References in periodicals archive ?
Figure 3 shows the acceptance ratio of GD-1, GD-2, and TPSSC versus RD.
In order to further evaluate the ability of TPSSC to accept security requests, we measure the acceptance ratio of TPSSC by changing some parameters of security request and network environment.
Moreover, it allows TPSSC to choose from a wider range of service nodes and routing paths.
This experiment also indicates that TPSSC has good scalability and large search space, which can perform well in the network with more nodes and links.
Figure 7 shows the maximum resource fragmentation of GD-1, GD-2, and TPSSC versus RD.
Figure 8 shows the maximum security service latency (namely, the maximum end-to-end latency of flow) of GD-1, GD-2, and TPSSC versus RD.
Figure 9 shows the time overhead of GD-1, GD-2, and TPSSC versus RD.
In order to evaluate the performance of TPSSC further, we conduct experiments with different number of security requests in the FT-8 network and measure the time overhead and the acceptance ratio.
With the increasing number of security requests, the time overhead of TPSSC increases and the increasing rate also broadens.
In this paper, we present a novel approach to integrate SSC into delivering security service and propose a three-phase method TPSSC to find near-optimal solutions of SSC-DP.
Caption: Figure 4: Acceptance ratio of TPSSC in the FT-6-A network.
Caption: Figure 5: Acceptance ratio of TPSSC in the FT-6-B network.
Acronyms browser ?
Full browser ?