• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yin Hao, Li Feng. Research on the Development of the Internet Performance Measurement Technologies[J]. Journal of Computer Research and Development, 2016, 53(1): 3-14. DOI: 10.7544/issn1000-1239.2016.20150660
Citation: Yin Hao, Li Feng. Research on the Development of the Internet Performance Measurement Technologies[J]. Journal of Computer Research and Development, 2016, 53(1): 3-14. DOI: 10.7544/issn1000-1239.2016.20150660

Research on the Development of the Internet Performance Measurement Technologies

More Information
  • Published Date: December 31, 2015
  • Nowadays, the Internet network has grown into a super-complex system from a small network in a laboratory, and its performance has been of great concern. The network performance is an important indicator of evaluating the network service performance, which can be widely used in service selection, congestion control, routing selection, network performance optimization, future network system architecture design, and so on. Many Internet performance measurement technologies are developed for these application requirements.In this paper, we systematically summarize the development of the existing network performance measurement technologies: first of all, the network performance measurement technologies is classified into different models, and the advantages and disadvantages of performance measurement technologies are well studied from different points of view; and then, the network performance measurement technologies can be divided into three stages: the measurement based on “what you see is what you get”, the large-scale distributed measurement based on path composition, and the big data driven QoE measurement, so the development and evolution of performance measurement technologies are well understood; finally, the challenges of network performance measurement technologies are deeply analyzed, and with the rapid development of the Internet network applications, the content which is needed to be studied in the future is pointed out, as well as the direction of development.
  • Related Articles

    [1]Fu Liguo, Pang Jianmin, Wang Jun, Zhang Jiahao, Yue Feng. Formal Model of Correctness and Optimization on Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(9): 2001-2011. DOI: 10.7544/issn1000-1239.2019.20180513
    [2]Zhou Zhibin, Wang Guojun, Liu Qin, Jia Weijia. A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification[J]. Journal of Computer Research and Development, 2018, 55(12): 2674-2684. DOI: 10.7544/issn1000-1239.2018.20170787
    [3]Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.
    [4]Li Tao, Zhang Jingzhong. Machine Proofs in Geometry Based on Complex Number Method[J]. Journal of Computer Research and Development, 2013, 50(9): 1963-1969.
    [5]Ma Yanfang, Zhang Min, Chen Yixiang. Formal Description of Software Dynamic Correctness[J]. Journal of Computer Research and Development, 2013, 50(3): 626-635.
    [6]Wang Yong, Fang Juan, Ren Xingtian, and Lin Li. Formal Verification of TCG Remote Attestation Protocols Based on Process Algebra[J]. Journal of Computer Research and Development, 2013, 50(2): 325-331.
    [7]Wang Changjing. Verifying the Correctness of Loop Optimization Based on Extended Logic Transformation System μTS[J]. Journal of Computer Research and Development, 2012, 49(9): 1863-1873.
    [8]Jing Shuxu, He Fazhi, Cai Xiantao, Cheng Yuan. A Method for Object Reference in Collaborative Modeling System[J]. Journal of Computer Research and Development, 2011, 48(11): 2031-2038.
    [9]Si Tiange, Tan Zhiyong, and Dai Yiqi. A Security Proof Method for Multilevel Security Models[J]. Journal of Computer Research and Development, 2008, 45(10): 1711-1717.
    [10]Wang Guilin, Qing Sihan. Security Notes on Two Cheat-Proof Secret Sharing Schemes[J]. Journal of Computer Research and Development, 2005, 42(11): 1924-1927.

Catalog

    Article views (1498) PDF downloads (1216) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return