CN109257360B - Hidden information sending and analyzing method based on transmission path in SDN network - Google Patents

Hidden information sending and analyzing method based on transmission path in SDN network Download PDF

Info

Publication number
CN109257360B
CN109257360B CN201811168158.4A CN201811168158A CN109257360B CN 109257360 B CN109257360 B CN 109257360B CN 201811168158 A CN201811168158 A CN 201811168158A CN 109257360 B CN109257360 B CN 109257360B
Authority
CN
China
Prior art keywords
turning
time
sending
transmission path
hidden information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811168158.4A
Other languages
Chinese (zh)
Other versions
CN109257360A (en
Inventor
金华
胡永涛
王昌达
宋雪桦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiexuan Electronic Technology Co.,Ltd.
Original Assignee
Jiangsu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University filed Critical Jiangsu University
Priority to CN201811168158.4A priority Critical patent/CN109257360B/en
Publication of CN109257360A publication Critical patent/CN109257360A/en
Application granted granted Critical
Publication of CN109257360B publication Critical patent/CN109257360B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a hidden information sending and analyzing method based on a transmission path in an SDN network, wherein different transmission paths are set by an SDN controller, and hidden information bits to be sent are represented by the grouped different transmission paths; the receiver judges the transmission path according to the transmission time of the packet, and further analyzes the hidden information bit; the invention realizes the transmission of the hidden information between any two hosts under the SDN network environment, and improves the information hiding performance by carrying the hidden information through the grouped transmission path.

Description

Hidden information sending and analyzing method based on transmission path in SDN network
Technical Field
The invention belongs to the technical field of information security, and particularly relates to a transmission path-based hidden information sending and analyzing method in an SDN network.
Background
The covert channel is defined as "capable of transferring confidential information from one process (user) to another process (user) using a normal channel without violating the security policy of a host", and the network covert channel is divided into a network storage covert channel and a network time covert channel according to different transmission modes. The network storage covert channel fills covert information into redundant bits or reserved bits of a data packet, and then the covert information is sent along with the network data packet to complete covert information transmission. The network time hidden channel transmits hidden information by modulating the time interval between normal data packets, and the method has strong concealment but is easily influenced by network jitter, time delay and the like. For this situation, in the environment of Software Defined Network (SDN), it is a good solution to transmit hidden information by adjusting the transmission path of network data packets.
Software Defined Networking (SDN) is a novel Network innovation architecture, and is an implementation manner of Network virtualization, and a core technology of the SDN is an OpenFlow technology, so that separation of Network data and Network device control is realized, and programming capability of a Network is introduced. The SDN has been developed at a high speed since its appearance, and is now widely used in the fields of data center networks, wireless local area networks, cloud computing, and the like.
The software defined networking fabric comprises a controller and a switch supporting the OpenFlow protocol. The hidden information transmission method based on the transmission path is used for transmitting the hidden information by adjusting the transmission path of a network data packet under the environment of a Software Defined Network (SDN). Specifically, in an SDN environment, a controller may analyze and specify a transmission path of a network packet, a sending end may select the transmission path through the controller to send hidden information, and a receiving end may extract the hidden information by statistically analyzing a transmission time of the packet.
Disclosure of Invention
In view of the above existing problems, the present invention provides a transmission path-based hidden information sending and parsing method in an SDN network, so as to improve the concealment of information transmission.
In order to achieve the purpose, the specific technical scheme of the invention is as follows: a hidden information sending and analyzing method based on a transmission path in an SDN network comprises the following steps:
1) constructing an SDN network topology set Stopo, namely a controller obtains the SDN network topology through a link layer discovery protocol, and constructing the topology set Stopo, wherein the topology set Stopo is marked as { E1, E2, … … En }, each element in the set Stopo consists of a triplet (Sx, Sy, isSwitch), wherein Sx represents a switch in the SDN network, Sy represents a switch or a host directly connected with Sx, and the isSwitch distinguishes whether Sy is a switch or a host;
2) constructing an SDN network topology set Stopow with a weight value;
3) constructing a switch set Lpath on the shortest path from a sending end to a receiving end;
4) acquiring the transmission time Ltime of information on an Lpath transmission path;
5) the sending end selects different paths according to the 1 or 0 to be sent and sends bits in sequence;
6) the receiving end analyzes whether the hidden information bit is 1 or 0 through the time of receiving the data packet until the receiving of the hidden information is finished.
Further, in the step 2), the method for constructing the aggregate Stopow is as follows:
2.1) for the triplets (Sx, Sy, isSwitch) corresponding to each element in the network topology set Stopo, the controller controls the Sx to send test data packets to the Sy, and a weight W from the Sx to the Sy is obtained, wherein the weight W represents the time that the data packets pass from the Sx to the Sy;
2.2) adding the weight W into the triad (Sx, Sy, isSwitch) to obtain a quadruple (Sx, Sy, isSwitch, W);
2.3) constructing an SDN network topology set Stopow with weight values by taking all four-tuples (Sx, Sy, isSwitch, W) as set elements.
Further, in the step 3), the method for constructing the switch set Lpath on the shortest path from the sending end to the receiving end is as follows:
3.1) determining a transmitting end and a receiving end, wherein the transmitting end is marked as h1, and the receiving end is marked as h 2;
3.2) initializing the shortest path set Lpath to be null;
3.3) judging whether h1 and h2 are in the same network segment, if so, turning to the step 4), and otherwise, turning to the step 3.4);
3.4) finding the switch which is directly connected with h1 and has the smallest weight as Si by using the SDN network topology set Stopow with the weight, and marking the switch which is directly connected with h2 and has the smallest weight as Sj;
3.5) judging whether Si and Sj are the same exchanger, if so, turning to the step 3.6), and otherwise, turning to the step 3.7);
3.6) adding Si into the set Lpath, and turning to the step 4);
3.7) judging whether Si and Sj are directly connected, if so, turning to the step 3.8), otherwise, turning to the step 3.9);
3.8) adding Si and Sj into the set Lpath, and turning to the step 4);
3.9) h1 ═ Si, h2 ═ Sj, go to step 3.4).
Further, in the step 5), the method for sending the hidden information includes:
5.1) sending the synchronous information;
5.2) determining a transmission path of a bit to be sent, if 1 is to be sent, controlling the transmission path of the packet to be an Lpath by the controller, namely, sending a flow table to a switch in the Lpath by the controller, and if 0 is to be sent, controlling the transmission path of the packet not to be the Lpath by the controller;
5.3) the timer starts to count time from 0;
5.4) sending the packet according to the transmission path;
5.5) judging whether the timing is less than a time threshold T, if so, turning to the step 5.4), and if not, turning to the step 5.6);
5.6) judging whether the sending of the hidden information is finished, if so, turning to the step 5.7), and if not, turning to the step 5.2);
5.7) the transmitting end sends an end mark.
Further, in step 6), the method for the receiving end to analyze the hidden information is as follows:
6.1) receiving and detecting the synchronous information sent by the sending end;
6.2) the timer starts to count time from 0;
6.3) the receiver receives the data packet sent by the sender;
6.4) judging whether the timing is less than a time threshold T, if so, turning to the step 6.3), and if not, turning to the step 6.5);
6.5) analyzing the data packets to obtain a time set Srecvtime ═ T of all the data packets in a time threshold T1,t2,t3,…,tk};
6.6) normalization of Srecvtimen’=(tn-tmin)/(tmax-tmin) Wherein n is 1, 2, 3 …, k; t is tmin=min(t1,t2,t3,…,tk);tmax=max(t1,t2,t3,…,tk) Let Srecvtime ═ t1’,t2’,t3’,…,tk' }; wherein t isminIs the minimum value in the set of times Srecvtime,tmaxIs the maximum value in the time set Srecvtime, Srecvtime' is the time set after normalization processing, t1’,t2’,t3’,…,tkIs' t1,t2,t3,…,tkNormalizing the result;
6.7) averaging Srecvtime
Figure GDA0002492439870000031
6.8) the concealment bits are parsed, i.e. if time-Ltime <10ms, a data bit "1" is obtained; if | time-Ltime | > is 10ms, a data bit "0" is obtained;
6.9) judging whether an end mark is received, if so, turning to the step 6.10), and if not, turning to the step 6.2);
6.10) the reception of the hidden information is finished.
Compared with the prior art, the method and the device realize the transmission of the hidden information between any two hosts under the SDN network environment, and improve the information hiding performance by carrying the hidden information through the grouped transmission path.
Drawings
Fig. 1 is a flow chart of covert information transmission.
Detailed Description
The present invention is further described with reference to the accompanying drawings, and a transmission path-based hidden information sending and parsing method in an SDN network is shown in fig. 1, and includes the following steps:
1) constructing an SDN network topology set Stopo, namely a controller obtains the SDN network topology through a Link Layer Discovery Protocol (LLDP), constructing the topology set Stopo, wherein the topology set Stopo is recorded as { E1, E2 and … … En }, each element in the set Stopo consists of a triplet (Sx, Sy and isSwitch), wherein Sx represents a switch in the SDN network, Sy represents a switch or a host directly connected with Sx, and the isSwitch distinguishes whether Sy is a switch or a host;
2) constructing an SDN network topology set Stopow with weight values, wherein the method comprises the following steps:
2.1) for the triplets (Sx, Sy, isSwitch) corresponding to each element in the network topology set Stopo, the controller controls the Sx to send test data packets to the Sy, and a weight W from the Sx to the Sy is obtained, wherein the weight W represents the time that the data packets pass from the Sx to the Sy;
2.2) adding the weight W into the triad (Sx, Sy, isSwitch) to obtain a quadruple (Sx, Sy, isSwitch, W);
2.3) constructing an SDN network topology set Stopow with weight values by taking all four-tuples (Sx, Sy, isSwitch, W) as set elements;
3) a switch set Lpath on the shortest path from a sending end to a receiving end is constructed, and the method comprises the following steps:
3.1) determining a transmitting end and a receiving end, wherein the transmitting end is marked as h1, and the receiving end is marked as h 2;
3.2) initializing the shortest path set Lpath to be null;
3.3) judging whether h1 and h2 are in the same network segment, if so, turning to the step 4), otherwise, turning to the step 3.4)
3.4) finding the switch which is directly connected with h1 and has the smallest weight as Si by using the SDN network topology set Stopow with the weight, and marking the switch which is directly connected with h2 and has the smallest weight as Sj;
3.5) judging whether Si and Sj are the same exchanger, if so, turning to the step 3.6), otherwise, turning to the step 3.7)
3.6) adding Si into the set Lpath, and turning to the step 4);
3.7) judging whether Si is directly connected with Sj, if so, turning to the step 3.8), otherwise, turning to the step 3.9)
3.8) adding Si and Sj into the set Lpath, and turning to the step 4);
3.9) h1 ═ Si, h2 ═ Sj, go to step 3.4);
4) acquiring the transmission time Ltime of information on an Lpath, namely setting a transmission path from a sender to a receiver as the Lpath through a controller, sending a data packet to the receiver by the sender, and analyzing the shortest path time Ltime by receiving the data packet by the receiver;
5) the sending end sends the hidden information, and the specific method is as follows:
5.1) sending the synchronous information;
5.2) determining a transmission path of a bit to be sent, if 1 is to be sent, controlling the transmission path of the packet to be an Lpath by the controller, namely, sending a flow table to a switch in the Lpath by the controller, and if 0 is to be sent, controlling the transmission path of the packet not to be the Lpath by the controller;
5.3) the timer starts to count time from 0;
5.4) sending the packet according to the transmission path;
5.5) judging whether the timing is less than a time threshold T, if so, turning to the step 5.4), and if not, turning to the step 5.6);
5.6) judging whether the sending of the hidden information is finished, if so, turning to the step 5.7), and if not, turning to the step 5.2);
5.7) the sending end sends an end mark;
6) the receiving end analyzes the hidden information, and the specific method comprises the following steps:
6.1) receiving and detecting the synchronous information sent by the sending end;
6.2) the timer starts to count time from 0;
6.3) the receiver receives the data packet sent by the sender;
6.4) judging whether the timing is less than a time threshold T, if so, turning to the step 6.3), and if not, turning to the step 6.5);
6.5) analyzing the data packets to obtain a time set Srecvtime ═ T of all the data packets in a time threshold T1,t2,t3,…,tk};
6.6) normalization of Srecvtimen’=(tn-tmin)/(tmax-tmin) Wherein n is 1, 2, 3 …, k; t is tmin=min(t1,t2,t3,…,tk);tmax=max(t1,t2,t3,…,tk) Let Srecvtime ═ t1’,t2’,t3’,…,tk' }; wherein t isminIs the minimum value in the set of times Srecvtime, tmaxIs the maximum value in the time set Srecvtime, Srecvtime' is the time set after normalization processing, t1’,t2’,t3’,…,tk' ist1,t2,t3,…,tkNormalizing the result;
6.7) averaging Srecvtime
Figure GDA0002492439870000051
6.8) the concealment bits are parsed, i.e. if time-Ltime <10ms, a data bit "1" is obtained; if | time-Ltime | > is 10ms, a data bit "0" is obtained;
6.9) judging whether an end mark is received, if so, turning to the step 6.10), and if not, turning to the step 6.2);
6.10) the reception of the hidden information is finished.

Claims (1)

1. A hidden information sending and analyzing method based on a transmission path in an SDN network is characterized by comprising the following steps:
1) constructing an SDN network topology set Stopo, namely a controller obtains the SDN network topology through a link layer discovery protocol, and constructing the topology set Stopo, wherein the topology set Stopo is marked as { E1, E2, … … En }, each element in the set Stopo consists of a triplet (Sx, Sy, isSwitch), wherein Sx represents a switch in the SDN network, Sy represents a switch or a host directly connected with Sx, and the isSwitch distinguishes whether Sy is a switch or a host;
2) constructing an SDN network topology set Stopow with a weight value;
2.1) for the triplets (Sx, Sy, isSwitch) corresponding to each element in the network topology set Stopo, the controller controls the Sx to send test data packets to the Sy, and a weight W from the Sx to the Sy is obtained, wherein the weight W represents the time that the data packets pass from the Sx to the Sy;
2.2) adding the weight W into the triad (Sx, Sy, isSwitch) to obtain a quadruple (Sx, Sy, isSwitch, W);
2.3) constructing an SDN network topology set Stopow with weight values by taking all four-tuples (Sx, Sy, isSwitch, W) as set elements;
3) constructing a switch set Lpath on the shortest path from a sending end to a receiving end;
3.1) determining a transmitting end and a receiving end, wherein the transmitting end is marked as h1, and the receiving end is marked as h 2;
3.2) initializing the shortest path set Lpath to be null;
3.3) judging whether h1 and h2 are in the same network segment, if so, turning to the step 4), otherwise, turning to the step 3.4)
3.4) finding the switch which is directly connected with h1 and has the smallest weight as Si by using the SDN network topology set Stopow with the weight, and marking the switch which is directly connected with h2 and has the smallest weight as Sj;
3.5) judging whether Si and Sj are the same exchanger, if so, turning to the step 3.6), otherwise, turning to the step 3.7)
3.6) adding Si into the set Lpath, and turning to the step 4);
3.7) judging whether Si is directly connected with Sj, if so, turning to the step 3.8), otherwise, turning to the step 3.9)
3.8) adding Si and Sj into the set Lpath, and turning to the step 4);
3.9) h1 ═ Si, h2 ═ Sj, go to step 3.4);
4) acquiring the transmission time Ltime of information on an Lpath transmission path;
5) the sending end selects different paths according to the 1 or 0 to be sent and sends bits in sequence;
the method for sending the hidden information comprises the following steps:
5.1) sending the synchronous information;
5.2) determining a transmission path of a bit to be sent, if 1 is to be sent, controlling the transmission path of the packet to be an Lpath by the controller, namely, sending a flow table to a switch in the Lpath by the controller, and if 0 is to be sent, controlling the transmission path of the packet not to be the Lpath by the controller;
5.3) the timer starts to count time from 0;
5.4) sending the packet according to the transmission path;
5.5) judging whether the timing is less than a time threshold T, if so, turning to the step 5.4), and if not, turning to the step 5.6);
5.6) judging whether the sending of the hidden information is finished, if so, turning to the step 5.7), and if not, turning to the step 5.2);
5.7) the sending end sends an end mark;
6) the receiving end analyzes whether the hidden information bit is 1 or 0 through the time of receiving the data packet until the receiving of the hidden information is finished;
6.1) receiving and detecting the synchronous information sent by the sending end;
6.2) the timer starts to count time from 0;
6.3) the receiver receives the data packet sent by the sender;
6.4) judging whether the timing is less than a time threshold T, if so, turning to the step 6.3), and if not, turning to the step 6.5);
6.5) analyzing the data packets to obtain a time set Srecvtime ═ T of all the data packets in a time threshold T1,t2,t3,…,tk};
6.6) normalization of Srecvtimen’=(tn-tmin)/(tmax-tmin) Wherein n is 1, 2, 3 …, k; t is tmin=min(t1,t2,t3,…,tk);tmax=max(t1,t2,t3,…,tk) Let Srecvtime ═ t1’,t2’,t3’,…,tk' }, where t isminIs the minimum value in the set of times Srecvtime, tmaxIs the maximum value in the time set Srecvtime, Srecvtime' is the time set after normalization processing, t1’,t2’,t3’,…,tkIs' t1,t2,t3,…,tkNormalizing the result;
6.7) averaging Srecvtime
Figure FDA0002492439860000021
6.8) the concealment bits are parsed, i.e. if time-Ltime <10ms, a data bit "1" is obtained; if | time-Ltime | > is 10ms, a data bit "0" is obtained;
6.9) judging whether an end mark is received, if so, turning to the step 6.10), and if not, turning to the step 6.2);
6.10) the reception of the hidden information is finished.
CN201811168158.4A 2018-10-08 2018-10-08 Hidden information sending and analyzing method based on transmission path in SDN network Active CN109257360B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811168158.4A CN109257360B (en) 2018-10-08 2018-10-08 Hidden information sending and analyzing method based on transmission path in SDN network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811168158.4A CN109257360B (en) 2018-10-08 2018-10-08 Hidden information sending and analyzing method based on transmission path in SDN network

Publications (2)

Publication Number Publication Date
CN109257360A CN109257360A (en) 2019-01-22
CN109257360B true CN109257360B (en) 2020-08-28

Family

ID=65045388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811168158.4A Active CN109257360B (en) 2018-10-08 2018-10-08 Hidden information sending and analyzing method based on transmission path in SDN network

Country Status (1)

Country Link
CN (1) CN109257360B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848461A (en) * 2010-05-04 2010-09-29 中国人民解放军信息工程大学 Method for secure routing and channel allocation in cognitive Mesh network
CN103581168A (en) * 2013-08-02 2014-02-12 中国科学技术大学苏州研究院 Hidden information communication method based on IP fragmentation camouflage technology
CN104660591A (en) * 2015-02-03 2015-05-27 中国科学技术大学苏州研究院 Covert communication method used for packet length feedback network and based on IP (internet protocol) address
CN105871772A (en) * 2015-01-18 2016-08-17 吴正明 Working method of SDN network architecture aimed at network attack
CN105871771A (en) * 2015-01-18 2016-08-17 吴正明 SDN network architecture aimed at DDoS network attack
CN107078898A (en) * 2014-05-20 2017-08-18 神秘双八达通有限公司 A kind of method that the private interconnection of safety is set up on multi-path network
WO2017167371A1 (en) * 2016-03-31 2017-10-05 Nec Europe Ltd. Rapid topology-independent path protection in sdn networks

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9742648B2 (en) * 2015-03-23 2017-08-22 Brocade Communications Systems, Inc. Efficient topology failure detection in SDN networks

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848461A (en) * 2010-05-04 2010-09-29 中国人民解放军信息工程大学 Method for secure routing and channel allocation in cognitive Mesh network
CN103581168A (en) * 2013-08-02 2014-02-12 中国科学技术大学苏州研究院 Hidden information communication method based on IP fragmentation camouflage technology
CN107078898A (en) * 2014-05-20 2017-08-18 神秘双八达通有限公司 A kind of method that the private interconnection of safety is set up on multi-path network
CN105871772A (en) * 2015-01-18 2016-08-17 吴正明 Working method of SDN network architecture aimed at network attack
CN105871771A (en) * 2015-01-18 2016-08-17 吴正明 SDN network architecture aimed at DDoS network attack
CN104660591A (en) * 2015-02-03 2015-05-27 中国科学技术大学苏州研究院 Covert communication method used for packet length feedback network and based on IP (internet protocol) address
WO2017167371A1 (en) * 2016-03-31 2017-10-05 Nec Europe Ltd. Rapid topology-independent path protection in sdn networks

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Dynamic searchable encryption with privacy protection for cloud computing;Xiaowei Li,Selasi Kwame Ocansey;《nternational Journal of Communication System》;20170930;全文 *
基于SDN的多路径并行传输数据调度方法;于萌,卓越;《信息通信》;20161231;全文 *
基于多维度抽象和广度优先搜索空间划分的隐秘信息流检测方法;王昌达,朱锦;《计算机应用研究》;20160531;全文 *

Also Published As

Publication number Publication date
CN109257360A (en) 2019-01-22

Similar Documents

Publication Publication Date Title
Polese et al. A survey on recent advances in transport layer protocols
Zhang et al. Novel quick start (QS) method for optimization of TCP
WO2019137524A1 (en) Method and system for determining quality of service flow of network, and network element
US20200358886A1 (en) Data Transmission Method, Apparatus, And System
US8094550B2 (en) Methods and systems for controlling network communication parameters
EP2008493A1 (en) Methods and apparatus for supporting quality of service in communication systems
US8917599B2 (en) Systems and methods for controlling data transmission rates
KR20020071010A (en) Adaptive link layer for point to multipoint communication system
US20080071919A1 (en) Determination of link qualities between an access point and a plurality of clients
CN108881031B (en) Self-adaptive reliable data transmission method based on SDN network
TWI531186B (en) Multiple-interface network device and selection method for transmitting network packets
TWI580226B (en) Method for determining maximum segment size
WO2019061516A1 (en) Concealed wireless communication physical-layer slope authentication method and apparatus
WO2019144802A1 (en) Data transmission method and related device
US11218912B2 (en) Method and apparatus for controlling traffic of network device in wireless communication network
CN109257360B (en) Hidden information sending and analyzing method based on transmission path in SDN network
He et al. Resilient QUIC protocol for emerging wireless networks
JPWO2004091148A1 (en) Mobile terminal and wireless access point in wireless access system
WO2023122592A1 (en) Deterministic radio networks configured for time-sensitive networking (tsn) communication
US20160241684A1 (en) Method and apparatus for link discovery among domains
Dias et al. Traditional TCP congestion control algorithms evaluation in wired-cum-wireless networks
Nguyen et al. An implementation of scalable, Vegas, Veno, and YeAH congestion control algorithms in ns-3
WO2019173984A1 (en) Data transmission method and device
Ito et al. GridFTP-APT: Automatic parallelism tuning mechanism for GridFTP in long-fat networks
WO2023213202A1 (en) Communication method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230418

Address after: No.246 Xingta Fourth Village, Xingta Town, Jinshan District, Shanghai, 201500

Patentee after: Shanghai Jiexuan Electronic Technology Co.,Ltd.

Address before: 212013 No. 301, Xuefu Road, Zhenjiang, Jiangsu

Patentee before: JIANGSU University