multicast protocols
Recently Published Documents


TOTAL DOCUMENTS

165
(FIVE YEARS 1)

H-INDEX

15
(FIVE YEARS 0)

2021 ◽  
Vol 11 (2) ◽  
pp. 578
Author(s):  
Bo Li ◽  
Jinlin Wang

Many bandwidth-intensive applications (such as online live, online games, etc.) are more suitable for using multicast to transmit information. Due to the advantages in scalability, Shared Tree (ST) is more suitable for large-scale deployment than Source-Based Tree (SBT). However, in ST-based multicast, all multicast sources need to send multicast data to a center node called a core, which will lead to core overload and traffic concentration. Besides, most existing multicast protocols use the shortest path between the source or the core and each receiver to construct the multicast tree, which will result in traffic overload on some links. In this paper, we propose an Identifier and Locator Decoupled Multicast approach (ILDM) based on Information-Centric Networking (ICN). ILDM uses globally unique names to identify multicast services. For each multicast service, the mapping between the multicast service name and the addresses of multicast tree nodes is stored in the Name Resolution System (NRS). To avoid core overload and traffic aggregation, we presented a dynamic core management and selection mechanism, which can dynamically select a low-load core for each multicast service. Furthermore, we designed a path state-aware multicast tree node selection mechanism to achieve traffic load balancing by using low-load links more effectively. Experimental results showed that our proposed multicast approach outperformed some other multicast methods in terms of core load, number of join requests, link load, traffic concentration, and routing state.



Wiley 5G Ref ◽  
2020 ◽  
pp. 1-18
Author(s):  
Ajay Bhardwaj ◽  
Samar Agnihotri
Keyword(s):  






10.29007/dhwl ◽  
2019 ◽  
Author(s):  
Koushik Maddali ◽  
Banafsheh Rekabdar ◽  
Swathi Kaluvakuri ◽  
Bidyut Gupta

Application level multicast is independent of router infrastructure unlike router-based IP multicast. The existing DHT-based application level multicast protocols work efficiently as long as there is almost no churn; otherwise, their performances start degrading drastically, because DHT – based architecture cannot handle churn effectively. Besides, most of DHT-based multicast protocols consider single data source and do not consider peer heterogeneity. In this work, we have considered an existing non-DHT based P2P architecture, viz., Residue Class based (RC-based) architecture which has already been shown to perform much better than some well-known DHT-based architectures from the viewpoints of speed of unicast communication and churn handling. We have presented a highly efficient capacity-constrained and any source multicast protocol suitable for the RC-based P2P architecture as mentioned above.



2019 ◽  
Vol 51 (02) ◽  
pp. 373-380
Author(s):  
N.N HUSSAINI ◽  
S ABBASI ◽  
A.A CHANDIO ◽  
S.M.R SHAH


Sensor Review ◽  
2019 ◽  
Vol 39 (1) ◽  
pp. 58-70 ◽  
Author(s):  
Oussama Senouci ◽  
Zibouda Aliouat ◽  
Saad Harous

Purpose This paper is a review of a number routing protocols in the internet of vehicles (IoV). IoV emphasizes information interaction among humans, vehicles and a roadside unit (RSU), within which routing is one of the most important steps in IoV network. Design/methodology/approach In this paper, the authors have summarized different research data on routing protocols in the IoV. Several routing protocols for IoV have been proposed in the literature. Their classification is made according to some criteria such as topology-based, position-based, transmission strategy and network structure. This paper focuses on the transmission strategy criteria. There exist three types of protocols that are based on this strategy: unicast protocol, broadcast protocols and multicast protocols. This later type is classified into two subclasses: geocast and cluster-based protocols. The taxonomy of the transmission strategy is presented in this study. We discuss the advantages and disadvantages of each type with a general comparison between the five types. Findings The authors can deduce that many challenges are encountered when designing routing protocols for IoV. Originality/value A simple and well-explained presentation of the functioning of the IoV is provided with a comparison among each categories of protocols is well presented along with the advantages and disadvantages of each type. The authors examined the main problems encountered during the design of IoV routing protocol, such as the quick change of topology, the frequent disconnection, the big volume of data to be processed and stored in the IoV, and the problem of network fragmentation. This work explores, compares existing routing protocols in IoV and provides a critical analysis. For that, the authors extract the challenges and propose future perspectives for each categories of protocols.



Author(s):  
Hoai Son Nguyen

Since the deployment of IP multicast remains restricted due to many practical and political issues, researchers have shifted focus to exploiting application-layer multicast for multicast data delivery. Recently there has been considerable interest in applying DHT routing algorithms to application-level multicast. However, early DHT-based multicast protocols are insufficient in addressing a number of technical issues such as heterogeneous capacity of nodes or node churn. In this chapter, the author describes a solution called BAM-Chord (i.e., Bandwidth Adaptive Multicast over Chord) that optimizes the topology of a multicast tree based on node bandwidth. In the proposed solution, node position (i.e., node identifier) on a BAM-Chord ring will be decided based on node bandwidth capacity such that it can build a wide and balanced multicast tree rooted at the source node. As a result, BAM-Chord protocol can utilize network resources of every node to reduce the depth of the multicast tree and take advantages of DHTs in maintaining the multicast tree.





Sign in / Sign up

Export Citation Format

Share Document