Computer Science ›› 2022, Vol. 49 ›› Issue (2): 321-328.doi: 10.11896/jsjkx.201200266
• Computer Network • Previous Articles Next Articles
MA Li-wen, ZHOU Ying
CLC Number:
[1]FAN Z F,LI S,ZHANG D.SDN data center network congestion control algorithm based on traffic scheduling[J].Computer Science,2017,44(S1):266-269,273. [2]WANG H H,ZHOU Y W,LIU J B.Hybrid-based routing algorithm for network congestion control in LLN[J].Computer Science,2019,46(6):107-111. [3]NEAL C,CHENG Y C,STEPHEN G,et al.BBR:congestion-based congestion control[J].Communications of the ACM,2017,60(2):58-66. [4]ZHANG H,ZHU H,XIA Y,et al.Performance Analysis ofBBR Congestion Control Protocol Based on NS3[C]//2019 Se-venth International Conference on Advanced Cloud and Big Data (CBD).Suzhou:IEEE CS CPS,2019:363-368. [5]JAMES G,KATHLEEN N.Bufferbloat:dark buffers in the Internet[J].Communications of the ACM,2012,55(1):57-65. [6]HORIE Y,THI D,NGUYEN A,et al.A Comparison of Con-gestion Control Algorithms in Emulated Wi-Fi Networks[C]//2020 International Conference on Information and Communication Technology Convergence (ICTC).Guayaquil:Association for Computing Machinery,2020:305-310. [7]KANAYA T,TABATA N,YAMAGUCHI S.A Study on Performance of CUBIC TCP and TCP BBR in 5G Environment[C]//2020 IEEE 3rd 5G World Forum (5GWF).Bangalore:IEEE Press,2020:508-513. [8]SASAKI K,YAMAGUCHI S.A Study on Bottleneck Band-width Estimation Based onAcknowledge Reception on TCP BBR[C]//2020 IEEE 44th Annual Computers,Software,and Applications Conference (COMPSAC).Madrid:IEEE Computer Society,2020:1107-1108. [9]NEIL A,MATTEO V,ANDRIUS A,et al.Mind the delay:the adverse effects of delay-based TCP on HTTP[C]//Proceedings of the 16th International Conference on emerging Networking Experiments and Technologies(CoNEXT '20).New York:Asso-ciation for Computing Machinery,2020:364-370. [10]ZAD D,AHMED F,SHARMA P,et al.Homa:An Efficient Topology and Route Management Approach in SD-WAN Overlays[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.Beijing:IEEE Press,2020:2351-2360. [11]LI Y L,MIAO R,LIU H Q,et al.HPCC:high precision congestion control[C]//Proceedings of the ACM Special Interest Group on Data Communication(SIGCOMM '19).New York:Association for Computing Machinery,2019:44-58. [12]MA Y,LIANG J.Throughput Maximization of NFV-EnabledMulticasting in Mobile Edge Cloud Networks[J].IEEE Tran-sactions on Parallel and Distributed Systems,2020,31(2):393-407. [13]CHEN K F,SHAN D F,LUO X H,et al.One Rein to RuleThem All:A Framework for Datacenter-to-User Congestion Control[C]//4th Asia-Pacific Workshop on Networking(APNet '20).New York:Association for Computing Machinery,2020:44-51. [14]FOREMCICH A,SNOEREN A,PORTER G,et al.Corundum:An Open-Source 100-Gbps Nic[C]//2020 IEEE 28th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM).IEEE Press,2020:38-46. [15]JACOBSON V.Congestion avoidance and control[J].ACM SIGCOMM Computer Communication Review,1995,25(1):157-187. [16]ZENG G X,HU S H,ZHANG J X,et al.Overview of Data Center Network Transmission Protocol[J].Computer Research and Development,2020,57(1):74-84. [17]ASHUTOSH S,FRAIDA F,SHIVENDRA P.A Low Latency Congestion ControlThat Can Compete[C]//Proceedings of the Student Workshop(CoNEXT '20).New York:Association for Computing Machinery,2020:15-16. [18]LLOYD B,GANESH A,ETHAN K,et al.On the Future of Congestion Control for the Public Internet[C]//Proceedings of the 19th ACM Workshop on Hot Topics in Networks(HotNets '20).New York:Association for Computing Machi-nery,2020:30-37. [19]AYUSH M,SUN X P,ATISHYA J,et al.The Great Internet TCP Congestion Control Census[J].Measurement and Analysis of Computing Systems,2019,3(3):1-24. [20]NANDITA D,TIZIANA R,CHENG Y C.An argument for increasing TCP's initial congestion window[J].ACM SIGCOMM Computer Communication Review,2010,40(3):26-33. |
[1] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[2] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[3] | HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332. |
[4] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[5] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[6] | WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9. |
[7] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[8] | FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349. |
[9] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[10] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[11] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[12] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[13] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[14] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[15] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
|