Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhigang Sun is active.

Publication


Featured researches published by Zhigang Sun.


acm special interest group on data communication | 2011

Using NetMagic to observe fine-grained per-flow latency measurements

Tao Li; Zhigang Sun; Chunbo Jia; Qi Su; Myungjin Lee

We introduce NetMagic to demonstrate the efficacy of RLI architecture RLI for the fine-grained per-flow latency measurements. In this demo, the main function of RLI is implemented in NetMagic, which is the key component of our experimental network comprising several computers and switches. We are going to show how NetMagic can provide rapid implementation and evaluation of RLI architecture that is difficult with commercial switch or router platforms. In the demo, the estimated fine-grained per-flow latency by RLI is monitored and dynamically presented. Further, the true latency with a resolution of 8ns is also provided by NetMagic for the evaluation. The efficacy of RLI architecture can be observed in a real-time fashion by the difference between estimated latencies and true ones.


high performance switching and routing | 2007

Towards Spoofing Prevention Based on Hierarchical Coordination Model

Gaofeng Lv; Zhigang Sun

A novel approach for filtering spoofed IP packets, called spoofing prevention based on hierarchical coordination model, is proposed. In the approach a unique temporal signature is associated with each ordered pair of source destination networks. Each packet leaving a source network S is marked with the signature Sig(S,D) , associated with (S,D) , where D is the destination network. Upon arrival at the destination network the signature is verified and removed. The method verifies the authenticity of packets carrying the address s which belongs to the source address space of network S indexed by the signature. While the information about source address spaces of network is transmitted by hierarchical coordination model, in which by the same method the information is propagated and processed for routers residing in the same hierarchical, furthermore using dynamic bloom filter the information is fused to be delivered over hierarchies, thus the implementation is efficient The major benefits of SP-HCM are the strong incentive it provides to network operators to implement it, and the fact that the approach lends itself to stepwise deployment, since it benefits networks deploying the approach even if it is implemented only on parts of the Internet.


ICoC | 2013

Towards Internet Innovation: Software Defined Data Plane

Gaofeng Lv; Zhigang Sun; Yijiao Chen; Tao Li

In order to support new network architectures, Openflow implements flows forwarding based on multiple tables via pipelines, which increases the difficulty of the implementation. With the advent of multi-core CPU, a software defined data plane, LabelCast, is proposed, which characterizes the ability of forwarding operations and processing services through the Label table and Cast table. Forwarding layer lookups based on fixed-length labels and schedules packets processing, including light-semantics action instructions of general process, which is easy to be realized and is denoted by the Label table, and protocol semantics or status-related service of special process, which could be enriched via opening resources within network devices and is arranged by the Cast table. LabelCast supplies a reliable and programmable data plane, and could load multiple network architectures, so as to facilitate Internet innovation.


Archive | 2013

Frontiers in Internet Technologies

Jinshu Su; Baokang Zhao; Zhigang Sun; Xiaofeng Wang; Fei Wang; Ke Xu

Long-term prediction is a key problem in real-time video traffic applications. Most of real-time video traffic belong to VBR traffic and has specific properties such as time variation, non-linearity and long range dependence. In this paper, feature extraction method of real-time video traffic based on multiscale wavelet packet decomposition is proposed. On this basis, LMS algorithm is adopted to predict wavelet coefficients. Through reverse wavelet transforms of the predicted wavelet coefficients, the long-term prediction of real-time video traffic is realized. Numerical and simulation results show that this long-term prediction algorithm can accurately track the variation trend of video signal and obtain an excellent prediction result.


Ksii Transactions on Internet and Information Systems | 2012

Neighbor Gradient-based Multicast Routing for Service-Oriented Applications

Hui Wang; Jianbiao Mao; Tao Li; Zhigang Sun; Zhenghu Gong; Gaofeng Lv

With the prevalence of diverse services-oriented applications, such as IPTV systems and on-line games, the current underlying communication networks face more and more challenges on the aspects of flexibility and adaptability. Therefore, an effective and efficient multicast routing mechanism, which can fulfill different requirements of different personalized services, is critical and significant. In this paper, we first define the neighbor gradient, which is calculated based on the weighted sum of attributes such as residual link capacity, normalized hop count, etc. Then two distributed multicast routing algorithms which are neighbor Gradient-based Multicast Routing for Static multicast membership (GMR-S) and neighbor Gradient-based Multicast Routing for Dynamic multicast membership (GMR-D), are proposed. GMR-S is suitable for static membership situation, while GMR-D can be used for the dynamic membership network environment. Experimental results demonstrate the effectiveness and efficiency of our proposed methods.


international conference on mechatronic science electric engineering and computer | 2011

Design and implementation of access and control method for NetMagic

Qi Su; Yijiao Chen; Chunbo Jia; Zhigang Sun; Tao Li

Network innovation is encountering great challenge, while conventional close environment of network can not meet the need of network innovation. NetMagic designed by National University of Defense and Technology is a new open and reprogrammable switch platform towards the innovation of NGI (Next Generation Internet) architecture. NetMagic can support rapid implementation and deployment of new protocols and packet processing mechanisms efficiently. We present an Ethernet-based remote access and control method for NetMagic, define NetMagic access and control protocol (NMAC protocol for short) for interaction between Controller and NetMagic, introduce the basic interactive model, present the design both in software and hardware, and finally verify the method and analyze the performance.


Archive | 2012

Message receiving method, module and system as well as device

Gaofeng Lv; Lu Tang; Zhigang Sun; Yijiao Chen; Tao Li; Donglai Xu; An Yang; Wei Shi


Archive | 2012

Feedback-based dynamic hierarchical data storage equipment reliability ensuring method

Yijiao Chen; Qingxin Tang; Zhigang Sun; Jianbo Guan; Tao Li; Guohong Zhao; Xilong Mao; Gaofeng Lv; Baokang Zhao; Xiangdong Cui


Archive | 2012

Remote asymmetric end communication method based on Ethernet

Yijiao Chen; Zexin Lu; Zhigang Sun; Guohong Zhao; Xilong Mao; Xiangdong Cui; Tao Li; Qi Su


Archive | 2012

IP (Internet protocol) fragment processing method based on two-level table storage and transport layer information inquiry

Guohong Zhao; Huabiao Lu; Jinshu Su; Yijiao Chen; Shuhui Chen; Yong Tang; Zhigang Sun; Xiangdong Cui; Xilong Mao; Gaofeng Lv; Tao Li

Collaboration


Dive into the Zhigang Sun's collaboration.

Top Co-Authors

Avatar

Gaofeng Lv

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Tao Li

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Yijiao Chen

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Jinshu Su

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Baokang Zhao

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Qi Su

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Chunbo Jia

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Jianbo Guan

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Jinli Yan

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Lu Tang

National University of Defense Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge