Session Models for Heterogeneous Multicasting Environments

合集下载

SOA

SOA
y Composite Applications BPEL in the Mix A Java EE Based Composite Application Summary
Why Services?

SOA = an architectural principle for structuring systems that SOA emphasizes the de-coupling of system components New services are created from existing ones in a synergistic fashion Strong service definitions are critical Services can be subsequently re-composed in response to changing business requirements
Purchase Service
Purchase Service Functions
Composite Applications—Summary



A composite application is a collection of existing and independently developed applications and new business logic, orchestrated together into a brand new solution of a business problem that none alone can solve Such an application looks to the user like a regular new interactive application, yet in reality it may be only 10 percent new and 90 percent an assembly of pre-existing components or data; The “glue” that brings a composite application together is integration technology

英汉互译技巧-3

英汉互译技巧-3

3.1.2 英汉字词层面上的对等
4. Equivalents interwoven with one another 词义交织 e.g. say 说
speak
talk tell

谈 诉
3.1.2 英汉字词层面上的对等
5. Words without equivalents 无对等词
e.g.



3.1 确定词义/ Diction
3.1.1确定词义的必要性
e.g. 1)在这种情况下 2)这种情况必须改变。 3)现在的情况不同了。 4)他们的情况怎么样? 5)前线有什么情况? 6)我们可能去哪儿,那得看情况而定。
1)在这种情况下 under such circumstances
2)这种情况必须改变。 This state of affaires must change. 3)现在的情况不同了。 Now things are different. 4)他们的情况怎么样? How do matters stand with them? 5)前线有什么情况? How is the situation at the front.
continuance, continuation, continuity Continuance= continue + ance the state of continuing Continuation= continue + action the act of continuing Continuity = continue + ity the quality of being contionuous
3.1.2 英汉字词层面上的对等
2. One word with multiple equivalents of the same meaning 多词同义 e.g. wife: 妻子、爱人、夫人、老婆、老伴、媳妇、堂客、内人…

数据库系统英文文献

数据库系统英文文献

Database Systems1. Fundamental Concepts of DatabaseDatabase and database technology are having a major impact on the growing use of computers. It is fair to say that database will play a critical role in almost all areas where computers are used, including business, engineering, medicine, law, education, and library science, to name a few. The word "database" is in such common use that we must begin by defining what a database is. Our initial definition is quit general.A database is a collection of related data. By data, we mean known facts that can be recorded and that have implicit meaning. For example, consider the names, telephone numbers, and addresses of all the people you know. Y ou may have recorded this data in an indexed address book, or you may have stored it on a diskette using a personal computer and software such as DBASE III or Lotus 1-2-3. This is a collection of related data with an implic it meaning and hence is a database.The above definition of database is quite general; for example, we may consider the collection of words that make up thispage of text to be related data and hence a database. However, the common use of the term database is usually more restricted.A database has the following implicit properties:.A database is a logically coherent collection of data with some inherent meaning. A random assortment of data cannot bereferred to as a database..A database is designed, built, and populated with data for a specific purpose. It has an intended group of users and somepreconceived applications in which these users are interested..A database represents some aspect of the real world, sometimes called the mini world. Changes to the mini world are reflected in the database.In other words, a database has some source from which data are derived, some degree of interaction with events in the real world, and an audience that is actively interested in the contents of the database.A database can be of any size and of varying complexity. For example, the list of names and addresses referred to earlier may have only a couple of hundred records in it, each with asimple structure. On the other hand, the card catalog of a large library may contain half a million cards stored under different categories-by primary author’s last name, by subject, by book title, and the like-with each category organized in alphabetic order. A database of even greater size and complexity may be that maintained by the Internal Revenue Service to keep track of the tax forms filed by taxpayers of the United States. If we assume that there are 100million taxpayers and each taxpayer files an average of five forms with approximately 200 characters of information per form, we would get a database of 100*(106)*200*5 characters(bytes) of information. Assuming the IRS keeps the past three returns for each taxpayer in addition to the current return, we would get a database of 4*(1011) bytes. This huge amount of information must somehow be organized and managed so that users can search for, retrieve, and update the data as needed.A database may be generated and maintained manually or by machine. Of course, in this we are mainly interested in computerized database. The library card catalog is an example of a database that may be manually created and maintained. A computerized database may be created and maintained either by a group of application programs written specifically for that task or by a database management system.A data base management system (DBMS) is a collection of programs that enables users to create and maintain a database. The DBMS is hence a general-purpose software system that facilitates the processes of defining, constructing, and manipulating databases for various applications. Defining a database involves specifying the types of data to be stored in the database, along with a detailed description of each type of data. Constructing the database is the process of storing the data itself on some storage medium that is controlled by the DBMS. Manipulating a database includes such functions as querying the database to retrieve specific data, updating the database to reflect changes in the mini world, and generating reports from the data.Note that it is not necessary to use general-purpose DBMS software for implementing a computerized database. We could write our own set of programs to create and maintain the database, in effect creating our own special-purpose DBMS software. In either case-whether we use a general-purpose DBMS or not-we usually have a considerable amount of software to manipulate the database in addition to the database itself. The database and software are together called a database system.2. Data ModelsOne of the fundamental characteristics of the database approach is that it provides some level of data abstraction by hiding details of data storage that are not needed by most database users. A data model is the main tool for providing this abstraction. A data is a set of concepts that can beused to describe the structure of a database. By structure of a database, we mean the data types, relationships, and constraints that should hold on the data. Most data models also include a set of operations for specifying retrievals and updates on the database.Categories of Data ModelsMany data models have been proposed. We can categorize data models based on the types of concepts they provide to describe the database structure. High-level or conceptual data models provide concepts that are close to the way many users perceive data, whereas low-level or physical data models provide concepts that describe the details of how data is stored in the computer. Concepts provided by low-level data models are generally meant for computer specialists, not for typical end users. Between these two extremes is a class of implementation data models, which provide concepts that may be understood by end users but that are not too far removed from the way data is organized within the computer. Implementation data models hide some details of data storage but can be implemented on a computer system in a direct way.High-level data models use concepts such as entities, attributes, and relationships. An entity is an object that is represented in the database. An attribute is a property that describes some aspect of an object. Relationships among objects are easily represented in high-level data models, which are sometimes called object-based models because they mainly describe objects and their interrelationships.Implementation data models are the ones used most frequently in current commerc ial DBMSs and include the three most widely used data models-relational, network, and hierarchical. They represent data using record structures and hence are sometimes called record-based data modes.Physical data models describe how data is stored in the computer by representing information such as record formats, record orderings, and access paths. An access path is a structure that makes the search for particular database records much faster.3. Classification of Database Management SystemsThe main criterion used to classify DBMSs is the data model on which the DBMS is based. The data models used most often in current commercial DBMSs are the relational, network, and hierarchical models. Some recent DBMSs are based on conceptual or object-oriented models. We will categorize DBMSs as relational, hierarchical, and others.Another criterion used to classify DBMSs is the number of users supported by the DBMS. Single-user systems support only one user at a time and are mostly used with personal computer. Multiuser systems include the majority of DBMSs and support many users concurrently.A third criterion is the number of sites over which the database is distributed. Most DBMSs are centralized, meaning that their data is stored at a single computer site. A centralized DBMS can support multiple users, but the DBMS and database themselves reside totally at a single computer site. A distributed DBMS (DDBMS) can have the actual database and DBMS software distributed over many sites connected by a computer network. Homogeneous DDBMSs use the same DBMS software at multiple sites. A recent trend is to develop software to access several autonomous preexisting database stored under heterogeneous DBMSs. This leads to a federated DBMS (or multidatabase system),, where the participating DBMSs are loosely coupled and have a degree of local autonomy.We can also classify a DBMS on the basis of the types of access paty options available for storing files. One well-known family of DBMSs is based on inverted file structures. Finally, a DBMS can be general purpose of special purpose. When performance is a prime consideration, a special-purpose DBMS can be designed and built for a specific application and cannot be used for other applications, Many airline reservations and telephone directory systems are special-purpose DBMSs.Let us briefly discuss the main criterion for classifying DBMSs: the data mode. The relational data model represents a database as a collection of tables, which look like files. Mos t relational databases have high-level query languages and support a limited form of user views.The network model represents data as record types and also represents a limited type of 1:N relationship, called a set type. The network model, also known as the CODASYL DBTG model, has an associated record-at-a-time language that must be embedded in a host programming language.The hierarchical model represents data as hierarchical tree structures. Each hierarchy represents a number of related records. There is no standard language for the hierarchical model, although most hierarchical DBMSs have record-at-a-time languages.4. Client-Server ArchitectureMany varieties of modern software use a client-server architecture, in which requests by one process (the client) are sent to another process (the server) for execution. Database systems are no exception. In the simplest client/server architecture, the entire DBMS is a server, except for the query interfaces that interact with the user and send queries or other commands across to the server. For example, relational systems generally use the SQL language for representing requests from the client to the server. The database server then sends the answer, in the form of a table or relation, back to the client. The relationship between client and server can get more work in theclient, since the server will e a bottleneck if there are many simultaneous database users.。

普锐司玛 ORiNOCO Wi-Fi Q2 2020v1 产品指南说明书

普锐司玛 ORiNOCO Wi-Fi Q2 2020v1 产品指南说明书

Controller ORiNOCO 9100 & Tsunami 10100 specifics
Network statistics RF Management Rogue Devices management (ORiNOCO only)
Included in the Kit One ORiNOCO® AP-9100R with four N-type surge protected connectors One power injector and country specific power cord Two 2.4 GHz, 5 dBi omni antennas Two 5 GHz, 7 dBi omni antennas One full axis Wall / Pole mounting kit One Grounding kit One Connector weatherproofing kit One Quick Installation Guide
One Quick Installation Guide
Anixter Code: 625519
Service options available: ServPak : level 1 (Plus or Prime)
© 2020 PPrrooxximimWWirireelelessss.. AAlllrrigighhttssrreesseerrvveedd..
New PV Advanced V.2.2 includes General
Supports Windows Server 2008(R2), 2012(R2) and 2016 Supports PostgreSQL v9.6.5 Remote client (no need for NPAPI capable web browser) Database quick backup/restore tool New products support

SM-SIP...(IJCNIS-V6-N9-8)

SM-SIP...(IJCNIS-V6-N9-8)

I.J. Computer Network and Information Security, 2014, 9, 58-65Published Online August 2014 in MECS (/)DOI: 10.5815/ijcnis.2014.09.08SM-SIP: Seamless Mobility Management for Heterogeneous Wireless NetworksKhaled ZeraouliaUniversity of Sciences and Technology Houari Boumediene (USTHB) El Alia BP 32, Bab Ezzouar 16111Tel/ Fax: 213 021 24 71 87 Algiers, Algeriakhaled.zeraoulia@Nadjib BadacheResearch Center on Scientific and Technical Information CERIST Algiers, Algerianbadache@Cerist.dzAbstract—Next-generation wireless networks (NGN) and internet of Thing (IoT) become two leaders of designing mobile multimedia services. The deployment of these services using heterogeneous wireless networks will be the important factor that leads to profound change in the way that these services are delivered. Also, how these services will be managed is a real challenge. Consequently, Seamless mobility management should be provided to support various services in heterogeneous networks. A SIP-based network appears as a very attractive alternative to mobile multimedia applications. In this paper, we introduce a novel mobility management strategy for mobile SIP networks, in which we develop a seamless handover used mobile SIP scheme called SM-SIP (Seamless Mobility Management for Heterogeneous Wireless Networks for Mobile SIP environment). SM-SIP can significantly reduce the system signaling cost and handover delay, by proactively processing the address allocation and session updates using link layer information of wireless networks. Also, our performance study shows that SM-SIP reduces efficiently packets loss using an anticipated buffering scheme.Index Terms—Seamless handoff, Fast handoff, Multimedia applications, QoS, Hierarchical SIP, Mobility management, Wireless communication).I.I NTRODUCTIONIn the last few years the number of mobile devices as well as access technologies has increased and the number devices are expected to increase with growing speed [1]. In addition, the rise of these devices in a communicating network creates the Internet of Things (IoT) which is the next revolutionary technology in transforming the internet into a fully integrated future internet [2].This new concept will provide new services and ubiquitous communications including large numbers of nodes (PDAs, laptops, sensors, etc.) with varying functionalities and carried by heterogeneous wireless networks (HWNs) [3][4][26]. So, designing these new services is a real challenge to overcome. In this work, we focus on the mobility management of these services in heterogeneous wireless networks (Fig.1).Fig.1. SM-SIP applicationIn our mobile multimedia service design, we assume that we have three important components: the first is the wireless sensing networks formed by the wireless sensor nodes. The second is cluster head in which a node serves as cluster head (CH) that buffer data originated from sources and transfer to sink nodes when they arrive. CH enables sink node to collect a large volume of data at a time without traveling long distances, Sink node moves along sensing areas and transmits sensing information to the third component which is the end- user which in turn may send information to the sink node. In this context, the designer of these services must investigate the mobility of sink node to meet QoS requirements. In mobile networks, mobile multimedia applications are delay-sensitive, loss-sensitive and causing overhead. There are mainly four ways of providing mobility nowadays. The first approach concerns link-layer mobility that is specific for each radio access network. In cellular networks, the handover from one node to another one is performed with the serving radio network subsystem relocation procedure [5][29]. The second approach handles mobility at the network layer by using Mobile IP [6]. The third approach is to consider mobility at the transport layer by using mobile SCTP (StreamControl Transmission Protocol) [7]. The last approach isto use application-layer mobility with Session Initiation Protocol (SIP) [8].Although the mobile SIP and mobile IPv6 [9][10]offer mobility management capability, mobile IPv6 is not suitable for supporting streaming media with stringent delay and eliminates packet losses requirements. Enabling mobility in IP networks is an important issue for making use of the many light-weight devices appearing at the market. The IP mobility support being standardized in the IETF uses tunnelling of IP packets from a Home Agent to a Foreign Agent to make the mobility transparent to the higher layer. There are a number of problems associated with Mobile IP, such as routing, each host needing a home IP address, tunnelling management, etc. furthermore, Future mobile systems, user demand for continuous connectivity is increasing irrespective of which type of interface or network they are using. With the growth of the wireless internet and the mobile computing marketplace we expect to see mobility without any geographical or network boundaries.In addition, several works in littirature investigated all-IP communication between WSN and IPv6 networks [11][12], such as IPv6 over Low power Wireless Personal Area Networks (6Lo-WPAN)[13] which is a protocol architecture that has recently been ratified to enable the seamless interconnectionof wireless sensor networks (WSN) to the Internet. Although, these works bring significant impact especially for interconnection way and data transmission, these improvements remain insufficient against flexibility, address configuration, Mobility, routing mechanisme and congestion problem. In this situation, the mobility management needs careful investigation to offer reasonable delays and packet loss for mobile multimedia and real time applications in different type of network. Mobile-SIP is evolving as the dominant protocol for multimedia call control in wireless and mobile networks. Providing seamless mobility support is one of the most challenging problems towards the system integration of fourth generation (4G) wireless networks [14]. Most of the related literature focuses on seamless mobility aiming to reduce the packet loss rate and handover delay which would eventually lead to efficiency mobile multimedia communication. Also, application-layer mobility management protocol like the Session Initiation Protocol (SIP) has been considered as the right candidate for handling mobility in the heterogeneous 4G wireless networks.Several contributions have been proposed to improve performance during handover [15] [16] [17]. Handover latency is the primary cause of packet loss resulting in performance degradation of Mobile IPv6 or mobile SIP. Mobile IPv6 with fast Handover enables a Mobile Node (MN) to quickly detect at the IP layer that it has moved to a new subnet by receiving link-related information from the link-layer [18]. Several research have been conducted in order to improve Link layer handoff performance in terms of handoff delays and packet loss rates for fast handover transmission. Since probe delays consist of the main contributor to the overall L2 handoff latency. [19] proposed a new intelligent fast handover scheme for mobile IPv6-based WLANs. The new approach consists of equipping mobile nodes with pre-configured mobility pattern to select new access point prior to attachment. [20] conducted a simulative evaluation of the overall performance of Fast Handovers for Mobile IPv6 in comparison. [21] enhanced buffer management scheme for Fast handover protocol. [22] described a fast handover scheme based mobile IP ( FMIPv6) combining two operation modes is analyzed considering the PPMF that is affected by the radius of a cell, velocity of mobile nodes, and the layer 2 triggering time. The effect of system parameters, such as the PPMF, the time required to process additional layer 3 signaling, and the layer 2 trigger time, is analytically investigated with respect to the signaling cost and the packet delivery cost. [18] proposed an enhancement to Fast Mobile IPv6 handover (FMIPv6), based on link layer information. Also, we proposed in [23] a seamless multimedia handoff for hierarchical mobile with a novel anticipate buffering scheme. [8] proposed a Predictive Address Reservation with SIP (PAR-SIP) which decreases handoff delay by proactively processing the address allocation and session update using link layer information of wireless networks.[24] introduced application layer techniques to achieve fast handoff for real-time based multimedia traffic in a SIP signaling environment.In our previous work [16], we introduced fast hierarchical mechanism FHSIP based on PARSIP mechanism [8]. The main contribution of our work is the integrating our anticipated buffering scheme [23] in our fast hierarchical mobile SIP described in [16] to provide a seamless mobility management over heterogeneous networks.Also, we try to eliminate packet loss and minimise handover latency for mobile multimedia services. At first, a novel buffering scheme is integrated to achieve free packet loss on fast hierarchical mobile sip environment in which we develop a seamless handover scheme called SM-SIP (Seamless Mobility scheme for Mobile SIP environment). SM-SIP can significantly reduce the system signalling cost and handover delay, by proactively processing the address allocation and session updates using link layer information of wireless networks. Also, our performance study shows that SM-SIP reduces efficiently packets loss using an anticipated buffering scheme.The rest of the paper is organized as follows. Section II provides theoritical backround. Implementation and Simulation details of our proposed solution SM-SIP are described in section III and IV. We finally conclude the paper in section V.II.T HEORITICAL BACKGROUNDMobile IP is designed for mobility management; it causes a high latency and signalling overhead during handover. Therefore, advanced mobility mechanisms improving Mobile SIP are desirable to perform efficient handover. Also, appropriate Quality of Service (QoS)support is needed for mobility-enhanced in order to meet mobile user’s expectations. For these raisons, our solution SM-SIP uses the Handover Layer 2 information to anticpate buffering scheme. To enhance the fast handover mechanism in SM-SIP we adopte the movement detection defined in PAR-SIP[ 8] where eachmobile node starts to search another reachable access point (AP) using active scan as the Signal to Noise Ratio (SNR) value of the current AP falls below the Cell Search Threshold. HMSIP [25] is used to reduce signaling overhead and handoff delay inside the same domain in a SIP environment. It follows the general regional registration approach found in various intra-domains mobility schemes (MIP-RR, HMIPv6) [9] and builds on SIP hierarchical registration. HMSIP defined a new entity responsible for locally handling intra-domain mobility called SIP Mobility Agent (SIPMA). SIPMA is a domain border router enhanced with the functionality of SIP Proxy and SIP Registrar. HMSIP allocates two IP addresses to the Mobile Host (MH), a local address (LA) reflecting the MH current point of attachment allocated by the serving access router and a global Domain Address (DA) used to uniquely identify the MH during its roaming inside the same domain, and is allocated by the SIP MA. The SIP MA maintains and manages a data base of soft state mappings between the SIP URI, the DA and the LA for each mobile that roams inside the domain. HMSIP caters for intra-domain mobility and relies on Mobile SIP2 for handling inter-domain mobility.SM-SIP is based on Hierarchical Mobile SIP to reduce signalling overhead and support seamless handoff in wireless/mobile networks. The regional registration procedure proposed by HMSIP offers low handoff delay, but it remains too high for real time applications which require low handoff. HMSIP can’t offer such delays even by eliminating home registration procedure because in addition to time necessary for Link layer handoff, the MH must detect movements in the network layer (it must discover that it is on a new sub-network using Router Advertisement (RA), which a router periodically broadcasts), obtain a new IP Address, re-configure its own network interface and some network parameters to communicate again, and finally update its location information by sending the SIP REGISTER message to the local registrar. Among the above steps, address allocation takes the most part of the handoff delay. DRCP [27]reduces the address allocation time; a handoff still requires a few hundred milliseconds. Address acquisition becomes then the main cause in degrading the service quality in real-time applications. For this reason and in order to reduce handoff delay at a value suitable for real time applications, we propose to reinforce HMSIP with a Predictive Reservation Address mechanism (PAR) (Fig.2). The regional registration procedure proposed by HMSIP offers low handoff delay, but it remains too high for real time applications which require handoff delay to avoid service degradation. So, to reduce total handover latency, PAR (Predictive Address Reservation) mechanism with HMSIP allows not only reducing handoff delay but also signalling overhead. To obtainFig.2. Link layer handover triggering in HMSIP [16]a new IP address in advance, MH must forecast its network layer movements before receiving RA (Router Advertisement) from a router. Network layer movements detection is done as follows: When the Signal to Noise Ratio value (SNR) of the current access point (AP) falls below the Cell Search Threshold, the MH starts to search another reachable AP with higher SNR than the current one (active scan). After the selection of such an AP and using an AP list, MH can verify whether the predictive AP belongs to the same access router or to a neighbour one. If the predictive AP belongs to the same access router, a link layer handoff is performed using its address MAC, else MH starts the Address Reservation Process. To the SIP-MA entity is added a data base to manage the domain access routers information. Each AR contains a neighbour AR information table, updated periodically by the SIP MA entity, to allocate a temporary address and to create an AP list for the MH.Fig.3. PAR-HMSIP handoff flow [16]The address reservation process is carried out in the same manner as in [8] with some modifications adapting it to the hierarchical environment. When a MH detects network layer handoff, it sends a reservation request to the current AR, cAR, as shown in the (Fig.3).The cAR sends to MH a temporary local address, topologically correct for the new sub network, and asks the SIP-MA router to validate this address. The SIP-MA router verifies that the allocated address is not used and replies with a validation message. The cAR then authorizes MH to use the allocated address. After this, MH sends a SIP REGISTER message to the SIP registrar of the serving SIP-MA and receives the OK message as a reply before the triggering of the link layer handoff. Allmobilitysupport using SIP proposals, privilege the reestablishment of the ongoing sessions (the SIP re-INVITE message) against the location information update after a handoff. But, in HMSIP environment there is no need to re-establish the ongoing SIP sessions after an intra-domain handoff, because the SIP-MA is informed about the new LA of the MH via the regional registration procedure and is able to Mobile SIP. Redirect the data path to the new location. Therefore there is also no need to re-establish in advance an ongoing session in SM-SIP. This allows reducing the number of procedures to be performed before the link layer handoff triggering and therefore the increase of the probability so that the tasks to be performed before the link layer handoff terminate before the triggering of the link layer handoff.III.S M-SIPMobility management with provision of seamless mobility and service continuity is the key topic in mobile network. In this section we will discuss our proposed scheme (SM-SIP).Our solution tries to provide good QoS performance support for mobile multimedia applications. Signaling overhead and handoff delays are reducing by using fast handover mechanism (combining: Predictive address reservation, handover anticipated) over HMSIP mode. Also, SM-SIP may guarantee seamless multimedia handover as long as the MH moves. But it is still not enough to enhance packet loss over real time and multimedia services. So we propose a integrate data buffering scheme [23] to reduce the amount of buffered user data along with the application requirements by integrating a fast buffering mechanism.Loss free packet: (Anticipated buffering process using security threshold)To minimize loss packet during handover, SM-SIP proposes an anticipate buffering (Fig.4)process with conditional tunnelling. This process enabling the temporary storage of the tunnelled before the handover packets, thus eliminating packet loss occurred during the link layer handover period.In Handoff mechanism, Signal strength based measurements are considered due to its simplicity [28]. Building on this, we define the two following metrics:a)LT (Loss threshold): A packet may be considered as lost if it is received with Signal Strength (SS) less than LT.b)ST (Security threshold): This threshold may be useful to synchronize with the start of Buffering application Handover: related to the initial idea was to start buffering with a broadcast message «Handoff Initiate». However, there may be packets loss before sending this message; we define the security threshold for anticipating the buffering before the signal level deteriorates. Soon as the mobile host receives the signal strength equal to the security threshold, it sends a message Application Control Buffer (RCB) to its old access router. This message acts as initiator of storing packets in the buffer. While the packets are being stored, the old access router sends a copy of these packets until there is a disconnection from the mobile host (reached the loss threshold). Note that the buffering continues until the connection with the new router is established and make a record with the new router.Fig.4. Anticipated Buffering Process [23]SM-SIP handover (Fig.5) is described as follows:Fig.5. SM-SIP handoverThe handoff procedure in mobile SIP environment consists of six subprocedures (Tab.1). Delay for each sub-procedure can be represented with T0~T5 as following:Table.1. handover sub-proceduresSIP_Handoff_Delay= T0 + T1 + T2+T3+ T4+ T5 (1) With PAR and link layer mechanisms, the delay required for DHCP Transaction and the re-INVITE procedure is not necessary since a MN proactively performs theaddress allocation and re-INVITE procedure before handoff. Thus, T2 and T4 values appeared zero. The total handoff delay can be estimated with the following [8]:SIP-Fast_Handoff_Delay= SIP_Handoff_Delay - T2 –T4= T0 + T1 + T3 + T5 (2)The integration of PAR mechanism in HMSIP (regional registration) reduce efficiently both handover overhead and delay, moreover, Address reservation delay and registration delay values appeared zero(executed in parallel within an existing SIP session). So, SIM-SIP handoff delay can be estimated as follow:SM-SIP_Handoff _Delay= T0+T6 (3)Where T6 = SIP-SES: Reconfiguration time + Time to establish a new SIP session in HMSIP. Note that withSM-SIP (Fig.5):T6<= T4+T5 (4)IV.S IMULATION1Simulation scenarioWe assume that there is no change in direction while the MH moves inside the overlapping area.Simulator: Ns-allinone-2.34Network: 1000*1000Modulation: DSSSBandwidth: 100 mbpsTraffic generator: videoPacket rate: 50 packet per secondPacket size: 512 bytesLoss Threshold: 3.41828e-10 Watts[27] presented a method to simulate sending the video in NS-2. We used this method to simulate the behavior of video transmission to mobile node. Obtaining a trace file can be using as scenario of sending video frames, this trace can be read by the simulator NS-2 (Fig.6). This will correspond to a send data during simulation.Fig.6. Video simulation model over NS-22Simulation resultsIn this section, we analyze the SM-SIP performance against different mobility solutions. It will be carried out four aspects: handover latency, throughput, jitter and handover loss packets. As we analyzed the performance of our proposed scheme we proved that SM-SIP transmits message faster and efficient than FMIPv6, FHMIPv6 and HMIPv6.Fig.7. Latency handover vs moving speedFig.7 and Fig.8 show the increase in the handover latency and the packet loss due to an increase in moving speed of MHs. As can be seen, SM-SIP approach performs better than FHMIPV6, HMIPv6 and HMSIP in terms of the handover latency and packet loss. Although the SM-SIP (with the integration of thresholds: ST-LT, Using HMSIP, Predictive Address Reservation) is designed to minimize the packet loss and the latency during a handover, a worse performance is observed with respect to HMIPv6 and HMSIP. In contrast, SM-SIP provides a low latency handover (1.04 and 1.75 s). This is due to the fundamental difference between handover registrations and anticipation Procedures in SM-SIP and other procedures. Furthermore, the number of packets lost depends on the moving speed of MH.Fig.8. Packet loss Rate (%) vs moving speedAs seen in the (Fig.8), SM-SIP packets lost rate isbetween 0 and 0.024. This means that the packet loss cantotally eliminated if we use an anticipated bufferingscheme.Fig.9. Jitter vs sequence number generatedFig.9shows the jitter comparison under videosequence generated. The mean jitter for video traffic is0.08 and 0.038s in HMSIP and SM-SIP correspondingly.In the other hand the mean jitter for video traffic is 0.14and 0.18 s in HMIPV6 and FHMIPV6 correspondingly.Furthermore, we can see that when the payload is light,there is no loss in SM-SIP for video traffic. We can seealso, that there is a difference between HMSIP and theSM-SIP6 under heavy background payload; Payloadaffects more to the performance of HMIPV6, FHMIPV6and HMSIP than SM-SIP. When there is heavybackground payload, the loss rate of HMIPV6, FHMIPV6and HMSIP is bigger than that of SM-SIP.Fig.10. throughput (Mb/s) Vs Moving speedFig.10 shows the dependency of the system throughputon buffer size. We allocate different buffer sizes tomobile nodes to see the dependency of the aggregatethroughput on the buffer size. Tha average throughput is:29, 25, 26, and 33 for buffer size equal to: 40 packets,100, 500, 1000 correspondingly.We can say that under small buffer conditions andunder video- traffic, a reduction the buffer size choice hasa positive effect on the throughput performance. So, wecan overcome throughput exceeds the saturationthroughput, by allocating the right buffer size. This maynot be easy in practice because one does not necessarilyknow a priori the number of clients in the system or theirrespective arrival processes. Fortunately, even if onecannot perfectly fit the buffer size to the traffic scenario,not much is lost in term of throughput. As we have seen,a smaller buffer gives identical throughput performanceas a large buffer under ten users and more, in which casesmaller buffers outperform large buffers.V.C ONCLUSIONThis paper proposes a handover scheme for achievingmobile multimedia services. The integration of the PARmechanism with the Hierarchical Mobile SIP reducessignificantly the handoff latency. Also, the integration ofanticipated buffering reduces significantly the handoffpacket losses during the handover process but itsintegration with the HMSIP environment provides betterhandoff performance. The paper analyzes the scheme'sperformance parameters, including the handover latency,throughput, jitter and handover loss packets. As weanalyzed the performance of our proposed scheme weproved that SM-SIP transmits message faster andefficient than FMIPv6, FHMIPv6 and HMIPv6.R EFERENCES[1]J.Puttonen, ―Mobility Management in Wireless‖. PublishedPhD thesis, University of Jyvaskyla, Finland, 2006.[2]J.Gubbi, R.Buyya, S.Marusic, M.Palaniswami, ―Internet ofThings (IoT): A vision, architectural elements, and future directions‖, Future Generation Computer Systems, Vol.29, P.1645-1660, 2013.[3]M.Ulema, J.M.Nogueira, and B.Kozbe ―Management ofWireless Ad Hoc Networks andWireless Sensor Networks‖, Journal of Network and Systems Management, Vol. 14, No.3, 200677.[4]K.Yang, Y.Wu, H.Chen, ―QoS-aware routing in emergingheterogeneous wireless networks, Quality-of-Service-Based Routing Algorithms for Heterogeneous Networks‖ IEEE Communications Magazine, 2007.[5]H.Fathi, S.Chakraborty and R.Prasad, ―MobilityManagement for VoIP in 3G System: Evaluation of Low-Latency Handover Schemes‖, IEEE Wireless Communication magazine, Vol. 12, Issue 2, pp. 96-104, 2005.[6] C.Perkins,‖ IP Mobility Support forIPv4,‖RFC3344,IETF‖, August2002, /rfc/rfc3344.txt?number=3344/(Accessed 20 March 2011).[7]Y.Leu, ―A novel network mobility handoff scheme usingSIP and SCTP for multimedia applications‖, Journal of Network and Computer Applications, vol. 32, pp. 1073–1091, 2009.[8]W.M.Kim, K.Kim, C.Lee.Yu and L.Link, ―Layer AssistedMobility Support Using SIP for Real-time Multimedia Communicationsé‖ ACM MobiWac.Philadelphia, PA, U.S.A, 2004.[9]M.Tao, H. Yu, ―A Smooth Handover Scheme for Fast-Moving Users in Mobile IPv6 Networks‖, WIRELESS PERSONAL COMMUNICATIONS, Vol.60, No 4, pp. 649-664, 2010.[10]L.J.HANG, P.Samuel, ―Evaluating the Performance of FastHandover for Hierarchical MIPv6 in Cellular Networks‖, JOURNAL OF NETWORKS, Vol. 3, No. 6, pp. 36-43, 2008.[11]W. Xiaonan, Q. Huanyan, ―Research on all-IPcommunication between wireless sensor networks and IPv6 networks‖, Computer Standards & Interfaces, vol 35, pp 403–414, 2013.[12]W.Xiaonan, Z.Shan, ―All-IP communication betweenwireless sensor networks and IPv6 networks based on location information‖ Computer Standards & Interfaces, vol. 35, pp 65–77, 2013.[13]A.Berguiga, H.Youssef, ―A Fast Handover Scheme forProxy-based Mobility in Wireless Sensor Networks‖MobiWac’12, October 21–22, Paphos, Cyprus, 2012. [14]N.Banerjee, W.Wu, K.Basu, S.K.Das, ―Analysis of SIP-based mobility management in 4G wireless networks‖ Computer Communications‖, vol. 27, pp.697–707, 2004. [15]N.Banerjee, A. Acharya and S.K.Das, ―Seamless SIP-based mobility for multimedia applications,‖ IEEE Network, vol. 20, no. 2, 2006.[16]F.Chahbour, N.Nouali, K.Zeraoulia, ―Fast Handoff forHierarchical Mobile SIP network ―,The Third World Enformatika Conference, WEC'05, April 27-29, Istanbul, Turkey, 2005.[17]Y.Leu, ―A novel network mobility handoff scheme usingSIP and SCTP for multimedia applications‖, Journal of Network and Computer Applications Vol. 32, pp. 1073–1091, 2009. [18]M.Alnas, I.Awan, R.D.W.Holton, ―PerformanceEvaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information‖, the Journal of Systems and Software 83 1644–1650, 2010.[19]L.J.Zhang, S.Pierre,―Intelligent Fast Handover Scheme forMobile IPv6-based Wireless Local Area‖ Networks IJCSNS International Journal of Computer Science and Network 60 Security, VOL.9 No.8, August 2009[20]M.Torrent, X.Perez-Costa, S.Sallent-Ribes,‖APerformance Study of Fast Handovers for Mobile IPv6‖, 28th Annual IEEE International Conference on Local Computer Networks (LCN’03), 2003.[21]Yao.M, and Chen.Y‖ An Enhanced Buffer ManagementScheme for Fast Handover Protocol‖, Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCSW’04), 2004.[22]S.Ryu, K.Lee, Y.Mun, ―Optimized fast handover schemein Mobile IPv6 networks to support mobile users for cloud computing J Supercomput, 2010.[23]K.Zeraoulia, N.Badache, ―Seamless Multimedia Handofffor Hierarchical Mobile IPv6‖T he Seventh International Conference on Wireless and Mobile Communications ICWMC 2011 June 19-24, Luxembourg, 2011.[24] A.Dutta, S.M adhani, W.Chen,‖ Fast-handoff Schemes forApplication Layer Mobility Management‖, 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2004, 2004.[25]N.C.Chang, T.Mai, L.H.Chang, ―HMSIP: HierarchicalMulticast SIP Protocol for streaming multimedia in wireless networks‖, IEEE International Conference on Networking, Sensing and Control, Taipei, Taiwan, March 21-23, 2004.[26]A.Barnawi,A.H.Altalhi,M.R.Qureshi,A.I.Khan,―Evaluationof IP Multimedia Subsystem based Mobile Mass Examination System‖ I. J. Computer Network and Information Security, 2012, 4, 1-12[27]S.Linck, E.Mory, J.Bourgeois, E.Dedu,‖Video qualityestimation of DCCP streaming over wireless networks‖, 14th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, February 15th - 17th, Montbéliard-Sochaux – France, 2006.[28]M.N.Vikas,K.N.Keshava,R.K.Prabhas,I.Hameem-Shanava,―Efficient Hand off using Fuzzy and Simulated Annealing‖I. J. Computer Network and Information Security, 2012, 1,17-23[29]A.Bhuvaneswari, E.G.D.Prakash Raj, ―An Overview ofVertical Handoff Decision Making Algorithms‖ I. J.Computer Network and Information Security, 2012, 9, 55-62.Authors’ ProfilesZeraoulia Khaled He graduated in 2002 as Dipl. Eng, and got his Master in 2005from Electrical Engineering and computer science (USTHB), with a thesis on ―video transmission over wireless networks‖. Since 2008 he is PhD student in this faculty, working on a thesis entitled ―Quality of Services in wireless multimedia mobile comm unications‖.Nadjib Badache received the engineer degree in computer science from the University of Constantine, Algeria, in 1978 and the master’s and PhD degrees from the University of Sciences and Technology Houari Boummediene (USTHB),。

基于异构多核环境下的核间通信机制设计与实现

基于异构多核环境下的核间通信机制设计与实现

2019年3月第40卷第3期计算机工程与设计C O M P U T E R E N G IN E E R IN G A ND DE S IG NM a r.2019V o l.40 N o.3基于异构多核环境下的核间通信机制设计与实现周楠,王仁,覃依漪,张杨,冯帆(中国航天科工集团第二研究院706所,北京100854)摘要:为改善异构多核环境下核间通信效率,实现处理器性能的最优化,提出一种适用于异构多核环境下的分层结构的 核间通信机制。

对核间通信机制的体系结构进行概述,阐明会话层、传输层的具体含义及其层间交互关系;在此基础上提 出应用于会话层与传输层的协议,依据协议完成通信机制的具体实现。

在A R M+D S P异构多核平台上进行实验测试,测试结果表明了该机制的可行性与有效性。

关键词$异构多核处理器&核间通信&ARM Cortex-A9;TMS320C6678;低延时中图法分类号!TP368 文献标识号:A文章编号$1000-7024 (2019)03-0887-07d o i: 10.16208!. iss n l000-7024. 2019. 03. 048Design and implementation of inter-core communication based onheterogeneous multicore environmentZHOU Nan,WANG Ren,QIN Yi-yi,ZHANG Yang,FENG Fan(In s titu te706,S e c o n d A c a d e m y o f C h in a A e ro s p a c e Science an d In d u s tr y C o rp o ra tio n,B e ijin g100854,C h in a)A b s tra c t:T o im p ro v e th e e ffic ie n c y o f in te r core c o m m u n ic a tio n in he tero gen eous m u ltic o re e n v iro n m e n t and to o p tim iz e th e p e r­fo rm a n c e o f th e processors, an in te r-c o re c o m m u n ic a tio n m e ch a n ism fo r h e tero gen eous m u lti-c o reT h e a rc h ite c tu re o f in te r core c o m m u n ic a tio n m e ch a n ism w as su m m a rize d,and th e sp e cific m e a n in g la y e r and its in te rla y e r in te ra c tio n w e re c la rifie d O n th is basis, a p ro to c o l a p p lie d to session la y e r and tra n s p o rt la y e r w as p ro­posed,and th e im p le m e n ta tio n o f c o m m u n ic a tio n m e ch a n ism w as c o m p le te d a cco rd in g to th e p ro to c o l.R e s u lts o f e x p e rim e n ta l te sts o n A R M+D S P h e tero gen eous m u lti-c o re p la tfo rm v e r ify th e fe a s ib ility and e ffe ctive n e ss o f th e in te r-c o re c o m m u n ic a tio nm e ch a n ism.K e y w o r d s:h e tero gen eous m u lti-c o re p ro c e s s o r;in te r-c o re c o m m u n ic a tio n;A R M C o rte x-A9;T M S320C6678;lo w la te n c y/引言相较于单核架构,多核架构所具有的性能功耗比优势 已经受到广泛关注,但是为利用多核架构所带来的性能优 势需要依赖于高效的核间通信机制(in te r-p ro c e s s o r co m-m u m c a tio n,IP C)m。

more information, you can contact the session organizers or the authors of the articles. A

more information, you can contact the session organizers or the authors of the articles. A

IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 © 2005 Published by the IEEE Computer SocietyVol. 10, No. 10; October 2005Cluster Computing and Grid 2005 Works in ProgressThis is the second in a two-part series () of works-in-progress articles taken from a special session, which was part of the Cluster Computing and Grid 2005 conference(/ccgrid2005), held in Cardiff, UK. The session was organized by Mark Baker (University of Portsmouth, UK) and Daniel S. Katz (Jet Propulsion Laboratory, US). For more information, you can contact the session organizers or the authors of the articles.A Pluggable Architecture for High-Performance Java MessagingMark Baker, University of PortsmouthAamir Shafi, University of PortsmouthBryan Carpenter, University of SouthamptonEfforts to build Java messaging systems based on the Message Passing Interface (MPI) standard have typically followed either the JNI (Java Native Interface) or the pure Java approach. Experience suggests there's no "one size fits all" approach because applications implemented on top of Java messaging systems can have different requirements. For some, the main concern might be portability, while for others it might be high bandwidth and low latency. Moreover, portability and high performance are often contradictory requirements. You can achieve highperformance by using specialized communication hardware but only at the cost of compromising the portability Java offers. Keeping both in mind, the key issue isn't to debate the JNI versus pure Java approaches, but to provide a flexible mechanism for applications to swap between communication protocols.To address this issue, we have implemented MPJ Express based on the Message Passing in Java (MPJ) API.1 MPJE follows a layered architecture that uses device drivers, which are analogous to Unix device drivers. The ability to swap devices at runtime helps mitigate the applications' contradictory requirements. In addition, we're implementing a runtime system that bootstraps MPJE processes over a collection of machines connected by a network. Though the runtime system isn't part of the MPI specifications, it's essential to spawn and manage MPJE processes across various platforms.MPJE's design is layered to allow incremental development and provide the capability to update and swap layers in or out as needed. Figure 1 shows a layered view of the messaging system. The high and base levels rely on the MPJ device2 and xdev level for actual communications and interaction with the underlying networking hardware. One device provides JNI wrappers to the native MPI implementations, and the other (xdev) provides access to Java sockets, shared memory, or specialized communication libraries. The wrapper implementation doesn't need xdev, because the native MPI is responsible for selecting and switching between different communication protocols. Figure 1 also shows three implementations of xdev: smpdev, the shared memory device; niodev, an implementation of xdev using the Java New I/O package; and gmdev, an implementation of xdev using JNI to interact with the Myrinet communications library.Figure 1. MPJ Express's layered design.MPJE's initial performance evaluation on Fast and Gigabit Ethernet shows comparable performance to mpiJava, which uses JNI wrappers to interact with a native MPI implementation. We released a beta version of MPJE in early September. You can find further details of MPJE on the project's Web site (/projects/mpj or email us.References1. B. Carpenter et. al, MPI for Java Position Document and Draft API Specification,tech. report JGF-TR-03, Java Grande Forum, Nov. 1998.2. S.B. Lim et. al, "A Device Level Communication Library for the HPJava ProgrammingLanguage." Proc. Iasted Int'l Conf. Parallel and Distributed Computing and Systems(PDCS 2003), ACTA Press, 2003.Mark Baker is a Reader in Distributed Systems at the University of Portsmouth, UK. Contact him at mark.baker@.Bryan Carpenter is a senior researcher at the Open Middleware Infrastructure Institute, University of Southampton, UK. Contact him at dbc@.Aamir Shafi is a PhD student in the Distributed Systems Group, University of Portsmouth, UK. Contact him at aamir.shafi@.Toward Intelligent, Adaptive, and Efficient Communication Services for Grid Computing Phillip M. Dickens, University of MaineWhat constitutes an intelligent, adaptive, highly efficient communication service for grid computing? An intelligent service can accurately assess the end-to-end system's state to determine how (and whether) to modify the data transfer's behavior. An intelligent controller could, for example, respond more aggressively to a network-related loss than to a loss caused by events outside the network domain. An adaptive communication service can either change its execution environment or adapt its behavior in response to changes in that environment. An efficient communication service can exploit the underlying network bandwidth when system conditions permit. It can also fairly share network resources in response to observed (or predicted) network contention.A necessary milestone on the path to such next-generation communication services is the development of a classification mechanism that can distinguish between various data-loss causes in cluster or Grid environments. We're developing such a mechanism based on packet-loss signatures, which show the distribution (or pattern) of packets that successfully traversed the end-to-end transmission path versus those that did not. These signatures are essentially largeselective-acknowledgment packets that the data receiver collects and, upon request, delivers to the data sender. We refer to them as packet-loss signatures because a growing set of experimental results shows that different data-loss causes have different signatures.1,2 The question then is how to quantify the differences between packet-loss signatures so that a classification mechanism can identify them.Our approach is to treat packet-loss signatures as time-series data and to apply techniques from symbolic dynamics to learn about the time series' dynamical structure. We quantify the structure in the sequence based on its complexity. We've learned that the complexity measures of packet-loss signatures have different statistical properties when the cause of such loss lies inside rather than outside the network domain. In fact, these statistical properties are different enough to let us construct, using Bayesian statistics, rigorous hypothesis tests regarding the cause of data loss.3 We're currently developing the infrastructure required to perform such hypothesis testing in real time.Next, we plan to develop and evaluate a set of responses tailored to particular data-loss causes. We'll explore, for example, data-receiver migration and user-specified limits on CPU utilization for data loss caused by contention for CPU resources.References1. P. Dickens and J. Larson, "Classifiers for Causes of Data Loss Using Packet-LossSignatures,"Proc. IEEE Symp. Cluster Computing and the Grid (CCGrid 04), IEEE CS Press, 2004.2. P. Dickens, J. Larson, and D. Nicol, "Diagnostics for Causes of Packet Loss in a HighPerformance Data Transfer System," /persagen/DLAbsToc.jsp?Proc. 18th Int'l Parallel and Distributed Processing Symp. (IPDPS 04), IEEE CS Press, 2004.3. P. Dickens and J. Peden, "Towards a Bayesian Statistical Model for the Causes of DataLoss,"Proc. 2005 Int'l Conf. High Performance Computing and Communications, LNCS 3726, Springer, 2005, pp. 755-767.Phillip M. Dickens is an assistant professor in the Department of Computer Science at the University of Maine. Contact him at dickens@.Grimoires: A Grid Registry with a Metadata-Oriented InterfaceSylvia C. Wong, School of Electronics and Computer Science, University of Southampton Victor Tan, School of Electronics and Computer Science, University of Southampton Weijian Fang, School of Electronics and Computer Science, University of Southampton Simon Miles, School of Electronics and Computer Science, University of Southampton Luc Moreau, School of Electronics and Computer Science, University of SouthamptonThe Grid is an open distributed system that brings together heterogeneous resources across administrative domains. Grid registries let service providers advertise their services, so users can use these registries to dynamically find available resources. However, existing service registry technologies, such as Universal Description, Discovery, and Integration (UDDI), provide only a partial solution.First of all, such technologies have limited support for publishing semantic information. In particular, services aren't the only entities that need to be classified for example, we would also want to define classifications for individual operations or their argument types. Second, only service operators can provide information about services, and in a large and disparate environment, it's impossible for operators to foresee all the information that users might use to find resources. Third, UDDI uses authentication techniques for security that aren't particularly suited for the large-scale nature of Grid systems.To address these problems, we're developing a registry called Grimoires() for the myGrid project () and the Open Middleware Infrastructure Institute (OMII, ) Grid software release. Figure 2 shows our registry's architecture, which we've implemented as a Web service. It has two major interfaces UDDI and metadata. The registry is UDDI v2 compliant, and you canaccess the UDDI interface using any UDDI client, such as UDDI4j (). To access the metadata functionalities, you need to use a Grimoires client.Figure 2. The Grimoires architecture. (UDDI is Universal Description, Discovery, and Integration.)Our registry has several unique features:l Registration of semantic descriptions. Our registry can publish and inquire overmetadata attachments. These attachments are extra pieces of data that provideinformation about existing entities in the registry. Currently, the registry supportsannotations to UDDI BusinessEntity, BusinessService, tModel, and BindingTemplate, and to WSDL (Web Services Description Language) operations and message parts.Thus, using Grimoires, users can annotate BusinessService with service ratings andfunctionality profiles and attach semantic types of operation arguments to WSDLmessage parts.l Multiple metadata attachments. Each entity can have an unlimited number ofattachments, and each piece of metadata can be updated without republishing the entity or other metadata attached to the same entity. This efficiently captures ephemeralinformation about services, which changes often.l Third party annotations. Both service operators and third parties can publishmetadata, so users with expert knowledge can enrich service descriptions in ways that the original publishers might not have conceived.l Inquiry with metadata. Grimoires supports multiple search patterns. It ranges from simple searches that return a list of metadata attached to the specified entity to morecomplex searches that return entities that match a certain criteria.l Signature-based authentication. UDDI uses a username and password credentialscheme. However, Grid environments typically use certificate-based authentication.OMII provides an implementation of SOAP message signing and verification thatconforms to Web Services security standards. By deploying Grimoires in the OMIIcontainer, the registry can authenticate users using X509 certificates. This makes iteasier to integrate Grimoires into existing Grid security infrastructures, and it provides an important building block certificate-based authentication for the single sign-on capabilities that many Grid applications require.For more information, please visit .Sylvia C. Wong is a research fellow in the Intelligence, Agents, Multimedia group at the School of Electronics and Computer Science, University of Southampton, UK. Contact her at sw2@.Victor Tan is a research fellow in the Intelligence, Agents, Multimedia group at the School of Electronics and Computer Science, University of Southampton, UK. Contact him atvhkt@.Weijian Fang is a research fellow in the Intelligence, Agents, Multimedia group at the School of Electronics and Computer Science, University of Southampton, UK. Contact him at wf@.Simon Miles is a research fellow in the Intelligence, Agents, Multimedia group at the School of Electronics and Computer Science, University of Southampton, UK. Contact him atsm@.Luc Moreau is a professor in the Intelligence, Agents, Multimedia group at the School of Electronics and Computer Science, University of Southampton, UK. Contact him atl.moreau@.Cite this article:Mark Baker, Bryan Carpenter, and Aamir Shafi, "Cluster Computing and Grid 2005 Works in Progress: A Pluggable Architecture for High-Performance Java Messaging," IEEE DistributedSystems Online, vol. 6, no. 10, 2005.Phillip M. Dickens, "Cluster Computing and Grid 2005 Works in Progress: Toward Intelligent, Adaptive, and Efficient Communication Services for Grid Computing," IEEE Distributed Systems Online, vol. 6, no. 10, 2005.Sylvia C. Wong, Victor Tan, Weijian Fang, Simon Miles, and Luc Moreau, "Cluster Computing and Grid 2005 Works in Progress: Grimoires: A Grid Registry with a Metadata-Oriented Interface," IEEE Distributed Systems Online, vol. 6, no. 10, 2005.。

abiCloud手册

abiCloud手册

概述AbiCloudAbicloud is an open source infrastructure software for the creation and integral management of Public & Private Clouds based on heterogeneous environments. The main aim of the project is to offer users a tool with the capacity for scaling, management, automatic and immediate provision of servers, storage, networks, virtual network devices as well as applications.DetailsNowadays companies have needs for different system architectures specific to a department or work group.Besides, there are companies with products which need to be scaled seasonally. Not being able to attend to these requirements on demand in an adequate manner makes users feel defrauded by a bad quality service and hence no longer use the product.With AbiCloud, it is possible to provision the needs of these work groups for their environments (development, tests, pre-production,production) immediately and instant de-provisioning when no longer necessary. The infrastructure does not deplete but instead takes advantage of its full capacity and reduces the value chain (provision problems), saves costs in space in the data center, enhances electricity, number of persons dedicated to maintenance, etc.With AbiCloud, small companies and start-ups can mount their own Private Cloud and obtain all the benefits that they will attain with AbiCloud in a big company or in a Host ProviderThe community version of AbiCloud is distributed under a free software license, hence it is possible to adjust to specific needs, for example Universities, ISVs, SaaS providers, etc.AbiCloud community is a collection of online resources for all those that wish to take advantage of open version. Registration is free and does not require any compromise for its ownership.What can you do with AbiCloud?•Manage your physical infrastructure:o Manage datacenters (this community version works only with one datacenter)o Manage Rackso Manage Physicals Machineso Manage Hypervisors (this community version works with virtualBox technology)o Controle the state of your physical Machines vs virtual infrastructure •Manage enterprises/users:o Manage enterpriseso Manage userso Control logged userso Manage user profileso Soft/hard limits•Manage Appliance libraries:o Manage local repositoryo Mange virtual imageso Define virtual images requirements.o Connect to public OVF repositorieso Private Repositories for each enterpriseo Upload/Download images from localhost to repository•Manage Virtual Infrastructureo Each enterprise has its virtual infrastructureo Manage virtual data Centerso Manage virtual Applianceso Assign private IP's to your virtual Machineso Bundle imageso Manage private network术语:abiCloud GlossaryThis chapter presents the different entities that appear in the application开始Getting startedThe aim of this chapter is to show a quick manual to create a basic cloud infrastructure composed of 1/2 machines deploying an easy application. In the basic configuration you can use your own computer (Where the server is installed) with virtualbox.This chapter is oriented to expose easy steps to follow:1.The basic installation contains the following information on the database to access tothe abicloud:•Sys Admin (Complete access to all functionalities)--> admin - password:xabiquo•Cloud Standard user (can only createVirtual Applications) --> user - password:xabiquo•An enterprise called abiquo.• A datacenter called myDatacenter with a virtualFactory on it (in the same machine).• A physical rack and machine called myMachine with localhost network interface and VirtualBox pre-configurated.•Hypervisor Support.• A repository called myRepository. This repository is located on /opt/vm_repository in the same server machine.•One Remote repository (abispace) located on amazon in order to download pre-configurated images ready to be used.Login into application (admin/xabiquo)Enter into infraestructure management and show that you have a physical Machine with the network and hypervisor information correctly typed.Access to Appliance Library and download a preconfigurated image from the remote repository.The image will be appear on the libraryEnter into Virtual Data Center section and create a new Virtual DataCenter on the desired physicalDatacenter and with your desired virtualization technologyCreate a new Virtual Appliance on your VDC createdUpdate your dhcp.leases with the information of IP/MAC defined by the popUp on click "ShowDHCP info"Drag and Drop your downloaded image on the central canvas.Configure your internal IP (Automatically, abicloud stablish an internal IP from the vdc range)Finally, you can powerOn your appliance. If all is OK, the button will appear in green color.Enjoy it !!新特性FeaturesA quick view of the current abiCloud functionalities of this community edition is the following:Login•Access to the application•Session stored in DB•User validation in DB•Three different roles:•SystemAdministratorEnterprise CloudAdmin•Cloud user Dashboard•Initial page toaccess differentcloud optionsUser Management•Manageorganizations•Manage users•Managesessions•Basic hard andsoft limitsInfrastructure management•Manage physicaldatacenters•Create•Modify•Delete•Manageracks/physicalmachines•Create•Modify•Delete•Clone•ShowRAM/CPU/HD•Networkinformation•HypervisorTechnology•Show Virtualinfrastructureutilization onphysicalinfraestructure•State ofphysicalmachines(used /availableresources) Appliance repository•Manage physicalrepository•Edit location•Manage virtual Images•Upload/download disks•Create imagesimages•Modify virtualimages•Delete virtualimages•Manage icons•Manage virtual imagescateogries•Createcategories•ModifyCategories•Deletecategories•Manage publicrepositories•Private repositories foreach enterpriseVirtual Appliances•Manage VirtualData Center•CreatevirtualDataCenter•ModifyvirtualDataCenter•DeletevirtualDataCenter•Manage virtualappliances•Createappliances•Modifyappliances•Deleteappliances•Basicview•Completeview•Deployappliances•Managelogs•Bundleimages•Multi Datacenterenvironments•Multi hypervisorenvironments。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Session Models for Heterogeneous Multicasting EnvironmentsCristian Hesselman and Henk EertinkTelematica Instituut, P.O. Box 589, 7500 AN Enschede, The Netherlands{hesselman, eertink}@telin.nlAbstractIn this paper, we describe ongoing work on a system that controls the Quality of Service (QoS) of streaming applications running in a heterogeneous fixed-mobile integrated environment. For thispurpose, the system dynamically composes and configures sets of IP multicast sessions that areinterconnected through proxies.1Motivation and overviewThe increasing capabilities of mobile terminals and mobile networks [16] allow the multimedia multiparty applications of the fixed environment (e.g. video conferencing, video on demand and gaming applications) to become available in the mobile environment as well. This opens up the opportunity to build advanced environment independent multimedia multiparty applications, provided the mobile and fixed parts of such applications are seamlessly integrated.A major problem for integration is that the parts of a distributed multiparty application that run on mobile terminals typically have to do with an operating environment that has fewer capabilities than the application parts that run on fixed terminals [10, 18]. For example, mobile operating environments typically have less available network bandwidth, a limited set of codecs, and smaller and lower quality displays. In addition, there is also a strong variation in the capabilities of mobile operating environments themselves [16]. For example, some mobile operating environments offer application parts high capacity network connectivity and full-color displays, whereas others offer a low network capacity and monochrome displays. The above two factors make it a difficult task to deliver each application part (fixed and mobile) with a sufficient QoS in a scalable manner.There are two extreme solutions to the above problem. One is to deliver a single QoS to all application parts, the other is to deliver a QoS that is fine-tuned to the capabilities of each application part’s operating environment. The first approach generally scales well, but typically provides a non-optimal overall QoS. The second approach generally provides an optimal overall QoS, but typically scales poorly.The middleware-based system that we discuss in this paper takes an approach that lies somewhere in the middle. In particular, our system deals with the heterogeneity of application parts’ operating environments by making groups of application parts that run in operating environments with similar QoS-related capabilities. The system then establishes an appropriate QoS level for each group and assumes that the capability variations within each group are small enough that active QoS control for the group can be kept to a minimum. The system can then focus on controlling the QoS differences between different groups of application parts. We argue that this approach delivers a sufficient QoS to the application parts while it at the same time ensures a high degree of scalability.In this paper, we focus on the delivery of QoS to the mobile part of distributed applications, in particular on how to provide QoS in the face of terminal mobility. We furthermore limit ourselves to three aspects of capability variations: media device variations, codec variations and network bandwidth variations. In a later stage, we also intend to consider aspects such as display sizes and display qualities (e.g. color, monochrome, etc.).The system that we describe relies on the ubiquitous presence of IP as the unifying glue for heterogeneous networks. In particular, our system relies on IP multicast because this transport technology forms a natural match with multiparty applications and because it proliferates rapidly.The rest of this paper is organized as follows. In Section 2 we first discuss the model with which we describe communication sessions. The system that we intend to construct will be built around this model. Section 3 gives an overview of our system in terms of the functions of which we think that they are necessary to control the QoS using the model of Section 2. Section 3 focuses on the functions related to joining an application part to a communications session, and on the functions required to deal with to terminal mobility. Section 4 presents related work and Section 5 closes with conclusions.2Session ModelThis section describes the session model that will form the basis of our middleware-based distributed system. Although it is generic model, we will for the sake of discussion present it by means of a specific example. We will do this at two levels of abstraction. On a high level of abstraction, our system supports sessions that carry media flows between application parts that operate on a variety of terminals that may connect to a variety of networks. This high level model describes the sessions that we want the system to support from an application’s perspective. Our system decomposes this model into a number of lower level homogeneous sessions (homogeneous in terms of media, media encoding and bandwidth consumption). Major requirements on the lower level model are scalability (large numbers of users should be able to simultaneously access the system), adaptivity (the system should be able to deal with variations in the availability of resources) and transparency (the lower level model should be transparent to the applications).Observe that both models deal with abstract sessions that need to be mapped to actual transports. For the sake of brevity, we will not discuss this mapping in this paper.2.1High Level Session ModelFigure 1 shows an example of the high-level session model that we have in mind. The model represents an instance of a distributed video conferencing application and consists of five User Agents (UAs) that are interconnected by a session. The system that we plan to develop will be responsible forestablishing and controlling the session, in particular forcontrolling the session’s QoS.User Agent X Bundle of flowsUA’s local view on session Global view on sessionFigure 1: Video conferencing session.The UAs shown in Figure 1 are application level programsthat represent the multimedia devices of a terminal (fixed or mobile) that are currently active. The devices produce or consume flows of audio or video information. Each UA sends and/or receives such flows to/from other UAs in the session.Based on the capabilities of each UA’s operating environment (supported media devices and network bandwidth), the session that interconnects the UAs delivers the right types of flows to the right UAs. The quality of the flows that a UA receives is less or equal to the quality of the flows such as they were transmitted. Quality degradations may occur as a result of several factors like variations in the capabilities of UAs’operating environments, terminal mobility, temporary unavailability of resources and RF interference.As an example, assume that the UAs A, B and E run on high-performance multimedia workstations that send and receive high-quality audio and video flows, whereas UAs C and D reside on GSM-like terminals that only receive low quality audio flows. In this setting, our system would not deliver the video flow from, for instance, UA A to C and D.That is, based on the characteristics of the mobile terminals and the bandwidth characteristics of their network connections, the system decides that sending video flows towards C and D makes no sense. The quality of A’s audio flow that UAs C and D do receive will furthermore typically be less than the quality of the same audio flow such as B and E receive it. This is for instance due to the mobiles’ low network capacity.The above example also reveals that each UA may generally have a different view of the session. UAs A, B and E for instance, perceive the session as a full-fledged multimedia conference that accepts and delivers audio and video flows.The UAs that run on the two GSM terminals, on the other hand, see the session as an audio-only conference that only accepts and delivers an audio flow. From a global perspective the session can therefore be considered heterogeneous with respect to the types of flows that it carries to and accepts from UAs. The example furthermore shows that different UAs may have different views on the quality of the same flow.Sessions may thus also be heterogeneous when it comes to QoS.2.2Lower Level Session ModelFigure 2 shows the lower level session model that refines the model of Figure 1. The model is a refinement in the sense that it also considers the codec and network bandwidth variations in the UAs’ operating environment. In a mobile setting, codec heterogeneity is particularly important to consider because unlike fixed terminals like PCs, mobile terminals often rely on hardware codecs. This makes mobile terminals more sensitive to the overall degree of codec heterogeneity because they generally cannot change codecs, nor can they easily extendtheir set of codecs. This is particularly true for small mobile terminals like PDAs.The idea behind the lower level communications model is to make groups of UAs that use the same codec for the same types of information flows and have approximately the same amount of network bandwidth at their disposal. The consequence of this grouping is that we can use a session with multicast capabilities to interconnect these UAs without having to perform per-UA transcoding between different coding schemes, per-UA filtering of flow types (cf. [1]) or per-UA bandwidth tuning. This ensures that our system possesses a high degree of scalability. The use of multicast sessions furthermore allows us to easily map the sessions onto transports with multicast capabilities, in particular on IP multicast groups. Observe that the multicast sessions are scoped (e.g. TTL scoped, organizationally scoped or link local scoped) to limit the amount of UAs that they will attract. This is particularly important for applications such as video conferencing where there is more than one UA that transmitsflows.Figure 2: Session of sessions.The multicast groups need to be interconnected to form the overall session of Figure 1. The interconnections between the different multicast groups perform functions like transcoding [15], filtering of flow types and rate adaptation for this purpose, but merely on a per-session pair basis rather than on a per-UA basis. The entities that are responsible for such tasks are application level programs that run on network nodes in LANs or access networks. We refer to these entities as proxies (cf. [8]). The proxies in our model are scoped for load-balancing purposes. Scoping may for instance be accomplished by limiting the range of ‘proxy advertisements’(cf. Agent Advertisements in Mobile IP [17]).Compared to the high level session of Figure 1, the lower level multicast sessions of Figure 2 are homogenous with respect to the types of flows that they carry as well as with respect to the flows’ quality (the flows rely on approximately the same network bandwidth). The multicast sessions will furthermore generally form a piece of the overall session because UAs will generally use different types of flows or different codecs. The lower level model can therefore be viewed as a decomposition of the higher level heterogeneous session in terms of several interconnected homogenous multicast sessions that each form a piece of the overall session.To complete the example, assume that UAs A and B use an MPEG-2 codec (for both their audio and their video flows), UAs C and D use a GSM codec (for their audio flows)and that UA E uses an MPEG-1 codec (also for both itsaudio and its video flows). According to the ‘grouping principle’, we end up with three groups: one interconnecting UAs A and B, one interconnecting UAs C and D and one with only UA E as a member. Observe that a UA becomes a member of two multicast sessions if it uses a different coding scheme for its audio and video flows.The three groups are interconnected by a number of proxies — three in this example. The proxies are labeled 1, 2 and 3 in Figure 2. Proxy 1, for instance, performs transcoding, filtering and rate adaptation tasks.3System OverviewOur middleware-based system is responsible for establishing structures such as the one shown in Figure 2 to provide the UAs in the heterogeneous session of Figure 1 with a sufficient QoS while retaining a high degree of scalability. The system is furthermore responsible for maintaining the established QoS level when the distributed application is used. Both tasks require the system to be aware of the heterogeneity of the environment. To maintain an established QoS level, the system furthermore needs to take the dynamics of the environment into consideration, especially that of the mobile environment.The establishment and maintenance of compositions of multicast sessions boils down to the execution of operations on the higher and lower level session models. UAs will typically invoke the operations that can be performed on the higher level session model, but the system may occasionally also do this. For instance, the system could autonomously decide to remove a video flow on a terminal because the terminal’s profile specifies that video flows should be dropped whenever it runs low on battery power. The operations that manipulate the lower level session model, on the other hand, will not be accessible to UAs. Instead, instances of the lower level model will only be visible and accessible to the middleware. The middleware will also be responsible for mapping instances of the higher level model to a lower level equivalent. This means that the middleware will be responsible for translating operations that the UAs invoke on a higher level session model into the equivalent operation(s) on the corresponding lower level model.We have identified a number of operations that can be executed on the higher and lower level session models. For the sake of brevity, we will limit the discussion to the operations of joining (or establishing) a session and the operations that occur as a result of terminal mobility. The join operation will be called by UAs to manipulate instances of the higher level session model and requires the middleware to perform one or more operations on an instance of the lower level session model. The operations that the middleware needs to execute to deal with terminal mobility apply to instances of the lower level session model only and will hence not be visible to UAs.Our focus in realizing the operations mentioned above will be on capability negotiation.Joining a session. If a UA intends to join a heterogeneous session (cf. Figure 1), the system needs to figure out which multicast sessions (cf. Figure 2) the UA can connect to. To this end the system will need to be made aware of the properties of the new UA’s operating environment. The system will furthermore have to be able to determine a ‘proxy path’ (requiring proxy discovery and routing) through the existing structure of multicast sessions. This path should not contain any loops. For example, if a UA running on a GSM terminal wants to join the session of Figure 1, it should connect to the GSM session of Figure 2 and use proxies 1 and 2 to reach the other UAs in the session. Proxy 3 should not be involved in the delivery of flows that emerge from the GSM session.In addition to finding a session to connect to and a proxy path, the system will also have to determine whether or not the addition of the new user will keep the load on proxy 1 within bounds (load balancing). This issue is particularly relevant for non-broadcast applications such as video conferencing because these applications require the system to deal with upstream as well as with downstream traffic. If the load on the proxy gets too high, the system will have to take appropriate actions to solve the problem. It may for instance decide to fire up a new proxy, attach the new proxy and the new UA to a new multicast session and plug the whole into the existing structure of multicast sessions.Terminal mobility.Consider the example of Figure 2 and suppose that UA C roams. At a certain point in time UA C will get ‘out of range’ of proxy 1 (proxies are scoped) or the GSM session (sessions are scoped, too). When this happens, UA C and its codec will be forced to leave the GSM session and join a new GSM session at another ‘location’. If such a session already exists, the system can deal with this event simply by having UA C leave the current GSM session and have it join the other GSM session. If no such session exists, the system will have to create one, attach the new session to the already existing structure of multicast sessions and proxies and join AE C to the new session. An application level handoff of this type needs to be completed as soon as possible so as not to disrupt communications for UA C.In a UMTS-like network environment that exists of various mobile network technologies and where terminals are equipped with either multiple radio interfaces or a software radio, a UA may also run into a new network that has other properties than the one the UA is currently using. For example, if the terminal on which UA C runs moves from a GSM-like network to an indoor wireless LAN, the available network capacity will generally increase. The UA C and its codec may then be moved to a higher capacity group. This transition will generally also involve adjusting a UA’s codec parameters to exploit the additional capacity and thus obtain a better quality. The system may alternatively respond by choosing a new codec (if more than one is available) or by adding new flows. The system may perform the inverse of one of the above actions when the mobile terminal runs into a network with less capacity.4Related WorkThe use of proxies to deal with capability variations of networks and terminals is not new. [2], [18], [8], [19] and [20] are examples of initiatives that take this approach. In particular, [18], [8] and [20] use proxies to overcome capability variations for mobile networks and terminals.[6] and [7] discuss an approach that uses multiple multicast sessions to control the bandwidth of video flows that destined for a set of heterogeneous clients. This approach is known as Receiver-driven Layered Multicast (RLM). RLM exploits the fact that advanced coding schemes such as MPEG-2 [13] and MPEG-4 [14] allow information flows to be encoded at multiple quality levels. Each quality level produces a flow of a certain bandwidth each of which RLM transmits onto a separate multicast session. This allows receivers to ‘tune in’ to as many sessions as they are capable of receiving given their current network capacity and ‘add up’ the quality levels they receive. We believe that our model also supports RLM. TheMPEG-2 session of Figure 2 could for instance consist of three multicast sessions each carrying flows of a different quality.We are also aware of work that makes use of combinations of proxies and multicast sessions, for instance [9], [10] and [11]. [9] and [11] also use IP multicast at the transport level, but neither of them deals with mobile communications. [10] does, but does not use IP multicast transports and focuses on reliable communications rather than on multimedia streaming.[9], [11] and [10] furthermore pay little attention to the dynamic composition and configuration of proxies and multicast sessions. [11] does consider this for a fixed environment, but only allows server applications to express their characteristics. As far as we know, it is not possible for, say, a terminal to describe its currently available bandwidth and request to be included in an existing session based on that bandwidth. [9] and [11] furthermore focus on broadcast applications while we also intend to consider non-broadcast applications like video conferencing.Work on session models for multimedia communication is part of a large number of other architectures, for instance in the IP-telephony world [3, 4, 5] or in the TINA telecommunications environment [12]. Our session model, however, has a different purpose in that it strongly focuses on dealing with terminal and network heterogeneity, on capability negotiation and on controlling compositions of IP-multicast sessions. Similar to the TINA session models, our session model uses multiple levels of abstraction. The higher level model describes communication sessions from an application’s perspective, while the lower level model describes communication sessions from a middleware perspective. To our knowledge, this two-level model-based approach does not exist in any of the work that deals with compositions of multicast sessions and proxies.In summary, our system is unique in that is built around a two-level model-based approach and focuses on the dynamic composition of multicast sessions and proxies as a result of terminal mobility.5Conclusions and StatusWe have presented our initial ideas about a middleware-based system that controls the QoS of distributed multimedia multiparty applications that run in fixed-mobile integrated environments. We have discussed the session model on which our system will rely. The model decomposes a heterogeneous communications session into several homogenous multicast sessions that are interconnected by proxies. We have also presented the first ideas about the system’s functions that will be responsible for establishing and controlling these sessions of sessions. In particular, we have discussed the functions of which we expect that the system will need them to be able to deal with UAs that want to join a session and to be able to deal with terminal mobility.We are currently implementing a first version of our system that will act as an initial proof of concept. References[1] R. Wittmann, M. Zitterbart, “AMnet: Active Multicasting Network”, Proc. of Intern. Conf. on Communications (ICC'98), Atlanta, GA, USA, June 1998[2] S. Cho, Y. Shin, “Multimedia Service Interworking over Heterogeneous Networking Environments”, IEEE Network, March/April 1999, pp. 61-69[3] M. Handley, V. Jacobson, “SDP: Session Description Protocol”, RFC 2327, April 1998[4] M. Handly, H. Schulzrinne, E. Schooler, J. Rosenberg,“SIP: Session Initiation Protocol”, RFC 2543, March 1999 [5] M. Handley, C. Perkins, E. Whelan, “Session Announcement Protocol”, IETF draft, draft-ietf-mmusic-sap-v2-03.txt, October 1999[6] S. McCanne, V. Jacobson, M. Vetterli, “Receiver-driven Layered Multicast”, ACM SIGCOMM, August 1996, Stanford, CA, pp. 117-130.[7] X. Li, M. Ammar, S. Paul, “Video Multicast over the Internet”, IEEE Network, March/April 1999, pp. 46-60 [8] E. Brewer et al., “A Network Architecture for Heterogeneous Mobile Computing”, IEEE Personal Communications Magazine, October 1998, pp. 8-24[9] E. Amir, S. McCanne, R. Katz, “An Active Service Framework and its Application to Real-time Multimedia Transcoding”, Proceedings of ACM SIGCOMM’98, Vancouver, British Columbia, September 1998[10] Y. Chawathe, S. Fink, S. McCanne, E. Brewer, “A Proxy Architecture for Reliable Multicast in Heterogeneous Environments”, Proceedings of ACM Multimedia '98, Bristol, UK, September 1998.[11] K. Jonas, M. Kretschmer, J. Moedeker, “Get a KISS —Communication Infrastructure for Streaming Services in a Heterogeneous Environment”, Proceedings of ACM Multimedia '98, Bristol, UK, September 1998[12] TINA Consortium, “Service Architecture”, June 1997, [13] T. Sikora, “MPEG-1 and MPEG-2 Digital Video Coding Standards”, http://wwwam.hhi.de/mpeg-video/papers/sikora/mpeg1_2/mpeg1_2.htm[14] R. Koenen, “MPEG-4 — Multimedia for Our Time”, IEEE Spectrum, Volume 36, Number 2, February 1999 [15] E. Amir, S. McCanne, H. Zhang, “An Application Level Video Gateway”, Proc. ACM Multimedia, San Fransisco, CA, USA, Nov. 1995, pp. 255-265[16] A. Fasbender, F. Reichert, E. Geulen, J. Hjelm, T. Wierlemann, “Any Network, Any Terminal, Anywhere”, IEEE Personal Communications, April 1999, pp. 22-30 [17] J. Solomon, “Mobile IP — The Internet Unplugged”, Prentice Hall, 1998[18] A. Fox, S. Gribble, E. Brewer, E. Amir, “Adapting to Network and Client Variability via On-Demand Dynamic Distillation”, ASPLOS-VII, Oct 1996, p. 160-170[19] N. Yeadon, A. Mauthe, F. Garcia, D. Hutchison, “QoS Filters: Addressing the Heterogeneity Gap”, Proc. of the Interactive Distributed Multimedia Systems and Telecommunication Services (IDMS’96), Berlin, Germany, May 1996[20] A. Balachandran, A. Campbell, M. Kounavis, “Active Filters: Delivering Scaled Media to Mobile Devices”, 7th International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV’97), May 1997, St. Louis, Missouri, USA。

相关文档
最新文档