• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Gao Jianmin, Lu Huimei, and Cao Yuanda. Multi-Source Interactive Application Layer Multicast Routing Protocol[J]. Journal of Computer Research and Development, 2011, 48(5): 778-785.
Citation: Gao Jianmin, Lu Huimei, and Cao Yuanda. Multi-Source Interactive Application Layer Multicast Routing Protocol[J]. Journal of Computer Research and Development, 2011, 48(5): 778-785.

Multi-Source Interactive Application Layer Multicast Routing Protocol

More Information
  • Published Date: May 14, 2011
  • Application layer multicast (ALM) without expanding the basic underlying network can support greater range of multicast communications, which makes it a popular mechanism for multicast applications. However, compared with the traditional IP multicast, ALM has larger network delay and the node stability is poor, which makes it become a unique and challenging problem to implement multi-source interactive multicast application. In this paper, an ALM protocol called Thunder is proposed. According to the roles of members in the group, Thunder divides the interactive group into core-network and peripheral-tree. The core-network consists of the multicast data sources. By using Mesh-Tree structure, it constructs an optimal distribution tree for each data source and pursues fast forwarding to optimize the interactive process. The peripherals-tree is a tree structure composed by the unstable members which just receive data or only produce a small amount of data. Additionally, Peripherals-tree structure allows more members to receive multicast data. Those unstable nodes will not influence the interaction process of core-network, so the response speed and the protocol scalability of the interactive process are improved. Experiments demonstrate that Thunder can decrease network delay of interactive ALM and improve the scalability, which makes the multi-source interactive multicast applications be deployed and implemented more easily.
  • Related Articles

    [1]Tan Tian, Ma Xiaoxing, Xu Chang, Ma Chunyan, Li Yue. Survey on Java Pointer Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 274-293. DOI: 10.7544/issn1000-1239.202220901
    [2]Wang Mingzhe, Jiang Yu, Sun Jiaguang. Static Instrumentation Techniques in Fuzzing Testing[J]. Journal of Computer Research and Development, 2023, 60(2): 262-273. DOI: 10.7544/issn1000-1239.202220883
    [3]Zhang Lei, Yang Zhemin, Li Mingqi, Yang Min. TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance[J]. Journal of Computer Research and Development, 2019, 56(11): 2315-2329. DOI: 10.7544/issn1000-1239.2019.20190348
    [4]Wang Lei, He Dongjie, Li Lian, Feng Xiaobing. Sparse Framework Based Static Taint Analysis Optimization[J]. Journal of Computer Research and Development, 2019, 56(3): 480-495. DOI: 10.7544/issn1000-1239.2019.20180071
    [5]Su Ning, Guo Junxia, Li Zheng, Zhao Ruilian. EFSM Amorphous Slicing Based Test Case Generation[J]. Journal of Computer Research and Development, 2017, 54(3): 669-680. DOI: 10.7544/issn1000-1239.2017.20151053
    [6]Ju Xiaolin, Jiang Shujuan, Chen Xiang, Zhang Yanmei, Shao Haoran. Factor Analysis of Influence for Fault Localization Framework Based on Slice Spectrum[J]. Journal of Computer Research and Development, 2014, 51(12): 2772-2787. DOI: 10.7544/issn1000-1239.2014.20131522
    [7]Wang Yawen, Yao Xinhong, Gong Yunzhan, Yang Zhaohong. A Method of Buffer Overflow Detection Based on Static Code Analysis[J]. Journal of Computer Research and Development, 2012, 49(4): 839-845.
    [8]Han Wei, He Yeping. Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System[J]. Journal of Computer Research and Development, 2011, 48(8): 1430-1437.
    [9]Ye Pengfei, Peng Xin, and Zhao Wenyun. Recovering the Use Case from Object-Oriented Programs by Static Analysis[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Bian Xiaofeng, Zhou Xuehai. Study on Modeling MIPS Processors for Static WCET Analysis[J]. Journal of Computer Research and Development, 2006, 43(10): 1828-1834.

Catalog

    Article views (768) PDF downloads (425) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return