The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Disruption Tolerant Networks (DTNs) are characterized by frequent network partitioning. This causes network connectivity to be opportunistic. In recent years, many collaborative applications have been envisioned for DTNs. These applications rely on the availability of reliable group communication protocols. To address this challenge in DTNs, we propose a scalable multicasting scheme that deterministically...
The innovative exploitation of network coding technology could bring great design advantages to MANETs. First, wireless links are inherently lossy due to channel fading or interference. Second, the delivery condition of the route from the source to each receiver in a multicast transmission might be significantly distinct. Trying to satisfy the reliability requirement for the poorly-connected receivers...
Leader-based protocols have been proposed for wireless networks such as 802.11 as an alternative approach to MAC layer ARQ. If based on feedback cancellation, such protocols may achieve low latency and high throughput at predictable reliability and superior scalability with respect to the number of subscribers. Especially for delay-bounded multicast A/V transmission these properties are highly desirable...
Wireless mesh networks (WMNs) have gained considerable attention in the recent years due to fast deployment, easy maintenance and low upfront investment compared with traditional wireless networks. Since WMNs are typically used as wireless backbones, they have the nature that the wireless communication is not stable. Hence, it is significant to protect them against link or node failures. Distribution...
Wireless mesh networks (WMNs) have gained considerable attention in the recent years due to fast deployment, easy maintenance and low upfront investment compared with traditional wireless networks. Since WMNs are typically used as wireless backbones, they have the nature that the wireless communication is not stable. Hence, it is significant to protect them against link or node failures. Distribution...
Group applications like the audioconference require a minimum level of quality of service for the adequate transmission of voice packets and the improvement of the signaling processes for joining, maintaining and leaving multicast groups. Traditionally, SIP servers have dealed with unicast signaling and have also been supported by IP multicast facilities described within the SDP payload information...
Multicasting can be an useful service in wireless mesh networks (WMNs), which have gained significant acceptance in recent years due to their potentials of providing a low-cost wireless backhaul service to mobile clients. Many applications in WMNs require efficient and reliable multicast communication, i.e., with high delivery ratio but with less overhead, among a group of recipients. However, in...
Security for wired embedded networks is becoming a greater concern as connectivity to the outside world increases. Protocols used in these networks omit support for authenticating messages to prevent masquerade and replay attacks. The unique constraints of embedded control systems make incorporating existing multicast authentication schemes impractical. Our approach provides multicast authentication...
In mobile ad hoc networks (MANETs), Quality of Service (QoS) of a multicast protocol is one of the most important performance metrics. Channel conditions and network topology frequently change, and in order to achieve a certain QoS, complex algorithms and protocols are needed. Often channel conditions are neglected during the design of a multicast protocol. However, vulnerability against channel errors...
Data transmission, such as software update, large file broadcasting and video on demand, can take advantage of the wide coverage and the broadcasting features of the satellite networks. The multicast technologies provide the support for these applications by efficiently using the expensive satellite bandwidth. One of them is the file delivery over unidirectional transport (FLUTE) protocol that is...
Although much work has been done on the design of gossip-based protocols, how to model and analyze the performance of such protocols is still a challenging task. The performance of a gossip-based protocol is significantly affected by its key parameters, e.g. the fanout of nodes. Determining the setting of such parameters through mathematical models is a key issue in gossip-based reliable multicast...
We describe an approach to improving network performance in networks with heterogeneous links - for example, a communications network constructed from satellite links, airborne relays, and line-of-site radios - using disruption tolerant networking. DTN defines an overlay network that uses storage at each hop to make end-to-end communications resilient to delay, loss, network disruption, temporary...
To improve the efficiency of reliable broadcast/multicast MAC protocol in wireless multi-hop network, a location aid algorithm to eliminate redundant nodes was brought forward. Using the neighbor geographical location information, according to the principle of equivalent collision region, the algorithm could reduce redundant nodes from receivers, which is unnecessary for acknowledgement. Thus, the...
In wireless sensor networks, existing location- based multicast protocols deliver data packets to group members through static data paths, using the location information of group members. Routing paths in the data delivery paths are never changed unless topology changes. Therefore, the nodes on the routing paths can be dead owing to continuous energy consumption and thus the lifetime of network might...
In this paper we present a comparative study of the nominee-based approach and consolidation-based approach to TCP-friendly reliable multicast. In this study, we find that TCP-friendliness may not be maintained in the nominee-based approach. The lack of flow control on recovery traffic is another drawback of nominee-based approach. On the other hand, throughput of the basic consolidation-based approach...
Gossiping has been widely used for disseminating data in large scale networks. Existing works have mainly focused on the design of gossip-based protocols but few have been reported on developing models for analyzing the fault tolerance property of these protocols. In this paper, we propose a general gossiping algorithm and develop a mathematical model based on generalized random graphs for evaluating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.