期刊文献+

校园网络流量控制的应用 被引量:3

Application of traffic control of campus networks
在线阅读 下载PDF
导出
摘要 从流量特性、建模复杂性、预测精度及应用场景等多角度进行分析比较,选用流量控制设备将网络带宽的管理提升为主动的、有效的、智能化的带宽管理服务,根据流量控制设备生成的日志总结了校园网络流量的规律,采取措施控制流量的分配,从而提升网络的利用率,结果证明,这种方法简便易行,性能指标较好地满足校园网络流量实时控制的需求. Different kinds of classic traffic prediction methods were reviewed.By comparison of their suitable data,prediction precision and suitable scene were presented.Using TTNET1000 to improve network bandwidth management services actively,effectively and intelligently,and some methods were taken according to the regularity drawn from the daily records of the traffic control facility,so as to raise the rate of campus networks utilization.Experimental results prove that this method is simple,and can meet the needs of real-time monitoring campus network traffic due to the better performance indicators.
作者 徐维 李兴军
出处 《武汉工程大学学报》 CAS 2012年第4期76-78,共3页 Journal of Wuhan Institute of Technology
关键词 网络管理 网络流量 流量控制 network management network traffic traffic control
  • 相关文献

参考文献4

二级参考文献16

  • 1周文莉,吴晓非.P2P技术综述[J].计算机工程与设计,2006,27(1):76-79. 被引量:112
  • 2李玉行,宋传志.P2P流量识别与监测[EB/OL].http://www.xllw.xn/n1836c12.aspx,2007.
  • 3佚名.业务识别与管理系统和网络流量的管理[EB/OL].http://network.51cto.com/art/200809/90119.htm,2008.
  • 4Sen S, Spatscheck O, Wang Dongmei.Accurate, scalable in-network identification of P2P traffic using application signatures [C].Proceedings of the 13th International Conference on WorldWide Web.New York,NY, USA:ACM,2004: 512- 521.
  • 5Karagiannis T, Broido A,Faloutsos M,et al.Transport layer identification of P2P traffic[C].Proeeedings of the 4th ACM SIGCOMM Conference on Internet Measurement. New York, NY, USA:ACM,2004:121 - 134.
  • 6周世杰,秦志光,吴春江.对等网络流量检测技术研究[EB/OL].http://www.qkzz.net/magazine/1009_6868/2007/05/1695937.htm,2007.
  • 7Kyoungwon Suh,Daniel R Figueiredo,Jim Kurose,et al.Characterizing and detecting skype-relayed traffic[C].lEEE Infocom, 2006.
  • 8Carl Livadas, Bob Walsh, David Lapsley, et al. Using machine learning techniques to identify botnet traffic[C].Proceedings of 2nd IEEE LCN Workshop on Network Security,2006.
  • 9Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic[C].Proceedings of Fifth IEEE International Symposium on Network Computing and Applications. Cambridge. Los Alamitos, CA, USA: IEEE Computer Society, 2006:93-102.
  • 10Allot.Traffic management [EB/OL] .http://www.sandi.co.jp/seminat/report-040610/pdf/azi.pdf.

共引文献36

同被引文献28

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部