The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most multicast routing protocols construct reverse shortest path trees (SPTs) to deliver shared data. However, the use of the reverse SPT presents a challenge in the inter-domain routing environment, as the path from the source to a receiver could be asymmetric to the one used to go from the receiver to the source. A possible approach is to utilize the round-trip joining message but it incurs the...
Disruption Tolerant Networks (DTNs) are characterized by frequent network partitioning. This causes network connectivity to be opportunistic. In recent years, many collaborative applications have been envisioned for DTNs. These applications rely on the availability of reliable group communication protocols. To address this challenge in DTNs, we propose a scalable multicasting scheme that deterministically...
Application-Layer Multicast (ALM) is considered a viable solution for compensating the lack of global IP Multicast deployment. While early ALM approaches consider only stationary end-systems, their use becomes more and more feasible on smaller devices like laptops and mobiles. Many ALM protocols have been proposed that employ multi-metric optimization strategies to consider e.g. delays, fanout-degrees,...
As the increasing of mobile Ad Hoc network applications, and the demand of group-oriented computer and communication, multicast routing technology has become the focus of the study. As the increasing of ...the scalability of the multicsat routing protocol becomes an important issue. In this paper, based on MAODV, an improvement protocol with policy-based clustering multicast routing is put forward...
Mobile IPv6 (MIPv6) and its basic extension for network mobility NEMO were initially designed to manage the mobility of device users and networks respectively while maintaining a permanent IP address. Nevertheless, the different MIPv6's experiments have shown many lacks in case of high mobility of nodes such as in vehicular networks. To overcome these lacks, many solutions have been proposed by the...
Wireless Mesh Networks are a wireless multi-hop networks in which the nodes are characterized by theirs stability. In this sort of network the minimum cost tree connects sources and receivers by implying a minimum number of forwarding nodes. This paper introduces an adaptation to the popular multicast protocol ODMRP (On-Demand Multicast Routing Protocol) named OODMRP (Optimized On-Demand Multicast...
In this paper we extend the analysis of by comparing delay in protocols using retransmission and packet encoding for bidirectional unicast communication over a satellite channel, where the signal propagation delay is significant. We derive results on the total sender-receiver delay based on analysis and computer simulation for a Bernoulli packet arrival distribution.
In wireless sensor networks with mobile sinks, it is a challenge to design reasonable data dissemination protocols to realize reliable, real-time and efficient data transmission from multiple sources to multiple sinks. Recently, many protocols such as TTDD, GHT and LBDD are proposed to solve this problem. However, most of them depend on the whole network topology information to optimize the data dissemination...
Quality of Service (QoS) is an important, and admittedly overloaded, concept for emerging services based on the Real-Time Transport Protocol (RTP) to deliver multimedia content. In the context of the Internet Protocol Television (IPTV) services, the synchronization of multimedia components plays an important role. In order to synchronize audio and video components of multimedia content, RTP timestamps...
We extend and relax the concept of tree-farm previously implicitly introduced for the design of the multicast protocol SplitStream. Our extension enables the tree-farm concept to be applied to non vertex-symmetric overlay networks. In particular, we demonstrate that, in the case of the de Bruijn overlay network used in P2P systems such as Koorde and D2B, our relaxed notion of tree-farm achieves higher...
There have been proposed many geographic multicasting protocols for wireless ad hoc sensor networks. Most of these protocols tend to exploit a Source-initiated Geographic Multicasting (SGM) approach which consists of three phases: first, a source collects the position information of all destination nodes; second, the source constructs a multicast tree through the position information; third, the source...
Previous gossip-based protocols developed for sensor networks or various kinds of P2P networks assume that all processes in a system are interested in all events occurring while communicating among them. Though all query nodes in a large group are running the same application, they might join various multicast groups depending on their interests. However, despite the significant importance of message...
Quality of Service (QoS) is still one of the major challenges for emerging services based on the Real-Time Transport Protocol (RTP) to deliver multimedia content. In the context of the Internet Protocol Television (IPTV) services, the synchronization of multimedia components plays an important role. In order to synchronize audio and video components of multimedia content, RTP timestamps have to be...
Application Layer Multicast (ALM) is considered as an alternative approach to IP multicast. Topology awareness is an important metric for ALM because it reduces link stress and delay stretch considerably. This work describes a novel, stable and low overhead ALM approach using binning technique to cluster nearby receivers, referred to as Bincast. Bincast uses a constant number of landmarks to cluster...
Mobile multicast becomes a research hotspot with the development of wireless and mobile technologies, and it is based on the traditional multicast protocols and mobility management protocols to provide the multicast services for mobile subscribers. Several mobile multicast methods were proposed in the past few years, but most of them are based on the mobile IPv6 and its alternatives which require...
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet...
Secure multicast over wireless networks is an important and challenging goal because of widespread deployment of wireless networks and the need of multicast. In this paper, we propose a new method to generate and distribute keys for multicast security function. In existing key management protocols, after join or leave a node, key regeneration and distribution is needed to provide multicast security...
The study of the multicast routing protocol of multi-constrained is important for the development of the high performance network. The aims are the multi-constrained network model and the definition of the formula of every constrained characteristic measurement. However, it is a NP-complete problem. In order to gain the approximative solution, many heuristic algorithms have been designed by filling...
Ethernet networks are evolving from the enterprise to the carrier thus facing new demands and requirements. Therefore, a set of new control approaches are being defined for Ethernet. Amongst these, IEEE 802.1aq Shortest Path Bridging (SPB) aims to assure the transmission of unicast and multicast frames on the shortest path in a bridged network. Three protocols have been proposed for the control of...
The fault detection mechanism of existing topology-aware ALM protocol is very simple which greatly weakens its performance. So it needs a more efficient mechanism to ensure the robustness and QoS of ALM. We propose a novel fault detection mechanism named REW (reverse-inhibition early warning) which can send warning message before the buffer data are consumed away to avoid the termination of service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.