首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
IETF softwire unicast and multicast framework for IPv6 transition   总被引:2,自引:0,他引:2  
IPv6 protocol plays an important role in the next generation of Internet (NGI). It is expected that the elegant coexistence of IPv4 and IPv6 is the key point of IPv6 transition. To solve the transition problem, we propose a mesh unicast framework and a multicast framework in this paper. We describe two reference models for the mesh unicast framework, and put forward two potential solutions for the multicast framework. A Linux-based prototype is implemented for IPv4 over IPv6 scenario and a test bed is deployed with 8 nodes on CERNET2. The deployment demon- strates the advantages of the framework.  相似文献   

2.
This paper presents the definition of multi-dimensional scalability of the Internet architecture, and puts forward a mathematical method to evaluate Internet scalability based on a variety of constraints. Then, the method is employed to study the Internet scalability problem in performance, scale and service scalability. Based on the examples, theoretical analysis and experimental simulation are conducted to address the scalability issue. The results show that the proposed definition and evaluation method of multi-dimensional Internet scalability can effectively evaluate the scalability of the Internet in every aspect, thus providing rational suggestions and methods for evaluation of the next generation Internet architecture.  相似文献   

3.
The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems. Based on the drastically increased IPv6 address space, a "source address validation architecture" (SAVA) is proposed in this paper, which can guarantee that every packet received and forwarded holds an authenticated source IP address. The design goals of the architecture are lightweight, loose coupling, "multi-fence support" and incremental deployment. This paper discusses the design and implementation for the architecture, including inter-AS, intra-AS and local subnet. The performance and scalability of SAVA are described. This architecture is deployed into the CNGI-CERNET2 infrastructure a large-scale native IPv6 backbone network of the China Next Generation Internet project. We believe that the SAVA will help the transition to a new, more secure and dependable Internet.  相似文献   

4.
An ultra-massive distributed virtual environment generally consists of ultra-massive terrain data and a large quantity of objects and their attribute data, such as 2D/3D geometric models, audio/video, images, vectors, characteristics, etc. In this paper, we propose a novel method for constructing distributed scene graphs with high extensibility. Thismethod can support high concurrent interaction of clients and implement various tasks such as editing, querying, accessing and motion controlling. Some application experiments are performed to demonstrate its efficiency and soundness. Supported by the National Basic Research Program of China (Grant No. 2004CB719403), the National High-Tech Research & Development Program of China (Grant Nos. 2006AA01Z334, 2007AA01Z318, 2009AA01Z324), the National Natural Science Foundation of China (Grant Nos. 60573151, 60703062, 60833007), and the Marine 908-03-01-10 Project  相似文献   

5.
The foundation of any network management systems is a database that contains information about the network resources relevant to the management tasks.A network information model is an abstraction of network resources,including both managed resources and managing resources,In the SNMP-based management framework,management information is defined almost exclusively from a “Device“ viewpoint,namely managing a network is equivalent to managing a collection of individual nodes.Aiming at making use of recent advances in distributed computing and in object-oriented analysis and design,the Internet management architecture can also be based on the Open Distributed Processing Reference Model(RM-ODP).The purpose of this article is to provide an Internet Network Resource Information Model.First,a layered management information architecture will be discussed.Then the Internet Network resource information model is presented.The information model is specified using object-Z.  相似文献   

6.
DRAGON-Lab—Next generation internet technology experiment platform   总被引:1,自引:0,他引:1  
Testbed technology is very important in the development of the Internet. Similar to the present internet, next generation internet also starts from testbed. There are two kinds of testbeds, testbed networks like CNGI-CERNET2, Internet2, Geant; testbed systems like PlanetLab, NS2. DRAGON-Lab can be viewed as both testbed network and testbed system. DRAGON-Lab is an independent AS (autonomous system) and connected to multiple real networks. On the other hand, DRAGON-Lab integrates many resources of its own, partners' and internet's, so as to provide open service. DRAGON-Lab has a large scale, provides open service, supports remote visualized experiments and programmable experiments. More details will be introduced in this paper.  相似文献   

7.
The investigation of the multimode beamforming network (BFN) has been developed from its scattering matrix (S-matrix) analysis. A substrate integrated waveguide (SIW) BFN is designed and fabricated on a single Rogers 5880 substrate. This device is not only marked by features of conventional BFN, such as Butler matrix, but also has additional benefits, e.g. more compact configuration and higher radiation efficiency. Measured and simulated results based on the proposed structure are in a good agreement, which indicates that this novel type of BFN has good characteristics and presents an excellent candidate in the development of intelligent microwave and millimeter-wave multibeam antenna systems. Supported by the National Natural Science Foundation of China (Grant No. 60621002), the National High-Tech Research & Development Program of China (Grant No. 2007AA01Z2B4), and the Scientific Research Foundation of Graduate School of Southeast University  相似文献   

8.
A survey on virtual reality   总被引:2,自引:0,他引:2  
Virtual reality (VR) is a scientific method and technology created during the exploration of the nature by human beings to understand, simulate, and better adapt and use the nature. Based on the analysis on the whole process of VR, this paper presents different categories of VR problems and a type of theoretical expression, and abstracts three kinds of scientific and technical problems in VR field. On the basis of foresaid content, this paper also studies current major research objectives, research results and development trend of VR in the aspects of VR modeling method, VR representation technology, human-machine interaction and devices, VR development suites and supporting infrastructure, as well as VR applications. Finally, several theoretical and technical problems that need to be further studied and solved are addressed. Supported by the National Basic Research Program of China (Grant No. 2009CB320805), the National Natural Science Foundation of China (Grant Nos. 60533070, 60503066), and the National High-Tech Research & Development Program of China (Grant Nos. 2006AA01Z333, 2006AA01Z311)  相似文献   

9.
Virtual human is a digital representation of the geometric and behavioral property of human beings in the virtual environment generated by computer. The research goal of virtual human synthesis is to generate realistic human bodymodels and natural human motion behavior. This paper introduces the development of the related researches on these two topics, and some progresses on example based human modeling and motion synthesis, and their applications in Chinese sign language teaching, computeraided sports training and public safety problem studying. Finally, some hot research topics in virtual human synthesis are presented. Supported partially by the National High-Tech Research & Development Program of China (Grant Nos. 2006AA01Z336, 2007AA01Z320), and the National Natural Science Foundation of China (Grant No. 60533070)  相似文献   

10.
Sensor data, typically images and laser data, are essential to modeling real plants. However, due to the complex geometry of the plants, the measurement data are generally limited, thereby bringing great difficulties in classifying and constructing plant organs, comprising leaves and branches. The paper presents an approach to modeling plants with the sensor data by detecting reliable sharp features, i.e. the leaf apexes of the plants with leaves and the branch tips of the plants without leaves, on volumes recovered from the raw data. The extracted features provide good estimations of correct positions of the organs. Thereafter, the leaves are reconstructed separately by simply fitting and optimizing a generic leaf model. One advantage of the method is that it involves limited manual intervention. For plants without leaves, we develop an efficient strategy for decomposition-based skeletonization by using the tip features to reconstruct the 3D models from noisy laser data. Experiments show that the sharp feature detection algorithm is effective, and the proposed plant modeling approach is competent in constructing realistic models with sensor data. Supported in part by the National Basic Research Program of China (Grant No. 2004CB318000), the National High-Tech Research & Development Program of China (Grant Nos. 2006AA01Z301, 2006AA01Z302, 2007AA01Z336), Key Grant Project of Chinese Ministry of Education (Grant No. 103001)  相似文献   

11.
随着网络规模的迅速增长和IPv6协议的发展,互联网网络管理工具变得越来越重要。该文设计了IPv4/IPv6兼容的简单网络管理协议底层通信机制和一种基于简单网络管理协议的拓扑发现方法,实现了下一代互联网网络管理系统。该系统由拓扑发现、网络性能分析以及故障管理3大功能模块组成,目前已成功应用在实际的网络环境中。  相似文献   

12.
A new patch-based texture synthesis method is presented in this paper. By the method, a set of patches that can be matched with a sampled patch for growing textures effectively, called the matching compatibility between patches, is generated first for each patch, and the set is further optimized by culling the patches that may cause synthesis conflicts. In this way, similarity measurement calculation for selecting suitable patches in texture synthesis can be greatly saved, and synthesis conflicts between neighbouring patches are substantially reduced. Furthermore, retrace computation is integrated in the synthesis process to improve the texture quality. As a result, the new method can produce high quality textures as texture optimization, the best method to date for producing good textures, and run in a time complexity linear to the size of the output texture. Experimental results show that the new method can interactively generate a large texture in 1024 × 1024 pixels, which is very difficult to achieve by existing methods. Supported by the National Basic Research Program of China (Grant No. 2009CB320802), the National Natural Science Foundation of China (Grant Nos. 60773026, 60833007), the National High-Tech Research & Development Program of China (Grant Nos. 2006AA01Z306, 2008AA01Z301), and the Research Grant of University of Macau  相似文献   

13.
QoS supported MAC mechanism is a key issue for supporting QoS in wireless ad hoc networks. A new backoff algorithm, named RWBO+BEB, was proposed previ- ously to decrease the packet collision probability significantly. In this paper, it is explored how to make RWBO+BEB support service differentiation in wireless ad hoc networks, and a novel proportional service differentiation algorithm, named p-RWBO, is proposed to allocate the wireless bandwidth according to the band- width ratio of each station. In p-RWBO, station n's walking probability (Pw,n) is selected according to its allocated bandwidth ratio. An analytical model is proposed to analyze how to choose Pw, n according to the bandwidth ratios of station n. The simulation results indicate that p-RWBO can differentiate services in terms of both bandwidth and delay.  相似文献   

14.
We present a demand-driven approach to memory leak detection algorithm based on flow- and context-sensitive pointer analysis. The detection algorithm firstly assumes the presence of a memory leak at some program point and then runs a backward analysis to see if this assumption can be disproved. Our algorithm computes the memory abstraction of programs based on points-to graph resulting from flow- and context-sensitive pointer analysis. We have implemented the algorithm in the SUIF2 compiler infrastructure and used the implementation to analyze a set of C benchmark programs. The experimental results show that the approach has better precision with satisfied scalability as expected. This work is supported by the National Natural Science Foundation of China under Grant Nos. 60725206, 60673118, and 90612009, the National High-Tech Research and Development 863 Program of China under Grant No. 2006AA01Z429, the National Basic Research 973 Program of China under Grant No. 2005CB321802, the Program for New Century Excellent Talents in University under Grant No. NCET-04-0996, and the Hunan Natural Science Foundation under Grant No. 07JJ1011.  相似文献   

15.
In service oriented architecture (SOA), service composition is a promising way to create new services. However, some technical challenges are hindering the application of service composition. One of the greatest challenges for composite service provider is to select a set of services to instantiate composite service with end- to-end quality of service (QoS) assurance across different autonomous networks and business regions. This paper presents an iterative service selection algorithm for quality driven service composition. The algorithm runs on a peer-to-peer (P2P) service execution environment--distributed intelligent service execution (DISE), which provides scalable QoS registry, dynamic service selection and service execution services. The most significant feature of our iterative service selection algorithm is that it can work on a centralized QoS registry as well as cross decentralized ones. Network status is an optional factor in our QoS model and selection algorithm. The algorithm iteratively selects services following service execution order, so it can be applied either before service execution or at service run-time without any modification. We test our algorithm with a series of experiments on DISE. Experimental results illustrated its excellent selection and outstanding performance.  相似文献   

16.
Emerging with open environments, the software paradigms, such as open resource coalition and Internetware, present several novel characteristics including user-centric, non-central control, and continual evolution. The goal of obtaining high confidence on such systems is more di?cult to achieve. The general developer-oriented metrics and testing-based methods which are adopted in the traditional measurement for high confidence software seem to be infeasible in the new situation. Firstly, the software develo...  相似文献   

17.
We consider the problem of efficiently computing distributed geographical k-NN queries in an unstructured peer-to-peer (P2P) system, in which each peer is managed by an individual organization and can only communicate with its logical neighboring peers. Such queries are based on local filter query statistics, and require as less communication cost as possible which makes it more difficult than the existing distributed k-NN queries. Especially, we hope to reduce candidate peers and degrade communication cost. In this paper, we propose an efficient pruning technique to minimize the number of candidate peers to be processed to answer the k-NN queries. Our approach is especially suitable for continuous k-NN queries when updating peers, including changing ranges of peers, dynamically leaving or joining peers, and updating data in a peer. In addition, simulation results show that the proposed approach outperforms the existing Minimum Bounding Rectangle (MBR)-based query approaches, especially for continuous queries.  相似文献   

18.
Boolean Operations on Conic Polygons   总被引:1,自引:0,他引:1       下载免费PDF全文
An algorithm for Boolean operations on conic polygons is proposed.Conic polygons are polygons consisting of conic segments or bounded conics with directions.Preliminaries of Boolean operations on general polygons are presented.In our algorithm,the intersection points and the topological relationships between two conic polygons are computed.Boundaries are obtained by tracking path and selecting uncrossed boundaries following rule tables to build resulting conic polygons. We define a set of rules for the i...  相似文献   

19.
包丛笑  李星 《计算机应用》2005,25(4):874-877
研究了美国下一代互联网协同应用环境Internet2Commons框架中的大规模分布式视频 会议应用服务的体系结构和关键技术,介绍了Internet2基于H.323协议的视频会议系统及正在其上 开展的各种应用,分析和总结了下一代互联网大规模视频协同环境的特点及向新一代IPv6网络迁移 的策略。  相似文献   

20.
In this paper, we give an up-to-date survey on physically-based fluid animation research. As one of the most popular approaches to simulate realistic fluid effects, physically-based fluid animation has spurred a large number of new results in recent years. We classify and discuss the existing methods within three categories: Lagrangian method, Eulerian method and Lattice-Boltzmann method. We then introduce techniques for seven different kinds of special fluid effects. Finally we review the latest hot research areas and point out some future research trends, including surface tracking, fluid control, hybrid method, model reduction, etc. Supported partially by the National Basic Research Program of China (Grant No. 2009CB320804), and the National High-Tech Research & Development Program of China (Grant No. 2006AA01Z307)  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号