Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for generating and simplifying self-similarity traffic of network key node based on opening/closing source model

A key node and source model technology, applied in the field of electronic information, can solve problems such as complex flow input

Inactive Publication Date: 2013-08-21
BEIHANG UNIV
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a simplified method for generating self-similar traffic at key nodes of the network based on an on / off source model, and aims to solve the problem that the flow input is too complicated for a specific topology network test or simulation, and provides a method based on an on / off source model The self-similar traffic generation simplification method for key network nodes, unifies the traffic input of network edge nodes, and adjusts the input parameters to make the statistical characteristics of traffic carried by key network nodes consistent with that before the simplification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating and simplifying self-similarity traffic of network key node based on opening/closing source model
  • Method for generating and simplifying self-similarity traffic of network key node based on opening/closing source model
  • Method for generating and simplifying self-similarity traffic of network key node based on opening/closing source model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0070] Secondly, according to the obtained adjacency matrix (A((a ij ) n×n )) to get edge nodes (s) and key nodes (K), the implementation method is as follows:

[0071] (1) Add each column of A to get the node degree vector (v);

[0072] (2) Select the node whose element is 1 in V and store it in S as the edge node, with a total of 656 elements;

[0073] (3) Store the node represented by the largest number in V into K, which is the key node. That is, the node with the largest degree.

[0074] Step 2: Calculate the betweenness of key nodes and the change law of flow distribution of key nodes with input parameters

[0075] According to the adjacency matrix obtained in step 1, directly draw its topology map in Matlab, such as figure 1 As shown, the following determines the betweenness of key nodes and explores statistical laws. The implementation steps are as follows:

[0076] (1) For each edge node s(i), the target node T(j) is randomly selected with equal probability, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for generating and simplifying self-similarity traffic of a network key node based on an opening / closing source model comprises the following steps: (1) building a network topology structure chart and confirming the key node, (2) calculating a betweenness of the key node and a change rule of the traffic distribution of the key node along with input parameters, (3) confirming initial parameters of the opening / closing source model of generated data by an edge node, and (4) feeding back and adjusting input parameters, and enabling traffic statistical characteristics of the key node to be the same with a target value. By means of the four steps, the purpose of generating and simplifying the self-similarity traffic of the network key node based on the opening / closing source model is achieved. The method is a simple method used for generating the traffic of key nodes in large-scale network simulations and tests, ensures that under the situation of uniform and simple edge node traffic input, traffic stress which is the same with traffic stress of complex and polybasic edge node traffic input can be obtained, accordingly, provides the traffic stress for effectively analyzing the performance of the key node, and has good practicality and economic value.

Description

technical field [0001] The invention provides a simplified method for generating self-similar traffic of key network nodes based on an on / off source model, relates to a simplified method for generating network traffic based on an on / off source model, and belongs to the technical field of electronic information. Background technique [0002] With the rapid development of the Internet, the diversification of network applications and the rapid deployment of new network applications, network congestion has become a common fault in the network. Different from the physical failure of components in traditional reliability research, the direct cause of network congestion is insufficient processing capacity of network components, and the huge stress caused by a large amount of traffic applied to components is the root cause of congestion. Research in recent years has shown that the congestion failure of some key nodes in the network has a significant impact on the reliability of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/751H04L12/801H04L45/02
Inventor 黄宁伍志韬胡宁张越
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products