###
DOI:
计算机系统应用英文版:2012,21(6):111-114
本文二维码信息
码上扫一扫!
统一消息接口模型及其改进
(1.北京邮电大学 网络与交换技术国家重点实验室,北京 100876;2.东信北邮信息技术有限公司,北京 100191)
Unified Messaging Interface Model and Its Improvement
(1.State Key Lab of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Bejing 100876, China;2.EBUPT Information Technology Co., Ltd, Beijing 100191, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 2010次   下载 3111
Received:September 30, 2011    Revised:November 22, 2011
中文摘要: 本文首先介绍了一种在移动增值业务开发中被广泛应用的统一消息接口模型,简要描述了该模型的整体结构和基本功能,以及它在增值业务开发中所处的位置。在介绍模型时,为便于讨论,本文将该模型逻辑上划分为了4 层结构,并用逻辑结构图做出说明,随后在总体上阐述了模型的工作机制和消息的处理流程。在此基础上,本文对模型在结构和功能上不合理或不完善之处进行了探讨,随后重点讨论了本文的改进方案,包括消息缓冲区结构的改造(重组缓冲区)、重发策略的修改、流量控制策略的完善(增加滑动窗口功能等)、缓冲区警戒及告警(增加溢出警戒、告警功
Abstract:This paper describes UMI(Unified Messaging Interface), which is a kind of messaging models and has been widely used in development of mobile value-added service. Then we give a brief description of this model about the overall structure and basic functions, following by an introduction of this model's location in the mobile value-added service development. In order to facilitate discussion, this model is logically divided into four function layers illustrated by the logical structure graph. Then, this paper generally describes the working mechanism and messaging process. On this basis, this paper analyzes the unreasonable structure and inadequate functions of this messaging model. Then we focus on the improvement programs, including the transformation of message buffer (re-organization of buffer), improvement of flow control strategy (such as sliding windows), buffer security reinforcement (overflow alert, alarm, flexible alarm strategy). Finally, we elaborate the significance of this improvement.
文章编号:     中图分类号:    文献标志码:
基金项目:国家自然科学基金(61072057,60902051);国家973 计划项目(2012CB315802);中央高校基本科研业务费专项资金(BUPT2009RC0505);国家科技重大专项(2011ZX03002-001-01,移动互联网总体架构研究)
引用文本:
李振宇,李炜,王晶.统一消息接口模型及其改进.计算机系统应用,2012,21(6):111-114
LI Zhen-Yu,LI Wei,WANG Jing.Unified Messaging Interface Model and Its Improvement.COMPUTER SYSTEMS APPLICATIONS,2012,21(6):111-114