• Title/Summary/Keyword: Multicast

Search Result 1,185, Processing Time 0.057 seconds

Mobility-Sensitive Multicast Protocol in NEMO

  • Li, Long-Sheng;Chi, Hung-I;Xie, Kai-Chung;Chan, Din-Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1994-2017
    • /
    • 2022
  • In view of the past, the mobility of the multicast source in the mobility networks is seldom discussed in the traditional multicast protocols. It is a heavy cost for the traditional multicast protocols to reconstruct the multicast tree in the Network Mobility (NEMO) environment. This article proposes an alternative multicast protocol, referred to as Mobility-Sensitive Multicast protocol (MSM), for the NEMO environment. The MSM can be considered as an alternative version of the Multicast Listener Discovery (MLD) protocol to maintain the multicast tree in the NEMO. There are two obvious contributions for the MSM. Reconstruct mechanism could rebuild the multicast tree for the mobility of the multicast source. Multi-group suppression mechanism reduce the multicast tree maintaining cost for the mobility of the multicast members. Through the performance evaluations and analyses, the MSM has less cost to maintain the multicast tree than the traditional multicast protocols, especially for a large numbers of multicast groups. Moreover, the MSM allows the mobility of the multicast source to reconstruct the multicast tree easily.

A Scalable Explicit Multicast Protocol for MANETs

  • Gossain Hrishikesh;Anand Kumar;Cordeiro Carlos;Agrawal Dharma P.
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.294-306
    • /
    • 2005
  • Group oriented multicast applications are becoming increasingly popular in mobile ad hoc networks (MANETs). Due to dynamic topology of MANETs, stateless multicast protocols are finding increased acceptance since they do not require maintenance of state information at intermediate nodes. Recently, several multicast schemes have been proposed which scale better' with the number of multicast sessions than traditional multicast strategies. These schemes are also known as explicit multicast (Xcast; explicit list of destinations in the packet header) or small group multicast (SGM). In this paper, we propose a new scheme for small group' multicast in MANETs named extended explicit multicast (E2M), which is implemented on top of Xcast and introduces mechanisms to make it scalable with number of group members for a given multicast session. Unlike other schemes, E2M does not make any assumptions related to network topology or node location. It is based on the novel concept of dynamic selection of Xcast forwarders (XFs) between a source and its potential destinations. The XF selection is based on group membership and the processing overhead involved in supporting the Xcast protocol at a given node. If the number of members in a given session is small, E2M behaves just like the basic Xcast scheme with no intermediate XFs. As group membership increases, nodes may dynamically decide to become an XF. This scheme, which can work with few E2M aware nodes in the network, provides transparency of stateless multicast, reduces header processing overhead, minimizes Xcast control traffic, and makes Xcast scalable with the number of group members.

Overlay Multicast Update Strategy Based on Perturbation Theory

  • Shen, Ye;Feng, Jing;Ma, Weijun;Jiang, Lei;Yin, Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.171-192
    • /
    • 2017
  • The change of any element in the network is possible to cause performance degradation of the multicast network. So it is necessary to optimize the topology path through the multicast update strategy, which directly affects the performance and user experience of the overlay multicast. In view of the above, a new multicast tree update strategy based on perturbation theory Musp (Multicast Update Strategy based on Perturbation theory) is proposed, which reduces the data transmission interruption caused by the multicast tree update and improves user experiences. According to the multicast tree's elements performance and the topology structure, the Musp strategy defines the multicast metric matrix and based on the matrix perturbation theory it also defines the multicast fluctuation factor. Besides it also demonstrates the calculability of the multicast fluctuation factor presents the steps of the Musp algorithm and calculates the complexity. The experimental results show that compared with other update strategies, as for the sensitivity of the multicast fluctuation factor's energized multicast tree to the network disturbance, the maximum delay of the Musp update strategy is minimal in the case of the local degradation of network performance.

An Implementation of IPv6 PIM-SSM in Linux Systems

  • Jeong Sang Jin;Kim Hyoung Jun
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.558-561
    • /
    • 2004
  • Currently, most IP multicasting applications are implemented based on Any-Source Multicast (ASM) model that supports many to many multicast services. However, it is known that current ASM-based multicast architecture has several deployment problems such as address allocation, lack of access control, and inefficient handling of well-known multicast sources. Source-Specific Multicast (SSM) working group in IETF proposed SSM architecture to overcome the weaknesses of ASM architecture. The architecture of SSM is based on one to many multicast services. Also, in order to provide SSM service, Multicast Listener Discovery Version 2 (MLDv2) protocol should be supported. In this paper, we introduce the architecture of SSM protocol and multicast group management protocol. After that, we present the architecture and implementation of IPv6 SSM and MLDv2 protocols in Linux systems.

  • PDF

Multicast Tree to Minimize Maximum Delay in Dynamic Overlay Network

  • Lee Chae-Y.;Baek Jin-Woo
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.1609-1615
    • /
    • 2006
  • Overlay multicast technique is an effective way as an alternative to IP multicast. Traditional IP multicast is not widely deployed because of the complexity of IP multicast technology and lack of application. But overlay multicast can be easily deployed by effectively reducing complexity of network routers. Because overlay multicast resides on top of densely connected IP network, In case of multimedia streaming service over overlay multicast tree, real-time data is sensitive to end-to-end delay. Therefore, moderate algorithm's development to this network environment is very important. In this paper, we are interested in minimizing maximum end-to-end delay in overlay multicast tree. The problem is formulated as a degree-bounded minimum delay spanning tree, which is a problem well-known as NP-hard. We develop tabu search heuristic with intensification and diversification strategies. Robust experimental results show that is comparable to the optimal solution and applicable in real time

  • PDF

Overlay Multicast in Wireless Ad Hoc Networks (무선 ad-hoc 망에서의 Overlay Multicast 지원 방안)

  • 김혜원
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.345-348
    • /
    • 2003
  • Overlay multicast is proposed as an alternative approach for providing muticast services. A logical infrastructure is built to form an overlay network on top of the physical layer. In this paper, we propose an efficient overlay multicast in wireless ad hoc networks. The overlay multicast tree adapts to the changes in underlying networks. The multicast tree adjusted according to the local member information.

  • PDF

Maximization of Path Reliabilities in Overlay Multicast Trees for Realtime Internet Service (실시간 인터넷 서비스를 위한 오브레이 말티케스트 트리의 패스 신뢰성 최대화)

  • Lee, Jung-H.;Lee, Chae-Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.33 no.2
    • /
    • pp.103-114
    • /
    • 2008
  • Overlay Multicast is a promising approach to overcome the implementation problem of IP multicast. Real time services like Internet broadcasting are provided by the overlay multicast technology due to the complex nature and high cost of IP multicast. To reduce frequent updates of multicast members and to support real time service without delay, we suggest a reliable overlay multicast tree based on members' sojourn probabilities. Path reliabilities from a source to member nodes are considered to maximize the reliability of an overlay multicast tree. The problem is formulated as a binary integer programming with degree and delay bounds. A tabu search heuristic is developed to solve the NP-complete problem. Outstanding results are obtained which is comparable to the optimal solution and applicable in real time.

Improved Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜에서 신뢰성 있는 멀티캐스트 전송을 위한 연결정보 기반의 효율적인 MAC 프로토콜)

  • Choi, Woo-Yong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.36 no.2
    • /
    • pp.94-100
    • /
    • 2010
  • The reliable multicast MAC (Medium Access Control) protocol is needed to guarantee the recipients' nonerroneous reception of the multicast data frames, which can be transmitted by the AP (Access Point) in infrastructure mode IEEE 802.11 wireless LANs. Enhancing the BMMM (Batch Mode Multicast MAC) protocol, in the literature, the connectivity-based reliable multicast MAC protocol was proposed to reduce the RAK (Request for ACKnowledgement) frame transmissions and enhance the multicast MAC performance. However, the number of necessary RAK frame transmissions increases as the number of multicast recipients increases. To alleviate the problem of the larger number of RAK frame transmissions with the larger number of multicast recipients, we propose the clustering algorithm for partitioning the recipients into a small number of clusters, so that the recipients are connected each other within the same clusters. Numerical examples are presented to show the reliable multicast MAC performance improvement by the clustering algorithm.

Path Level Reliability in Overlay Multicast Tree for Realtime Service

  • Lee, Chae-Y.;Lee, Jung-H.
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.312-315
    • /
    • 2006
  • Overlay Multicast is a promising approach to overcome the implementation problem of IP multicast. Real time services like internet broadcasting are provided by overlay multicast technology due to the complex nature of IP multicast and the high cost to support multicast function. Since multicast members can dynamically join or leave their multicast group, it is necessary to keep a reliable overlay multicast tree to support real time service without delay. In this paper, we consider path level reliability that connects each member node. The problem is formulated as a binary integer programming which maximizes the reliability of multicast tree. Tabu search based algorithm is presented to solve the NP-hard problem.

  • PDF

An SDN based hopping multicast communication against DoS attack

  • Zhao, Zheng;Liu, Fenlin;Gong, Daofu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2196-2218
    • /
    • 2017
  • Multicast communication has been widely used in the Internet. However, multicast communication is vulnerable to DoS attack due to static router configuration. In this paper, HMC, a hopping multicast communication method based on SDN, is proposed to tackle this problem. HMC changes the multicast tree periodically and makes it difficult for the attackers to launch an accurate attack. It also decreases the probability of multicast communication being attacked by DoS and in the meanwhile, the QoS constrains are not violated. In this research, the routing problem of HMC is proven to be NP-complete and a heuristic algorithm is proposed to solve it. Experiments show that HMC has the ability to resist DoS attack on multicast route effectively. Theoretically, the multicast compromised probability can drop more than 0.6 when HMC is adopt. In addition, experiments demonstrate that HMC achieves shorter average multicast delay and better robustness compared with traditional method, and more importantly, it better defends DoS attack.