Design and Implementation of Routing Protocols for IPv6 Global Anycast Communications
VxWorks

Case Studies
Some notable examples of VxWorks in action include its use in the Mars Rover mission, where it provides the operating system for the river's control system It has also been used in the avionic systems of commercial aviation, as well as in high speed rail transportation systems
• Memory Optimization Methods: To optimize memory usage, VxWorks provides mechanisms such as memory partitioning and pooling Memory partitioning allows for the creation of fixed size memory blocks, reducing fragmentation and improving allocation speed Memory pooling allows for the reuse of pre allocated memory blocks, further reducing fragmentation and improving efficiency
scheduling, and inter process communication mechanisms
Advantages
VxWorks provides a stable and predictable runtime environment, making it suitable for safety critical applications It modular design allows for easy customization and integration with other systems Additionally, VxWorks supports a wide range of hardware platforms and processors
多核处理器核间的通信研究与实现免费范文

多核处理器核间的通信研究与实现摘要:针对多核处理器的特点提出一种新型的异构多核DSP处理器结构。
主处理器为通用处理器,作为控制密集型处理器核用于系统管理和控制;8个DSP作为计算密集型处理器核,用于大信息量融合计算。
详细设计8个DSP 之间的NoC互连结构。
首先采用2×4 2D Turos结构进行单个路由节点结构的设计,包括数据包格式、路由和仲裁设计;其次对路由节点进行编码、路由算法设计和确定节点路由方向。
该结构具有总线局部通信带宽高的优点,采用NoC 的易扩展性和NoC在各DSP之间通信的并行性使系统规模易于扩展并满足大批量数据传输要求。
最后通过仿真实验,验证了该设计的有效性,为后续多核处理器的设计与实现打下坚实的技术基础。
关键词:多核处理器;片上网络;拓扑结构;数据传输中图分类号: TN911?34; TP391 文献标识码: A 文章编号: 1004?373X (2016)16?0083?05Abstract: Aiming at the characteristics of multi?core processor, a new heterogeneous structure of multi?core DSP is put forward. The main processor is a common processor used for system management and control to control the intensive processor cores. Eight DSPs as the computation intensive processor cores are used to fuse and calculate the large amount of information. The structure of NoC interconnection among 8 DSPs was designed detailedly. The 2×4 2D Turos structure is used to design the single routing node structure, including data packet format design, routing design and arbitration design. And then the items of routing nodes coding, routing algorithm design and node routing direction determining were performed. This structure has the advantage of high bus local communication bandwidth. The extensibility of NoC and parallelism of NoC communication among DSPs are used to extend the system scale easily and satisfy the requirement of massive data transmission. The validity of the design was verified with simulation experiment, and it lays a solid technical foundation for follow?up design and implementation of multi?core processors.Keywords: multi?core processor; Network on Chip; topology structure;data transmission0 引言多核处理器是在一个芯片上集成多个处理器核,通过多核并行执行的方式来提高性能,对计算机体系结构的发展有着深远的影响[1?2]。
ROUTOS

ROUTOSIntroduction:ROUTOS is a state-of-the-art routing operating system designed to manage network traffic efficiently. It provides intelligent algorithms and advanced routing protocols to optimize routing decisions and ensure seamless connectivity in complex network infrastructures. This document will provide a detailed overview of ROUTOS, its features, benefits, and implementation.Features of ROUTOS:1. Advanced Routing Algorithms:ROUTOS incorporates advanced routing algorithms that analyze network topology, traffic patterns, and other relevant factors to determine the optimal path for data packets. These algorithms dynamically adapt to changing network conditions, ensuring minimum latency and maximum throughput.2. Dynamic Path Selection:ROUTOS continuously monitors network conditions and dynamically selects the best path for transmitting data. Ittakes into account factors such as link quality, congestion levels, and shortest path to deliver the packets efficiently.3. Traffic Engineering:ROUTOS enables traffic engineering by allocating network resources intelligently. It provides mechanisms to prioritize traffic based on predefined policies, ensuring that critical applications receive the necessary bandwidth while optimizing resource utilization.4. Multi-Protocol Support:ROUTOS supports a wide range of routing protocols, including OSPF (Open Shortest Path First), BGP (Border Gateway Protocol), IS-IS (Intermediate System to Intermediate System), and RIP (Routing Information Protocol). This versatility allows seamless integration with diverse network infrastructures.5. Fault Recovery and Redundancy:ROUTOS is designed to minimize network downtime by offering fault recovery mechanisms and redundancy options. It detects and reacts to link failures, rerouting traffic through alternate paths to ensure continuous connectivity.6. Traffic Monitoring and Analysis:ROUTOS provides comprehensive traffic monitoring and analysis tools to gain insights into network performance and troubleshoot potential issues. It offers real-time statistics, flow analysis, and detailed reports for effective network management.Benefits of ROUTOS:1. Improved Network Performance:The advanced routing algorithms and traffic engineering capabilities of ROUTOS optimize network performance by ensuring efficient data transmission and resource allocation. This results in reduced latency, increased throughput, and improved overall network quality.2. Enhanced Scalability and Flexibility:ROUTOS can handle large-scale networks with ease due to its scalable architecture and support for various routing protocols. It can adapt to evolving network requirements, making it suitable for both small and enterprise-level networks.3. Increased Reliability:ROUTOS enhances network reliability by providing fault recovery mechanisms and redundancy options. It minimizes network downtime and ensures uninterrupted connectivity, critical for mission-critical applications and services.4. Simplified Network Management:ROUTOS simplifies network management by offering comprehensive monitoring and analysis tools. Administrators can gain insights into network performance, troubleshoot issues efficiently, and make data-driven decisions for network optimization.Implementation of ROUTOS:1. Hardware Requirements:The implementation of ROUTOS requires network devices capable of running the operating system efficiently. These devices should meet the minimum hardware specifications provided by the manufacturer.2. Installation and Configuration:ROUTOS installation involves loading the operating system onto compatible network devices and configuring the necessary settings. This process includes defining networktopology, enabling routing protocols, and setting up policies for traffic engineering.3. Integration with Existing Infrastructure:ROUTOS can seamlessly integrate with existing network infrastructure, including routers, switches, and other network devices. It can interoperate with different routing protocols, allowing organizations to leverage their existing network investments.4. Training and Support:Organizations implementing ROUTOS may require training for network administrators to understand and effectively manage the operating system. Training programs and technical support are available from the ROUTOS manufacturer to ensure a smooth implementation process.Conclusion:ROUTOS is a powerful routing operating system that offers advanced routing algorithms, dynamic path selection, traffic engineering capabilities, and fault recovery mechanisms. Its features and benefits contribute to improved network performance, enhanced scalability, increased reliability, and simplified network management. By implementing ROUTOS,organizations can optimize their network infrastructure, ensure seamless connectivity, and efficiently manage network traffic.。
计算机专业英语复习题

一、判断对错1. The software system is the physical equipment that you can see and touch.2. Typically, a data value is set to zero to represent FALSE and 1 value for TRUE.3. In the earliest general-purpose computer, most input and output media were magnetic disks.4. Supercomputers are largest, fastest, and most expensive computer available.5. A computer system consists of hardware system and software system.1. The data bus always receives data from the CPU, and the CPU never reads the data bus.2. Main memory holds whatever programs and data are available for immediate use by theCPU.3. Dynamic RAM does not have to be refreshed.4.Dot-matrix printer work by squirting tiny droplets of liquid ink at the paper.5. The auxiliary memory is very small, relatively expensive, and has very high access speed.1. Shift registers operate in serial fashion all the bits of the word at a time.2. RISC processors have larger instruction sets that often include some particularly complexinstructions.3. SIMD represents an organization that includes many processing units under the supervisionof a common control unit.4. Parallel processing is established by distributing the data among the multiple functional units.5. RISC is a complex instruction set computer.1. A number of different algorithms can exist for solving a computational problem, and each ofthese algorithms could have a same running time complexity.2. The divide-and-conquer algorithm is a bottom-up technique that usually begins by solvingthe smallest subproblems, the dynamic programming solves problems in a top-down fashion.3. An important property of arrays is that their size and shape are constant.4. If all of the elements stored in a list are of the same type, then the list is said to beheterogeneous. However, if different types of elements are stored in the list, then the list is said to be homogeneous.5. A queue is a dynamic set that obeys the LIFO property.1. The computer hardware recognizes only assembly language instruction.2. A program written in the assembly language of one microprocessor can run on a computerthat has a different microprocessor.3. Assembly languages are platform-independent, but high-level languages are notplatform-independent.4. The 4GLs are also called nonprocedural languages.5. Each assembly language instruction corresponds to one unique machine code instruction.二、完形填空Unit 1This chapter introduces digital computer, data types, the evolution of computers, and types of computers. 1 is known to all, it’s hard to find a field in 2 computers are not being used. Digital computer, also called electronic computer or computer, is a digital system that 3 various computational tasks. Digital computers use the 4 number system, which has two digits: 0 and 1.By using various coding 5 , groups of bits can be made to represent not only binary numbers 6 other discrete symbols, such as decimal digits or letters of the alphabet. A computer system consists of hardware system and software system. Programs tell the hardware what to do. 7 software is designed to accomplish real-world tasks in fields such as accounting, entertainment, and engineering. Computers are usually 8 into four broad categories: microcomputers, minicomputers, mainframe computers, and supercomputers. It’s hard to give a 9 definition to each type because computer speeds and storage 10 change rapidly.1. A. As B. It C. As it D. That2. A. what B. which C. where D. when3. A. performs B. carries C. makes D. integrates4. A. decimal B. binary C. Arabian D. American5. A. technique B. technologyC. techniquesD. technologies6. A. instead of B. rather thanC. but alsoD. as well7. A. Application B. System C. Word D. Excel8. A. put B. made C. conducted D. classified9. A. precious B. progress C. proceeding D. precise10. A. capacities B. capable C. capabilities D. capacity1.A2. B3. A4. B5. C6. C7. A8. D9. D 10.AUnit 2A computer system 1 of hardware system and software system. The hardware of the computer is usually divided into three major parts or three 2 subsystems: the CPU, the memory subsystem, and the I/O 3 . The CPU is made up of three major parts, Register Set, the 4 logic unit, or ALU, and Control Unit. It performs many operations and controls computer. Memory is also known as 5 memory or main memory, which is cataloged into two major types of memory: Random Access Memory (RAM) and Read Only Memory (ROM).It refers to the 6 in the computer that hold whatever programs and data are available 7 immediate use by the CPU, along with the program’s data. Computer systems include special hardware 8 between the CPU and peripherals to supervise and synchronize allinput and output transfers. These components are called 9 units because they interface between the processor bus and the peripheral device. The I/O subsystem allows the CPU to 10 with input and output devices.1. A. consists B. makes upC. constitutesD. comprise2. A. premier B. primaryC. preliminaryD. elementary3. A. system B. machine C. subsystem D. device4. A. mathematic B. authorativeC. arithmeticD. authoritative5. A.external B.exterior C. Interior D. internal6. A. circuits B. wires C. lines D. hardware7. A.by B. for C. with D. in8. A.software B. setting C. listing D. components9. A. singular B.dual C. interface D. compact10. A.handle B. interact C. respond D. link1. A2. B3. C4. C5. D6. A7. B8. D9. C 10. BUnit 3In computer engineering, computer architecture is the ___1___ design and fundamental operational structure of a computer system. It is a ___2___ and functional description of requirements, especially speeds and interconnections, and design implementations for the various parts of a computer —___3___ largely on the way by which the central processing unit (CPU) performs internally and accesses addresses in memory. Computer system architecture ___4___ the design of the four ___5___: parallel processing, pipelining, vector processing and RISC. Parallel processing system is used to provide simultaneous data-processing tasks for the purpose of increasing the ___6__ speed of a computer systemand is able to perform ___7___ data processing to achieve faster execution time. A pipeline is a set of data processing elements connected in series, so that the output of one element is the input of the next one. The elements of a pipeline are often ___8___ in parallel or in time-sliced fashion. A vector processor, is a CPU design that is able to run mathematical operations on multiple data elements simultaneously. Computers with vector processing capabilities are in demand in 9___ applications. RISC processors have fewer and __10___ instructions than CISC processors. As a result, their control units are less complex and easier to design.1. A. lastest B. conceptual C. ideal D. simple2. A. plan B. design C. blueprint D. concept3. A. relying B. depending C. attaching D. focusing4. A. refers B. speaks C. involves D. interacts5. A. ingredients B. types C. kinds D. lists6. A. computational B. computerC. computationD. computing7. A. current B. compoundC. concurrentD. massive8. A. displayed B. carriedC. accomplishedD. executed9. A. special B. specialized C. specific D. especial10. A. simple B. simplifying C. singular D. simpler1. B2. C3. D4. C5. A6. A7. C8. D9. B 10.D Unit 4Algorithms are essential to the way computers process information, because a computer program is 1 an algorithm that tells the computer what specific 2 to perform in certain order in order to carry out a speci fied task, such as calculating employees’ paychecks or printing students’ report cards. Thus, an algorithm can be considered to be 3 sequence of operations that can be performed by a turning-complete system. In fact, a data structure is a way of 4 data in a computer so that it can be used efficiently. Often a carefully 5 data structure will allow the 6 efficient algorithm to be used. The choice of the data structure often begins from the choice of an 7 data type.A well-designed data structure allows a variety of critical operations to be performed, using as few resources, both execution time and memory space, as possible. Data structures are implemented by a 8 language as data types and the references and operations they provide. Moreover, different kinds of data structures are 9 to different kinds of applications, and some are highly specialized to certain tasks. For example, B-trees are particularly well-suited for implementation of databases, 10 networks of machines rely on routing tables to function.1. A. essentially B. essential C. partially D. mainly2. A. methods B. steps C. plans D. exercises3. A. some B. a C. the D. any4. A. receiving B. storing C. input D. output5. A. chosen B. madeC. programmedD. picked6. A. very B. most C. more D. less7. A. abstract B.concrete C. special D. certain8. A. basic B. runningC. programmingD. advanced9. A. comforted B. suited C. compared D. hooked10. A. therefore B. with C. when D. while1. A2. B3. D4. B5. A6. B7. A8. C9. B 10. DUnit 5A total computer system includes both hardware system and software system. Hardware consists of the 1 components and all associated equipment. Software refers to the programs that are 2 for the computer. It is possible to be familiar with various3 of computer software without being concerned with details of how the computer hardware operates.A programming language is a language used to write computer programs, which involve a computer 4 some kind of computation or algorithm and possibly control over 5 devices such as printers, robots, and so on. Programming languages differ from 6 languages in that natural languages are only used for interaction between people, while programming languages also allow humans to communicate 7 to machines. Some programming languages are used by one device 8 control another. A prominent 9 of programming languages is to provide instructions to a computer. Thousands of different programming languages have been 10 , and new languages are created every year.1. A. mental B. possible C.essential D. physical2. A. design B. spoken C. writtenD. made3. A. parts B. kinds C.types D. aspects4. A.performed B. to performC. performingD. performs5. A.intenal B. external C. inside D. outside6. A. natural B. Human C. computer D. artificial7. A.orders B. instructions C. codes D. calls8. A. to B. for C. with D. over9. A. show B. research C. purpose D. study10. A. creatingB. created C. to create D. creation1. D2. C3. D4. C5. B6. A7. B8. A9. C 10. B三、汉译英1.coding techniques 编码技术2. application software 应用软件3. floating point data 浮点数据4.timesharing分时,分时技术5. storage capacities 存储容量1. system buses 系统总线2. virtual memory 虚拟存储器3. computer architecture 计算机体系结构4. instruction set 指令集5. direct memory access 直接存储器存取1.parallel processing 并行处理2. pipeline processing流水线处理3. vector processing 向量处理4. scalar processor标量处理器5. backward compatibility 向下兼容1. parallel algorithm并行算法2. exhaustive search穷举搜索3. dynamic programming 动态规划4. doubly-linked list 双向链表5. two-dimensional array 二维数组1. derived class派生类2. Inheritance 继承3. markup languages 标记语言4. Hyperlinks 超链接5. Java virtual machine Java虚拟机四、翻译句子1. By using various coding techniques, groups of bits can be made to represent not only binary numbers but also other discrete symbols.2. System software includes not only the complex programs used by technicians to create application software in the first place but also the organizational programs needed to start up the computer and govern its use of other programs.3. Data are numbers and other binary-code information that are operated on to achieve required computational results.4. Rather than arithmetically or logically manipulating characters, a computer may concatenate strings of characters, replace some characters with others, or otherwise manipulate character strings.5. Software applications like word processing, electronic spreadsheets, database management programs, painting and drawing programs, desktop publishing, and so forth became commercially available, giving more people reasons to use a computer.1. By asserting these internal and external control signals in the proper sequence, the control unit causes the CPU and the rest of the computer to perform the operation needed to correctly process instructions.2. In a computer with virtual memory, less-used parts of programs are shifted from RAM to a hard disk and are moved back only when needed.3. A technique used to compensate for the mismatch in operating speeds is to employ an extremely fast, small cache between the CPU and main memory whose access time is close to processor logic clock cycle time.4. The data transfer rate of peripherals is usually slower than the transfer rate of the CPU, and consequently, a synchronization mechanism may be needed.5. In some computers the interrupt vector is an address that points to a location in memory where the beginning address of the I/O service routine is stored.1. The purpose of parallel processing is to speed up the computer processing capability and increase its throughput, that is, the amount of processing that can be accomplished during a given interval of time.2. It is characteristic of pipelines that several computations can be in process in distinct segments at the same time.3. To achieve the required level of high performance it is necessary to utilize the fastest and most reliable hardware and apply innovative procedures from vector and parallel processing techniques.4. In general, the greater the number of instructions in an instruction set, the larger the propagation delay is within the CPU.5. Although CISC processors are more complex, this complexity does not necessarily increase development costs.1. In short, communication problems arise when the language used for an algorithm's representation is not precisely defined or when information is not given in adequate detail.2. Another common algorithmic structure involves that the need to continue executing a statement or sequence of statements as long as some condition remains true.3. In many algorithms, running time will vary not only for inputs of different sizes, but also for different inputs of the same size.4. Thus, dynamic programming is a bottom-up technique that usually begins by solving the smallest subproblems, saving these results, and then reusing them to solve larger and larger subproblems until the solution to the original problem is obtained.5. The conversion from this conceptual one-dimensional array organization to the actual arrangement within the machine’s memory is straight forward and the data can be stored in a seguence of 24 memory cells with consecutive address in the same order envisioned by the programma.1. Documentation is needed for everyone who will be involved with the program——users, operators, and programmers.2. Rather, programs written in a high-level language or assembly language are converted to machine language, which is then executed by the computer.3. The corresponding programs set forth precise procedures, or series of instructions, and the programmer has to follow a proper order of actions to solve a problem.4. 4GLs may not entirely replace third-generation languages because they are usually focused on specific tasks and hence offer fewer options.5. Inheritance is the means by which objects of a class can access member variables and functions contained in a previously defined class, without having to restate those defi nitions.。
移动adhoc网络HOLSR路由协议研究与实现

余敬东(1968~),男,副教授,研究方向为无
万方数据
2148
2009,30(9)
计算机工程与设计Computer Engineering and Design
逻辑分级,不同的层级问采用不同的通信频率进行互不干扰 的独立通信。HOLSR将性能低、单接口的节点被指派为低级 (一级),将较高性能的节点指派为中间级(二级)。二级节点拥 有两个接口,一个接口采用和一级节点相同的频段,另一个接 口采用不同的频段进行同级间的通信,在第二级的通信范围 比第一级大。性能最高的为最高级(三级),拥有两个或3个接 口,可同时与各级节点通信,同级问采用高速的点到点链路。 HOLSR的网络结构如图l所示。
万方数据
(1)设群的群成员数为m,定义平均群内最少成员数为
MIN_AVRG_MEM
MIN_AVRG_MEM=丁1×%熊警
MAX—AVRG—MEM=z×j专;丢篙 平均群内最多成员数MAX AVRG—MEM
(2)若加<MIN AVRG MEM,该群首节点降级为低一级节
点,群内节点加入其它群。 (3)若所>MAX AVRG MEM,该群首节点根据群内路由
节点通过接收HELLO、TC消息完成对网络拓扑的掌握。 若网络为静态网络或者节点的移动较慢,网络的拓扑情况会
在一个相对较长的时间内保持相对稳定状态。这时,节点重
复发送及接收相同内容的HELLO及TC控制消息,造成资源 浪费。因此,只有当满足以下条件时才发送TC控制消息:
·当节点检测到两跳范围内邻节点发生变化时,重新计
黄娟,余敬东:移动ad-hoe网络HOLSR路由协议研究与实现
2009,30(9)
2149
验平台,完成协议算法的实现工作。 在Linux操作系统中,系统的路由功能划分成两部分来实
机场智能驱鸟系统中的路由节点设计与实现

第37卷第10期 计算机应用与软件Vol 37No.102020年10月 ComputerApplicationsandSoftwareOct.2020机场智能驱鸟系统中的路由节点设计与实现陈裕通1 刘志刚1 陈裕芹1 刘玉芬21(广州民航职业技术学院 广东广州510403)2(华南理工大学广州学院 广东广州510800)收稿日期:2019-06-10。
广东省重点科研项目(2018GKTSCX025);广东省普通高校青年创新人才类项目(2018GkQNCX080)。
陈裕通,讲师,主研领域:无线通信技术。
刘志刚,副教授。
陈裕芹,副教授。
刘玉芬,高工。
摘 要 由于鸟类飞行路线的不确定性导致鸟击事件的时常发生,航空安全受到严重威胁,因此必须采取有效措施防止此类事件的发生。
结合现有驱鸟设备与机场地理环境的特性,提出基于物联网技术构建机场智能驱鸟系统的方案。
利用若干星型拓扑构建网状拓扑的设计解决ZigBee网络传输距离的问题,尤其对网络拓扑中起关键性作用的路由节点进行软硬件的设计,实现在机场区域内布设ZigBee网络的目的。
实验验证了所设计的路由节点的有效性,提高了原有机场驱鸟设备的驱鸟效果。
关键词 鸟击 驱鸟设备 物联网 路由节点中图分类号 TP319 文献标志码 A DOI:10.3969/j.issn.1000 386x.2020.10.018DESIGNANDIMPLEMENTATIONOFROUTINGNODEINAIRPORTINTELLIGENTBIRD REPELLINGSYSTEMChenYutong1 LiuZhigang1 ChenYuqin1 LiuYufen21(GuangzhouCivilAviationCollege,Guangzhou510403,Guangdong,China)2(GuangzhouCollegeofSouthChinaUniversityofTechnology,Guangzhou510800,Guangdong,China)Abstract Becauseoftheuncertaintyofbirdflightroutes,birdstrikesoftenoccurandaviationsafetyisseriouslythreatened.Therefore,effectivemeasuresmustbetakentopreventsuchincidents.Basedonthecharacteristicsofexistingbird repellingequipmentandairportgeographicenvironment,thispaperproposesaschemeofbuildingairportintelligentbird repellingsystembasedonInternetofThings.ItsolvedtheproblemoftransmissiondistanceofZigBeenetworkbyusingthedesignofseveralstartopologiestoconstructnetworktopology,especiallythedesignofhardwareandsoftwareofroutingnodeswhichplayedakeyroleinnetworktopology,andrealizedthepurposeofZigBeenetworkinairportarea.Theexperimentsverifytheeffectivenessoftheproposedroutingnode,whichimprovesthebird repellingeffectoftheoriginalairportbirdrepellingequipment.Keywords Birdstrike Birdrepellingequipment InternetofThings Routingnode0 引 言鸟类的飞行路线是难以预测的,而人类的飞行却是有规划的,因此当两者同时在有限空间里飞行时就必然会发生相撞的事故,也就是鸟击又名鸟撞。
asic设计及验证流程

asic设计及验证流程Asic design and verification process is a crucial step in ensuring the functionality and quality of integrated circuits. This process involves the creation of custom hardware to perform specific functions, such as in microprocessors or memory chips. Asic design begins with defining the requirements and specifications of the chip, which includes determining the desired functionality, performance, and power consumption. This initial stage is critical in setting the foundation for the rest of the design process, as any errors or oversights here can lead to costly delays and rework later on.Asic设计和验证流程是确保集成电路功能和质量的关键步骤。
该过程涉及创建定制硬件以执行特定功能,例如微处理器或存储器芯片。
Asic设计始于定义芯片的需求和规格,包括确定所需的功能、性能和功耗。
这个初始阶段对于后续设计过程至关重要,因为这里的任何错误或疏忽都可能导致昂贵的延迟和重新工作。
Once the requirements and specifications are established, the next step in the asic design process is architectural design. This phase involves creating a high-level design of the chip, including blockdiagrams and key components. Architectural design is crucial for determining the overall structure and organization of the chip, as well as defining the interfaces between different modules. This stage also includes making decisions on technology choices, such as the use of specific components or design methodologies.一旦建立了需求和规格,Asic设计流程的下一步是架构设计。
VLSI导论复习

1 VLSI设计得层次以及每一层主要关注得对象,未来VLSI Design Flow and Abstraction; Future、Major levels of abstractionSpecification,技术规范设计用户提出对芯片用途、运行速度等得说明,规范多数就是不完全得,只就是一组要求Behavior,行为级设计行为描述比规范说明详细,规范通常用文字描述,而行为通常用可执行程序建模来描述Register-transfer,寄存器传输级设计系统得时间行为就是完全确定得,一直每个时钟周期内得输入信号与输出信号而逻辑信号并不就是以逻辑门形式给出得,系统功能由存储在抽象存储单元中得布尔函数来定义,从不而落就函数中仅仅能得到粗略得延时与面积估计Logic逻辑设计根据逻辑门、锁存器与触发器得布尔逻辑特性进行系统设计,尽管已知系统结构,但还就是不能计算完全得精确延时Circuit电路设计由晶体管实现电路系统Layout版图设计及早前得最后一级设计,由版图提取出寄生电阻与电容,然后加到所描述得电路中,从而进行更精确得仿真。
FutureVLSI technology is going to 14nm, and will scale down to the limit of molecule or atom level (Stability?)–Power: Important for portable device to decrease leakage current、–Interconnect: When VLSI technology scale down, the delay of interconnect is more and more important, because the RC of interconnect is almost no changed (the switch time of transistor is decreased)–3D transistor and 3D IC–Wafer level package–Design complexity: Integrated with biologic and optic device, and MEMS, and co-design with software, the ICs will be more intelligent --How to reuse?C-nanotube, successors?在碳纳米管得内部可以填充金属、氧化物等物质,这样碳纳米管可以作为模具,首先用金属等物质灌满碳纳米管,再把碳层腐蚀掉,就可以制备出最细得纳米尺度得导线,或者全新得一维材料,在未来得分子电子学器件或纳米电子学器件中得到应用。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Design and Implementation of Routing Protocols for IPv6Global Anycast CommunicationsSatoshi DoiGraduate School of Information Science and Technology,Osaka Uni-versity,1–5Yamadaoka,Suita,Osaka565–0871,JapanShingo AtaGraduate School of Engineering,Osaka City University,3–3–138Sug-imoto,Sumiyoshi-ku,Osaka558–8585,JapanHiroshi KitamuraSolution Development Laboratories,NEC Corporation,2–11–5 Shibaura,Minato-Ku,Tokyo108–8557,JapanMasayuki MurataGraduate School of Information Science and Technology,Osaka Uni-versity,1–5Yamadaoka,Suita,Osaka565–0871,JapanAbstract:Anycast is a new IPv6feature that supports service–orientedaddress assignments in IPv6networks.However,because there are no pro-tocol standards or even consensus on routing protocols,inter–segment any-cast communications are not yet available.In this paper,wefirst discussproblems and solutions on inter–segment anycast communications.Basedon ourfindings,we propose two routing protocols for inter–segment any-cast to support anycast–oriented communication.We also implement theproposed routing protocols in an experimental environment and verify thatthey work correctly.We also compare the proposed routing protocols anddiscuss which is most suited to reducing overheads as much as possible.Keywords:IPv6,Anycast Communication,Network–layer Anycast,Any-cast Application,Anycast RoutingReference to this paper should be made as follows:Doi,S.,Ata,S.,Kita-mura,H.and Murata,M.(2005)‘Design and Implementation of RoutingProtocols for IPv6Global Anycast Communications’,International Journalof Internet Protocol Technology,Vol.x,No.x,pp.xxx–xxx.Biographical notes:Satoshi Doi is currently with Sony Corporation,Japan.He received B.E.and M.E.degrees in information science and tech-nology from Osaka University in2002and2004,respectively.His researchwork is in the area of designing protocols related to IPv6anycasting.Shingo Ata is a lecturer in the Graduate School of Engineering at Osaka1City University,Japan.He received M.E.and Ph.D.degrees in informaticsand mathematical science from Osaka University in1998and2000,re-spectively.His research includes design of communication protocols and performance modeling of communication networks.Hiroshi Kitamura works at NEC Corporation since1990.He also worksas a Visiting Associate Professor at University of Electro-Communicationsince2004.He received B.S.and M.S.degree from Nagoya University in1988and1990,respectively.He also received a Ph.D.degree in informat-ics and mathematical science from Osaka University in2002.He has beenengaged in research and development of Internet protocols.He currentlyfocuses on research and development of IPv6,Mobile IPv6,Plug and Play,and Security.Table1:IPv6address types.unicast multicast anycast communication point to point to point to form point multipoint pointtarget of node group service typeaddressnumber of single multiple multiplemembershiproles in both client serverC/S model(listner)1INTRODUCTIONAnycast[1]is one of the new IPv6(IP version 6[2])features that supports service-oriented address assignments in IPv6networks.An anycast address is not determined by the location of the node,but by the type of service offered at the node.In any-cast communications,the client can automatically obtain the appropriate node corresponding to a spe-cific service without knowledge of the location of the server.Anycast,which is defined in the IPv6,is a new networking paradigm supporting service–oriented ad-dresses and an identical address can be assigned to multiple nodes providing a specific service.An any-cast packet(i.e.,one with an anycast destination ad-dress)is delivered to one of these nodes with the same anycast address.The idea of anycast wasfirst de-scribed in RFC1546[3],which stated that the moti-vation for anycasting was to drastically simplify the task offinding an appropriate server on the Internet. The Internet Protocol version6(IPv6)has three types of IP addresses,i.e.,unicast and multicast ad-dressesas in IPv4,and an anycast address that is the subject of the current paper.Table1summa-rizes the forms of communication for these addresses.A unicast address is a unique identifier for each net-work interface,and multiple interfaces must not be assigned the same unicast address.Packets with the same destination address are sent to the same node.A multicast address,on the other hand,is assigned to a group of nodes,i.e.,all group members have theFigure1:Anycast communication.same multicast address and packets for this address are sent to all members simultaneously.Like a multicast address,a single anycast address is assigned to multiple nodes(called anycast mem-bership),but unlike multicasting,only one member of the assigned anycast address communicates with the originator at a time.Figure1has an example of anycast communica-tion.There are three nodes associated with the any-cast address A any.When the source node sends a packet,where the destination address is A any,the packet is sent to one of three nodes(X uni in thisfig-ure),not to all hosts.The advantage of anycasting is that the source node can receive a specific service without knowledge on current conditions in service nodes and/or networks.When host X uni goes down, the packet for A any can be sent to another host(Y uni or Z uni)(Fig.1).How appropriately the destination node is chosen from anycast membership depends on the anycast routing protocol.The basic idea behind anycast communication is to separate the logical service identifier from the phys-ical host equipment,i.e.,the anycast address is as-signed on a type-of-service basis,which enables the network service to act as a logical host.However,IPv6anycasting still has several prob-lems that need to be clarified within the context of the current specifications.In our previous work,we showed some applications suitable to anycasting and provided some advantages of anycasting[4].Another problem with IPv6–based anycasting is 2that a routing protocol has not been included in its specifications,which is indispensable in making any-casting more widespread.There are several challeng-ing issues that need to be resolved in designing any-cast routing protocols[4].1.Scalability issueThe routing entries for anycast addresses should be stored individually on the router.It is easy to imagine explosions in routing tables as anycast addresses get to be more widely used.2.Criteria for selecting anycast membershipAnycast routing is required to transfer an any-cast packet to an appropriate anycast node,but the meaning of appropriate needs to differ among applications.The criteria for anycast routing strongly affects anycast communication capabil-ities.Based on thesefindings,we designed routing proto-cols for inter-segment anycast communication that we will present after the next section.We also need to identify how stateful applications utilize anycasting in designing their routing proto-cols.Internet applications using all TCP-based or some UDP-based protocols are stateful,i.e.,end hosts establish the conditions of communication with each other and assume that their partners are identical during the exchange.This is very important be-cause the current definition of anycasting is essen-tially stateless,i.e.,the destination host should be de-termined on a packet-by-packet basis by the routers. In our previous work,we have proposed Anycast Ad-dress Resolving Protocol(AARP)to establish TCP connections with a specific anycast address[4].The rest of this paper is organized as follows.The next section discusses the proposed anycast routing architecture.In Section3,we describe the specifica-tion of our architecture and we test and evaluate our proposed protocols in Section4.Finally,we summa-rize our work and describe our future research topics in Section5.2ARCHITECTURAL DESIGNThe advantage of anycast communication from the application’s view is that the packet is automatically forwarded to the appropriate node according to network and/or node conditions.It is therefore important to maintain the routing information of anycast addresses.Because of this,we will propose a new anycast routing architecture,which we describe in this section.2.1Design Choices and ModelsThe design choices we made in our anycast routing protocol are as follows.2.1.1Using Existing Address SpaceWe allowed unicast and anycast addresses within the same space and to do this we chose a seed node from anycast membership before assigning an anycast ad-dress.We then established the anycast address of membership to be the unicast address of the seed node.The anycast router forwards an anycast packet to an appropriate node within the anycast member-ship.However,the unicast router only tries to for-ward the anycast packet to the seed node.An anycast packet leaving an arbitrary node is at the very least sent to the seed node.Any packet destined for the anycast address is guaranteed to be sent to at least one destination node.2.1.2Gradual DeploymentWe envision the gradual deployment of anycasting and the protocol works correctly in our architecture and offers advantages even if there is only one anycast router between the sender and seed node.Its impact increases as more anycast routers are deployed.2.1.3Modifying Existing Routing Protocols We adopted an approach that modifies existing rout-ing protocols to the anycast routing protocol to re-duce the complexity of implementation.32.1.4Packet-by-Packet Basis Forwarding Each anycast router forwards anycast packets to only one node on a packet-by-packet basis.As previously discussed,anycast routers should have both node selection criteria and knowledge to select one entry.We introduce a value called metric for this purpose.Each anycast router selects one ap-propriate node based on the metric.The meaning of appropriateness differs due to the kinds of applica-tions,and only a node with an anycast address can know what application it provides.Then,the metric is advertised by the node having the anycast address. Moreover,we assume that the metric is non-negative with an integer value that simplifies the operation of anycast routers.All anycast routers select appropri-ate a node from multiple nodes by simply comparing the metric(e.g.,the anycast router chooses one rout-ing entry with a minimum value for the metric).We define two types of metric(called metric type):•receiver metric:the preference value of a node with an anycast address(e.g.,CPU load).The receiver metric can only be set by the any-cast receiver,and must not be updated by the anycast router.This type of metric is suitable for notifying of the availability of resources in the anycast receiver(e.g.,CPU resources and num-ber of acceptable requests).•link metric:the preference value of a link among two anycast routers(e.g.,propagation delay).If the metric is link metric,the anycast router overwrites the metric value in the control mes-sage by adding the value of link metric associated with the anycast router.The link metric is useful in describing the end-to-end performance(e.g., round trip delay and number of hops).However, this link metric should be configured based on the metric of unicast routing because the anycast packets traverse the route that unicast routing uses.2.2Proposed ArchitectureFigure2is an overview of the routing architecture we propose and there are two types of routing topolo-gies.The unicast network is the existing network topology where both unicast and anycast packets are forwarded on the basis of a unicast address.In the anycast network,anycast-aware routers(called any-cast routers)are connected to one another and only anycast packets are forwarded by treating their ad-dresses as anycast addresses.The anycast network can thus be considered as a logical overlay network over the unicast network.In an anycast network,nodes are not physically (i.e.,directly)connected,but are connected via var-ious kinds of logical peer-to-peer connections(e.g., virtual path,tunneling,or encapsulation).An any-cast router is upper-compatible,does anycast routing functions,and has the capabilities of unicast routers. An anycast router has extra routing entries(called anycast routing entries)in the unicast routing table to handle anycast addresses.For each anycast ad-dress,the anycast router registers only one anycast routing entry as a host entry.The host entry means the routing entry with128–bit length address prefix. If the anycast router knows there are multiple nodes having same anycast address,it selects one node and registers it in the routing table.When a packet ar-rives at the anycast router,it checks the unicast rout-ing table tofind an entry regarding the destination address of the packet in the same fashion as existing unicast routing which uses the longest prefix match-ing.As a result of the longest prefix matching,the anycast routing entry must be chosen if the anycast router has its entry.Then,the anycast router can find an entry by using the destination address.After itfinds this,the packet is treated as an anycast packet and forwarded to the next anycast router according to the routing table.Otherwise,it is forwarded through the unicast routing mechanism.Figure2has an example of anycast routing where we have assumed that the node selection criterion is the number of hops.A smaller count is more appropriate here.In Figure2,the short cylin-ders represent routers and the one labeled“ARo”is an anycast router.The other short cylinders(i.e., non-labeled cylinders)are unicast routers.There are two anycast members for the anycast address 3ffe:5::5.Note here that3ffe:5::5is also the unicast address of anycast receiver ARe1.Here,node 4Figure2:Proposed ArchitectureARe1is the seed node of anycast membership for 3ffe:5::5.The other node ARe2is in a different network(3ffe:4::/32).Let us now consider where two nodes(C1and C2)send packets destined for any-cast addresses3ffe:5::5.The difference is whether there is an anycast router on the route to seed node ARe1.C1first forwards the packet to router ARo through unicast routing(solid arrow).Intermediate router ARo is an anycast router and can detect that the packet is also an anycast packet.According to anycast routing(dashed arrow),any-cast router ARo then forwards it to node ARe2, which is the node nearest C1.However,since there is no anycast router between C2and ARe1,the packet is simply forwarded to ARe1through unicast rout-ing only.Note that there is a more appropriate node (ARe2)in this network.For example,if we replace the router next to C2(short-checked cylinder)with an anycast router,the packet could be transmitted to the more appropriate ARe2node through anycast routing.The above description reveals that our anycast routing protocol works appropriately even when there are a limited number of anycast routers.If these are increased,better routing is achieved.When all routers in the network are anycast,flexible routing adopting a control policy using various metrics will be possible.3ROUTING PROTOCOL DESIGNThis section describes the routing protocols for the anycast routing architecture we propose.Note again that our basic motivation in supporting anycasting was to minimize the overheads or implementation in-volved in deploying it as much as possible.We focused on the difference between any-casting and unicasting/multicasting to develop an anycast routing protocol through existing uni-cast/multicast routing protocols.Anycasting and unicasting/multicasting have many similar character-istics while they also have some differences.Ourfirst step in designing the anycast routing protocol is to clarify these similarities and thenfind how to mod-ify the existing routing protocols to support anycast routing.Several protocols for unicast or multicast routing are currently available.As we can see in Table2, these can be classified into three types,i.e.,a(1)dis-tance vector,(2)link state,and(3)core-based tree.In the distance vector algorithm,a router has a list of routers which are directly connected to it.By ex-changing the list with other adjacent routers,it can identify all routers capable of connecting to an arbi-trary destination.The link state algorithm utilizes a list of connected links instead of a list of routers. Through exchanging the list of links,the router can identify the entire topology of the network.The router then prepares a shortest path tree(SPT)with Dijkstra’s shortest pathfirst algorithm[5].Based on the SPT,the routerfinally constructs the routing table.The core-based tree is a kind of hierarchical al-gorithm and itfirst chooses one or more core routers from all routers.The core router centralizes all rout-ing information on behalf of the other routers.One of these other routers only holds the routing informa-tion for where it belongs.Each router only sends a packet to the core router and only it can decide the route for the destination address.Since each routing protocol has both advantages and disadvantages,we defined the anycast routing protocol based on all of these,i.e.,(1)the Anycast extensions to RIP(ARIP),(2)the Anycast exten-5Table2:Classification of Routing ProtocolsDistance Link Core BasedVector State Tree Unicast RIPng[6]OSPFv3[7]Multicast DVMRP[8]MOSPF[9]PIM-SM[10]Anycast ARIP AOSPF PIA-SM[11]Figure3:Overview of Anycast Routing Protocol sions to OSPF(AOSPF),and(3)the Protocol In-dependent Anycast Sparse Mode(PIA-SM).In our previous work,we designed the(3)PIA-SM[11],and Matsunaga[12]provides a description of the imple-mentation method for this.(1)ARIP and(2)AOSPF are presented in turn in the subsections that follow. In terms of functionality,a routing protocol for anycast communication consists of the following three steps(see also Figure3)and the difference between the two above–mentioned routing protocols are in Step2.1.Initiate anycast membership2.Construct and update routing table3.Forward anycast packetsThe anycast router forwards anycast packets based on the routing table constructed in Step2.Note again that Step3is the same as unicast routing.Each anycast router simply checks the unicast routing ta-ble tofind an entry regarding the destination addressof the packet.In what follows,we detail Step1and Step2separately.3.1Initiating Anycast Membership Like multicasting,the host participating in(or leav-ing from)anycast membership must have the capabil-ity of notifying the nearest anycast router of the sta-tus(joining/leaving).The method offinding a host participating in anycast membership(called anycast host below)is different and is based on the loca-tion of the anycast host.If the anycast receiver and the anycast router are on the same segment,an ex-tended version of MLD(Multicast Listener Discov-ery)is used[13].This is called ARD(Anycast Re-ceiver Discovery).Basically,an anycast host gener-ates an ARD report message to the anycast router af-ter the anycast host receives an ARD query message from the anycast router.The anycast host can ad-ditionally send the ARD report message if it cannot receive the ARD query message.However,the any-cast host sends an ARD done message prior to leaving membership.Because the destination addressfield of ARD packets is set to one of the link-local addresses, e.g.,the link-scope all-nodes(FF02::1)or the link-scope all-routers(FF02::2),this method can only be applied where all hosts and routers reside within the same segment.3.2Constructing and Updating Rout-ing TableIf the type of routing entry advertised by the anycast receiver is only the receiver metric,the processes of constructing and updating the routing table are com-mon to the ARIP and AOSPF.We call these proce-dures as the Advertising Receiver Metric,which we presentfirst.This is followed by an explanation on constructing and updating routing tables supporting the link metric.3.2.1Advertising Receiver MetricFigure4outlines the constructing and updating rout-ing tables when anycast routers only consider the re-ceiver metric.If anycast routers only consider the 6receiver metric,they can use unicast routing infor-mation to describe the topology of routers.Each anycast receiver becomes just like a leaf attached to a tree constructed through the topology of anycast routers.Before describing the procedure,we define some routing related nodes.•Selected anycast receiver is the anycast re-ceiver which has the minimum metric among the same anycast membership.•Alternate anycast receiver is the anycast re-ceiver which has the second minimum metric among the same anycast membership.•Selected anycast router is the anycast router physically or virtually connected to the selected anycast receiver.•Alternate anycast router is the anycast router physically or virtually connected to the selected anycast receiver.•Adjacent anycast router is the anycast router connected physically or virtually.Figure4shows the basic operations for the Adver-tising Receiver Metric which are following.1.Notify the membership information by exchanging ARD query/report All anycast re-ceivers send the ARD report indicating their mem-bership information and metric in response to the ARD query sent from the anycast router periodically. If the anycast receiver cannot receive the ARD query, they can send the unsolicited ARD report.After receiving the ARD report,the anycast router creates/updates the entry in the local database called ARDB(Anycast Receiver Database).Each entry in the ARDB is stored with three items:the anycast address itself,the receiver metric,and the unicast address of the anycast router.2.Send the information of new anycast re-ceiver.If the anycast router receives the ARD re-port,it sends the information on the new anycast receiver(i.e.,three items registered in the ARDB)to the adjacent anycast routers.3.Constructing the routing table and the ARDB After receiving the entry of ARDB,the anycast router lookups the routing entry for the any-cast address specified in the ARD report,and com-pares the metric in the ARD report with the metric in the matched routing entry.If the metric in the ARD report is smaller than the metric in the routing entry,the anycast router replaces the metric to the smaller one.Then,the anycast router forwards the entry to all the adjacent anycast routers except the router from which the ARD report arrives.By propa-gating the ARD report hop-by-hop basis,all anycast routers can obtain the minimum value of the metric and its forwarding direction.Then,all the packets sent to the anycast address are transferred to the se-lected anycast receiver.Additionally,the anycast router connected to the anycast receiver can store the entry of ARDB if the anycast address of attached anycast receiver is the same as the anycast address of new anycast receiver. This stored ARDB entry is used when the metric is updated.If the selected anycast router does not have the ARDB entry of other anycast receivers and it de-tects the overload of selected anycast receiver by using threshold exceeding message as follows,the anycast router will send a large number of message to discover other anycast receivers.Moreover,if the anycast router receives this message,it also does not know other anycast receiver.Then,each anycast router sends the reply message respectively.It consumes much of traffic.Therefore,each anycast router stores the receiving entry in the ARDB if the metric is more than the value of the attached anycast receiver’s metric.Basically,all requests from the client are forwarded to the anycast receiver with the lowest metric(called the selected anycast receiver).If the condition of the selected anycast receiver changes,the metric of the receiver changes.When the selected anycast receiver does not have the lowest metric,another anycast re-ceiver(called alternate anycast receiver)is selected as a new selected anycast receiver.To discover the alternate anycast receiver,the se-lected anycast router picks out an entry with the low-est metric among all entries in the ARDB except for the current selected anycast receiver.Then,the fol-7Figure 4:Basic Operation of Advertising Receiver Metriclowing process is done to update the routing entry (See Figure 5).1.The selected anycast receiver sends a threshold exceeding message when the metric value exceeds the threshold.2.When the selected anycast router receives the threshold exceeding message,it lookups the en-tries which has the minimum metric for the any-cast address specified in the threshold exceeding message.Then,it selects an alternate anycast receiver ,and finds the alternate anycast router in the ARDB.3.After finding the alternate anycast receiver ,the selected anycast router sends a change request message to the alternate anycast router .The al-ternate anycast router is identified by the unicast address of anycast router stored in the ARDB.4.After receiving the change request message,the alternate anycast router sends a routing update message to all anycast routers by using flooding.5.Then,each anycast router updates its routing ta-ble when it receives the routing update message.The selected anycast router can recognizethatFigure 5:Route Update of Advertising Receiver Metricthe alternate anycast router changes its rout-ing information based on the change route re-quest.If the selected anycast router cannot re-ceive a routing update message,it wonders that the change request message might be dropped.The selected anycast router remove the entry which has the minimum metric for the anycast address in the ARDB,and back to Step 2.We designed this mechanism assuming that the se-lected anycast receiver would change according to the condition of anycast receivers.In unicast routing,packets during transitions in the routing path may be dropped,but it does not occur frequently.How-ever,with anycasting,because route changes occur more frequently than with unicasting,the frequency of dropping packets in anycasting is relatively higher than the case of unicasting.Consequently,more fail–safe mechanisms are needed to prevent anycast pack-ets from being dropped because of route changes.With our design,the anycast router which sent the change request message confirms that the selected anycast receiver is replaced by the alternate anycastreceiver by receiving the routing update message.Fora more complete fail–safe mechanism,we introduced following procedure.•During route changes,the routing information for all anycast routers is unstable.Some anycast routers have changed to the new route while oth-ers have not done yet.Because the new route in-8formation is distributed from the alternate any-cast router,anycast packets may be forwarded to either the selected anycast receiver or the alter-nate anycast receiver.Since the routing update message is transferred from the alternate any-cast router,the anycast routers near the alter-nate anycast router can update the routing ta-ble early.However,anycast routers far from the alternate anycast router may forward the any-cast packet to the selected anycast receiver.In that case,the selected anycast router redirects the anycast packet toward the alternate anycast router.This prevents packets from dropping.This mechanism is also useful when anycast re-ceivers fail.If a selected anycast receiver sud-denly goes down without sending a threshold ex-ceeding message and the attached anycast router detects this,the router attached to the selected anycast receiver sends a change request message to the router attached to the alternate anycast receiver.Additionally,during route changes,it redirects anycast packets toward the alternate anycast receiver.3.2.2Supporting Link MetricThe ARIP and the AOSPF use different mechanism to collect the link metric.In what follows,we describe these mechanisms separately.ARIPFigure6has an example of constructing/updatinga routing table with ARIP.ARIP works as follows.1.Notify the membership information by exchanging ARD query/report All anycast re-ceivers send the ARD report indicating their mem-bership information(i.e.,anycast address)in re-sponse to the ARD query the anycast router sent periodically.If the anycast receiver cannot receive the ARD query,they can send the unsolicited ARD query at certain interval(e.g.,every30seconds).The periodical update by the anycast router is triggered by the ARD report from the anycast receiver.2.Send the ARI message After receiving the ARD report,the anycast router creates an Any-cast Route Information(ARI)message which con-sists of at least(anycast address,metric)pair.Then, the anycast router sends it to the adjacent anycast routers.When the anycast router sends the ARI message to adjacent anycast routers,it overwrites the metric of ARI message by adding the link metric as-sociated with the output interface.This is because that the link metric in the direction from the anycast receiver is more important.The anycast receiver acts as a server,then much data will be transferred from the anycast receiver to the clients.3.Receive the ARI message and update the routing table and/or Blocking list When an anycast router receives the ARI message,the anycast routerfirst checks whether the anycast address of the ARI message has already been stored in the routing table.If the anycast address is not in the routing table on the anycast router,the anycast router regis-ters the anycast address into the routing table.Then, the anycast router overwrites the metric of ARI mes-sage and forwards it to the adjacent anycast routers except in the direction of its source.Otherwise,it compares the metric of the ARI message with the metric of existing routing entry.After receiving the entry of ARI message,the any-cast router lookups the routing entry for the anycast address specified in the ARI message,and compares the metric in the ARI message with the metric in the matched routing entry.If the metric in the ARI mes-sage is smaller than the metric in the routing entry, the anycast router replaces the metric to the smaller one.Then,the anycast router forwards the entry to all the adjacent anycast routers except the router from which the ARI message arrives.When the any-cast router sends the ARI message to adjacent any-cast routers,it overwrites the metric of ARI message by adding the link metric associated with the output interface.By propagating the ARI message hop-by-hop basis,all anycast routers can obtain the mini-mum value of the metric and its forwarding direction. Then,all the packets sent to the anycast address are transferred to the selected anycast receiver.9。