面向资源的普适服务网络体系基础研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
互联网高效的分组交换机制、灵活的可扩展性、以及终端强大可参与能力等优良特性,使其成为新一代网络设计的主要蓝本。然而,由于自发、无组织的设计和发展模式,以及网络环境和用户需求的日益变化,互联网的原始设计结构逐渐暴露出许多弊端和不足。
     本论文分析互联网原始设计结构问题,以新一代网络“基于分组交换,提供普适服务”为目标,提出面向资源(服务、数据)的普适服务网络设计。与传统研究不同,本文是一个自顶向下的系统性设计,将面向资源的设计原则贯穿到了互联网资源处理最主要的三个阶段:注册查询、连接建立、数据传输。论文依托国家973项目“一体化可信网络与普适服务体系基础研究”开展,可以看作是该项目提出的“标识分离映射”模型在解决互联网问题的一次尝试和应用,主要研究成果和创新点如下:
     ①基于“一体化可信网络与普适服务体系基础研究”提出的“标识分离映射”开放模型,首次系统提出自顶向下的面向资源互联网构架(体现在②③④中),并组网构建了完整的原型系统,实现了网页浏览、下载、视频等互联网主要应用;
     ②在资源注册查询阶段,设计实现面向资源的映射系统和统一注册查询机制,解决现有DNS面向主机带来的问题,并通过引入服务标识、连接标识及其映射完善互联网原始分层结构;
     ③在资源连接建立阶段,引入面向资源的优先级子连接设计和协商机制,根据②中的统一资源注册信息以及其它网络信息和用户偏好实现灵活的连接建立;
     ④在资源数据传输阶段,提出基于③中子连接的多连接多路径优先映射机制和面向资源的路径选择机制,从而实现新网络环境下互联网传输层新构架。
Efficient packet switching transmission,flexible scalability,and powerful end host make Internet be the blueprint of the new generation network.However, because of the design and development with spontaneous as-hoc model,and the changes of network environment and users need,there have been a lot of defects of Internet original design.
     This paper analysis the architecture shortcomings of Internet,with the object of providing pervasive service on packet network which is also the object of different research of new generation network,and introduces a Resource-Oriented(data,service) network design.Comparing with other researches,our research is a Top-Down system design,and uses Resource-Oriented to three main stages of network resource processing: registration,connection,and transform.This paper bases on the nation 973 project "Fundamental Research on the Architecture of Universal Trustworthy Network and Pervasive Services",the main research results and innovations are as follows:
     ①Based on "Identifier Separating Mapping Theory" of"Fundamental Research on the Architecture of Universal Trustworthy Network and Pervasive Services",this paper firstly introduces a Top-Down system design of Resource-Oriented network,and constructs the whole prototype including Web browse,download,and video on line.
     ②In the resource registration and finding stage,this paper designs and implements the mapping system based on Resource-Oriented and universal registration,which could solve the problems of DNS based on Host-Oriented,and makes Internet architecture integrity using connection identifier and its mapping.
     ③In the resource connection establish stage,this paper presents the connection and priority sub-connection establish based on Resource-Oriented and negotiation mechanism.This design supports flexible connection establish using the registration information,other network information and user preference.
     ④In the resource data transform stage,the paper introduces multi-connection and multi-path priority mapping mechanism and path choosing based on Resource-Oriented, which is a new transport layer framework.
引文
[1]The 3rd Generation Partnership Project(3GPP),[EB/OL].URL:http://www.3gpp.org/.
    [2]The 3rd Generation Partnership Project 2(3GPP2),[EB/OL].URL:http://www.3gpp2.org/.
    [3]4G,[EB/OL].URL:http://www.4g.co.uk/.
    [4]Next Generation Networking(NGN),[EB/OL].URL:http://www.itu.int/ITU-T/ngn/.
    [5]Next Generation Internet(NGI),[EB/OL].URL:http://eurongi.enst.fr/en_accueil.html.
    [6]China Next Generation Internet(CNGI),[EB/OL].URL:http://www.edu.cn/internet_2_1339/.
    [7]张宏科,苏伟.新网络体系基础研究--一体化网络与普适服务.电子学报,2007,35(4):593-598.
    [8]ICPS Conference Scope,[EB/OL].URL:http://icps2005.cs.ucr.edu/.
    [9]R.Stewart et al.Stream Control Transmission Protocol.RFC 2960,Internet Engineering Task Force,Oct.2000.
    [10]E.Kohler,M.Handley,S.Floyd.Datagram Congestion Control Protocol.RFC4340,Internet Engineering Task Force,March 2006.
    [11]H.Balakrishnan,K.Lakshminarayanan,S.Ratnasamy,S.Shenker,I.Stoica,M.Walfish.A Layered Naming Architecture for the Internet.SIGCOMM,Portland OR,Aug 2004.
    [12]International DOI Foundation,[EB/OL].URL:http://www.doi.org/.
    [13]K.Sollins.Architectural principles of uniform resource name resolution,January 1998.RFC 2276.
    [14]K.Sollins and L.Masinter.Functional requirements for Uniform Resource Names,December 1994.RFC 1737.
    [15]G.Ballintijn,M.van Steen,and A.S.Tanenbaum.Scalable user-friendly resource names.IEEE Internet Computing,5(5):20-27,2001.
    [16]M.Walfish,H.Balakrishnan,and S.Shenker.Untangling the Web from DNS.In lst USENIX/ACM Symposium on Networked Systems Design and Implementation(NSDI '04),San Francisco,CA,March 2004.
    [17]L.Daigle,D.van Gulik,R.Iannella,and P.Faltstrom.URN namespace definition mechanisms,June 1999.RFC 2611.
    [18]李丹,吴建平,崔勇,徐恪.互联网名字空间结构及其解析服务研究.软件学报,2005,16(8):1445-1455.
    [19]Moskowitz R,Nikander P.RFC 4423:Host Identity Protocol(HIP) Architecture[J].Internet RFCs.2006.
    [20]P.Nikander,J.Ylitalo,and J.Wall.Integrating security,mobility,and multi-homing in a HIP way.In Network and Distributed Systems Security Symposium(NDSS '03),pages 87-99,San Diego,CA,February 2003.
    [21]Walfish M,Balakrishnan H,Shenker S.Untangling the web from DNS[J].Proceedings of the lst conference on Symposium on Networked Systems Design and Implementation-Volume 1table of contents.2004:17-17.
    [22]Walfish M,Stribling J,Krohn M,et al.Middleboxes no longer considered harmful[J].USENIX Symposium on Operating Systems Design and Implementation.
    [23]Francis P,Gummadi R.IPNL:A NAT-extended Internet architecture[J].ACM SIGCOMM.2002.
    [24]Balakrishnan H,Lakshminarayanan K,Ratnasamy S,et al.A Layered Naming Architecture for the Internet [J].
    [25]Guha S,Francis P.An end-middle-end approach to connection establishment[J].2007.
    [26]Adjie-winoto W,Schwartz E,Balakrishnan H,et al.The design and implementation of an intentional naming system[J].Proceedings of the seventeenth ACM symposium on Operating systems principles.1999:186-201.
    [27]Koponen T,Chawla M,Chun B G,et al.A data-oriented (and beyond)network architecture[J].Proceedings of the 2007 conference on Applications,technologies,architectures,and protocols for computer communications.2007:181-192.
    [28]Cheriton D R,Gritter M.TRIAD:A New Next-Generation Internet Architecture[J].Computer Science Department,Stanford University.2001.
    [29]Fall K.A delay-tolerant network architecture for challenged intemets[J].Proceedings of the 2003 conference on Applications,technologies,architectures,and protocols for computer communications.2003:27-34.
    [30]Cerf V,Burleigh S,Hooke A,et al.Delay Tolerant Networking Architecture[J].IETF Draft.2006.
    [31]Su J,Scott J,Hui P,et al.Haggle:Clean-slate Networking for Mobile Devices[J].Submitted for publication.2006.
    [32]Andrew D.Birrell and Bruce Jay Nelson.Implementing remote procedure calls.Transactions on Computer Systems,2(1):39—59,February 1984.
    [33]Hari Balakrishnan et al.TCP behavior of a busy Internet server:Analysis and improvements.In IEEE INFOCOM,March 1998.
    [34]R.Fielding et al.Hypertext transfer protocol HTTP/1.1,June 1999.RFC 2616.
    [35]Venkat Kudallur et al.IE7 networking improvements in content caching and decompression.IEBlog,October 2005.
    [36]Mozilla.org.Firefox tips & tricks:Pipelining,http://www.mozilla.0rg/support/firefox/tips#oth pipelining.
    [37]J.Rosenberg.et al.IETF RFC3261,SIP:Session Initiation Protocol[S].Jun.2002.
    [38]H.Schulzrinne et al.RTP:A transport protocol for real-time applications,July 2003.RFC 3550.
    [39]B.Ford.Structured Streams:a New Transport Abstraction.In Proc.of ACM SIGCOMM '07,Kyoto,Japan,Aug.2007.
    [40]Sally Floyd,“Highspeed TCP for Large Congestion Windows”,RFC 3649,Experimental,December 2003.
    [41]R.Wang,M.Valla,M.Y.Sanadidi and M.Gerla,“Using Adaptive Bandwidth Estimation to provide enhanced and robust transport over heterogeneous networks”,10th IEEE International Conference on Network Protocols (ICNP 2002),Paris,France,Nov.2002.
    [42]Sivakumar H,Bailey S,Grossman R L.PSockets:The Case for Application-level Network Striping for Data Intensive Applications using High Speed Wide Area Networks.SC2000: High-Performance Network and Computing Conference,Dallas,TX,2000.
    [43]Eggert L,Heidemann J,Touch J.Effects of Ensemble-TCP.ACM Computer Communication Review,2000,30(1):15-29.
    [44]Balakrishnan H,Rahul H,Seshan S.An Integrated Congestion Management Architecture for Internet Hosts.Proc.ACM SIGCOMM,September 1999.
    [45]Allman M,Kruse H,Ostermann S..An application-level solution to tcp's satellite inefciencies.In Proceedings of the First International Workshop on Satellite-based Information Services (WOSBIS),Rye,NY,November 1996.
    [46]Cohen E,Kaplan H,Oldham J.Managing TCP Connections under Persistent HTTP.Proceedings of the Eighth International World Wide Web Conference,Toronto,Canada,May 1999.
    [47]Grid Forum GridFTP Introduction:http://www.sdsc.edu/GridFomm/RemoteData/Papers/gridftp_intro_gf5.pdf.
    [48]Baru C,Moore R,Rajasekar A,Wan M.The SDSC Storage Resource Broker.In Procs.Of CASCON'98.Toronto,Canada,1998.
    [49]Floyd S.Congestion Control Principles.RFC 2914.
    [50]Allman M,Kruse H,Ostermann S.An application-level solution to tcp's satellite inefficiencies.1997.[Online].Available:citeseer.nj.nec.com/allman97applicationlevel.html.
    [51]Lee J,Gunter D,Tierney B.Applied Techniques for High Bandwidth Data Transfers across Wide Area Networks.Dec 2000,LBNL-46269.
    [52]Hacker T,Athey B.The end-to-end performance effects of parallel TCP sockets on a lossy wide-area network.In Proceedings of IEEE IPDPS,Fort Lauderdale,FL USA,2002.
    [53]Gonzalo Camarillo,et al.,Evaluation of Transport Protocols for the Session Initiation Protocol,Network[J],IEEE,Volume:17,Issue:5,pages:40-46,Sept.-Oct.2003.
    [54]Humaira Kamal,et al,SCTP versus TCP for MPI[C],Proceedings of the 2005 ACM/IEEE SC 05 Conference,pages:30-38,November 2005.
    [55]B.Benatallah and F.Casati,editors.Distributed and Parallel Database,Special issue on Web Services.Springer-Verlag,2002.
    [56]A.Dogac,editor.ACM SIGMOD Record 31(1),Special Section on Data Management Issues in E-Commerce.ACM,March 2002.
    [57]Hsieh H Y,Sivakumar R.A Transport Layer Approach for Achieving Aggregate Bandwidths on Multihomed Mobile Hosts.In ACM International Conference on Mobile Computing and Networking (MOBICOM).Atlanta,Georgia,September 2002.
    [58]Zhang M,Lai J,Krishnamurthy A,Peterson L,Wang R.A Transport Layer Approach for Improving End-to-End Performance and Robustness Using Redundant Paths.In USENIX,June 2004.
    [59]Iyengar J R,Shah K C,Amer P D,Stewart R.Concurrent multipath transfer using SCTP multihoming,In Proceedings of SPECTS 2004,San Jose,CA,USA,2004.
    [60]Iyengar J R,Amer P,Stewart R.Concurrent multipath transfer using SCTP multihoming over independent end-to-end paths.IEEE/ACM Transactions on Networking.2006,14(5):951-964.
    [61]Al A A E,Saadawi T,Lee M.A transport layer load-sharing mechanism for mobile wireless hosts.In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops,Orlando,FL,USA,Mar.14-17,2004,87-91.
    [62]H.Balakrishnan,M.F.Kaashoek,D.Karger,and R.Morris.Looking up data in P2P systems.Communications of the ACM,46(2):43-48,Feb.2003.
    [63]STOICA I,MORRIS R,KARGER D.Chord:a scalable peer-to-peer lookup service for Internet applications[A].ACM SIG-COMM Conference[C].San Diego,CA,USA,2001,4(31):149-160.
    [64]ZHAO B,HUANG L,STRIBLING J.Tapestry:a resilient global-scale overlay for service deployment[J].IEEE Journal on Selected Areas in Communications.2004,22(1):41-53.
    [65]Rowstron,P.Druschel,Pastry:scalable,distributed object location and routing for large-scale peer-to-peer systems,IFIP/ACM Middleware 2001,November 2001.
    [66]GUPTA I,BIRMAN K,LINGA P.Kelips:building an efficient and stable P2P DHT through increased memory and background overhead[A].Second International Workshop on Peer-to-Peer Systems(IP1TPS)[C].Berkeley,CA,USA,2003.
    [67]Meyer D,Zhang L,Fall K.Report from the IAB Workshop on Routing and Addressing[J].IRTF draft" draft-iab-raws-report-02,txt" available at http://www.ietf.org,Apr.2007.
    [68]Maziores D,Kaminsky M,Kaashoek M F,et al.Separating key management from file system security[J].1999.
    [69]P.Nikander,J.Ylitalo,and J.Wall.Integrating security,mobility,and multi-homing in a HIP way.In Network and Distributed Systems Security Symposium(NDSS '03),pages 87-99,San Diego,CA,February 2003.
    [70]L.Meyer,W.T.Penzhorn,Denial of service and distributed denial of service - today and tomorrow,in:IEEE AFRICON,2004,pp.959-964.
    [71]R.K.C.Chang,Defending against flooding-based distributed denial-of-service attacks:a tutorial,IEEE Communications Magazine 40(10)(2002) 42-51.
    [72]R.Cox,A.Muthitacharoen,R.Morris.Serving DNS using a peer-to-peer lookup service[C].Proceedings of the Int'l Workshop on Peer-To-Peer Systems 2002(IPTPS 2002).2002.155-165.
    [73]M.Walfish,H.Balakrishnan,S.Shenker.Untangling the Web from DNS[C].Proceedings of the lst conference on Symposium on Networked Systems Design and Implementation - Volume 1.San Francisco California.2004.17-17.
    [74]洪锋,李明禄.SChord:优化解决Chord覆盖网的扰动问题[J].电子学报,2005,33(B12):2361-2365.
    [75]LI J,STRIBLING J,GIL T.Comparing the performance of distributed hash tables under churn[A].Proceedings of the 3rd International Workshop on Peer-to-Peer Systems[C].La Jolla,CA,United States,2004,87-99.
    [76]HSIAO H,KIN C.Mobility chum in DHT[A].Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops(ICDCSW'05)[C].Taiwan,2005,799-805.
    [77]RHEA S,GEELS D,ROSCOE T,Handling chum in a DHT[A].Proceedings of the 2004USENIX Technical Conference[C].Boston,MA,USA,2004,127-140.
    [78]KUNZMANN G,BINZENHOFER A,HENJES R,Analyzing and Modifying Chord's Stabilization Algorithm to handle high chum rotes[A].IEEE 7th Malaysia International Conference on Communication[C].Germany,16-18 Nov.2005,6pp.
    [79]杨冬,董平,张宏科.对等网络Churn问题评估模型与分析.通信学报,2007,28(6):39-47.
    [80]Brighten P,SHENKER S,STOICA I.Minimizing Churn in distributed systems[A].ACM SIG-COMM Conference[C].Pisa,Italy,Sep.2006,147-158.
    [81]p2psim,[EB/OL].http://pdos.lcs.mit.edu/p2psim.
    [82]Kingdata,[EB/OL].http://pdos.csail.mit.edu/p2psim/kingdata/.
    [83]GUMMADI K,SAROIU S,GRIBBLE S.King:estimating latency between arbitrary Internet end hosts[A].Proceedings of the 2002 SIGCOMM Internet Measurement Workshop[C].Marseille,France,2002,5-18.
    [84]KRISHNA P,SAROIU S,GRIBBLE S.A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems[J].Multimedia Systems Journal,2003,9(2):170-184.
    [85]杨冬,周华春,张宏科.基于一体化网络的普适服务研究.电子学报.2007,35(4):607-613.
    [86]ITU-T G.1010 End-User Multimedia QoS Categories Series G:Transmission Systems and Media,Digital Systems and Networks Quality of Service and Performance,Nov 1,2001.
    [87]T.Berners-Lee,D.Connolly.Hypertext Markup Language - 2.0,November 1995.RFC1866.
    [88]J.Boyer.Canonical XML Version 1.0,March 2001.RFC3076.
    [89]Document Object Model(DOM),[EB/OL].URL:http://www.w3.org/DOM/.
    [90]The Simple API for XML(SAX),[EB/OL].URL:http://www.saxproject.org/.
    [91]Linux kernel SCTP(Lksctp).[EB/OL].URL:http://Lksctp.sourceforge.net/.
    [92]W.R.Stevens,TCP/IP Illustrated,Volume 1:The Protocols.Addison-Wesley,Reading,MA,1994.
    [93]NS-2 documentation and software,version 2.31.[Z].Univ.California,Berkeley,LBL,USC/ISI,and Xerox Pare,URL:http://www.isi.edu/nsnam/ns.
    [94]C.Perkins,"IP Mobility Support for IPv4," RFC 3220,Jan.2002.
    [95]B.Landfeldt et al.,"SLM,A Framework for Session Layer Mobility Management," Proc.IEEE ICCCN,Oct.1999.
    [96]I.Aydin and C.Shen,"Cellular SCTP:A Transport-Layer Approach to Internet Mobility,"Internet draft,work in progress,Oct.2003.
    [97]D.Funato,K.Yasuda,and H.Tokuda,"TCP-R:TCP Mobility Support for Continuous Operation," IEEE Int'l.Conf.Net.Protocols,Oct.1997.
    [98]A.C.Snoeren and H.Balakrishnan,"An End-to-End Approach to Host Mobility," 6th Annual ACM/IEEE Int'l Conf.Mobile Comp.and Net.,Aug.2000.
    [99]D.A.Maltz and P.Bhagwat,"MSOCKS:An Architecture for Transport Layer Mobility," IEEE INFOCOM,1998.
    [100]林创.计算机网络和计算机系统的性能评价.北京:清华大学出版社,2001.
    [101]Osogami T,Wierman A,Harchol B M,Scheller W A.A recursive analysis technique for multi-dimensionally infinite Markov chains.ACM SIGMETRICS Performance Evaluation Review.2004,32(2):3-5.
    [102]Bobbio A,Horv'ath A,Telek M.Matching three moments with minimal acyclic phase type distributions.Communications in Statistics - Stochastic Models,.2005,21(2):303-326.
    [103]Neuts M F.Matrix-analytic Methods in Queueing Theory.In Advances in Queueing.Theory,Methods,and Open Problems.CRC Press,1995,265-293.
    [104]Osogami T,Harchol B M.A closed-form solution for mapping general distributions to minimal PH distributions.School of Computer Science,Carnegie Mellon University,Technical Report CMU-CS-03-114,2003.
    [105]Riska A,Smimi E.MAMSolver:a matrix-analytic methods tool.In:T.Field,P.Harrison,J.Bradley,U.Harder(Eds.),Performance TOOLS 2002.London,UK,Lecture Notes in Computer Science,Springer,Berlin,April 2002,2324:205-211.
    [106]Shenker S.Fundamental design issues for the future Internet.IEEE J.Sel.Areas Commun.1995,13(7):1176-1188.
    [107]Shi L,Liu C,Liu B.Network Utility Maximization for Tri-ple-Play Services,Computer Communication,2008,31:2257 -2269.
    [108]Lee J.W.,Mazumdar R.,Shroff N.,Non-convex optimization and rate control for multi-class services in the Internet,IEEE/ACM Transactions on Networking,2005,13(4):827-840.
    [109]Hande P.,Zhang P.,Chiang M.,Distributed rate allocation for Inelastic flows,IEEE/ACM Transactions on Networking,2007,15(6):1240-1253.
    [110]J.Iyengar,A.Care,P.Amer,G.Heinz,and R.Stewart.Making SCTP More Robust to Changeover.In SPECTS 2003,Montreal,Canada,July 2003.
    [111]R.Stewart,Q.Xie et.al.,"Stream Control Transmission Protocol(SCTP)Dynamic Address Reconfignration," RFC 5061,IETF,September 2007.
    [112]S.Koh,M.J.Chang,and M.Lee "mSCTP for soft handover in transport layer" IEEE Communications letters March 2004.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700