节点文献

网络损伤仿真系统的设计及实现

Design and Implementation of Network Damnification Simulation System

【作者】 王军

【导师】 姚俊峰;

【作者基本信息】 厦门大学 , 软件工程, 2013, 硕士

【摘要】 随着Internet的发展,基于Internet(也就是基于IP协议)的应用也在随着时间迅猛的发展。越来越多的应用开始关心起网络传输质量以后,那些影响了应用性能的网络因素也逐一被重视起来。通过分析这些因素,我们能够更加深入的了解网络与应用的相互作用关系,才能有针对性地解决影响应用性能的网络故障。也只有系统地了解清楚这些因素的内在关系,加以理论化,才能让我们对网络未知情况进行有根据的预测分析。通过对那些影响应用性能的网络因素进行仿真,我们可以在实验室中获得与真实网络类似的网络环境,在这种网络环境下测试我们开发的网络应用系统,无疑可以减小应用部署到真实网络中的风险。随着应用对网络的要求越来越高以及网络本身越来越复杂,网络仿真器的应用将会越来越广泛。文章首先讨论了网络损伤理论和基于网络损伤理论的网络建模方法,归纳出IP网络对IP包可能产生的6种“基损伤”(网络对IP包的基本负面影响)。然后详细叙述了基于该理论的网络仿真器架构模型和6种基损伤的仿真实现方法。最后,文章给出了一个实现该模型的仿真器实例,介绍了网络仿真器在PC硬件架构、Linux操作系统下的实现具体过程。

【Abstract】 With the development of the Internet, based on the Internet (which is based on IP protocol) applications are swift and violent development over time. More and more applications began to care about the network transmission quality, the factors that affect the application performance of the network also have been seriously rise. By analyzing these factors, we can more in-depth understanding of the interaction of network and application of relationship, can have specific solutions to affect application performance of network failure. Only to systematically understand the intrinsic relationships between these factors and theoretical, can let us to have network unknown situation according to the analysis of the forecast.Based on those factors affecting application performance of the network simulation, We can be obtained in the lab network environment similar to that of the real network, in this test we development under the network environment of network application system, there is no doubt that can reduce the risk of application is deployed to the real network.As the application is more and more high to the requirement of network and network itself more and more complex, the application of the network simulator will be more and more widely.A new theory about "network damnification" was discussed first. In this theory, all the bad effect when IP package pass through the network were reduced to six kind of "essential damnification". Base on this theory, network model and network emulator model was built. An instance of the network emulator running in Linux also was introduced.

  • 【网络出版投稿人】 厦门大学
  • 【网络出版年期】2014年 05期
  • 【分类号】TP311.52
  • 【被引频次】1
  • 【下载频次】107
节点文献中: 

本文链接的文献网络图示:

本文的引文网络