期刊文献+

覆盖多播节点失效检测的分布式算法的改进 被引量:1

An Improved Distributed Algorithm for Node Failure Detection Mechanism of Overlay Multicast
下载PDF
导出
摘要 覆盖多播在端系统间构建数据分发树.由于端系统随意地加入或退出多播组,其可靠性不如路由器.当分发树中的非叶节点退出或者节点失效时,其下游节点将受到影响.低代价而快速的节点失效检测能降低由于服务间断所带来的影响,同时也为后续的恢复工作提供一个良好的基础.在分析相关工作的基础上,提出了一种改进的节点失效检测机制,它能够兼顾节点失效检测时间和额外消息负载两个性能指标. Overlay Multieast constructs a data distributing tree among end systems. End systems may leave the multieast group voluntarily, so they are more susceptible to failures than touters. The non-leaf nodes in the distributing tree leave or fail, all downstream nodes are affected. Fast detection with low overhead can reduce the influence of the disruption of service, and provide a favorable basis for recovery in succession. Based on the related work, we propose an improved failure detection mechanism, which can greatly reduce the failure detection time, at the cost of slightly increased overhead.
出处 《昆明学院学报》 2009年第6期67-68,72,共3页 Journal of Kunming University
基金 国家自然科学基金资助项目(10861012) 云南省教育厅科学研究基金项目(09Y0347) 云南大学中青年骨干教师培养计划专项经费资助项目
关键词 覆盖多播 节点失效检测 分布式算法 心跳 overlay muhicast node failure detection distributed Algorithm heartbeat
  • 相关文献

参考文献2

二级参考文献8

  • 1陆正福,李亚东,何英.IP多播组密钥管理方案分类体系研究[J].计算机工程与科学,2004,26(10):23-26. 被引量:13
  • 2陆正福,何英.组密钥管理中的d叉树数据结构设计[J].计算机工程与科学,2006,28(10):13-15. 被引量:2
  • 3GENNARO R,,RCHATGI P.How to Sign Digital Streams[].Advances in Cryptology-CRYPTO‘.1997
  • 4ZHAO X,PRAKASH A.Source Authentication in GroupCommunication Systems[].Proceeding of thethInternational Workshop on Database and Expert SystemApplication(DEXA‘).2003
  • 5CHALLAL Y,BETTAHAR H.Hybrid and AdaptiveHash_chaining scheme for Datastreaming SourceAuthentication[].IEEE-HSNMC.2004
  • 6Wong C K,Lam S S.Digital Signatures for Flows and Multicasts[].IEEE ACM Transactions on Networking.1999
  • 7CanettiR,,Garay J,Itkis G.Multicast Security: A Taxonomy and some Efficient Constructions[].Proc INFOCOM.1999
  • 8.

共引文献1

同被引文献12

  • 1黄俊,韩玲莉,陈光平.基于协议数据包分析的计算机网络课程教学方法探索[J].实验室研究与探索,2006,25(6):653-656. 被引量:14
  • 2Tanenbaum A S.计算机网络[M].第4版.潘爱民译.北京:清华大学出版社,2004.
  • 3陈鸣,常强林,岳振军.计算机网络实验教程[M].北京:机械工业出版社,2007.
  • 4KUROUSE J F, ROSE K W. Computer Networking:A Top-Down Approach Featuring the Internet[ M ]. 3th ed. Beijing: Higher Education Press, 2005.
  • 5MATTHEWS J N. Hands-on Approach to Teaching Computer Networking Using Packet Traces[ C ] // Special Interest Group on Information Technology Education (SIGITE). New York : ACM ,2005 : 167 - 173.
  • 6FUENTES F, KAR D C. Ethereal vs. Tepdump: a comparative study on packet sniffing tools for educational purpose [ J]. Journal of Computing Sciences in Colleges,2005,21 (4) : 169 - 176.
  • 7CLINCY V A, ABU-HALAWEH N. A Taxonomy of free Network Sniffers for teaching and research[ J]. Journal of Computing Sciences in Colleges ,2005,21 ( 1 ) :64 - 75.
  • 8CHO K, MITSUYA K, KATO A. Traffic Data Repository at the WIDE Project [ C] //Proceedings of the annual conference on USENIX Annual Technical Conference. California: USENIX ,2000:51.
  • 9BEJTLICH R. OpenPacket. org: the challenge of a free, public packet capture repository[ C ] // Proceedings of the I st ACM workshop on Network data anonymization. New York : ACM ,2008 : 1 - 2.
  • 10YIONEN T. Thoughts on how to mount an attack on tcpdpriv' s " a50" option[ EB/OL]. [2009 -06 -21 ]. http://www, ita. ee. lbl. gov/html/contrib/attack50/attack50, html.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部