...This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then the advantages of college English autonomous learning dynamic teaching mode under computer network technology are discussed.After that,it demonstrates a case study of a Computer-assisted English teaching model in academic writing.展开更多
Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive area...Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive areas. Unfortunately, it also has some disadvantages such as increased network workload, and inconvenience in disaster recovery. To overcome these disadvantages, we propose a channel bonding technique and provide hot backup functions in the designed NAS system, named HUSTserver. Channel bonding means merging multiple Ethernet channels into integrated one, and that the data packets can be transferred through any available network channels in a parallel mode. The hot backup function provides automatic data mirroring among servers. In this paper, we first describe the whole system prototype from a software and hardware architecture view. Then, multiple Ethernet and hot backup technologies that distinguish HUSTserver from others are discussed in detail. The findings presented demonstrate that network bandwidth can be scaled by the use of multiple commodity networks. Dual parallel channels of commodity 100 Mbps Ethernet are both necessary and sufficient to support the data rates of multiple concurrent file transfers. And the hot backup function introduced in our system provides high data accessibility.展开更多
The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high perfo...The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware, wireless/mobile network, new generation network services and applications, and foundational theories on network modeling. Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.展开更多
A multicast routing algorithm of multiple QoS constraints based on widest-bandwidth (MRQW) which takes available bandwidth as the prime metric, considering the constraints of the surplus energy of the node, delay an...A multicast routing algorithm of multiple QoS constraints based on widest-bandwidth (MRQW) which takes available bandwidth as the prime metric, considering the constraints of the surplus energy of the node, delay and delay jitter, is presented. The process of routing based on MRQW is provided for as well. Correctness proof and the complexity analysis of the MRQW are also given in the paper. Simulation results show that the MRQW has a good performance in creating multicast trees. It not only satisfys multiple QoS constraints but also makes multicast links have larger available bandwidth展开更多
From the viewpoint of service level agreements, the transmission accuracy rate is one of critical performance indicators to assess internet quality for system managers and customers. Under the assumption that each arc...From the viewpoint of service level agreements, the transmission accuracy rate is one of critical performance indicators to assess internet quality for system managers and customers. Under the assumption that each arc's capacity is deterministic, the quickest path problem is to find a path sending a specific of data such that the transmission time is minimized. However, in many real-life networks such as computer networks, each arc has stochastic capacity, lead time and accuracy rate. Such a network is named a multi-state computer network. Under both assured accuracy rate and time constraints, we extend the quickest path problem to compute the probability that d units of data can be sent through multiple minimal paths simultaneously. Such a probability named system reliability is a performance indicator to provide to managers for understanding the ability of system and improvement. An efficient algorithm is proposed to evaluate the system reliability in terms of the approach of minimal paths.展开更多
Based on the Intranet technique,the design and implementation of rural area electricity Management Information System(RAEMIS)is researched.And then,a new RAEMIS with opening dynamic multimedia hypertext architecture i...Based on the Intranet technique,the design and implementation of rural area electricity Management Information System(RAEMIS)is researched.And then,a new RAEMIS with opening dynamic multimedia hypertext architecture is proposed.The advantages of new system include uniform user interface friendly,quick and accurate database accessing,and easy maintenance.展开更多
Digital images have been applied to various areas such as evidence in courts.However,it always suffers from noise by criminals.This type of computer network security has become a hot issue that can’t be ignored.In th...Digital images have been applied to various areas such as evidence in courts.However,it always suffers from noise by criminals.This type of computer network security has become a hot issue that can’t be ignored.In this paper,we focus on noise removal so as to provide guarantees for computer network security.Firstly,we introduce a well-known denoising method called Expected Patch Log Likelihood(EPLL)with Gaussian Mixture Model as its prior.This method achieves exciting results in noise removal.However,there remain problems to be solved such as preserving the edge and meaningful details in image denoising,cause it considers a constant as regularization parameter so that we denoise with the same strength on the whole image.This leads to a problem that edges and meaningful details may be oversmoothed.Under the consideration of preserving edges of the image,we introduce a new adaptive parameter selection based on EPLL by the use of the image gradient and variance,which varies with different regions of the image.Moreover,we add a gradient fidelity term to relieve staircase effect and preserve more details.The experiment shows that our proposed method proves the effectiveness not only in vision but also on quantitative evaluation.展开更多
A router architecture based upon ForCES (Forwarding and Control Element Separation), which is being standardized by IETF ForCES working group, gains its competitive advantage over traditional router architectures in...A router architecture based upon ForCES (Forwarding and Control Element Separation), which is being standardized by IETF ForCES working group, gains its competitive advantage over traditional router architectures in flexibility, programmability, and cost-effectiveness. In this paper, design and implementation of a ForCES-based router (ForTER) is illustrated. Firstly, the implementation architecture of ForTER is discussed. Then, a layered software model, which well illustrates ForCES features, is proposed. Based on the model, design and implementation of Control Element (CE) and Forwarding Element (FE) in ForTER are introduced in detail. Moreover, security for ForTER is considered and an algorithm to prevent DoS attacks is presented. Lastly, experiments of ForTER are illustrated for routing and running routing protocols, network management, DoS attack prevention, etc. The experimental results show the feasibility of the ForTER design. Consequently, the ForTER implementation basically testifies the feasibility of ForCES architecture and some IETF ForCES specifications.展开更多
The article briefly introduces the three stages that China Post experienced and the circumstances of the fundamental network construction, focusing on introducing the three sorts of services based on postal comprehens...The article briefly introduces the three stages that China Post experienced and the circumstances of the fundamental network construction, focusing on introducing the three sorts of services based on postal comprehensive computer network's applicable software system : postal financial service ; traditional service electrified ; electronic postal service. Finally the thinking for future China Post's informationizing constructing is put forward.展开更多
To deal with the challenges of both computation-complexity and algorithm-scalability posed to the design of an IPSec engine, we develop PAC (parallel algorithm core), called PAC, employed in an IPSec engine, which c...To deal with the challenges of both computation-complexity and algorithm-scalability posed to the design of an IPSec engine, we develop PAC (parallel algorithm core), called PAC, employed in an IPSec engine, which can meet requirements of both exploiting parallelism existing in IPSec packets and offering scalability in both the scales and types of cryptographic algorithms. With three kinds of parallelism and two kinds of transparency defined, a novel hierarchy of the specifically-designed parallel structure for PAC is presented, followed by corresponding mechanisms. With a simulation, the scalability of PAC is examined. For the purpose of performance evaluation, a Quasi Birth-and-Death (QBD) process is then established to model a simplified version of the proposed PAC. Performance evaluation of PAC in terms of two representative measures, throughput and mean packet waiting time, is numerically investigated. A comparison study is done on a simulation basis. Conclusions are finally drawn for providing a helpful guideline for both the design and implementation of our proposal.展开更多
An algorithm is proposed which can be used for the topology design of switched LAN with heavy traffic and multi-segments. The main principle of the algorithm is to split the whole traffic to segments as even as possib...An algorithm is proposed which can be used for the topology design of switched LAN with heavy traffic and multi-segments. The main principle of the algorithm is to split the whole traffic to segments as even as possible. The algorithm consists of binary division and ordinary division. When the number of segments equals to powers of 2, binary division is used; ordinary division is based on binary division but suitable to more common cases. Both correctness and time complexity of the algorithm are discussed in detail, and a comparison of the algorithm with the best result is given at the same time.展开更多
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
文摘In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.
文摘With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction.
文摘Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.
文摘With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.
文摘After analysing and discussing the goal and problems of computer networkdesign, the authors developed a computer network CAD with detaileddescriptions. Its architecture, functions and modules are given. Lastly a set ofparameters for performance evaluation are proposed.
文摘The Computer Network Information Center(CNIC) is a newly-established CAS institute,which is engaged in the research and development of network and scientific databases.At present the Center is in charge of two key projects:a scientific database project and a national computing and networking facility of China (NCFC).
基金The 2021 Heilongjiang Education Scientific Planning Key Projects"Research and Practice of‘Multi-Course Fusion’Online and Ofifline Hybrid Teaching Mode Based on Improving Employment Competitiveness-Taking Computer Basic Course as An Example"(Project Number:GJB1421199 and GJB1422190)The 2019 Teaching Research Project of Heilongjiang Bayi Agricultural University"Online and Offline Hybrid Teaching of Office Automation Course"(Project Number:NDJY1918)The 2021 Teaching Research Project of Heilongjiang Bayi Agricultural University"Machine Learning Course Based on Case Teaching in Application Exploration of Big Data Specialty"(Project Number:NDJY2121)。
文摘The Computer Network course is widely offered in colleges and universities.This course is both theoretical and practical.It organically combines theory and practice in order to achieve the goal of teaching.The main objective of the course is to train students to have various skills,including those of enterprise scale network construction,network management,and network maintenance.Influenced by traditional teaching for a long time,the existing teaching of the course in colleges and universities urgently needs reform;otherwise,it will not be able to meet the social demand for talents in the new era.This paper focuses on the practical problems of the Computer Network teaching reform and proposes some efiective reform suggestions,hoping to engender an efficient link among the Computer Network course teaching,talent training,and the social needs in colleges and universities.
文摘In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.
文摘This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then the advantages of college English autonomous learning dynamic teaching mode under computer network technology are discussed.After that,it demonstrates a case study of a Computer-assisted English teaching model in academic writing.
文摘Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive areas. Unfortunately, it also has some disadvantages such as increased network workload, and inconvenience in disaster recovery. To overcome these disadvantages, we propose a channel bonding technique and provide hot backup functions in the designed NAS system, named HUSTserver. Channel bonding means merging multiple Ethernet channels into integrated one, and that the data packets can be transferred through any available network channels in a parallel mode. The hot backup function provides automatic data mirroring among servers. In this paper, we first describe the whole system prototype from a software and hardware architecture view. Then, multiple Ethernet and hot backup technologies that distinguish HUSTserver from others are discussed in detail. The findings presented demonstrate that network bandwidth can be scaled by the use of multiple commodity networks. Dual parallel channels of commodity 100 Mbps Ethernet are both necessary and sufficient to support the data rates of multiple concurrent file transfers. And the hot backup function introduced in our system provides high data accessibility.
基金supported in part by the National Natural Science Foundation of China under Grants No.90604003 and No.90604004by the National Grand Fundamental Research 973 Program of China under Grant No.2003CB314801.
文摘The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware, wireless/mobile network, new generation network services and applications, and foundational theories on network modeling. Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.
基金This project was supported by the National Natural Science Foundation of China (90304018)and the Natural ScienceFoundation of Hubei Province of China (2004ABA023)
文摘A multicast routing algorithm of multiple QoS constraints based on widest-bandwidth (MRQW) which takes available bandwidth as the prime metric, considering the constraints of the surplus energy of the node, delay and delay jitter, is presented. The process of routing based on MRQW is provided for as well. Correctness proof and the complexity analysis of the MRQW are also given in the paper. Simulation results show that the MRQW has a good performance in creating multicast trees. It not only satisfys multiple QoS constraints but also makes multicast links have larger available bandwidth
基金supported in part by the National Science Council,Taiwan,China,under Grant No.NSC 101-2628-E-011-005-MY3
文摘From the viewpoint of service level agreements, the transmission accuracy rate is one of critical performance indicators to assess internet quality for system managers and customers. Under the assumption that each arc's capacity is deterministic, the quickest path problem is to find a path sending a specific of data such that the transmission time is minimized. However, in many real-life networks such as computer networks, each arc has stochastic capacity, lead time and accuracy rate. Such a network is named a multi-state computer network. Under both assured accuracy rate and time constraints, we extend the quickest path problem to compute the probability that d units of data can be sent through multiple minimal paths simultaneously. Such a probability named system reliability is a performance indicator to provide to managers for understanding the ability of system and improvement. An efficient algorithm is proposed to evaluate the system reliability in terms of the approach of minimal paths.
文摘Based on the Intranet technique,the design and implementation of rural area electricity Management Information System(RAEMIS)is researched.And then,a new RAEMIS with opening dynamic multimedia hypertext architecture is proposed.The advantages of new system include uniform user interface friendly,quick and accurate database accessing,and easy maintenance.
基金This paper is partly supported by the National Natural Science Foundation of China(GRANT No.61672293).
文摘Digital images have been applied to various areas such as evidence in courts.However,it always suffers from noise by criminals.This type of computer network security has become a hot issue that can’t be ignored.In this paper,we focus on noise removal so as to provide guarantees for computer network security.Firstly,we introduce a well-known denoising method called Expected Patch Log Likelihood(EPLL)with Gaussian Mixture Model as its prior.This method achieves exciting results in noise removal.However,there remain problems to be solved such as preserving the edge and meaningful details in image denoising,cause it considers a constant as regularization parameter so that we denoise with the same strength on the whole image.This leads to a problem that edges and meaningful details may be oversmoothed.Under the consideration of preserving edges of the image,we introduce a new adaptive parameter selection based on EPLL by the use of the image gradient and variance,which varies with different regions of the image.Moreover,we add a gradient fidelity term to relieve staircase effect and preserve more details.The experiment shows that our proposed method proves the effectiveness not only in vision but also on quantitative evaluation.
基金Supported by the National Natural Science Foundation of China under Grant Nos. 60573116 and 60603072the National High Technology Development 863 Program of China under Grant No. 2007AA01Z201+1 种基金the Zhejiang Provincial NSF China under Grant Nos. Z106829, Y106747the Zhejiang Sci & Tech Project under Grant No. 2006C11215.
文摘A router architecture based upon ForCES (Forwarding and Control Element Separation), which is being standardized by IETF ForCES working group, gains its competitive advantage over traditional router architectures in flexibility, programmability, and cost-effectiveness. In this paper, design and implementation of a ForCES-based router (ForTER) is illustrated. Firstly, the implementation architecture of ForTER is discussed. Then, a layered software model, which well illustrates ForCES features, is proposed. Based on the model, design and implementation of Control Element (CE) and Forwarding Element (FE) in ForTER are introduced in detail. Moreover, security for ForTER is considered and an algorithm to prevent DoS attacks is presented. Lastly, experiments of ForTER are illustrated for routing and running routing protocols, network management, DoS attack prevention, etc. The experimental results show the feasibility of the ForTER design. Consequently, the ForTER implementation basically testifies the feasibility of ForCES architecture and some IETF ForCES specifications.
文摘The article briefly introduces the three stages that China Post experienced and the circumstances of the fundamental network construction, focusing on introducing the three sorts of services based on postal comprehensive computer network's applicable software system : postal financial service ; traditional service electrified ; electronic postal service. Finally the thinking for future China Post's informationizing constructing is put forward.
基金supported by the National High Technology Development 863 Program of China (Grant No. 2005AA121210).
文摘To deal with the challenges of both computation-complexity and algorithm-scalability posed to the design of an IPSec engine, we develop PAC (parallel algorithm core), called PAC, employed in an IPSec engine, which can meet requirements of both exploiting parallelism existing in IPSec packets and offering scalability in both the scales and types of cryptographic algorithms. With three kinds of parallelism and two kinds of transparency defined, a novel hierarchy of the specifically-designed parallel structure for PAC is presented, followed by corresponding mechanisms. With a simulation, the scalability of PAC is examined. For the purpose of performance evaluation, a Quasi Birth-and-Death (QBD) process is then established to model a simplified version of the proposed PAC. Performance evaluation of PAC in terms of two representative measures, throughput and mean packet waiting time, is numerically investigated. A comparison study is done on a simulation basis. Conclusions are finally drawn for providing a helpful guideline for both the design and implementation of our proposal.
文摘An algorithm is proposed which can be used for the topology design of switched LAN with heavy traffic and multi-segments. The main principle of the algorithm is to split the whole traffic to segments as even as possible. The algorithm consists of binary division and ordinary division. When the number of segments equals to powers of 2, binary division is used; ordinary division is based on binary division but suitable to more common cases. Both correctness and time complexity of the algorithm are discussed in detail, and a comparison of the algorithm with the best result is given at the same time.