Multicasting in Multihop Optical WDM Networks with Limited Wavelength Conversion(Special Invited Survey)
スポンサーリンク
概要
- 論文の詳細を見る
This paper provides an overview on efficient algorithms for multicasting in optical networks supported by Wavelength Division Multiplexing (WDM) with limited wavelength conversion. We classify the multicast problems according to offline and on-line in both reliable and unreliable networks. In each problem class, we present efficient algorithms for multicast and multiple multicast and show their performance. We also present efficient schemes for dynamic multicast group membership updating. We conclude the paper by showing possible extension of the presented algorithms for QoS provision.
- 社団法人電子情報通信学会の論文
- 2003-01-01
著者
-
Pan Yi
Department Of Computer Science Georgia State University
-
Shen Hong
Graduate School And Information Science Japan Advanced Institute Of Science And Technology
-
Horiguchi Susumu
Graduate School Of Information Science Jaist
-
Shen Hong
Graduate School Of Computer Science Japan Advanced Institute Of Science And Technology
-
SUM John
Department of Computing, Hong Kong Polytechnic University
-
Sum John
Department Of Computing Hong Kong Polytechnic University
-
Horiguchi Susumu
Graduate School Of Computer Science Japan Advanced Institute Of Science And Technology
関連論文
- A Nonblocking Optical Switching Network for Crosstalk-Free Permutation
- Crosstalk-Free Permutation in Photonic Rearrangeable Networks Built on a Combination of Horizontal Expansion and Vertical Stacking of Banyan Networks(Special Issue on Parallel and Distributed Computing, Applications and technologies)
- A Lightpath Restoration Method Using Multi-Backup Paths in WDM Networks
- Dynamic RWA Based on the Combination of Mobile Agents Technique and Genetic Algorithms in WDM Networks with Sparse Wavelength Conversion(Software Agent and Its Applications)
- MOBLE ROBOT LOCALIZATION USIGNG OMINI-DIRECTIONAL VIEW
- TTN : A High Performance Hierarchical Interconnection Network for Massively Parallel Computers
- High-Performance Training of Conditional Random Fields for Large-Scale Applications of Labeling Sequence Data
- Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing
- Robust Node Positioning in Wireless Sensor Networks
- Self-Routing Nonblocking WDM Switches Based on Arrayed Waveguide Grating
- Routing Algorithms for Packet/Circuit Switching in Optical Multi-log_2N Networks
- Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks
- Fair Scheduling for Delay-Sensitive VoIP Traffic
- Efficient Network Coding-Based Loss Recovery for Reliable Multicast in Wireless Networks
- A More Efficient COPE Architecture for Network Coding in Multihop Wireless Networks
- Breakage prediction-based route maintenance in ad hoc networks (インターネットアーキテクチャ)
- Modified Hierarchical 3D-Torus Network
- Dynamic Communication Performance of a Hierarchical Torus Network under Non-uniform Traffic Patterns(Computer Systems)
- New Bounds on the Feedforward Design of Optical Output Buffer Multiplexers and Switches
- Maintaining Packet Order in Reservation-Based Shared-Memory Optical Packet Switch
- Redundant Vias Insertion for Performance Enhancement in 3D ICs
- Efficient routing algorithms for feedforward output buffer queue switch (ネットワークシステム)
- Variant X-Tree Clock Distribution Network and Its Performance Evaluations(Low-Power and High-Performance VLSI Circuit Technology,VLSI Technology toward Frontiers of New Market)
- 無線アドホックネットワークにおける蟻の食性を利用したルーティング法(ユビキタス)
- Parallel Molecular Dynamics in a Parallelizing SML Compiler(Special Issue on Parallel and Distributed Computing, Applications and technologies)
- HTN : A New Hierarchical Interconnection Network for Massively Parallel Computers(Special Issue on Parallel and Distributed Computing, Applications and technologies)
- A Class of Benes-Based Optical Multistage Interconnection Networks for Crosstalk-Free Realization of Permutations(Fiber-Optic Transmission for Communications)
- 前立腺癌の遺伝子診断 : FISH法を用いたヒト染色体欠失解析の臨床的意義
- 前立腺癌における染色体8番短腕(8p22)欠失の臨床的意義
- Optimal Methods for Proxy Placement in Coordinated En-Route Web Caching(Internet Technology V)
- Optimal Proxy Placement for Coordinated En-Route Transcoding Proxy Caching(Internet Systems)(New Thechnologies and their Applications of the Internet)
- The Bases Associated with Trellises of a Lattice(Coding Theory)
- A more accurate skew model for well-balanced H-tree clock distribution network (プロセス・デバイス・回路シミュレーション(統計モデリングも含む))
- A more accurate skew model for well-balanced H-tree clock distribution network (プロセス・デバイス・回路シミュレーション(統計モデリングも含む))
- Behavior of Active Lightpath Restoration in All-Optical WDM Networks
- An Upper Bound on Blocking Probability for Vertical Stacked Optical Banyan Networks with Extra Stage
- Performance Measurement of the Multi-backup paths Restoration Scheme under Capacity Constraint
- Optimization Techniques for Parallel Codes of Irregular Scientific Computations(Code Generation and Optimization)
- On the Multiple Bridge Fault Diagnosis of Baseline Multistage Interconnection Networks (Special Issue on Architectures, Algorithms and Networks for Massively parallel Computing)
- A Probabilistic Sentence Reduction Using Maximum Entropy Model(Natural Language Processing)
- The Characteristic Generators for a Group Code(Coding Theory)
- Multicasting in Multihop Optical WDM Networks with Limited Wavelength Conversion(Special Invited Survey)
- Investigation of the Recurrence Patterns of Gastric Cancer Following a Curative Resection
- Predictive Value of the First Ictal Recording in Determining Localization of the Epileptogenic Region by Scalp/Sphenoidal EEG
- Load Balancing Based on Load Coherence between Continuous Images for an Object-Space Parallel Ray-Tracing System
- Optimal parallel weighted multiselection
- Efficient weighted multiselection in parallel architectures
- Trellis Properties of Product Codes(Coding Theory)
- Some Trellis Properties on Lattices(Coding Theory)
- Special Issue on Parallel and Distributed Computing, Applications and Technologies
- Constructing a Multilayered Boundary to Defend against Intrusive Anomalies(Application Information Security)