62 results on '"Xcast"'
Search Results
2. D-MENTOR Algorithm for OSPF Protocol under Delay Constrain Supporting Unicast and Multicast Traffic
- Author
-
Annop Monsakul
- Subjects
Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,business.industry ,computer.internet_protocol ,Computer science ,Distributed computing ,Open Shortest Path First ,Distance Vector Multicast Routing Protocol ,020302 automobile design & engineering ,02 engineering and technology ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,IP multicast ,020201 artificial intelligence & image processing ,Xcast ,Electrical and Electronic Engineering ,Unicast ,business ,computer ,Software ,Pragmatic General Multicast ,Computer network - Published
- 2016
3. Subcarrier Assignment and Power Allocation for Preference-Aware Multicast Services in Active Array Aided LTE Networks
- Author
-
Qinghai Yang, Mingli Chu, and Kyung Sup Kwak
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Multimedia Broadcast Multicast Service ,Subcarrier ,Source-specific multicast ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Resource allocation ,Xcast ,Active antenna ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Published
- 2016
4. Towards High-Performance Load-Balance Multicast Switch via Erasure Codes
- Author
-
Fuxing Chen, Li Ma, Dongcheng Wu, Dagang Li, and Weiyang Liu
- Subjects
Source-specific multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,Fountain code ,Xcast ,Electrical and Electronic Engineering ,business ,Erasure code ,Software ,Online codes ,Computer network - Published
- 2015
5. Distance-Based Fair Resource Allocation Algorithm for Device-to-Device Multicast Communication in SFN System
- Author
-
Zijia Huang, Wenrong Gong, Xiaoxiang Wang, and Mingming Li
- Subjects
Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,Device to device ,Multicast communication ,Source-specific multicast ,Resource allocation ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Computer network ,Distance based - Published
- 2015
6. Optimization of Multicast Delivery for Threshold Secret Shared Content
- Author
-
Nagao Ogino, Shigehiro Ano, and Yuto Nakamura
- Subjects
Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Source-specific multicast ,Linear network coding ,Content (measure theory) ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Pragmatic General Multicast ,Computer network - Published
- 2015
7. Multicast Transmission Access Control Methods for Various Wireless LAN Applications
- Author
-
Takefumi Hiraguri, Kentaro Nishimori, Hideaki Yoshino, Kenya Jin'no, and Toshiyuki Ogawa
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,computer.internet_protocol ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Source-specific multicast ,Reliable multicast ,Multicast address ,IP multicast ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Computer network - Published
- 2014
8. Device-Aware Visual Quality Adaptation for Wireless N-Screen Multicast Systems
- Author
-
Jincheol Park, Inwoong Lee, Taegeun Oh, Seonghyun Kim, and Sanghoon Lee
- Subjects
Multimedia ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,computer.internet_protocol ,computer.software_genre ,Source-specific multicast ,Reliable multicast ,Multicast address ,IP multicast ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Pragmatic General Multicast ,Computer network - Published
- 2013
9. Scalability Analysis of Source Routing Multicast for Huge Numbers of Groups
- Author
-
Takeru Inoue, Katayama Yohei, Noriyuki Takahashi, and Ryutaro Kawamura
- Subjects
Dynamic Source Routing ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Source-specific multicast ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Pragmatic General Multicast ,Computer network - Published
- 2013
10. A Resilient Forest-Based Application Level Multicast for Real-Time Streaming
- Author
-
Tatsuya Mori, Koso Murakami, Kazuya Takahashi, Hideki Tode, and Yusuke Hirota
- Subjects
Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,Computer science ,computer.internet_protocol ,business.industry ,Source-specific multicast ,Reliable multicast ,IP multicast ,Isolation (database systems) ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Pragmatic General Multicast ,Computer network - Published
- 2013
11. Effect of Limiting Pre-Distribution and Clustering Users on Multicast Pre-Distribution VoD
- Author
-
Ryoichi Kawahara, Haruhisa Hasegawa, Noriaki Kamiyama, and Tatsuya Mori
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,Distance Vector Multicast Routing Protocol ,Limiting ,Pre distribution ,Source-specific multicast ,Xcast ,Electrical and Electronic Engineering ,business ,Cluster analysis ,Software ,Computer network - Published
- 2013
12. Fanout Set Partition Scheme for QoS-Guaranteed Multicast Transmission
- Author
-
SeokHwan Kong, Kyungmin Kim, and Jaiyong Lee
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Source-specific multicast ,Reliable multicast ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Pragmatic General Multicast ,Computer network - Published
- 2013
13. Peer-to-Peer Content Multicast Using Off-Peak Periods in Wireless Access Links
- Author
-
Shigehiro Ano and Nagao Ogino
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,Peer-to-peer ,computer.software_genre ,Source-specific multicast ,Wireless ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Computer network - Published
- 2013
14. A Loss-Recovery Scheme for Mixed Unicast and Multicast Traffic Using Network Coding
- Author
-
Liang Zhou, Shengqiang Li, and Zhiheng Zhou
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,Source-specific multicast ,Linear network coding ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,Unicast ,business ,Software ,Pragmatic General Multicast ,Computer network - Published
- 2013
15. Local Location Search Based Progressive Geographic Multicast Protocol in Wireless Sensor Networks
- Author
-
Soochang Park, Jeongcheol Lee, Sang-Ha Kim, and Euisin Lee
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Inter-domain ,Computer science ,computer.internet_protocol ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Distance Vector Multicast Routing Protocol ,Geographic routing ,Source-specific multicast ,Reliable multicast ,Multicast address ,IP multicast ,Xcast ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,computer ,Software ,Pragmatic General Multicast ,Computer network - Abstract
To provide scalability against group size, Global Location Search based Hierarchical Geographic Multicast Protocols (GLS-HGMPs) have recently been proposed for wireless sensor networks. To reduce the communication overhead imposed by the global location search and prevent the multicast data detour imposed by the hierarchical geographic multicasting in GLS-HGMPs, this letter proposes Local Location Search based Progressive Geographic Multicast Protocol (LLS-PGMP). Simulation results show that LLS-PGMP is superior to GLS-HGMPs.
- Published
- 2012
16. A Minigroup Multicast with Deflected Routing in Multi-Channel Wireless Multimedia Sensor Networks
- Author
-
Kyungran Kang, Nowon Kim, and Young-Jong Cho
- Subjects
Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,Computer science ,Inter-domain ,business.industry ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Multimedia Broadcast Multicast Service ,Key distribution in wireless sensor networks ,Source-specific multicast ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Published
- 2012
17. Acknowledgment Mechanisms for Network-Coding-Based Reliable Wireless Multicast
- Author
-
Kaikai Chi, Xiaohong Jiang, Yi-Hua Zhu, and Yanjun Li
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,computer.internet_protocol ,Distributed computing ,Source-specific multicast ,Reliable multicast ,Multicast address ,IP multicast ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Pragmatic General Multicast ,Computer network - Published
- 2012
18. Multicast Design Method Using Multiple Shared-Trees in Optical WDM Networks
- Author
-
Yusuke Hirota, Hiroaki Honda, Koso Murakami, and Hideki Tode
- Subjects
Computer Networks and Communications ,Computer science ,computer.internet_protocol ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Data_CODINGANDINFORMATIONTHEORY ,Multimedia Broadcast Multicast Service ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,Pragmatic General Multicast ,Multicast transmission ,Protocol Independent Multicast ,Multicast ,Inter-domain ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Source-specific multicast ,Internet Group Management Protocol ,Reliable multicast ,IP multicast ,Unicast ,business ,computer ,Software ,Computer network - Abstract
In next-generation networks, ultra-high speed transfer capability will become necessary to support a variety of advanced multimedia services. The Optical Wavelength Division Multiplexing (WDM) network is seen as one of promising networks. To deal with various multimedia services, the network should support not only unicast transmission but also multicast transmission. However, IP multicast has several problems, for example, all routers must have multicast functions. IP multicast needs routers with high overheads and excessive energy consumption. Hence, optical multicasting in optical WDM networks is a promising solution for future internet services. A tree-shared multicasting concept has been proposed to support multicast transmissions in optical WDM networks. This method assembles multiple multicast traffic streams into one burst and the burst is delivered using a shared-tree. However, this method can not be applied to dynamic multicasting. This paper proposes a novel WDM multicast design method for dynamic traffic demand using multiple shared-trees, which includes shared-tree generation/selection and wavelength assignment, for the purpose of simplifying the routing process and receiving multicast traffic efficiently. We evaluate its performance from the viewpoints of the burst loss probability and the number of redundant and useless transfers whose data is discarded at the egress edge nodes.
- Published
- 2012
19. Resource Allocation for Scalable Video Multicast over OFDMA Systems
- Author
-
Yuping Zhao and Zan Yang
- Subjects
Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,Source-specific multicast ,Video multicast ,Scalability ,Resource allocation ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Published
- 2012
20. On Approximating a Multicast Routing Tree with Multiple Quality-of-Service Constraints
- Author
-
Yoshiaki Tanaka, Jun Huang, and Yan Ma
- Subjects
Static routing ,Dynamic Source Routing ,Protocol Independent Multicast ,Multicast ,Link-state routing protocol ,Computer Networks and Communications ,Computer science ,Distributed computing ,Multipath routing ,Distance Vector Multicast Routing Protocol ,Xcast ,Electrical and Electronic Engineering ,Software - Published
- 2012
21. Overlay Real-Time Video Multicast System
- Author
-
Ho Jong Kang, Hyung Rai Oh, and Hwangjun Song
- Subjects
Overlay multicast ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,Inter-domain ,business.industry ,computer.internet_protocol ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Distance Vector Multicast Routing Protocol ,Overlay network ,Data_CODINGANDINFORMATIONTHEORY ,Source-specific multicast ,Internet Group Management Protocol ,Reliable multicast ,Multicast address ,IP multicast ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Pragmatic General Multicast ,Computer network - Abstract
In this paper, we present an effective overlay real-time video multicast system over the Internet. The proposed system effectively integrates overlay multicast technology and video compression technology. Overlay multicast tree and target bit rate are determined to satisfy the given average delay constraint, and H.263+ rate control is implemented to enhance the human visual perceptual quality over the multicast tree. Finally, experimental results are provided to show the performance of the proposed overlay video multicast system over the Internet.
- Published
- 2010
22. A Study of a New Multicast Traffic Control Policy Based on the Number of Receivers and Its Evaluation in TDM-PON Systems
- Author
-
Jun Kyun Choi, YoungHwan Kwon, Min-Gon Kim, and Seong Gon Choi
- Subjects
Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,computer.internet_protocol ,Inter-domain ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Distance Vector Multicast Routing Protocol ,Multimedia Broadcast Multicast Service ,Source-specific multicast ,Internet Group Management Protocol ,Reliable multicast ,Multicast address ,IP multicast ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Pragmatic General Multicast ,Computer network - Abstract
This letter proposes a new multicast traffic control policy in TDM-PON, which differentially classifies multicast flows which have relatively many associated receivers as high-class, and multicast flows which have relatively few associated receivers as low-class. Simulation results confirm that the proposed policy can effectively enhance multicast performance regarding delay and loss, specifically important to multimedia services, compared to the legacy policy.
- Published
- 2010
23. Multicast Routing and Wavelength Assignment for Dynamic Multicast Sessions in WDM Network Using Minimum Delta
- Author
-
Alex Fung and Iwao Sasase
- Subjects
Routing and wavelength assignment ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Physics::Optics ,Distance Vector Multicast Routing Protocol ,Data_CODINGANDINFORMATIONTHEORY ,Blocking (statistics) ,Source-specific multicast ,Computer Science::Networking and Internet Architecture ,Xcast ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,business ,Software ,Computer network - Abstract
We propose a scheme of MultiCast Routing and Wavelength Assignment (MC-RWA) to establish light-tree for dynamic multicast session for the Wavelength Division Multiplex (WDM) network by choosing the wavelength that leads to a reduction in blocking probabilities by using a parameter Δ. Δ is defined as the overall reduction of connectivity of the nodes in the network caused by a wavelength assignment process when using a particular wavelength, and we assign wavelength resources to the multicast session by choosing the Δ which leads to smallest reduction in connectivity. Through computer simulation, we show that the proposed scheme has lower blocking probabilities when compared with minimum cost scheme under the condition that wavelength conversion is not allowed.
- Published
- 2010
24. Chordal Graph Based Channel Assignment for Multicast and Unicast Traffic in Wireless Mesh Networks
- Author
-
Yusheng Ji, Baohua Zhao, Hao Zhou, and Junfeng Jin
- Subjects
Wireless mesh network ,Multicast ,Computer Networks and Communications ,Wireless network ,Computer science ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,Source-specific multicast ,Graph (abstract data type) ,Xcast ,Electrical and Electronic Engineering ,Unicast ,Greedy algorithm ,business ,Software ,Pragmatic General Multicast ,MathematicsofComputing_DISCRETEMATHEMATICS ,Computer network - Abstract
With the increasing popularity of multicast and real-time streaming service applications, efficient channel assignment algorithms that handle both multicast and unicast traffic in wireless mesh networks are needed. One of the most effective approaches to enhance the capacity of wireless networks is to use systems with multiple channels and multiple radio interfaces. However, most of the past works focus on vertex coloring of a general contention graph, which is NP-Complete, and use the greedy algorithm to achieve a suboptimal result. In this paper, we combine unicast and multicast with a transmission set, and propose a framework named Chordal Graph Based Channel Assignment (CGCA) that performs channel assignment for multicast and unicast traffic in multi-channel multi-radio wireless mesh networks. The proposed framework based on chordal graph coloring minimizes the interference of the network and prevents unicast traffic from starvation. Simulation results show that our framework provides high throughput and low end-to-end delay for both multicast and unicast traffic. Furthermore, our framework significantly outperforms other well-known schemes that have a similar objective in various scenarios.
- Published
- 2010
25. Reliable Multicast with Local Retransmission and FEC Using Group-Aided Multicast Scheme
- Author
-
Alex Fung and Iwao Sasase
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,computer.internet_protocol ,business.industry ,Computer science ,Network packet ,Distributed computing ,Retransmission ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Distance Vector Multicast Routing Protocol ,Data_CODINGANDINFORMATIONTHEORY ,Source-specific multicast ,Internet Group Management Protocol ,Reliable multicast ,Multicast address ,IP multicast ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Pragmatic General Multicast ,Computer network - Abstract
In reliable multicast, feedback and recovery traffic limit the performance and scalability of the multicast session. In this paper, we present an improvement to the many-to-many reliable multicast protocol, Group-Aided Multicast protocol (GAM), with a local-group based recovery by making use of forward error correction (FEC) locally in addition to NACK/retransmission. In contrast to the original GAM, which only makes use of NACK-based recovery, our scheme produces FEC packets and multicasts the packets within the scope of a local group in order to correct uncorrelated errors of the local members in each group of the multicast session, which reduces the need for NACK/retransmission. By using our scheme, redundancy traffic can be localized in each group within a multicast session, and the overall recovery traffic can be reduced.
- Published
- 2009
26. A Secure Multicast Framework in Large and High-Mobility Network Groups
- Author
-
Jung-San Lee and Chin-Chen Chang
- Subjects
Secure multicast ,Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,business.industry ,Network packet ,Computer science ,Key distribution ,Computer security ,computer.software_genre ,Telecommunications network ,Source-specific multicast ,Forward secrecy ,Xcast ,Electrical and Electronic Engineering ,business ,Key management ,computer ,Software ,Pragmatic General Multicast ,Computer network - Abstract
With the widespread use of Internet applications such as Teleconference, Pay-TV, Collaborate tasks, and Message services, how to construct and distribute the group session key to all group members securely is becoming and more important. Instead of adopting the point-to-point packet delivery, these emerging applications are based upon the mechanism of multicast communication, which allows the group member to communicate with multi-party efficiently. There are two main issues in the mechanism of multicast communication: Key Distribution and Scalability. The first issue is how to distribute the group session key to all group members securely. The second one is how to maintain the high performance in large network groups. Group members in conventional multicast systems have to keep numerous secret keys in databases, which makes it very inconvenient for them. Furthermore, in case that a member joins or leaves the communication group, many involved participants have to change their own secret keys to preserve the forward secrecy and the backward secrecy. We consequently propose a novel version for providing secure multicast communication in large network groups. Our proposed framework not only preserves the forward secrecy and the backward secrecy but also possesses better performance than existing alternatives. Specifically, simulation results demonstrate that our scheme is suitable for high-mobility environments.
- Published
- 2009
27. A Hierarchical Multicast Routing Using Inter-Cluster Group Mesh Structure for Mobile Ad Hoc Networks
- Author
-
Yoshiaki Kakuda, Izumi Yamamoto, Kazuki Ogasawara, and Tomoyuki Ohta
- Subjects
Dynamic Source Routing ,Computer Networks and Communications ,Computer science ,Wireless ad hoc network ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Wireless Routing Protocol ,Destination-Sequenced Distance Vector routing ,Xcast ,Electrical and Electronic Engineering ,Pragmatic General Multicast ,multicast routing ,Vehicular ad hoc network ,Wireless mesh network ,Multicast ,Adaptive quality of service multi-hop routing ,Protocol Independent Multicast ,Network packet ,Inter-domain ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile ad hoc network ,Ad hoc wireless distribution service ,ad hoc networks ,Source-specific multicast ,Optimized Link State Routing Protocol ,Geocast ,business ,Software ,Computer network - Abstract
Multicast communication over mobile ad hoc networks has become popular. However, dependable and scalable multicast routing is required for mobile ad hoc networks even though network size and node mobility continue to increase. Therefore, this paper proposes a new hierarchical multicast routing scheme for such ad hoc networks. The proposed scheme introduces the inter-cluster group mesh structure based on our previous autonomous clustering proposal. In the proposed scheme, data packets are delivered from the source node to the multicast members through multiple routes over the inter-cluster group mesh structure. Simulations show that the proposed scheme is scalable with regard to network size and strong against node mobility; it can provide dependable multicast communication on large mobile ad hoc networks.
- Published
- 2009
28. Multicast Routing and Wavelength Assignment with Shared Protection in Multi-Fiber WDM Mesh Networks: Optimal and Heuristic Solutions
- Author
-
Matthieu Guyot, Lunchakorn Wuttisittikulkij, Poompat Saengudomlert, Kampol Woradit, and Pisit Vanichchanunt
- Subjects
Routing and wavelength assignment ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,Heuristic (computer science) ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Telecommunications network ,Source-specific multicast ,Xcast ,Electrical and Electronic Engineering ,business ,Integer programming ,Software ,Computer network - Abstract
While the problem of multicast routing and wavelength assignment (MC-RWA) in optical wavelength division multiplexing (WDM) networks has been investigated, relatively few researchers have considered network survivability for multicasting. This paper provides an optimization framework to solve the MC-RWA problem in a multi-fiber WDM network that can recover from a single-link failure with shared protection. Using the light-tree (LT) concept to support multicast sessions, we consider two protection strategies that try to reduce service disruptions after a link failure. The first strategy, called light-tree reconfiguration (LTR) protection, computes a new multicast LT for each session affected by the failure. The second strategy, called optical branch reconfiguration (OBR) protection, tries to restore a logical connection between two adjacent multicast members disconnected by the failure. To solve the MC-RWA problem optimally, we propose an integer linear programming (ILP) formulation that minimizes the total number of fibers required for both working and backup traffic. The ILP formulation takes into account joint routing of working and backup traffic, the wavelength continuity constraint, and the limited splitting degree of multicast-capable optical cross-connects (MC-OXCs). After showing some numerical results for optimal solutions, we propose heuristic algorithms that reduce the computational complexity and make the problem solvable for large networks. Numerical results suggest that the proposed heuristic yields efficient solutions compared to optimal solutions obtained from exact optimization.
- Published
- 2009
29. A Solution for Irregular IP Multicast Packet Flooding – For Heavy Traffic IP Multicast Communication –
- Author
-
Katsunori Yamaoka, Shin-ichi Nakagawa, Makoto Misumi, Ken-ichi Chinen, and Yoichi Shinoda
- Subjects
Computer Networks and Communications ,computer.internet_protocol ,Computer science ,Distance Vector Multicast Routing Protocol ,IGMP snooping ,law.invention ,law ,Internet Protocol ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,Hardware_REGISTER-TRANSFER-LEVELIMPLEMENTATION ,Pragmatic General Multicast ,Protocol Independent Multicast ,Multicast ,business.industry ,Network packet ,Inter-domain ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Optical IP Switching ,Telecommunications network ,IP tunnel ,Source-specific multicast ,Local Management Interface ,Internet Group Management Protocol ,Reliable multicast ,Martian packet ,IP multicast ,business ,Mbone ,computer ,Software ,Computer network - Abstract
When an IP Multicast network is constructed on a switch-based network, many IP Multicast packet broadcasts are generated, and these broadcasts cause trouble for all of the other kinds of communication. To solve this problem, implementing IGMP Snooping on various switches has been proposed. However, some switches have insufficient IP Multicast packet-handling capability. This problem is also mentioned in RFC4541. In this paper, we propose the IGMP Snooping Activator (ISA) mechanism as a way to solve the IP Multicast packet-handling problem. The ISA transmits dummy IGMP Queries to maintain the IP Multicast network, and it joins the flooding IP Multicast group to activate IGMP Snooping in switches that are unable to handle IP Multicast packets. The experimental evaluation shows the effectiveness of our proposed method: the network load decreases because of the method's effective restraint of IP Multicast packet flooding.
- Published
- 2009
30. Network-Aware Overlay Multicast for Large Data Dissemination
- Author
-
Joonbok Lee and Kilnam Chon
- Subjects
Computer Networks and Communications ,Computer science ,computer.internet_protocol ,Distributed computing ,Overlay network ,Distance Vector Multicast Routing Protocol ,Throughput ,Steiner tree problem ,symbols.namesake ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,Dissemination ,Pragmatic General Multicast ,Overlay multicast ,Protocol Independent Multicast ,Multicast ,business.industry ,Inter-domain ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Source-specific multicast ,Internet Group Management Protocol ,Reliable multicast ,symbols ,IP multicast ,business ,computer ,Software ,Computer network - Abstract
In this paper, we propose a network-aware overlay multicast (NAOM) technique for large data dissemination in a well-managed overlay network. To improve the throughput, NAOM utilizes forward-only hosts; these hosts participate in the overlay network but are not members of the multicast. With the inclusion of the forward-only hosts, data slices can detour bottleneck links and more resources can be used to build efficient multicast trees. Large data are divided into fixed-size slices, and the slices are delivered simultaneously to multicast receivers along the multiple multicast trees. We model the problem of building efficient multicast trees with the inclusion of forward-only hosts. The problem is an NP-hard problem, and we introduce a polynomial time heuristic algorithm. Furthermore, we propose a dynamic scheduling scheme for the transfer of data along the evaluated multicast trees. Our experimental results in a real network environment show an improvement of the throughput but at the cost of additional resource consumption of forward-only nodes.
- Published
- 2009
31. Authenticated IGMP for Controlling Access to Multicast Distribution Tree
- Author
-
Hyun-Sun Kang and Chang-Seop Park
- Subjects
Multicast ,Computer Networks and Communications ,computer.internet_protocol ,business.industry ,Computer science ,Access control ,IGMP snooping ,law.invention ,Source-specific multicast ,law ,Internet Group Management Protocol ,Network service ,Internet Protocol ,IP multicast ,Xcast ,Electrical and Electronic Engineering ,business ,Key management ,computer ,Software ,Computer network - Abstract
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.
- Published
- 2009
32. An Efficient Multicast Forwarding Method for Optical Bursts under Restricted Number of Burst Replicas
- Author
-
Nagao Ogino and Hajime Nakamura
- Subjects
Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,Routing table ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Distance Vector Multicast Routing Protocol ,Data_CODINGANDINFORMATIONTHEORY ,Optical burst switching ,Telecommunications network ,Packet switching ,Source-specific multicast ,Burst switching ,Xcast ,Electrical and Electronic Engineering ,Unicast ,business ,Software ,Computer network - Abstract
Optical burst switching (OBS) is a promising approach for the realization of future flexible high-speed optical networks. In particular, a multicast forwarding method for optical bursts is important if an efficient high-speed grid computing network is to be realized. In OBS networks, the number of burst replicas generated at each node is strongly restricted due to optical power impairment of multicast bursts. Moreover, unrestricted replication of multicast bursts at each OBS node may not be advantageous because an increase in the number of multicast bursts within the network causes more frequent deflection forwarding of both multicast and unicast bursts. This paper proposes an efficient hop-by-hop multicast forwarding method for optical bursts, where idle output ports are selected based on scores simply calculated using a routing table that each OBS node holds. This method can mitigate increases in loss rate and transfer delay of multicast bursts, even if the number of burst replicas generated at each OBS node is strongly restricted. Moreover, this method can efficiently mitigate an increase in the number of multicast bursts within the network by avoiding unnecessary replication of multicast bursts at each OBS node. Simulation results show that the proposed method can actually mitigate degradation of the loss rate and transfer delay for multicast bursts under the restricted number of burst replicas at each OBS node. Moreover, when the arrival rate of multicast bursts is large relative to that of unicast bursts, the proposed method is able to improve the loss rates of both multicast and unicast bursts by switching the forwarding method for the multicast bursts to the simple unicast forwarding method without burst replication.
- Published
- 2009
33. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs
- Author
-
Anas Basalamah and Takuro Sato
- Subjects
Voice over IP ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,Computer science ,Network packet ,business.industry ,computer.internet_protocol ,Automatic repeat request ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Distance Vector Multicast Routing Protocol ,Throughput ,Source-specific multicast ,Embedded system ,Internet Group Management Protocol ,Wireless lan ,Reliable multicast ,IP multicast ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Pragmatic General Multicast ,Computer network - Abstract
For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.
- Published
- 2009
34. Cheatproof Dual-Tree Application-Level Multicast for Bulk Data Distribution
- Author
-
Taku Noguchi and Miki Yamamoto
- Subjects
Router ,Computer Networks and Communications ,computer.internet_protocol ,Computer science ,Distributed computing ,Overlay network ,Distance Vector Multicast Routing Protocol ,Throughput ,law.invention ,Packet switching ,law ,Internet Protocol ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,Pragmatic General Multicast ,Protocol Independent Multicast ,Multicast ,Network packet ,Inter-domain ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Packet forwarding ,Source-specific multicast ,Internet Group Management Protocol ,Reliable multicast ,Shortest path problem ,IP multicast ,business ,computer ,Software ,Computer network - Abstract
Application-level multicast has drawn a lot of attention as an alternative to IP multicast. In application-level multicast, multicast related features, such as group membership management, packet replication and packet forwarding are implemented at end-hosts instead of routers. The host perceived transmission quality and multicast forwarding responsibility depend on its position in the multicast distribution tree. This nature of application-level multicast motivates selfish members to alter their position by unrightful means to maximize their private benefits. Uncooperative behaviors of these selfish members, i.e. cheating, increase unfairness between selfish members and faithful members. In the context of bulk data distribution, this unfairness between members significantly impacts the receiver throughput. In this paper, to alleviate the negative impact of cheating members, we propose a new tree building protocol which builds dual multicast trees. Our proposed protocol constructs a shortest-widest path tree as the 1st tree. The members having lower position in the 1st tree are located at higher position in the 2nd tree in exchange for their unfairness. To investigate performance of our proposed protocol, it is compared with the existing application-level multicast protocol. Our simulation results show that our protocol outperforms the existing protocol from the view point of throughput and resource utilization against member cheating.
- Published
- 2008
35. A Novel Approach to Overlay Multicasting Schemes for Multi-Hop Ad-Hoc Networks
- Author
-
Jejun Oh, Namhi Kang, and Younghan Kim
- Subjects
Routing protocol ,Network architecture ,Multicast ,Computer Networks and Communications ,Computer science ,Wireless network ,Wireless ad hoc network ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Overlay network ,Mobile ad hoc network ,Network topology ,law.invention ,Network simulation ,Hop (networking) ,Packet switching ,Relay ,law ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Abstract
Multicast is an efficient transport mechanism for group-based community communications and mobile ad-hoc networks (MANET) is recently regarded as a promising solution for supporting ubiquitous computing as an underlying network technology. However, it is challenging to deploy the multicast mechanism used in a wired network directly into MANET owing to scarce resources in wireless networks and unpredictable changes in network topology. Several multicast mechanisms have been proposed in the literature to overcome these limitations. In MANET, especially, overlay multicasting schemes present several advantages over network-based multicasting schemes. However we have observed a common limitation of previously proposed overlay multicasting schemes. They introduce redundant data transmissions that waste network bandwidth and the battery of relay nodes. The observation motivated us to propose an efficient way to create and maintain a “semi-overlay structure” that utilizes a few nonmember nodes selected as branch nodes. The proposed scheme, called “SOMRP (Semi-overlay multicast routing protocol),” has been evaluated by using extensive network simulation in two different scenarios, comparing the performance of SOMRP with two previously proposed schemes. Simulation results show that SOMRP outperforms the two schemes in terms of the packet delivery ratio, transmission cost and end-to-end delay.
- Published
- 2008
36. Multiple Tree Multicast Ad Hoc On-Demand Distance Vector (MT-MAODV) Routing Protocol for Video Multicast over Mobile Ad Hoc Networks
- Author
-
Chee-Onn Chow and Hiroshi Ishii
- Subjects
Routing protocol ,Computer Networks and Communications ,computer.internet_protocol ,Computer science ,Wireless ad hoc network ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Wireless Routing Protocol ,Multicast address ,Wireless ,Xcast ,Electrical and Electronic Engineering ,Pragmatic General Multicast ,Vehicular ad hoc network ,Adaptive quality of service multi-hop routing ,Multicast ,Protocol Independent Multicast ,business.industry ,Inter-domain ,Multiple description coding ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Source-specific multicast ,Distance-vector routing protocol ,Optimized Link State Routing Protocol ,Geocast ,Internet Group Management Protocol ,Reliable multicast ,IP multicast ,business ,computer ,Software ,Computer network - Abstract
Video multicast over wireless medium has gained increasing popularity in a wide range of applications, such as video-on-demand and group video conferencing. With mobile ad hoc networks emerging as a promising solution for future ubiquitous communications, supporting reliable video multicast over mobile ad hoc networks is a timely research topic. In this paper we tackle this issue by using multiple tree multicast routing protocol. Specifically, we introduce an extension to the Multicast Ad Hoc On-demand Distance Vector (MAODV) routing protocol to construct two optimally disjoint trees in a single routine. The extended protocol is called Multiple Tree Multicast Ad Hoc On-demand Distance Vector (MT MAODV) routing protocol. In order to distribute the video evenly and independently between these disjoint trees, the Multiple Description Coding (MDC) scheme is used for video coding. Simulation shows that the proposed protocol demonstrates video multicast with better quality than the conventional video multicast using a single tree only.
- Published
- 2008
37. Proportional Fair Scheduling for Multicast Services in Wireless Cellular Networks
- Author
-
Young Yong Kim and Chung Ha Koh
- Subjects
Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,Distance Vector Multicast Routing Protocol ,Throughput ,Proportionally fair ,Telecommunications network ,Scheduling (computing) ,Source-specific multicast ,Resource allocation ,Wireless ,Resource management ,Xcast ,Electrical and Electronic Engineering ,Unicast ,business ,Software ,Computer network ,Communication channel - Abstract
Recently, there has been extensive research on resource allocation schemes for multicast services that would satisfy the requirements of multimedia traffic. Although several schemes have been proposed to improve the performance of individual multicast groups, it is not easy to achieve both throughput efficiency and user fairness. In this study, we propose a new multicast scheduling scheme for achieving proportional fair (PF) allocation in wireless cellular systems. The basic idea of PF is to schedule the user whose corresponding instantaneous channel quality is the highest relative to the average channel condition over a given time scale. We first extend the PF metric to the extent that the scheduler can reflect the user's varying channel gain, and fairness, not only in the unicast case, but also in multicast transmissions. A multicast PF scheme maximizes the summation of the logarithmic average rate of all multicasting users. Thus, it improves the fairness to mobile users when compared to max-rate allocation, because the logarithmic rate gives more weight to lower rate users, while achieving high throughput. Moreover, the proposed scheme is less complex than max-rate allocation.
- Published
- 2008
38. Evaluation of Reliable Multicast Applications for Large-Scale Contents Delivery
- Author
-
Teruji Shiroshita, Kinoshita Shingo, Yukihiro Nakamura, Tetsuo Sano, and Takahiko Nagata
- Subjects
Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,Broadband networks ,Scheduling (computing) ,Reliable multicast ,Xcast ,Electrical and Electronic Engineering ,Best-effort delivery ,Communications protocol ,business ,Software ,Pragmatic General Multicast ,Computer network - Abstract
Reliable Multicast has been applied to large-scale contents delivery systems for distributing digital contents to a large number of users without data loss. Reliable contents distribution is indispensable for software updates and management data sharing in actual delivery services. This paper evaluates the implementation and performance of RMTP; a reliable multicast protocol for bulk-data transfer, through the developments of contents delivery systems. Software configuration is also examined including operation functions such as delivery scheduling. Furthermore, applicability of reliable multicast to emerging broadband networks is also discussed based on the experimentation results. Through the deployment of the protocol and the software, performance estimation has played a key role for constructing the delivery systems as well as for designing the communication protocol.
- Published
- 2007
39. Share Based-Channel Scheduling Algorithm for Multicast Video Delivery in WDM Optical Access Networks
- Author
-
Tae-Yeon Kim, Minho Kang, Jeong Ju Yoo, HyunHo Yun, Nam-Uk Kim, and Byong-Whi Kim
- Subjects
Computer Networks and Communications ,Computer science ,computer.internet_protocol ,Packet processing ,Distance Vector Multicast Routing Protocol ,Data_CODINGANDINFORMATIONTHEORY ,Multimedia Broadcast Multicast Service ,Scheduling (computing) ,law.invention ,law ,Convergence (routing) ,Internet Protocol ,Telecommunications link ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,Pragmatic General Multicast ,Access network ,Protocol Independent Multicast ,Multicast ,business.industry ,Inter-domain ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Telecommunications network ,Source-specific multicast ,IP multicast ,business ,computer ,Algorithm ,Software ,Computer network - Abstract
One of the important issues of future convergence service design in access networks is the ability to support different kinds of video delivery services for high quality IP-TV and multicast Video on Demand (VoD). In this paper, we address how to efficiently allocate video transmission channels based on multicast management technology in shared wavelength division multiplexed-passive optical network (WDM-PON). The shared WDM-PON introduces a broadcast downstream wavelength to support multicast videos in the point-to-point WDM-PON. Based on the shared architecture and multicast management technologies, the proposed dynamic channel scheduling arbitrates transmission channels of videos. It uses the information of broadcast video share to maximize traffic share in the optical layer. By maintaining high video share, proposed algorithm supports the maximum number of high quality multicast videos without serious service interference to real-time videos, delay-able videos, and internet services. In addition, it also reduces the packet processing burden and buffer size of the optical line termination (OLT). The analytic and simulation results validate the effectiveness of the proposed algorithm.
- Published
- 2007
40. On Multicasting Based on Nested Mobile Router Information in Network Mobility
- Author
-
Tae-Jin Lee, Hyunseung Choo, and Moonseong Kim
- Subjects
Router ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network mobility ,Distance Vector Multicast Routing Protocol ,law.invention ,Source-specific multicast ,Mobile IP ,law ,Convergence (routing) ,Internet Protocol ,Cellular network ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Abstract
Mobile IP is a solution to support mobile nodes but it does not handle NEtwork MObility (NEMO). The NEMO Basic Support (NBS) [1] ensures session continuity for all the nodes in a MObile NETwork (MONET). Since the protocol is based on Mobile IP, it inherits from Mobile IP the same fundamental problem such as tunnel convergence, when it is used to support the multicast for NEMO. In this paper, we propose the multicast Route Optimization (RO) scheme in NEMO environments. We suppose that the Mobile Router (MR) has a multicast function and the Nested Mobile Router Information (NeMRI). The NeMRI is used to record a list of the CoAs of all the MRs located below. And it obtains information whether the MRs desire multicast services. Also, we adopt any RO scheme to handle pinball routing. Therefore, we achieve optimal routes for multicasting in NEMO. We also'develop analytic models to evaluate the performance of our scheme. We show much lower multicast tree delay and cost in NEMO compared with other techniques such as Bi-directional Tunneling (BT), Remote Subscription (RS), and Mobile Multicast (MoM) based on the NBS protocol.
- Published
- 2006
41. Max-Min Fair Rate Allocation Scheme in Multirate Multicast Networks Using Supervisory Control
- Author
-
Hee-Jung Byun and Jong-Tae Lim
- Subjects
Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,Real-time computing ,Bandwidth allocation ,Source-specific multicast ,Supervisory control ,Convergence (routing) ,Bandwidth (computing) ,Resource allocation ,Overhead (computing) ,Resource management ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Abstract
This paper describes a max-min fair rate allocation scheme in multicast networks based on the supervisory control framework for discrete event systems. Based on the discrete event model of multicast networks, we design a supervisor to guarantee the max-min fair allocation of bandwidth. Analysis and simulations are used to show that the controlled networks guarantee the max-min fair sharing with a low message exchange overhead and fast convergence time.
- Published
- 2006
42. Dynamic Activating and Deactivating Loss Recovery Router for Live Streaming Multicast
- Author
-
Aki Kobayashi, Yuthapong Somchit, Katsunori Yamaoka, and Yoshinori Sakai
- Subjects
Router ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,Computer science ,computer.internet_protocol ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Distance Vector Multicast Routing Protocol ,Source-specific multicast ,Packet switching ,Packet loss ,Internet Group Management Protocol ,Reliable multicast ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Computer network - Abstract
Live streaming is delay sensitive and can tolerate some amount of loss. The QoS Multicast for Live Streaming (QMLS) Protocol, focuses on the characteristics of live streaming. It has been shown to improve the performance of live streaming multicast by reducing the end-to-end packet loss probability. However, the placement of active routers performing the QMLS function has not been discussed. This paper proposes a dynamic method to activate and deactivate routers in order to minimize the number of active routers for each QMLS-packet flow and discusses its parameters. The results of an evaluation show that the proposed method can reduce the number of active routers for each flow and adjust the active routers according to changes in the multicast tree.
- Published
- 2006
43. Multicast Communication for Video Broadcasting Service over IPv4 Network Using IP Option
- Author
-
Sumiya Marugami, Mikihiko Nishiara, I Gusti Bagus Baskara Nugraha, and Hiroyoshi Morita
- Subjects
Routing protocol ,Router ,Computer Networks and Communications ,computer.internet_protocol ,Computer science ,Distance Vector Multicast Routing Protocol ,law.invention ,law ,Internet Protocol ,Xcast ,Electrical and Electronic Engineering ,Pragmatic General Multicast ,Protocol Independent Multicast ,Multicast ,business.industry ,Network packet ,Datagram ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,IPv4 ,Telecommunications network ,Internet Group Management Protocol ,Network service ,IP multicast ,Unicast ,business ,computer ,Software ,Computer network - Abstract
In this paper, we propose a protocol for multicast communication called Multicast Datagram Transfer Protocol (MDTP) to provide multicast for video broadcasting service on the Internet. MDTP is a one-to-many multicast communication protocol, which is constructed based on IPv4 unicast protocol by utilizing IP Router Alert Option, and it uses unicast addressing and unicast routing protocol. A mechanism is presented to allow a router to remove identical video stream, to duplicate a video stream, and to forward each copy of the duplicated video stream to its destinations. Ordinary IP routers that do not support MDTP will treat the MDTP packets as normal unicast packets. Hence, gradual deployment is possible without tunneling technique. With a delegation mechanism, MDTP router is also able to handle request from clients, and serve the requested video stream. The simulation results show that the average bandwidth usage of MDTP is close to the average bandwidth usage of IP multicast. MDTP also has greater efficiency than XCAST, and its efficiency becomes significant for a large number of clients.
- Published
- 2006
44. Performance Analysis of Reliable Multicast Protocols Using Transparent Proxy Servers on Wired and Wireless Networks
- Author
-
Sung-Kwan Youm, Chul-Hee Kang, and Meejoung Kim
- Subjects
Multicast ,Protocol Independent Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Throughput ,computer.software_genre ,Proxy server ,Source-specific multicast ,Server ,Reliable multicast ,Xcast ,Electrical and Electronic Engineering ,business ,computer ,Software ,Pragmatic General Multicast ,Computer network - Abstract
This paper considers the reliable multicast transport protocols used in hybrid networks that include wired and wireless networks and transparent proxy servers. We present four analytic performance models of two extreme reliable multicast transport protocols, sender-initiated and receiver-initiated, and supported and unsupported by transparent proxy servers are considered in each reliable multicast protocol. We analyze the throughputs of these four different models mathematically. Numerical results show that transparent proxy servers give good effects to overall performance. Furthermore, the receiver-initiated reliable multicast supported by transparent proxy servers gives better performances of total throughput than sender-initiated reliable multicast supported by transparent proxy servers. We provide efficiency criterion of the optimal number of transparent proxy servers for each protocol under varying wireless loss probabilities. Numerical results are verified by simulations.
- Published
- 2006
45. Architecture for IP Multicast Deployment: Challenges and Practice
- Author
-
Shinsuke Suzuki, Jun Murai, Hitoshi Asaeda, and Katsushi Kobayashi
- Subjects
Router ,Routing protocol ,Computer Networks and Communications ,computer.internet_protocol ,Computer science ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Loose Source Routing ,Multimedia Broadcast Multicast Service ,law.invention ,law ,Internet Protocol ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,Pragmatic General Multicast ,Link state packet ,Protocol Independent Multicast ,Multicast ,Inter-domain ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Source-specific multicast ,Local Management Interface ,Internet Group Management Protocol ,Reliable multicast ,IP multicast ,Mbone ,business ,computer ,Software ,Computer network - Abstract
SUMMARY IP multicast technology is highly advantageous for various applications and future needs in the Internet. Yet, it is generally recognized that the IP multicast routing protocol is fairly complex and nonscalable and requires additional maintenance and operational cost to network administrators. Although there has been much research related to IP multicast and most router vendors already support basic IP multicast routing protocols, there is still a big gap between what is reported as the stateof-the-art in the literature from what is implemented in practice. In this paper, we clarify the complexities of traditional multicast communication and describe possible solutions using the one-to-many multicast communication model called Source-Specific Multicast (SSM). We explain this communication model and the corresponding routing architecture and examine the statistics obtained for the number of multicast routing entries in our backbone router, which is connected to the international backbone. We also introduce our international collaboration activities that are contributing to the deployment and promotion of IP multicast services in the Internet.
- Published
- 2006
46. An Autonomous Clustering-Based Hierarchical Multicast Routing for Mobile Ad Hoc Networks
- Author
-
Tomoyuki Ohta, Yoshiaki Kakuda, and Toshifumi Kawaguchi
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer Networks and Communications ,Computer science ,Wireless ad hoc network ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Wireless Routing Protocol ,Data_CODINGANDINFORMATIONTHEORY ,Ad hoc On-Demand Distance Vector Routing ,Xcast ,Electrical and Electronic Engineering ,Hierarchical routing ,Vehicular ad hoc network ,Protocol Independent Multicast ,Multicast ,Adaptive quality of service multi-hop routing ,business.industry ,Inter-domain ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,multicast routing ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Link-state routing protocol ,Optimized Link State Routing Protocol ,Geocast ,ad hoc networks ,business ,Software ,Computer network ,clustering - Abstract
This paper discusses multicast routing in ad hoc networks. In multicast routing, a node delivers the same message to the other nodes within a multicast group along with a multicast tree. Since nodes are moving around in ad hoc networks, the links between the nodes change frequently. However, the multicast tree must be maintained to deliver the messages regardless of the link changes. This paper gives a description of an autonomous clustering-based hierarchical multicast routing protocol in ad hoc networks. Since the autonomous clustering scheme is adaptive to the node movement, the proposed multicast routing can maintain the multicast tree in despite of link changes. This paper shows the effectiveness of autonomous clustering-based hierarchical multicast routing from the point of view of adaptability to link changes and scalability to multicast members.
- Published
- 2005
47. Functional Unit Oriented Middleware for Application-Level Multicast Services
- Author
-
Hiroyuki Morikawa, Nodoka Mimura, Kiyohide Nakauchi, and Tomonori Aoyama
- Subjects
Multicast ,Computer Networks and Communications ,Video capture ,business.industry ,Computer science ,Distributed computing ,Overlay network ,Redundancy (engineering) ,Systems architecture ,Codec ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Pragmatic General Multicast ,Computer network - Abstract
Application-level multicast (ALM) is a novel technology for multipoint applications, such as large scale file distribution, video and audio streaming, and video conferencing. Although many ALM mechanisms or algorithms have been proposed, all the multicast functions have been independently developed and integrated into individual applications. In such a situation, the development of ALM applications includes a lot of redundancy. Our goal is to improve the efficiency of developing ALM applications by reducing the development redundancy and to provide application developers with a middleware on which various ALM applications can be efficiently developed with minimum efforts. To this end, we develop a functional unit oriented ALM middleware, namely RelayCast. RelayCast provides a minimum but fundamental set of functionality as a functional unit, and constructs the basis on which additional and specific functions (i.e. codec, video capture, etc.) for each application are implemented. Some functional units contain several components with different algorithms, and RelayCast meets the requirements of various applications by choosing the appropriate component. In this paper, we propose RelayCast architecture, and present the implementation and experiments of a prototype.
- Published
- 2005
48. Construction of a Robust Multicast Tree for Application-Level Multicast
- Author
-
Miki Yamamoto and Taku Noguchi
- Subjects
Routing protocol ,Computer Networks and Communications ,Computer science ,computer.internet_protocol ,Distributed computing ,Overlay network ,Distance Vector Multicast Routing Protocol ,Peer-to-peer ,computer.software_genre ,Multimedia Broadcast Multicast Service ,law.invention ,Packet switching ,law ,Internet Protocol ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,Pragmatic General Multicast ,Multicast ,Protocol Independent Multicast ,Inter-domain ,Network packet ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Application layer ,Source-specific multicast ,Internet Group Management Protocol ,Reliable multicast ,IP multicast ,Unicast ,business ,computer ,Software ,Computer network - Abstract
Application-level multicast (ALM) is a feasible alternative to IP multicast. In ALM, multicast related features, such as group membership management, multicast routing and packet replication, are implemented at end-hosts instead of routers. A multicast distribution tree is constructed in the application layer, so all nodes in this tree are end-hosts. Packet transmission between end-hosts uses conventional IP unicast service. Therefore, all end-hosts can enjoy multicast communications without IP multicast service. However, ALM has a serious problem that the multicast distribution tree is intrinsically fragile and an end-host failure causes tree partitions. In this paper, to deal with this problem, we propose a new tree construction protocol which makes outdegrees of intermediate nodes be balanced. The degree-balanced distribution tree can reduce the average number of nodes decoupled by tree partitions. To investigate performance of our protocol, it is compared with an existing ALM protocol. Our simulation results show that our protocol outperforms the existing protocol from the viewpoints of robustness, loss probability and receiver-perceived delay.
- Published
- 2005
49. A Fast and Efficient Explicit Multicast Routing Protocol
- Author
-
Nasser Yazdani and Mozafar Bag-Mohammadi
- Subjects
Routing protocol ,Computer Networks and Communications ,Computer science ,computer.internet_protocol ,Distributed computing ,Distance Vector Multicast Routing Protocol ,Data_CODINGANDINFORMATIONTHEORY ,law.invention ,law ,Header ,Internet Protocol ,Multicast address ,Xcast ,Electrical and Electronic Engineering ,Pragmatic General Multicast ,Protocol Independent Multicast ,Multicast ,Inter-domain ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Source-specific multicast ,Internet Group Management Protocol ,Reliable multicast ,IP multicast ,business ,computer ,Software ,Computer network - Abstract
The state-oriented design of IP multicast may lead to the scalability problem, especially when there is a very large number of concurrent multicast groups in the network. Motivated by this problem, explicit multicast offers a stateless design using header space of multicast data packets. In this paper, we propose a novel stateless scheme called Linkcast that efficiently eliminates processing overhead of explicit multicast protocols. In Linkcast, the multicast sender encodes the tree listing its links in a proper way. The tree code is sent with every multicast data packet. Simulation results and experiments with real-trees show that Linkcast completely eliminates processing overhead of other explicit multicast protocols such as Xcast with comparable header size overhead.
- Published
- 2005
50. An Enhanced Scalable Probe-Based Multicast Admission Control Scheme
- Author
-
Chun Tung Chou, Zongkai Yang, Wei Liu, Chunhui Le, and Jianhua He
- Subjects
Multicast transmission ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Network packet ,Computer science ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Admission control ,Source-specific multicast ,Differentiated services ,Xcast ,Electrical and Electronic Engineering ,business ,Software ,Pragmatic General Multicast ,Computer network - Abstract
To guarantee QoS for multicast transmission, admission control for multicast sessions is expected. Probe-based multicast admission control (PBMAC) scheme is a scalable and simple approach. However, PBMAC suffers from the subsequent request problem which can significantly reduce the maximum number of multicast sessions that a network can admit. In this letter, we describe the subsequent request problem and propose an enhanced PBMAC scheme to solve this problem. The enhanced scheme makes use of complementary probing and remarking which require only minor modification to the original scheme. By using a fluid-based analytical model, we are able to prove that the enhanced scheme can always admit a higher number of multicast sessions. Furthermore, we present validation of the analytical model using packet based simulation.
- Published
- 2005
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.