• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xia Nu, Li Wei, Lu You, Jiang Jian, Shan Feng, Luo Junzhou. The Redundant Tree Algorithm for Uninterrupted Data Delivery[J]. Journal of Computer Research and Development, 2016, 53(9): 2016-2029. DOI: 10.7544/issn1000-1239.2016.20150380
Citation: Xia Nu, Li Wei, Lu You, Jiang Jian, Shan Feng, Luo Junzhou. The Redundant Tree Algorithm for Uninterrupted Data Delivery[J]. Journal of Computer Research and Development, 2016, 53(9): 2016-2029. DOI: 10.7544/issn1000-1239.2016.20150380

The Redundant Tree Algorithm for Uninterrupted Data Delivery

More Information
  • Published Date: August 31, 2016
  • With the development of the big data applications, the requirement for guaranteeing un-interrupted data delivery is growing gradually. To address the problem of single node/link failure, researchers had conducted lots of work. However, current methods for guaranteeing uninterrupted data delivery face the deficiencies of low performance of the primary/secondary delivery paths and the low resistant ability to the multiple nodes/links failure. In order to solve the above problems, a circle selecting by edge sorting based redundant tree algorithm for uninterrupted data delivery CSES is presented. At first, a minimal delivery tree with the data source as the root node is built in this algorithm, on which the routing hop count of the primary paths is the smallest. Secondly, in order to reduce the hop count of the secondary paths and to enhance the resistant ability of the multiple nodes/edges failure, the edges in network topology but not included in the tree are sorted based on the sum of the nodes on the paths between the root node and the two nodes of the edge. Then, the edges are added to the minimal tree to form the redundant circles and the redundant branches of the redundant circles are added to the minimal tree. Finally, a redundant tree rooted by the data source is built. The experimental results show that, compared with the other redundant tree algorithms, the hop count of the primary/secondary paths on the redundant tree built by CSES algorithm is smaller and the resistant ability of multiple nodes/edges failure of CSES algorithm is better.
  • Related Articles

    [1]Wei Zheng, Dou Yu, Gao Yanzhen, Ma Jie, Sun Ninghui, Xing Jing. A Consistent Hash Data Placement Algorithm Based on Stripe[J]. Journal of Computer Research and Development, 2021, 58(4): 888-903. DOI: 10.7544/issn1000-1239.2021.20190732
    [2]Zhang Jiaying, Wang Qi, Zhang Zhixing, Ruan Tong, Zhang Huanhuan, He Ping. Lab Indicator Standardization in a Regional Medical Health Platform[J]. Journal of Computer Research and Development, 2019, 56(9): 1897-1906. DOI: 10.7544/issn1000-1239.2019.20180729
    [3]Xu Qingui, Qin Yong, Yang Taolan. Light-Weight Integrity Monitoring Based on Hashing Time Validity[J]. Journal of Computer Research and Development, 2015, 52(3): 702-717. DOI: 10.7544/issn1000-1239.2015.20131382
    [4]Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824
    [5]Yuan Chunyang, Xu Junfeng, Zhu Chunge. A Trusted Recovery Model for Assurance of Integrity Policy Validity[J]. Journal of Computer Research and Development, 2014, 51(2): 360-372.
    [6]Zheng Jinhua, Li Ke, Li Miqing, and Wen Shihua. Adaptive Neighbor Multi-Objective Evolutionary Algorithm Based on Hypervolume Indicator[J]. Journal of Computer Research and Development, 2012, 49(2): 312-326.
    [7]Fu Zhongliang. Effective Property and Best Combination of Classifier Linear Combination[J]. Journal of Computer Research and Development, 2009, 46(7): 1206-1216.
    [8]Fu Zhongliang. Effectiveness Analysis of AdaBoost[J]. Journal of Computer Research and Development, 2008, 45(10): 1747-1755.
    [9]Ding Zhiming, Han Jingyu, Li Man, and Yu Bo. Network-Constrained Moving Objects Database Based Traffic Flow Statistical Analysis Model[J]. Journal of Computer Research and Development, 2008, 45(4): 646-655.
    [10]Zhao Liang, Wang Jianmin, Sun Jiaguang. A Study of Software Test Criterion Effectiveness Measure[J]. Journal of Computer Research and Development, 2006, 43(8): 1457-1463.
  • Cited by

    Periodical cited type(8)

    1. 刘杨,汪伦,沈鑫. 基于SDN服务链安全资源池的园区网出口方案设计. 现代信息科技. 2025(01): 115-119 .
    2. 张正昌. 云取证的学理反思与制度调适. 财经法学. 2025(02): 174-189 .
    3. 陈培欣,罗志娟. 基于区块链的云取证方案. 网络安全技术与应用. 2024(03): 124-126 .
    4. 丁丽萍,杜漠,黄昭颖,肖炯恩. 基于人工智能与区块链技术融合的端到云智慧执法平台. 警察技术. 2022(01): 62-69 .
    5. 吕锋. 云平台下入侵人员位置实时监测方法研究. 计算技术与自动化. 2022(02): 29-33 .
    6. 陈葳葳,曹利,顾翔. 基于区块链的车联网电子取证模型. 计算机应用. 2021(07): 1989-1995 .
    7. 唐寅,何嘉. 基于软件定义的安全功能服务链部署方法. 计算机工程与设计. 2021(11): 3052-3058 .
    8. 李嘉鑫,马征兆,张叶舟,唐远新,翟继强. 基于云取证的轻量级虚拟机监视器设计. 计算机与网络. 2020(23): 61-64 .

    Other cited types(4)

Catalog

    Article views (1253) PDF downloads (459) Cited by(12)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return