Please wait a minute...

Current Issue

    25 December 2008, Volume 29 Issue 12
    Papers
    Research on resource scheduling of reconfigurable optical networks for distributed services
    Hui LI,Lei-ming MA,Yue-feng JI
    2008, 29(12):  10-15.  doi:1000-436X(2008)12-0010-06
    Asbtract ( 0 )   HTML ( 1)   PDF (1774KB) ( 625 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To provide customized services for concurrent distributed applications in optical networks,a load balanced multi-source multi-path parallel scheduling strategy was proposed,in which the network load and applications load are equally shared in different resources nodes.Simulation results validate that this strategy can effectively reduces the block ratio of distributed services compared with single-source single-path strategy and multi-source multi-path strategy.A testbed of reconfigurable optical network for distributed services is designed to validate the feasibility and effectively of the load balanced parallel scheduling strategy through an example of distributed GridFTP service.The experiment results show,considering the load balance of the application resources and network resources together,this strategy with can successfully decrease the process time of distributed services in grid system and improve system performance.

    Analysis and improvement of an ID-based authenticated key agreement protocol
    Xiao-fen WANG,Yuan CHEN,Guo-zhen XIAO
    2008, 29(12):  16-21.  doi:1000-436X(2008)12-0016-06
    Asbtract ( 0 )   HTML ( 1)   PDF (1228KB) ( 146 )   Knowledge map   
    References | Related Articles | Metrics

    The security of a recently proposed ID-based authenticated key agreement protocol was analyzed.Although it is provably secure in the standard model,a malicious PKG (private key generator) can still obtain all of the agreed session keys,that is,it doesn’t provide PKG-forward secrecy in escrowless mode.To satisfy the security requirement in escrowless mode,an improved version of the protocol was presented and it was proved to be a secure authenticated key agreement in the standard model.Results show that it provides perfect forward secrecy and PKG-forward secrecy.

    Efficient and extensible architecture of traffic identification at application layer
    Zhong ZHANG,Jian-hua YANG,Gao-gang XIE
    2008, 29(12):  22-31.  doi:1000-436X(2008)12-0022-10
    Asbtract ( 81 )   HTML ( 1)   PDF (746KB) ( 48 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The application identification system is required to be extensible and efficient for abundant rules and their frenquent updating.A new architecture of traffic identification ARTIST (architecture of traffic identification with script and operation tree) was proposed.An identification description language and its engine have been designed to support deep packet inspection,traffic statistics signature matching,multi-state combination based on a describing model for application identification method which can cover all existing identification methods in ARTIST.New identification method can be updated online with the script expediently.An identification operation tree structure is used to lessen the average identification rules quantity for packet checking.The experiment result shows that the ARTIST can both support the dynamic update for identification methods and rules and acquire a higher performance for high bandwidth.

    Research on traffic identification and wavelength scheduling scheme in optical internet
    Hong-xiang WANG,Yue-feng JI,Hui LI
    2008, 29(12):  32-36.  doi:1000-436X(2008)12-0032-05
    Asbtract ( 78 )   HTML ( 1)   PDF (803KB) ( 95 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A conception of universal inter-arrival time (UIAT),and a traffic identification algorithm based on UIAT by using Bayesian network was presented.A novel wavelength scheduling scheme with traffic identification was proposed and numerically simulated.Simulation results show,the average traffic identification accuracy of the method is higher than 98%,and the identification accuracies vary with the number of instances of that traffic in the training data.It is also shown that the traffic identification based wavelength scheduling scheme can match the wavelength utilization with application requirements better with higher wavelength efficiency.

    Self adaptive method for end-to-end available bandwidth estimation
    An-fu ZHOU,Min LIU,Zhong-cheng LI,Gao-gang XIE
    2008, 29(12):  37-45.  doi:1000-436X(2008)12-0037-09
    Asbtract ( 90 )   HTML ( 3)   PDF (2398KB) ( 224 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A low overhead,self adaptive method for end-to-end available bandwidth estimation was proposed.Firstly,on low utilization path,the mathematic equation between the probability that input probe gap increases caused by CT packets and the distribution of output probe gap was set up,and then CT load was derived from the equation.Secondly,a metric called gap symmetry (GS) was proposed to weigh the busyness degree of a network path,and the self adaptive available bandwidth estimation method based on GS was presented.NS-2 simulations show that compared with previous methods,our method shows its advantages in terms of measurement time,accuracy,and overhead.

    On-demand multi-user lightpath sharing through parallel transmission in optical grid networks
    Zhen-zhong WANG,Hui LI,Yue-feng JI
    2008, 29(12):  46-50.  doi:1000-436X(2008)12-0046-05
    Asbtract ( 62 )   HTML ( 1)   PDF (942KB) ( 257 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A lightpath sharing provision method for optical grid networks was proposed.It enables multi grid jobs employ one lightpath simultaneously according to their dynamic requests in their execution time.By aggregating multi grid jobs effectively,data transfer rate of gird applications on the lightpath could approach the maximum bandwidths supported by the lightpath.Experimental results show that,compared to conventional dedicated lightpath based optical grid networks,the proposed scheme could improve network resource utilization remarkably while the QoS of grid application is guaranteed.

    Automated mining of packet signatures for traffic identification at application layer with apriori algorithm
    Xing-bin LIU,Jian-hua YANG,Gao-gang XIE,Yue HU
    2008, 29(12):  51-59.  doi:1000-436X(2008)12-0051-09
    Asbtract ( 251 )   HTML ( 19)   PDF (1007KB) ( 396 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Automatic and accurate extraction packet signatures are the foundation of the precise traffic identification at application level.A method which can automatically extract the packet signatures of characteristic string and packet length for traffic identification at application layer was proposed.The identification rate,accuracy rate,positive identification error rate and negative identification error rate have been verified with experiment on some traces to valid the mined signatures.

    Research on semantics of trust transitivity in cryptographic primitives
    Li-cheng WANG,Yun PAN,Li-ze GU,Yi-xian YANG
    2008, 29(12):  60-65.  doi:1000-436X(2008)12-0060-06
    Asbtract ( 67 )   HTML ( 1)   PDF (491KB) ( 66 )   Knowledge map   
    References | Related Articles | Metrics

    Under the background of trustable computing and trust management,the semantics of trust transitivity in cryptographic primitives were concerned,and an embryo model was proposed.Further,by using the model as a tool,semantics of trust transitivity in several signature primitives are formulated.The results manifest that the proposed model has the capability to capture the semantics of trust transitivity in these sigature primitives.And finally,the prospect on potential applications of proposal in designing and analysis of trust management systems for IP networks was sketched.

    Technical Reports
    Denotation and application mechanism of complicated network shared management information model
    Zhi-peng GAO,Xue-song QIU,Zhi-li WANG,Wen-jing LI
    2008, 29(12):  66-72.  doi:1000-436X(2008)12-0066-07
    Asbtract ( 53 )   HTML ( 2)   PDF (1196KB) ( 152 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With IP-based environment of complicated network,in order to solve the network management’s problem of system expansibility,multi-domain management,uniform resource description,the method for modeling and using the shared management information model was presented from the mechanism of denotation to application.First,improve the language OWL,and OWL-NM was presented to build the template of shared management information model.Then,the rule aggregation mapping the IDL-based model to OWL-NM-based model was given.The third,storage application mechanism that can store the shared management information model to database was shown.At last,a prototype system was designed to prove the conclusions.

    Information model for analyzing impact of faults in Internet services
    Jing HUANG,Lu CHENG,Xue-song QIU,Hui-hu LONG
    2008, 29(12):  73-80.  doi:1000-436X(2008)12-0073-08
    Asbtract ( 64 )   HTML ( 1)   PDF (2049KB) ( 48 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By defining the major types of managed objects and their relationships with each other,an information model for fault impact analysis of Internet services was proposed.The relationships also included those between the high-level service and the underlying IT infrastructure which realized the service.An experiment was given afterwards and the results show that the model can be effectively used to analysis the impact of the fault in Internet services.

    Papers
    Cryptanalysis and improvement of a block cryptographic scheme based on logistic map
    Ji-yun YANG,Xiao-feng LIAO,Di XIAO,Shao-jiang DENG
    2008, 29(12):  86-90.  doi:1000-436X(2008)12-0086-05
    Asbtract ( 64 )   HTML ( 2)   PDF (685KB) ( 309 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Through analyzed of an improved chaotic block cryptographic scheme,it was found that this scheme behaves as a stream cipher indeed and generated keystream is independent with plaintext.By means of chosen plaintext attack,the keystream used can easily be recovered with little computing.The algorithm a chosen plaintext attack was proposed and validated by experiment.In order to avoid the flaw,a remedy which makes keystream dependent with plaintext though ciphertext feedback was suggested while keeping all the merits of the original cryptosystem.

    Technical Reports
    Elimination methods of resource allocation deadlock for optical networking real-time connection restoration
    Yue-ming LU,Tong ZHAO,Wei-li GONG,Hui LI,Yue-feng JI
    2008, 29(12):  91-95.  doi:1000-436X(2008)12-0091-05
    Asbtract ( 63 )   HTML ( 1)   PDF (918KB) ( 66 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The arrival of intelligent optical networking highlighted the unusual issue of distributed parallel deadlock in the allocation of resources and impacted on the performance of connection restoration.As the need for the properties of fast connection establishment and restoration,an elimination method of the resource parallel and distributed allocation deadlock was proposed for the optical networking real-time connection restoration based on a connection address priority,which reduces the blocking rate of connection establishment and restoration and shorten the connection recovery time in the high load.

    summarize
    Current and upcoming development in basic research of measurable,controllable and manageable IP network
    Luo-ming MENG,Gao-gang XIE,Xue-song QIU,Hui LI,Ke-ping LONG,Yi-xian YANG,Lie-guang ZENG
    2008, 29(12):  96-102.  doi:1000-436X(2008)12-0096-06
    Asbtract ( 69 )   HTML ( 3)   PDF (385KB) ( 361 )   Knowledge map   
    References | Related Articles | Metrics

    International program in science for measurable,controllable and manageable IP network was introduced,the research progress on measurable,controllable and manageable IP network was given,the prospect including network measurement,network management,network control was discussed.After analyzed of the prospect,a method studied measurable,controllable and manageable IP network was proposed.In this method,IP network and environment of IP network was studied as a entity.Two type of boundary condition including the boundary condition between IP network and service (application ),the boundary condition between IP network and optical transport network was given.

    Academic communication
    Modeling methods and model for flow-based IP network
    Ying WANG,Luo-ming MENG,Xue-song QIU,Zhi-li WANG
    2008, 29(12):  103-108.  doi:1000-436X(2008)12-0001-09
    Asbtract ( 47 )   HTML ( 2)   PDF (664KB) ( 144 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The management information modeling methods of IP network was studied based on the concept of “flow”,which describes the connectionless characteristics of IP network.The basic principles of information modeling were promoted,the characteristics of IP network as well as the concept of “flow” were analyzed,and the transform mechanisms from connectionless functional architecture components to IP network managed object classes were discussed.Based on the above methods,a management information model was built,which focuses on the network level characteristics of IP network.The model had been applied in the IP network management environment and proved effective.

    Combining Alamouti coding with V-BLAST through dynamic antenna grouping
    Ming-hua XIA,Yuan-ping ZHOU,Wen-kun WEN
    2008, 29(12):  109-115.  doi:1000-436X(2008)12-0108-07
    Asbtract ( 57 )   HTML ( 3)   PDF (1718KB) ( 269 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    V-BLAST is combined with Alamouti coding in MIMO systems to take advantages of both spatial diversity and multiplexing techniques.Based on the optimal detection ordering information generated in the conventional V-BLAST systems,several bits feedback information was built without any additional computational complexity and then the transmit antennas are dynamically divided into two groups:the two weakest antennas are grouped for Alamouti coding and the rest antennas operates as V-BLAST.Through dramatically improving the BER performance of the first detection stage and suppressing the error propagation effect,the proposed algorithm achieves better BER performance over V-BLAST with same spectral efficiency,and it can be applied in the MIMO systems in which the number of transmit antennas is more than that of the receive antennas.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: