Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016)

Session: Computer Networks

17 articles
Proceedings Article

Dynamic Routing Mechanism in Network Simulation Based on Topology Perception Time Series

Lei-gang SUN, Yu-feng MA, Li-ju CHEN, Bo WU
A fundamental requirement for any routing mechanism in network simulation is to truly reflect the forwarding process of packet from source to destination in the simulated topology. In current network simulators, all the nodes know the information instantaneously when the topology changed, which is obviously...
Proceedings Article

Simulation Oriented OWL-S Extension and Cloud Interaction

Zhi-hui JIANG, Jian-feng LU, Hui WANG, Yao-ping YU
In the field of cloud manufacturing, in order to evaluate cloud service composition better, simulation could be introduced into the process of cloud service composition. This job requires adding simulation information to the service description document. Besides, for achieving the simulation of cloud...
Proceedings Article

The Characteristics of Compound Models Designed for Internet of Things

Jing SU, Fei MA, Bing YAO
In order to study the scale-free of more and more real-life networks, we design, construct a class of compound network models by the methods of graph theory for understand and try to simulate network models from Internet of Things (IoT), and we computed the parameters of models, such as: average degree,...
Proceedings Article

A Cross-Layer Routing Protocol Based on Location Information for Multi-hop Wireless Ad hoc Networks with Directional Antenna

Tai-bin HUANG, Lei LEI
In multi-hop wireless ad hoc networks, communications with directional antennas can effectively improve the transmission range of the node. Most of existing directional routing protocols adopt the four-way handshaking mechanism which transmits and receives with directional and omnidirectional antennas...
Proceedings Article

Method for Measuring the Internet Devices and Applications Based on the Features

Chuan GAO, Han-bing YAN, Zi-Xiao JIA
With the continuous development of the Internet, the security problem of the Internet is more and more serious. The security postures of the Internet devices and applications have subjected extensive attention of the growing number of Internet users. In this paper, we put forward a measurement method...
Proceedings Article

Power Communication Optical Network Traffic Grooming Algorithm Based on Differentiated Services

Zhong-miao KANG, Xi-jie DONG, Hui-tong LIU, Liang-rui TANG
With the development of smart grid, the data service of large particle and IP in power communication network has been increasing, which has put forward a great challenge to the existing power communication optical network based on MSTP (Multi-Service Transfer Platform) technology and WDM (Wavelength...
Proceedings Article

An Adaptive Algorithm of Data Network Traverse Based on Node Analysis

Yan XU, Yi ZHENG, Yu ZHANG, Hui LIU, Hao CUI, Hai-lin LIU
In this paper we describe a data network traverse algorithm. It traverses based on ternary tree and has Depth First Search (DFS) feature. The data network modeling employs three types of components: Line, Node and Intersection. Each type has typical data structure to connect other type. This algorithm...
Proceedings Article

The Improvement of Network Performance by Using the Technique of PF-RING Zero-copy to Optimize Spark Streaming

Feng LIU, Zhan-rong LI, Yang GAO, Sheng-si LUO
Regarding the problem of lower utilization rate of broadband and data throughput in the real-time computations when Spark Streaming receiving and treating a large number of TCP packet, we proposed a technique of effective zero-copy of IO kernel and optimiazation of user protocol stack. By comparing and...
Proceedings Article

Customized Service's Empirical Analysis And Exploration In LifeBased On Double O2O Mode-A Case Study Of 'Suning V Purchase'

Yi-peng LI, Di WANG
With the rapid development of the Internet economy, people's consumption level is getting higher and higher, the demand for customized services is becoming increasingly apparent. At the same time double O2O mode shine in the Internet Age. Based on the field investigation in Wuhan, this paper studies...
Proceedings Article

An NDN-based Query Processing Framework for Networked Databases

Zhu-hua LIAO, Zeng-de TENG, Jian ZHANG, Yi-zhi LIU
Nowadays, massive databases have accumulated and networked in the large-scale and distributed networks, however, in which extensive data are still hard to be directly shared to or efficiently exploited by the users as many challenges and technical designs of query processing are arising in the networks....
Proceedings Article

Hadoop-based Intrusion Detection Technology and Data Visualization for Website Security

Xiao-ming ZHANG, Yu-xin WANG, Ge-tong ZHANG, Guang WANG
Network attack becomes more popular today. It is still difficult to detect the intrusion activity accurately for users websites through traditional approaches. A kind of integrated system is designed and established for the website security analysis based on Hadoop system. The core components of hardware...
Proceedings Article

SDNForensics: A Comprehensive Forensics Framework for Software Defined Network

Shu-hui ZHANG, Xiang-xu MENG, Lian-hai WANG
Software-defined networking (SDN) is an emerging network architecture, which decouples the control and data planes of a network. Owing to its openness and standardization, SDN enables researchers to design and implement new innovative network functions and protocols in a much simpler and flexible way....
Proceedings Article

The k-spined Cubes and Its Properties

Xin-Yun QIN, Dao-Yun XU
The diameter of hypercube and its properties is an important issue for improving thecommunication efficiency of interconnection network. A new variant SQ _n^k of the n-dimensional hypercube is introduced by a spinningfunction _k. In this variant, called k-spined cubes, neighbors of any node can be quickly...
Proceedings Article

A SQLite Recovery Method for Various Primary Key and B+tree Reorganization

Jiang DU, Ming-jian LI
Free blocks and free pages have tremendous forensic potential. Based on analyzing layouts of cells which have different types of keys, the mechanism of deletion and free blocks coalescing, a new recovering method with byte level accuracy is proposed. First, aiming at multiple keys' types and rewriting...
Proceedings Article

Efficient Content Delivery and Caching Scheme Using Network Coding in CCN

Yan LIU, Shun-zheng YU
Content Centric Networking (CCN) is a new network architecture around content dissemination and retrieval, which treats content as a primitive and routes content by name. Differently from the conventional content dissemination and retrieval of the CCN, we introduce a novel content delivery scheme based...
Proceedings Article

An Application Based on Regular Expression

Jian-Ping DU, Ya-Shu LIU
Hypertext is the main format on the Internet, which has the characteristic of the non-continuity and simple formal standard. This paper researches how to extract information from hypertext by regular expression, gives the example on extracting weather information base on the web of Sohu, Sina and Tencent...
Proceedings Article

Hauth:A Novel Approach for Network Visibility Protection

Xin WANG, Neng GAO, Ling-chen ZHANG
Software-Defined Networking (SDN) is a new paradigm that offers services and applications great power to manage network. Based on the consideration that the entire network visibility is the foundation of SDN, many attacks emerge in poisoning the network visibility, leading to severe host hijacking. Meanwhile,...