Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Su Jinshu is active.

Publication


Featured researches published by Su Jinshu.


networking architecture and storages | 2009

Network Access Control Mechanism Based on Locator/Identifier Split

Tu Rui; Su Jinshu; Chen Feng

Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes network access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.


international forum on computer science-technology and applications | 2009

A Study of Hinge-Transmit Property of BGP Routing System

Liu Yujing; Zhang Bofeng; Wang Fei; Su Jinshu

From the aspect of inter-domain routing security, it is important to identify the critical ASes which transmit a large fraction of data traffic. By analyzing the BGP routing process under the control of routing polices and evaluating a series of Transmit factors, we realize that BGP routing system has a Hinge-Transmit property. It indicates that Tier-1 AS set is the hinge of the Internet, transmitting a large fraction of data traffic to the whole network; a subset of Tier-1 AS set with a special topological location (core AS set) is the hinge of data delivery paths to a specified destination, transmitting a large fraction of data traffic from any source to the destination. These hinge ASes are the keys of Internet security and should be protected carefully. Finally, we verify the result by Route Views routing tables.


international conference on information and communication technology convergence | 2016

Implementation of TCP large receive offload on multi-core NPU platform

Li Jie; Chen Shuhui; Su Jinshu

Nowadays, the ethernet is developing much faster than memory and CPU technologies, protocol processing has become the bottleneck of TCP performance on end systems. Modern NICs usually support offload techniques such as checksum offload and TCP Segmentation Offload(TSO), allowing the end system to offload some processing work onto the NIC hardware. In this paper, we propose an implementation of Large Receive Offload(LRO) on a multi-core NPU platform to improve TCP performance, particularly, we employ a so called active ACK mechanism to make very large packets(64KB) aggregation possible. We present experiment results to demonstrate the effectiveness of our proposal.


availability, reliability and security | 2014

A Structure P2P Based Web Services Registry with Access and Control

He Qian; Zhao Baokang; Long Yunjian; Su Jinshu; Ilsun You

In the cloud computing, there are massive functions and resources are encapsulated into Web services. The traditional web service registry systems normally using the central architecture can’t meet the requirements of cloud computing. A web service registry system based on structured P2P system with secure access and control is implemented. Multiple Universal Description, Discovery and Integration (UDDI) nodes are organized by the P2P based schedule and communication mechanism. The registration and discovery of Web services is redesigned to the new system that provides services like one single UDDI server. The experiment results show that the capacity can be extended dynamically and support large scalable access.


international conference on information science and engineering | 2010

Research on AS path betweenness based filtering policy against BGP prefix hijacking

Liu Yujing; Li Yuan; Bofeng Zhang; Su Jinshu

BGP prefix hijacking is a sort of security threaten of the Internet. The current effort on hijacking defense is to deploy filters for hijacking route on the edge of the Internet. In order to reduce the deployment cost of defense filter, we proposed an AS path betweenness based filter policy. By simulating a large amount of prefix hijacking experiments, we found that deploying defense filters on the core of the Internet is an effective and efficient way to gain high resilience of the network.


Journal of Software | 2006

Advances in Machine Learning Based Text Categorization

Su Jinshu; Zhang Bofeng; Xu Xin


Archive | 2013

Satellite cluster self-organization networking method based on master-slave heterogeneous data transmission module

Su Jinshu; Wu Chunqing; Yu Wanrong; Zhao Baokang; Tang Zhu; Hu Xiaofeng; Zhao Feng


Archive | 2014

Data distribution method of third-generation mobile communication core network based on user terminal IP (Internet Protocol)

Tang Yong; Chen Shuhui; Zhao Guohong; Cheng Mian; Su Jinshu; Lu Zexin


Archive | 2015

Link redistribution method for polar orbit satellite network snapshots

Feng Zhenqian; Wu Chunqing; Liu Bo; Tang Zhu; Su Jinshu; Zhao Baokang; Chen Yijiao; Yu Wanrong; Mao Xilong; Deng Jinsheng


Archive | 2015

Upstream resource dispatching method and device directed at 3G (the 3rd generation telecommunication)/4G (the fourth generation telecommunication) satellite mobile communication network

Zhao Baokang; Su Jinshu; Wang Baosheng; Wu Chunqing; Chen Yijiao; Liu Bo; Mao Xilong; Chen Shuhui; Cui Xiangdong; Yu Wanrong; Feng Zhenqian; Guan Hongtao; Fei Changjiang

Collaboration


Dive into the Su Jinshu's collaboration.

Top Co-Authors

Avatar

Chen Shuhui

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Baosheng

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Zhao Baokang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Tao Jing

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Peng Wei

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Li Sudan

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Liu Bo

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Wang Hong

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Hu Xiaofeng

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Gao Xianming

National University of Defense Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge