Skip to main content

Study of Flow Control System Model Based on Bypass Protocol Analysis

  • Conference paper
Information Computing and Applications (ICICA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 243))

Included in the following conference series:

  • 2213 Accesses

Abstract

The paper has proposed a bypass protocol analysis method in the design of flow control system to change the traditional working style. In this new method, the network packets can be controlled after its protocol is identified. To improve the performance of the system, a zero-copy implementation, based on flow control system, is designed to realize the memory sharing between kernel space and user space. The applications enable the direct access to the kernel data through memory sharing. Thus, the time spent on data copying and context switching is greatly reduced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Keny, F.P., Maulloo, A.K., Tan, D.K.H.: Rate control for communication networks: shadow prices, proportional faimess and stability. Joumal of the 0perational Research Society, 237–252 (1998)

    Google Scholar 

  2. Bansal, D., Ward, P.: Third-Party Flow Control. In: Proc of the 3rd Annual Communication Networks and Services Research Conference, New York, pp. 118–124 (2005)

    Google Scholar 

  3. Huan, Y.W., Ying, D.L.: A Survey and Measurement Based Comparison of Bandwidth management Techniques. IEEE Communications Surveys and Tutorials, 10–21 (2003)

    Google Scholar 

  4. Thiran, P., Le Boudec, J.-Y.: Network Calculus: A Theory of Deterministic Queuing Systems for the Internet. LNCS, vol. 2050, pp. 3–81. Springer, Heidelberg (2001)

    Book  MATH  Google Scholar 

  5. Chen, Y., Jiao, Z., Xie, J.: Design and Implementation of a High Performance VIA Based on Myrinet. Journal of Software, 285–292 (2006)

    Google Scholar 

  6. Han, D., Nassn.: A NAS-based storage network. Journal of harbin Institute of Technology, 95-99 (2007)

    Google Scholar 

  7. Li, Y.C.: LyraNET: A zero-copy TCP/IP protocol stack for embedded systems. Real-Time Systems, 76–81 (2006)

    Google Scholar 

  8. Yousif, M.F: On generalizations of PF-rings. Communications in Algebra, 65–69 (2004)

    Google Scholar 

  9. Xia, H., Chen, K.: Research and Performance and Optimization of Gigabit network based on Zero-Copy technology. Micro-Computer Information, 155–157 (2008)

    Google Scholar 

  10. Jerry, H.K., Chu, L.: Zero-Copy TCP in Solaris. In: Proceedings of the USENIX 2005 Annual Technical Conference, pp. 21–22 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, S., Zhang, Y., Fan, Z. (2011). Study of Flow Control System Model Based on Bypass Protocol Analysis. In: Liu, C., Chang, J., Yang, A. (eds) Information Computing and Applications. ICICA 2011. Communications in Computer and Information Science, vol 243. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27503-6_91

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27503-6_91

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27502-9

  • Online ISBN: 978-3-642-27503-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics