• Title/Summary/Keyword: Multicast communication

Search Result 334, Processing Time 0.028 seconds

A Dynamic Multicast Scheme for Paging on HMIPv6 (HMIPv6 에서 페이징을 위한 동적 멀티캐스트 기법)

  • Park, Si-Yong;Lee, Bong-Hwan
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.1297-1300
    • /
    • 2007
  • 본 논문에서는 HMIPv6 에 적용이 가능한 핸드오프 확률 기반의 페이징 기법과 페이징 요구 메시지 전송을 위한 멀티캐스트 기법을 제안한다. 핸드오프 확률 기반의 페이징 기법은 모바일 호스트들의 이동 패턴에 기반하여 비정형화 된 페이징 영역을 설정하고 이를 기반으로 거리와 핸드오프확률을 이용하여 멀티캐스트 트리를 구성한다.

Design and Evaluation of Multicast Message Delivery Algorithm for Mobile Networks (이동통신망을 위한 멀티캐스트 메시지 전달 알고리즘의 설계 및 평가)

  • Jang, Ik-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.537-545
    • /
    • 2009
  • In this paper, we proposed an effective multicast causal order algorithm with hand-off protocol for mobile networks. Since the size of control informations needed to enforce message transfer order has much influence on the performance of hand-off and message transfer in mobile networks, size of control information need to be minimized. We reduced the size of control information by analyzing all the valid communication patterns and pruning redundant information not required to enforce causal order as early as possible, and used hand-off protocol which requires minimal amount of control information to be transferred. By simulation, we found that the proposed algorithm showed better performance than other existing algorithms.

Design of Multicast Group Key Management Protocol for Information Security in PIM_SM (PIM-SM 정보 보안을 위한 멀티캐스트 그룹 키 관리 프로토콜 설계)

  • 홍종준
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.87-94
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multcast user in PIM-SM multicast group communication. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager, Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel. after checking the user's validity through the secure channel, As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key, Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

Multimedia Data Security of Video Conferencing System (영상회의 시스템에서의 멀티미디어 데이터 보안)

  • 이원호;한군희
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.231-236
    • /
    • 2003
  • Video conferencing system it is various at internet and uses the reading is become accomplished. Research of like this portion synchronization of audio, the video compression technique and multimedia data, supports the video conference the research of the Mbone of the If multicast for being active, being become accomplished the multimedia service which is various an video from internet, the line speed of communication becomes high-speed anger and to follow leads is become accomplished. The video conference from opening elder brother dispersion internet network environment the problem against the image which is an image conference data and a voice security is serious and it raises its head. To sleep it presents the security method which from the video conference it follows in quality of multimedia data from the dissertation which it sees and it does.

  • PDF

A study on the Robust and Systolic Topology for the Resilient Dynamic Multicasting Routing Protocol

  • Lee, Kang-Whan;Kim, Sung-Uk
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.3
    • /
    • pp.255-260
    • /
    • 2008
  • In the recently years, there has been a big interest in ad hoc wireless network as they have tremendous military and commercial potential. An Ad hoc wireless network is composed of mobile computing devices that use having no fixed infrastructure of a multi-hop wireless network formed. So, the fact that limited resource could support the network of robust, simple framework and energy conserving etc. In this paper, we propose a new ad hoc multicast routing protocol for based on the ontology scheme called inference network. Ontology knowledge-based is one of the structure of context-aware. And the ontology clustering adopts a tree structure to enhance resilient against mobility and routing complexity. This proposed multicast routing protocol utilizes node locality to be improve the flexible connectivity and stable mobility on local discovery routing and flooding discovery routing. Also attempts to improve route recovery efficiency and reduce data transmissions of context-awareness. We also provide simulation results to validate the model complexity. We have developed that proposed an algorithm have design multi-hierarchy layered networks to simulate a desired system.

A Study on Optical internet Transmission technic Using DWDM based on network (네트워크 기반에서의 DWDM을 이용한 광 인터넷 전송 기술에 관한 연구)

  • 장우순;정진호
    • Journal of Internet Computing and Services
    • /
    • v.2 no.1
    • /
    • pp.87-96
    • /
    • 2001
  • This article proposes traffic dispersion with optical transmission technical and development of transmission rate for the safe multicast computer communication in the high bandwidth, Recently multicast traffic such as distance conference or Internet broadcast increases therefore the importance of traffic dispersion and transmission rate is emphasized. Ultimately this article offers the way of carrying out the above suggestion, First this paper points out traffic problems occurred in voice and text centered transmission. Next, transmission rate can be controlled by optical transmission technic to solve above difficulties in the multimedia and Internet. We investigated the feature and output on Add-Drop Mux/Demux and Also presented charges of length accord each stage in interference. We can show, the best data of design as a result of this experiment.

  • PDF

A Practical Unacknowledged Unicast Transmission in IEEE 802.11 Networks

  • Yang, Hyun;Yun, Jin-Seok;Oh, Jun-Seok;Park, Chang-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.3
    • /
    • pp.523-541
    • /
    • 2011
  • In current IEEE 802.11 wireless LAN, every unicast transmission requires an ACK from the receiver for reliability, though it consumes energy and bandwidth. There have been studies to remove or reduce ACK overhead, especially for energy efficiency. However none of them are practically used now. This paper introduces a noble method of selective unacknowledged transmission, where skipping an ACK is dynamically decided frame by frame. Utilizing the fact that a multicast frame is transmitted without accompanying an ACK in 802.11, the basic unacknowledged transmission is achieved simply by transforming the destination address of a frame to a multicast address. Since removing ACK is inherently more efficient but less strict, its practical profit is dependent on traffic characteristics of a frame as well as network error conditions. To figure out the selective conditions, energy and performance implications of unacknowledged transmission have been explored. Extensive experiments show that energy consumption is almost always reduced, but performance may be dropped especially when TCP exchanges long data with a long distance node through a poor wireless link. An experiment with a well-known traffic model shows that selective unacknowledged transmission gives energy saving with comparable performance.

A Study on the Ordered Multicast Protocols with Flow Control (흐름제어를 이용한 순서화 멀티캐스트 프로토콜에 관한 연구)

  • 박판우;이기현;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.10
    • /
    • pp.1117-1130
    • /
    • 1992
  • In this study, we propose a protocol for the communication between process groups required during message transfers. This is accomplished by an efficient process management of distributed systems connected by computer networks. For a single process group, a multicast protocol was proposed, which can control message flows while maintaining the order of messages sent or delivered. Through use of membership-related services, a member composing a process group may leave and join the current a membership anytime during execution. Moreover, message delivery can be delayed by using a logical vector time stamp. The functionality of the message delivery includes a virtual synchronization in response to a change in membership.

  • PDF

The Study on the Improvement of Multicast in IPv6 (Xcast적용 및 성능향상을 위한 연구)

  • Lim, Seung-Ho;Song, Jeong-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.146-149
    • /
    • 2005
  • Confusion of network traffic is increased by increasing of internet user and large of network, Specially olded one and one communication caused loss of bandwidth because of redundant packet by increasing video conference and internet broadcasting. Thereupon multicast technique, method reducing loss of bandwith, for multimedia data transmission was proposed. This paper proposes method to solve overhead problem in the middle router through group management and capsuling with the Xcast technique added Disignated Router(DR). To solve the middle router not supporting IPv6, Xcast using tunneling technique in the IPv6 design and analyze the performance through a simulated examination.

  • PDF