Font Size: a A A

Research On High Efficient Transmission Mobile Network Based On FLUTE Protocol

Posted on:2013-06-29Degree:DoctorType:Dissertation
Country:ChinaCandidate:J HeFull Text:PDF
GTID:1228330395459632Subject:System architecture
Abstract/Summary:PDF Full Text Request
With development of mobile network and the technology of multimedia, thenumber of users who use the network is growing rapidly; the requirement of networkQoS (Quality of Service) is also increased. However, mobile network’s transmissionability is limited by the band width, coverage area, file transmission method, othernetwork resources and the large number of users, thus, the transmission qualitiesincluding the real-time transmission and integrated transmission were seriouslyinfluenced. So, it has important significance both from the aspect of theoretical andpractical values to research the high efficient transmission method of multimedia files.Focusing on the issue mentioned above, this paper, firstly analyzed the existedmobile network broadcasting protocol—ALC, research results show that ALC protocolis a binary transmission protocol which is better efficient to transmit binary files, butwith less considerable efficiency when transmits multimedia files and ASCII texts.Furthermore, when transmitting file by ALC protocol, the file and its attribute will betransmitted separately which result in a time-consuming file fusion process at thereceiving end; Secondly, this paper analyzed the shortage of intrusion detection system(IDS) which is used by some operators in beijing, and improved the system accordingto the characters of multimedia and the requirement of the IDS of. Finally, this paperdiscussed the generation method of virtual multimedia file from the aspect of serviceprovider of mobile network.In order to solve the issues above, the main contributions of this paper are asfollows:(1) According to the issues of ALC, the deduced protocol, FLUTE protocol isproposed in this paper, and the series instrument is defined, either. They are FDT (FileDelivery Table), FEC coding method which is used to guarantee the safety of the filetransmission, the congestion control of the network. FDT provided the mapping of fileand its attributes, thus the file and its attributes can be transmitted together comparedwith ALC. Thus the rearrangement of the packets becomes easy for the receivers, and low-delay requirements can be met at the same time; the FEC is a safety controlstrategy which is used to code the file to be transmitted, thus the correct context can beguaranteed; and the congestion control is used to guarantee the connectivity of thenetwork.(2) A FLUTE protocol state machine has been designed according to the functionsof FLUTE protocol and the interactionsamong the various functions. The FLUTEprotocol has nine different states, they are:"idle" indicates that the system is waitingfor an interruption,"wait_SD" indicates that the system is waiting for the sessiondescription information,"Wait_recvData" indicates that the system is waiting for thepackets,"Wait_recvObj" indicates that the system is waiting to receive objects,"Wait_Auth" indicates that the system is waiting for the authorization,"Wait_CENCdecode" indicates that the system is waiting for the re-encoded files,"FDT_analysis" indicates the state of the FDT analysis machine,"Wait_AppReply"indicates that the system is waiting for the state that the application returned,"Obj_recvSuccess" indicates that the object is successfully received. According to thedemands of these states, this paper designed five modules, these are: PR (packetreceiver module), PA (packet Analysis module), FC (package coding modules), DA(data authentication module), CD (content decoding module) and UM (upper interfacemodule). In order to achieve communication among these modules, this paper designedsome communication interfaces, these interfaces are divided into two types: a kind ofvertical-type interfaces and kind of horizontal-type interfaces. respectively, wherein thenaming rule of vertical-type interfaces is "A2B" form, wherein A, B are the modulenames, the horizontal-type interfaces command the rule "A2CM" or "CM2A" form,wherein, CM control management module, A represents the name of the module, cancommunicate with each other through the interface and transmission of informationamong the various modules; additionally, the system may also generate errorclassifications, to enhance the robust requirements of the system.(3) Thirdly, the main contribution of this paper is the design of the FLUTE clientside, including the state machine design, module design, interfaces of the modulesdesign and the error handing of it. Thus the FLUTE client side is achieved under theplatform of Liunx and manuals for users are also be provided, Simultaneously, the testhas also been done to test the feasibility of FLUTE client side, the test result manifeststhat the four main functions of multi-media file transmission are achieved, they are:1) Receiving the specific file under the “file list” pattern;2) Receiving files from theserver under the “auto” pattern;3) Receiving FEC coded file from the server underthe “auto” pattern;4) Receiving files from the server under the pattern of“fdt-based”.(4) Another contribution of this paper is the proposal of CC-FLUTE protocol,which is an improvement of FLUTE. The main differences are the firm andnon-break-up channel compared with FLUTE, it means that if the channel isestablished, it can’t be broken up unless the circuit is modified or the organization ischanged. The survey for CC-FLUTEprotocol shows that the characteristic isappropriate for the requirement of the intrusiondetection&alarm system, therefore, thispaper makes the requirement of the system, the overall design and the detailed designof the system according to the maintenance requirements of the mobile network. Theuse of it shows that CC-FLUTE protocol is efficient and the alarm function can meetthe requirement of the current management style.(5) A new multimedia file generation method is proposed in the aspect of ServiceProvider, how to render the scene of the reality is another big issue of mobile networkbecause of most of the multimedia files are rendered by the computer but not thephotos of the reality such as3D animation, network games and etc., this paperproposed a new graphic rendering method based on GPU and its CUDA programmingarchitecture, which is a more efficient multimedia file rendering method. The results ofthe experiments show that the complexity scene can be rendered much faster and betterunder the GPU compared with the one rendered by CPU at the same number of thegrid and iteration time.In summary, this paper discussed the multimedia file transmission from threeaspects, including the aspect of mobile network transmission, the aspect of applicationof mobile network itself, and the aspect of the service provider of the mobile network,it also discussed the high efficient transmission of the multimedia file, the best use ofthe bandwidth of the network channel and the high efficient rendering of themultimedia files. The processes of discussion and feedbacks of the applicationmanifest that FLUTE and CC-FLUTE protocol proposed and improved in this papercan be used to transmit multimedia files efficiently; and the intrusion detection&alarm system can enhance the humanized degree, the security quality of transport and decrease the delay of the alarm simultaneously; and the high efficient file renderingmethod which is based on GPU and CUDA could provide a fundamental support ofcustomer experiences. The research of this paper has great significance of themanufacture chain of the whole mobile network.
Keywords/Search Tags:FLUTE protocol, FLUTE client, FDT mechanism, CC-FLUTE protocol, Intrusiondetection&alarm system, High efficient multimedia file rendering, ray tracingalgorithm, GPU parallel processing
PDF Full Text Request
Related items