• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dong Pingping, Wang Lezhi, Sun Jun, and Wang Jianxin. Data and Protocol Optimization Techniques in Wide Area Networks[J]. Journal of Computer Research and Development, 2014, 51(5): 944-958.
Citation: Dong Pingping, Wang Lezhi, Sun Jun, and Wang Jianxin. Data and Protocol Optimization Techniques in Wide Area Networks[J]. Journal of Computer Research and Development, 2014, 51(5): 944-958.

Data and Protocol Optimization Techniques in Wide Area Networks

More Information
  • Published Date: May 14, 2014
  • In recent years, with the rapid development of computer networks, people increasingly rely on computer networks to obtain information. However, ubiquitous applications are deployed over the wide area networks (WANs), which have shown low transport efficiency due to the natural characteristics of WANs such as high latency and high packet loss rate. WANs optimization, also known as WANs acceleration, which aims to accelerate a broad range of applications and protocols over WANs, has become a hot topic in both academia and industry. Based on the in-depth study of the current WANs optimization techniques from different aspects that cause the WANs performance degradation, a survey is presented on the state of the art of WANs optimization or WANs acceleration techniques from the networking point of view including data optimization and protocol optimization. Data optimization also includes data compression, data caching, data pre-fetching and data de-duplication, while protocol optimization is depicted with transport layer optimization and application-layer protocol optimization. Meanwhile, how these acceleration techniques can improve application performance, mitigate the impact of latency and loss, and minimize bandwidth consumption is also illustrated. In addition, widely deployed WANs acceleration products incorporating major WANs optimization techniques are discussed. Finally, a conclusion and some perspectives are given.
  • Related Articles

    [1]Fang Dongliang, Liu Puzhuo, Qin Chuan, Song Zhanwei, Sun Yuyan, Shi Zhiqiang, Sun Limin. Survey of Protocol Security of Industrial Control System[J]. Journal of Computer Research and Development, 2022, 59(5): 978-993. DOI: 10.7544/issn1000-1239.20211132
    [2]He Kewen, Zhang Jiachen, Liu Xiaoguang, Wang Gang. Fingerprint Search Optimization for Deduplication on Emerging Storage Devices[J]. Journal of Computer Research and Development, 2020, 57(2): 269-280. DOI: 10.7544/issn1000-1239.2020.20190543
    [3]Zeng Gaoxiong, Hu Shuihai, Zhang Junxue, Chen Kai. Transport Protocols for Data Center Networks: A Survey[J]. Journal of Computer Research and Development, 2020, 57(1): 74-84. DOI: 10.7544/issn1000-1239.2020.20190519
    [4]Yan Fang, Li Yuanzhang, Zhang Quanxin, Tan Yu’an. Object-Based Data De-Duplication Method for OpenXML Compound Files[J]. Journal of Computer Research and Development, 2015, 52(7): 1546-1557. DOI: 10.7544/issn1000-1239.2015.20140093
    [5]Cao Jian, Wang Xingwei, Zhang Jinhong, Huang Min. A Data Driven Cognitive Routing Protocol for Information-Centric Networking[J]. Journal of Computer Research and Development, 2015, 52(4): 798-805. DOI: 10.7544/issn1000-1239.2015.20148404
    [6]Li Chao, Wang Shupeng, Yun Xiaochun, Zhou Xiaoyang, Chen Ming. A Reading Performance Improvement Method in Deduplication Based on Pipeline[J]. Journal of Computer Research and Development, 2013, 50(1): 90-100.
    [7]Zong Ming, Wang Xiaodong, and Zhou Xingming. Cost-Optimizing Adaptive Location Service Protocol in MANET[J]. Journal of Computer Research and Development, 2012, 49(12): 2515-2528.
    [8]Fu Yinjin, Xiao Nong, and Liu Fang. Research and Development on Key Techniques of Data Deduplication[J]. Journal of Computer Research and Development, 2012, 49(1): 12-20.
    [9]Jin Hai, Luo Fei, Zhang Qin, and Zhang Hao. An Efficient Data Transfer Protocol for P2P-Based High Performance Computing[J]. Journal of Computer Research and Development, 2006, 43(9): 1543-1549.
    [10]Liu Yi, Pang Liaojun, and Wang Yumin. An Optimistic Payment Protocol Based on Mobile Agents[J]. Journal of Computer Research and Development, 2005, 42(10): 1686-1691.

Catalog

    Article views (940) PDF downloads (819) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return