Zhiyong Zhang's research while affiliated with Shandong University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (19)
Journaling techniques play an important role in addressing the reliability issue of filesystems caused by the volatile DRAM (Dynamic Random Access Memory)-based buffer cache. However, journaling techniques introduce a large number of extra storage writes, which greatly degrades system performance, especially for mobile devices [1]. Emerging Non-Vol...
The exponential growth of devices connected to the network has resulted in the development of new IoT applications and services. A large number of IoT devices are application-specific which makes the network difficult to manage and change. The Software Defined Networking (SDN) paradigm brings a new perspective of solving the network rigidity issue....
With the rapid development of storage technology, Solid State Drive (SSD) has received extensive attentions from industry and academia. As a promising alternative of the conventional Hard Disk Drive (HDD), SSD shows its advantages in terms of I/O performance, power consumption and shock resistance. But the natural constraint of write endurance limi...
Software-Defined Networking (SDN) has been introduced to Wireless Sensor Networks (WSNs) to achieve centralized control and flexible network management. In Software-Defined Wireless Sensor Networks (SDWSNs), security and energy are two critical issues. However, few studies address these two aspects simultaneously. In this paper, we propose an Energ...
Wireless sensor networks (WSNs) are considered as a key enabler for the paradigm of Internet of Things (IoT). With increasing number of devices connected to the IoT environments, traditional solutions for WSNs tend to be costly in terms of network maintenance and management. Software-Defined Networking (SDN) appears as a viable alternative network...
As the ocean exploration becomes more and more popular, the Underwater Wireless Sensor Network (UWSN) has recently received extensively attentions. In UWSN, a large number of nodes are deployed at different depths, which means once deployed, it will be difficult to replace or recharge due to the complex underwater environment. Therefore, improving...
Software-Defined Networking (SDN) allows controlling applications to install fine-grained forwarding policies in the underlying switches. Ternary Content Addressable Memory (TCAM) enables fast lookups in hardware switches with flexible wildcard rule patterns. However, the performance of packet processing is severely constrained by the capacity of T...
Software-Defined Networking (SDN) allows controlling applications to install fine-grained forwarding policies in the underlying switches. Ternary Content Addressable Memory (TCAM) enables fast lookups in hardware switches with flexible wildcard rule patterns. However, the performance of packet processing is severely constrained by the capacity of T...
Software defined network (SDN) is an emerging network architecture that has drawn the attention of academics and industry in recent years. Affected by investment protection, risk control and other factors, the full deployment of SDN will not be finished in the short term, thus it results into a coexistence state of traditional IP network and SDN wh...
Compared with the conventional dynamic random access memory (DRAM), emerging non-volatile memory technologies provide better density and energy efficiency. However, current NVM devices typically suffer from high write power, long write latency and low write endurance. In this paper, we study the task allocation problem for the hybrid main memory ar...
Journaling technique is widely used in modern file systems for high reliability and fast recovery from system failures. However, journaling mechanism accounts for extra journal traffic flushed from the buffer cache to storage, greatly impeding the performance of file systems. Emerging non-volatile memory (NVM) technologies bring a new perspective o...
Compared with the conventional dynamic random access memory (DRAM), emerging non-volatile memory such as the phase change random access memory (PRAM) has better density and energy efficiency. However, it usually suffers shortcomings of high write power/latency and low write endurance. In this paper, we study the task allocation problem on the hybri...
Software-Defined Networking (SDN) and OpenFlow have brought a promising architecture for the future networks. However, there are still a lot of security challenges to SDN. To protect SDN from the Distributed denial-of-service (DDoS) flooding attack, this paper extends the flow entry counters and adds a mark action of OpenFlow, then proposes an entr...
Available energy becomes a critical design issue for the increasingly complex real-time embedded systems. Phase Change Memory (PCM), with high density and low idle power, has recently been extensively studied as a promising alternative of DRAM. Hybrid PCM-DRAM main memory architecture has been proposed to leverage the low power of PCM and high spee...
Mobile ad hoc networks are more flexible than tradition networks since they do not require fixed infrastructure and allow all nodes move in a random trajectory, which leads frequent rerouting and degrades network performance. A better routing protocol can provide a more stable route to adapt to dynamic topology. In this paper, we propose a novel st...
Citations
... Employing NVMs in buffering schemes has already been addressed in prior studies based on two main approaches: 1) storage-aware approach [4,65,66] and 2) storage-unaware approach [2,7,9,16,41,[67][68][69]. The first approach aims at improving the lifetime and performance of SSD-based storage systems using different mechanisms such as dirty page favoring [4] (the mechanism of using policies to prioritize dirty pages in the buffer), overcoming small write problem, and reducing garbage collection frequency [51]. ...
... Hybrid SDN networks are divided into the SDN autonomous system (SAS) and IP autonomous system (IPAS). The SAS is a centralized framework by the SDN controller as the manager, while IPAS is a distributed framework, with SAS and IPAS bridged by a gateway, as shown in Figure 2. The IP and SDN is hybrid in topology and divided into two domains, which face compatibility problems and security challenges in both domains [16]. ...
... WSNs [3] [4], sensor nodes in the network collaborate with one another to execute sensing task and forward data through the network hop by hop based on some specific routing protocols [5]. WSNs are usually deployed in harsh or hostile environment and work in an unsupervised mode, they are vulnerable to various kinds of attacks especially during the routing process [6], such as selective forwarding, Greyhole, Wormhole, and Blackhole attacks [7], [8]. Traditional cryptography-based secure techniques are highly complex and inconsistent with the specific characteristics and severe constraints of WSNs [9]. ...
... EBDCR is based on the replacement of the low energy level nodes with respect to the depth adjustment mechanism [25]. The authors have suggested the replacement of the low energy nodes with high energy nodes which is not so simple in underwater harsh environment. ...
... They increased the cache hit ratio and achieved fast flow table lookups, but there still is room for improvement due to their lack of consideration on flow dynamics. Furthermore, Ding et al. [25] proposed a hybrid flow table storage architecture, utilizing NVM-based TCAM to cache the most popular rules to improve the cache-hit ratio, while relying on a very small-size SRAM-based TCAM to handle cache-miss traffic to decrease update latency. Wang et al. [26] built a traffic-aware hybrid rule allocation scheme by logically split TCAM into two parts: reactive and proactive, which can be dynamically adjusted according to network traffic behavior. ...
... The coldness criterion can also be combined with read and write intensity, motivated by the read/write performance asymmetry of PM. This combination prioritize readintensive cold pages over write-intensive ones as candidates to demote to PM [26], [20], [48], [8], [46], [62], [44], [16]. ...
... Sun et al. 20 formulated the SDN controller optimization problem and proposed a routing algorithm, Dijkstra-Repeat in SDN nodes, which can offer disjoint multipath routing. In order to make it computationally feasible for large-scale networks, they then developed a new fast fully polynomial time approximation scheme (FPTAS)-based lazy routing update. ...
... However, data loss due to power failure is the major drawback of DRAM-based buffers because of its volatility. Thus, DRAM-based buffers exploit mechanisms such as periodic flush [2,5] and/or partial use of main storage as the journal area [6][7][8][9][10] to recover data in the case of power failure. Nevertheless, these techniques significantly increase storage write traffic. ...
... But it only considers main memory with the following characteristics: 1. Uniform latency of access, 2. Infinite durability and 3. The hybrid memory architecture are not adoptable directly to PRAM's main memory structure [6,18,22,24]. The objective of this work is 1) To reduce energy consumption, 2) To reduce number of NVM records and 3) To reduce the NVM size of the main memory. ...
... The ddos attack will mostly affect the cloud computing, SDN is the solution to mitigate the attack. Because of the fast evolution of botnets, the ddos attacks affect the cloud computing in the faster rate [25]. Q. Yan et al [26] classified the ddos attack based on the location where the protection mechanism was installation. ...