A Time and Distance - Based Multicast Algorithm for IPv6 Mobile Networks

Size: px
Start display at page:

Download "A Time and Distance - Based Multicast Algorithm for IPv6 Mobile Networks"

Transcription

1 A Time and Distance - Based Multicast Algorithm for IPv6 Mobile Networks Wu-Hsiao Hsu, Bin-Hau Lee, Ming-Han Liu, Bor-Yeh Shen, Kun-Hua Lin Department of Computer Science and Engineering, Ming-Chuan University, Taoyuan, Taiwan wuhsiao@mcu.edu.tw Abstract IP multicasting has naturally been considered the ideal technique to be used with multimedia communications. Unfortunately, current multicast protocols do not consider the dynamic membership. Therefore, we propose a time and distance-based multicast algorithm TDBMA for IPv6 mobile networks. The TDBMA is subject to time and distance. A foreign network is qualification to join the existing multicast tree only its value of time and distance is larger than a computed threshold. The experimental analyses are presented to characterize the performance of the proposed algorithm. Keywords: IP multicast, Mobile networks, multicast tree. 1. Introduction Recently mobile hosts MH and wireless networks have become widely popular. For the wireless network, users are allowed to connect networks without being tethered off a wired network. In the meantime, multimedia applications such as video on demand VoD, video conferencing, and on-line games have also become extremely popular and attractive. It is becoming clear that MH will expect to have access to the multimedia applications available in traditional wired networks. Therefore, multicasting has naturally been considered the ideal technique to be used with multimedia communications, mainly because its inherent nature is to minimize the network resource. Consequently, many efforts are being made to provide efficient mobility and multicasting support in the current IP networks. Many multicast protocols, such as DVMRP, PIM-SIM, and MOSPF, have been proposed by the IETF and used on the Internet. These protocols implicitly assume static hosts when building a multicast delivery tree. They do not consider the dynamic membership. Therefore, current multicast protocols have not been optimized to handle host mobility. The addition of mobility in the host group implies that the multicast algorithm ought to focus not only on the issue of dynamic group membership, but also on host location. When a MH moves to a foreign network and resubscribes to a multicast tree, the foreign network must determine whether the subscription was accepted or rejected. If the foreign network accepts the subscription, it is clear that frequent reconfiguration of multicast delivery tree every time a host moves could result in substantial control overhead. On the other hand, if the foreign network rejects the subscription, it is also clear that leaving a multicast tree unchanged every time a host moves can result in inefficient and increased delay of multicast datagram delivery. In this paper, we propose a time and distance-based multicast algorithm TDBMA for IPv6 mobile networks. When a MH arrives at a foreign network and resubscribes to a multicast group, the foreign network can use TDBMA to determine whether it can join the multicast group or not. TDBMA is subject to two key factors: one is time which describes the total time that the MH stays in the foreign network. The other is distance which describes the distance from the foreign network to the multicast tree. The foreign network can join the multicast group directly only both the time and distance are larger than a computed threshold. The remainder of this paper is organized as follows. In section 2, the previous works was introduced. Section 3 introduces our TDBMA. The simulation model and results are described in section 4. Some conclusions are given in section Previous works Previous works on finding a multicast tree can be classified into two categories. First, the destination nodes are static during the transmission period. This multicast routing problem has been formulated as finding a minimum cost multicast tree problem, which is also known as the Steiner tree problem [1], [2] and was shown to be NP-complete [3]. Secondly, a dynamic network node denoted as MH in this paper is allowed to move during its call holding time. Two basic mechanisms have been proposed by the IETF in mobile IP to support multicasting. These are known as 1 Proceedings of the 18th International Conference on Advanced Information Networking and Application AINA 04

2 remote subscription and bi-directional tunneling, and have been described in [4] for IPv4 and [5] for IPv6. The remote subscription provides the shortest routes for delivery of multicast datagrams to mobile hosts, while the bi-directional tunneling hides host mobility from all other members of the group. The bi-directional tunneling is based on home agent functionality. Mobile hosts receive multicast data by way of their home agents. This results from the fact that multiple Mobile IP tunnels from different HAs terminate at a common FA. This feature is called the tunnel convergence problem. MoM [6] was proposed to solve this problem. It uses the DMSP Designated Multicast Service Provider to avoid duplicate datagram being tunneled to the common FA. RBMoM [7] was proposed and intended to trade off between the shortest delivery path and the frequency of the multicast tree reconfiguration by controlling the service range of the multicast home agent. 3. The time and distance - based multicast algorithm TDBMA When a MH moves to a foreign network FN, TDBMA must be used by the foreign network router FNR to determine whether it can join the multicast tree or not. For simplicity, we assume that an existing multicast routing protocol DVMRP, PIM-SIM, or MOSPF was used in the wired network and already established a multicast tree T. The source node and destination nodes of the multicast group mg are described by a pair, D where is the source node of the multicast group mg and D is the finite set of destination nodes to be connected from source node. T = V T, E T where V T is the set of nodes on the tree, {} D V T and E T is the set of links on the tree. 3.1 The description and definition of the time and distance When a MH arrives at a FN, it follows the registration scenario of mobile IPv6 that sends a packet via FNR to its HA containing a Binding Update BU destination option. If the MH resubscribes to the mg, TDBMA must immediately be used by the FNR to determine whether the FNR is qualification to join the T or the MH just receive multicast packets by way of its HA, using unicast mobile IP tunnels from its HA. The key points that determine to join the T or not depend on time and distance. The time is defined by how long the MH stays in the FN. It is possible that the MH may temporarily stay in the FN and move to another FN as soon as possible. In this case, the FNR is not qualification to join the T. On the other hand, the MH may stay in the FN for a period of time. During this period of time, if the MH wants the services of the HA beyond the current registration period, the MH must send a new BU to it before the expiration of this period. As a result, the more the BU was sent by the MH, the longer the MH stays in the FN. In this case, it is inefficient for the MH to receive multicast packets by way of its HA. The FNR may join the T and then directly forward the multicast packets to MH. In contrast to the time, the distance is defined by the shortest path length from MH to the T. If the distance from the MH to the HA is larger than the distance from MH to the T, it is also inefficient for the MH to receive multicast packets by way of its HA. The best way for the MH to receive multicast packets is directly from the T. In this case, the FNR may join the T and forward the multicast packets to the MH. 3.2 The description of the TDBMA In TDBMA, two tables have been defined. As shown in figure 1, each FNR not including in the T maintains a Binding Table BT which describes the information of a MH, the obtained care-of address CoA of a MH, the total number of Binding Update BU that a MH has sent denoted by BUG, and the multicast group MG that a MH is going to join. Also, the of each T records a Network Table NT which describes the FNR, BUG, the average number of BUG for a multicast group denoted by ABUG, and the multicast group MG that the FNR is going to join. TDBMA uses a FN-metric, referred to as foreign network metric, to determine whether a FNR is qualification to join the T or not. FN-metric can be defined as where d t FN-metric = d + 1- t 1 if D _ FH D _ FS 0 if D _ FH D _ FS, and if BUG ABUG 1 0 if BUG ABUG. Both d and t represent the distance and time, respectively. D_FH and D_FS denote the distance from the FNR to HA and the distance from the FNR to the ontree nodes, respectively. For the distance d, if D_FH is larger than D_FS, this means that the MH may be far away from its HA and close to the T. In this case, the value of d is set to 1. Similarly, for the time t, if BUG is larger than ABUG, this means that the MH may stay in the FN for a long time. In this case, the value of t is set to 1. TDBMA recommend that the FNR can directly join the T only both the value of t and d is equal to 1. is a constant weighting factor, where 0 1. Choosing a value for close to 1 and 0 makes the FN- 2 Proceedings of the 18th International Conference on Advanced Information Networking and Application AINA 04

3 metric to d and t, respectively. For other cases, the FNmetric depends on the value of d and t. 3.3 The operation of TDBMA As shown in figure 2, suppose the, D = A, {C, D, E, F} and both MH1 and MH2 have moved from nodes F to H and D to G, respectively. For the initial stage, each MH will receive multicast packets by way of its HA after finishing the registration procedures. Suppose MH1 has sent totally six times of BU to its HA F and MH2 has sent totally two times of BU to its HA D. In the meantime, each FNR will send its own BT periodically to the source node A. For example, Both H and G will send the BT to the A. After receiving all BTs, the will calculate ABUG and write the result into NT for the multicast group mg. Let T BUG = {BUG 1, BUG 2,.., BUG x } denote as the set of BUGs of all nodes not in the T. Also, letµ BUG denote as the mean of the T BUG containing X items and can be represented as x i BUG 1 BUGi where BUG i denotes the sum of the values of all data in the T BUG. The corresponding standard deviation BUG can also be defined as BUG X x BUGi i 1 X The proportion of data falling within k standard deviations of the mean, which is called Chebyshev s theorem [8], is given by 1-1/k 2 where k > 1. The important advantage of Chebyshev s theorem is that the desired proportion is independent of the distribution of data set. From Chebyshev s, an ABUG can be calculated as following, BUG ABUG = µ BUG + k BUG. For example, as shown in figure 2, the T BUG = {6, 2}, µ BUG = 4 and BUG = If we let k = 1.1, ABUG = Obviously, the value of ABUG depends on a given k. For calculating both D_FH and D_FS, it is easy to find the D_FH by checking the unicast routing table resided in the FNR. The unicast path is typically the shortest path in terms of hop length. For example, as shown in figures 3a and 3b,, D = A, {D, E, F, H} and V T = {A, B, C, D, E, F, G, H}. The HA and FNR of the MH1 are nodes H and K, respectively. When the 2 MH1 arrived at the node K, node K will find the D_FH, which is 2 hops and the path is KLH, by checking its unicast routing table directly. In contrast to D_FH, D_FS is found by sending a probe message from FNR to the T along the unicast shortest path from FNR to the. If an on-tree node receives this probe message, it will reply to this message which includes the information of D_FS. Otherwise, the probe message is again sent towards the. For example, as shown in figure 3c, node K will find the shortest path to by check its unicast routing table. Then it will send the probe message towards the. The on-tree node G, as shown in figure 3d will reply that the D_FS is 1 to node K. After determining the d and t, the FN-metric was calculated by the FNR as following, FN metric 1 0 if d 1 and t 1 and 0 and 1 otherwise. Obviously, if FN-metric is equal to 1, the FNR is qualification to join the mg. That is, the FNR can join the T and directly receive all multicast packets. Otherwise, the FNR is not allowed to join the T and will still receive the multicast packets by way of its HA. For example, as shown in figure 2, only node H is qualification to join the T since BUG > ABUG = 6 > and D_FS 1 < D_FH 2. If we let k = 1.5, none of the FNRs are allowed to join the T. It is clear that if a smaller k is given, there are more nodes to be considered to join the T. 3.4 The TDBMA In TDBMA, when a MH moves to a FN and resubscirbes to a mg, there are four cases to be discussed : 1 Both the HA and FNR have already joined the mg. In this case, after the procedure of registration, the MH can receive the multicast packets by way of the FNR. As shown in figure 4a, suppose the, D = A, {D, F, H} and MH1 moves from nodes F to H. Since both HA F and FNR H of the MH1 have joined the mg, MH1 can receive the multicast packets by way of the H. 2 The HA has joined the mg but the FNR does not. In this case, the FNR must calculate its FN-metric. As shown in figure 4b, suppose the, D = A, {D, F}. Sine node F has joined the mg but node H does not, node H must calculate its own FN-metric in order to determine whether it can join directly the mg or not. 3 The FNR has joined the mg but the HA does not. In this case, the HA must be forced to join the mg because it is possible that the MH will move to another FN at any time. At this time, the MH can still receive the 3 Proceedings of the 18th International Conference on Advanced Information Networking and Application AINA 04

4 multicast packets by way of its HA. As shown in figure 4c, suppose the, D = A, {D, H}. Because the node F does not join the mg, node H must inform the node F to join the mg. 4 Both the HA and the FNR does not join the mg. In this case, the HA must be forced to join the mg and the FNR can calculate its own FN-metric in order to determine whether it is qualification to join the mg or not. As shown in figure 4d, suppose the, D = A, {D}. The nodes F and H are forced to join the mg and calculate its own FN-metric, respectively. 4. The simulation model and results 4.1 Simulation models and assumptions A network model with n nodes, which is similar to that of [9], is randomly distributed in a rectangular coordinate grid. Each node is located in an integer coordinates and represented as a multicast router and base station. The radius of transmission range of each node is chosen randomly from 0, L]. The maximal node n and radius L are set to 50 and 100, respectively. The size of the number of moving hosts will be given by 0 initially and increased by 5 each time until 20. Also, the initial size of multicast member D is given by 20. For simplicity, suppose the distance is measured by hop count. That is, the distance of a path from MH to source node is measured by the number of routers that a datagram encounters along this path. The BUG of a BT maintained by the FNR can be chosen randomly from 1, 30. The k is set to 1.1 for our all experiments. The is given by 0, 1, and 0.2 for different performance evaluation. All parameters are summarized in the table Simulation results and discussion The simulation results are shown in figures 5 and 6 which are to evaluate the number of nodes on the multicast tree T and the number of operation of joining and pruning, respectively. Three different algorithms, Join remote subscription, Tunnel bi-directional tunneling, and TDBMA are compared by changing the parameter to 0, 1, and 0.2 respectively. The total number of nodes in the V T is 27 based on the given D for our simulation. For = 0, FN-metric = t. That is, the value of FNmetric is determined by t factor only. Look at figures 5a and 6a, if the total number of moving node is 0, TDBMA produces the highest nodes in the V T because the MHs, which possible already arrived at FN, are randomly chosen. If the HAs of these chosen MHs do not join the T, these HAs are forced to join the T. Hence even there are no MHs, the nodes in the V T will still be increased. If the total number of moving nodes is increased from 5 to 20, TDBMA still almost produces the highest nodes in V T. This is because there are too much pruning operations in the Join algorithm. For example, for the number of moving nodes 5, the number of join operation is 3. The remaining 2 moving nodes are moved to the on-tree nodes. Hence, the total number of nodes in the V T is 30. But since the pruning operation is also 3, the number of nodes in the V T is reduced to 27, which is same number as our simulation default. On the other hand, since the Tunnel algorithm is independent of the moving host location, the number of nodes in the V T is never changed and the number of joining and pruning is always 0. For = 1, FN-metric = d. That is, the value of FNmetric is determined by d factor only. Look at figures 5b and 6b, since there are higher number of joining and pruning than that of = 0, the Join algorithm has the lowest V T. TDBMA still has the highest nodes in the V T. The reason is the same as the = 0. For = 0.2, FN-metric depends on t and d. Look at figures 5c and 6c, it is obviously that the number of nodes in the V T is reduced for TDBMA because it is not easy for each MH to satisfy the condition of FN-metric. From our simulation, the Join algorithm produces too much number of Joining and Pruning in high mobility. As a result, the multicast tree T reconstructs more frequently. Hence, the multicast network established by Join algorithm is quite unstable and also waste more network resource than other algorithms. On the other hand, although TDBMA produces more nodes in the V T than Join algorithm, the total number of Joining and Pruning is lower than that of Join algorithm. Hence, the multicast network is more stable and the transmission of multicast packets is more efficient. Finally, though the Tunnel algorithm has the most stable multicast network, it has the lowest efficiency for transmitting the multicast packets. 5. Conclusions When a MH moves to a FN and resubscribe to the mg, an algorithm must be used to determine whether this MH can join the current multicast tree T or receive the multicast packets by way of its HA. In this paper, we propose a new algorithm, TDBMA, which depends on the time and distance of the MH. Unlike Join algorithm, which joins the T without any restriction, and Tunnel algorithm, which the number of tunnels is unlimited, TDBMA can be used by the MH to join the T only the time and distance of the MH satisfy the defined condition. The simulation results show that the multicast tree update by TDBMA is not as frequent as Join algorithm. Also, the TDBMA is more efficient than Tunnel algorithm for receiving the multicast packets. References 4 Proceedings of the 18th International Conference on Advanced Information Networking and Application AINA 04

5 [1] R.Garey and S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, Freeman, New York, [2] P. Winter, Steiner problem in networks: A survey, Networks, vol. 17, pp , [3] R.Garey and S. Johnson, The rectilinear Steiner tree problems is NP-complete, SIAM J. Appl. Math., vol. 32, pp , [4] G. Xylomenos, and G. Polyzos, IP Multicast for Mobile Hosts, IEEE Commun. Mag., vol. 35, no. 1, Jan. 1997, pp T/FUXPSL 5BCMF / #6 #6. #5 H H. #5 # [5] C. Bettstetter, A. Riedl, and G. GeBler, Interoperation of Mobile Ipv6 and Protocol Independent Multicast Dense Mode, Proc. Wksp. WL Net. Mob. Comp., Toronto, Canada, Aug [6] T.G. Harrison, C.L. Williamson, W.L. Mackrell and R.B. Bunt, Mobile multicastmom protocol: Multicast support for mobile hosts, in: proceedings of ACM/IEEE MOBICOM 97. T#JOEJOH 5BCMF. $P #6.. *1 H #6. T#JOEJOH 5BCMF. $P #6.. *1 H Figure 2. The operation of TDBMA [7] Chunhung Richard Lin, Kai-Min Wang, Scalable Multicast Protocol in IP-Based Mobile Networks, Wireless Networks 8, 27-36, probe messge find the shortest path by check unicast routing table [8] D.R. Byrkit, Statistics Today: A comprehensive Introduction, Menlo Park, California, [9] B.M. Waxman, Routing of multipoint connections, IEEE J. Select. Areas Commun., vol.6, no.9, pp , Dec $P #6. * +, - a MH1 moves from node H to node K. * +, - b Node K calcuates the D_FH by checking its unicast routing table B 5IF#JOEJOH 5BCMF * +., - c Node K calcuates the D_FS by sent the probe message along the unicast shortest path from node K to source A * +., - d The on-tree node G reply to the probe message to node K which include the information of D_FS / #6 #6. Figure 3. The calculation of D_FS C 5IF/FUXPSL 5BCMF Figure 1. The defined tables. B CPUI BOE IBWFKPJOFE UIFTBN FN VMUJDBTUHSPVQ. C IBTKPJOFEUIFNVMUJDBTU USFFCVU EPFTOPU DBMDVMBUFJUTPXO / N FUSJD. D IBTKPJOFEUIFNVMUJDBTU USFFCVU EPFTOPU JTGPSDFE UP KPJO UIFN VMUJDBTUUSFF. JTGPSDFE UP KPJO UIFN VMUJDBTUUSFF DBMDVMBUFJUTPXO / N FUSJD E #PUI BOE EPFTOPUKPJOUIF N VMUJDBTUUSFF Figure 4. The four cases of TDBMA 5 Proceedings of the 18th International Conference on Advanced Information Networking and Application AINA 04

6 Table 1. The simulation parameters Paramete Description Value r n The total number of nodes in our 50 network model L The radius of transmission range 100 between two nearby nodes. MH The total number of moving hosts 0 ~ 20 d The distance of a path from source Hop count to destination t The time that MH stays in a FN 1 ~ 30 k a constant weighting factor 1.1 a constant weighting factor 0, 1, and 0.2 D The size of multicast member 20 /VN CFSPG/PEFTJOUIF. VMUJ U5SFF D B T 5P BM/ U V NSPG+PJOJOHBOE1 C F SVO O J 5PU M B VNCFS / PG+PJ JOHBOE1SVOJOH O /VNC SPG.PW F OH/P J ETF a = 0 /VNCFS PG. PWJOH /PEFT b = 1 /VNCFSPG.PWJOH/PEF T /VNCFS PG/PEFTJ OU F I.VMU BT J UD SF 5F a = 0 5PUBM/ VN CFS PG +PJOJOHBOE1SVO OH J /VNCFS PG. PWJOH /PEFT /VNCFS PG. PWJOH /PEF T b = 1 c = 0.2 Figure 6. The total number of joining and pruning /VNCF S PG/PEFTJ OU F I.VMU JTUD SFF B5 /VNCF S PG. PWJOH /PEFT c = 0.2 Figure 5. the number of nodes in the multicast tree 6 Proceedings of the 18th International Conference on Advanced Information Networking and Application AINA 04

An Efficient Multicast Routing Protocol for Mobile Hosts

An Efficient Multicast Routing Protocol for Mobile Hosts An Efficient Multicast Routing Protocol for Mobile Hosts Miae Choi, Byung-Won On, Hyunki Baik and Myong-Soon Park Department of Computer Science & Engineering, Korea University Email: {mine, Dwon, xihson.

More information

A Timer-Based Mobile Multicast Routing Protocol in Mobile Networks

A Timer-Based Mobile Multicast Routing Protocol in Mobile Networks A Timer-Based Mobile Multicast Routing Protocol in Mobile etworks Jin Park and oung-joo Suh Department of Computer Science & Engineering Pohang University of Science & Technology (POSTECH) San 31 Hyoja-Dong

More information

Reliable Mobile IP Multicast Based on Hierarchical Local Registration

Reliable Mobile IP Multicast Based on Hierarchical Local Registration Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Reliable Mobile IP Multicast Based on Hierarchical Local Registration Huanming ZHANG, * Quanlong GUAN, Zi Zhao ZHU, Weiqi

More information

IP MULTIMEDIA IN N EXT-GENERATION MOBILE N ETWORKS: SERVICES, PROTOCOLS, AND T ECHNOLOGIES ABSTRACT

IP MULTIMEDIA IN N EXT-GENERATION MOBILE N ETWORKS: SERVICES, PROTOCOLS, AND T ECHNOLOGIES ABSTRACT IP MULTIMEDIA IN N EXT-GENERATION MOBILE N ETWORK: ERVICE, PROTOCOL, AND T ECHNOLOGIE MULTICAT FOR MOBILE HOT IN IP NETWORK: PROGRE AND CLLENGE CHRITOPHE JELGER AND THOMA NOEL LITT - LOUI PATEUR UNIVERITY

More information

Seamless Multicast Handover in Fmipv6-Based Networks

Seamless Multicast Handover in Fmipv6-Based Networks Seamless Multicast Handover in Fmipv6-Based Networks Moneeb Gohar, Seok Joo Koh, Tae-Won Um, and Hyun-Woo Lee Abstract This paper proposes a fast tree join scheme to provide seamless multicast handover

More information

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998.

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998. Supporting IP Multicast for Mobile Hosts Yu Wang Weidong Chen Southern Methodist University fwy,wcheng@seas.smu.edu May 8, 1998 Abstract IP Multicast is an ecient mechanism of delivering a large amount

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

An Enhancement of Mobile IP by Home Agent Handover

An Enhancement of Mobile IP by Home Agent Handover An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,

More information

Chapter 3 A New Framework for Multicast Mobility in WiFi Networks

Chapter 3 A New Framework for Multicast Mobility in WiFi Networks Chapter 3 A New Framework for Multicast Mobility in WiFi Networks 3.1 Introduction This chapter presents the designed framework that was produced during this research. The chapter describes about network

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea

More information

1. INTRODUCTION. Keywords IP, bandwidth, wireless technology, linear programming.

1. INTRODUCTION. Keywords IP, bandwidth, wireless technology, linear programming. ISSN (ONLINE): 2349-7084 GLOBAL IMPACT FACTOR 0.238 DIIF 0.876 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 2, ISSUE 7, JULY 2015, PP 458-465 USING INTEGER LINEAR PROGRAMMING

More information

Multicast Communications

Multicast Communications Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

Optimal method to Reducing Link and Signaling Costs in Mobile IP

Optimal method to Reducing Link and Signaling Costs in Mobile IP Optimal method to Reducing Link and Signaling Costs in Mobile IP Sridevi Assistant Professor, Department of Computer Science,Karnatak University,Dharwad Abstract The objective of this research paper is

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

List of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF

List of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF Multicast OSPF OSPF Open Shortest Path First Link State Protocol Use Dijkstra s algorithm (SPF) Calculate shortest path from the router to every possible destination Areas Limit the information volume

More information

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa Multicast Communications Slide Set were original prepared by Dr. Tatsuya Susa Outline 1. Advantages of multicast 2. Multicast addressing 3. Multicast Routing Protocols 4. Multicast in the Internet 5. IGMP

More information

Regional Registration-Based Mobile Multicast Service Management in Mobile IP Networks

Regional Registration-Based Mobile Multicast Service Management in Mobile IP Networks Wireless Pers Commun DOI 10.1007/s11277-009-9745-9 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Regional Registration-Based Mobile Multicast Service Management in Mobile IP Networks Ing-Ray Chen

More information

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Ljubica Blazević Jean-Yves Le Boudec Institute for computer Communications and Applications (ICA) Swiss

More information

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Ljubica Blazević Jean-Yves Le Boudec Institute for computer Communications and Applications (ICA) Swiss

More information

Multicast routing Draft

Multicast routing Draft Multicast routing Draft Lucia Tudose Nokia Research Center E-mail: tudose@research.nokia.com Abstract Multicast routing is establishing a tree which is routed from the source node and contains all the

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet * gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

Interaction of RSVP with ATM for the support of shortcut QoS VCs: extension to the multicast case

Interaction of RSVP with ATM for the support of shortcut QoS VCs: extension to the multicast case Roberto Cocca, Stefano Salsano Interaction of RSVP with ATM for the support of shortcut QoS VCs: extension to the multicast case INFOCOM Department Report 004-004-1999 University of Rome La Sapienza Abstract

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Hyemee Park, Tae-Jin Lee, and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Flow Control in Reliable Multicast Protocol

Flow Control in Reliable Multicast Protocol Flow Control in Reliable Multicast Protocol Flow Control in Reliable Multicast Protocol Ali M. Alsaih Department of Communication Technology and Networks University Putra Malaysia Abstract A Flow Control

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Q-PMIP: Query-based Proxy Mobile IPv6

Q-PMIP: Query-based Proxy Mobile IPv6 Q-PMIP: Query-based Proxy Mobile IPv6 Jae Wan Park*, Ji In Kim*, Seok Joo Koh* *School of Computer Science and Engineering, Kyungpook National University, Korea jwparkinf8@gmail.com, jiin16@gmail.com,

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E- mail: sj ko h @ pcc.c t ri.rc.k Abstract In this paper, we propose a simple

More information

Chapter 2 Literature Survey

Chapter 2 Literature Survey Chapter 2 Literature Survey 2.1 Introduction This chapter provides an introduction and a summary of the key literature that has been consulted for this research. Creating a framework to provide multicast

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Spring'15 1 Announcements Project proposals. Feedback. Class schedule updated. Exam:

More information

Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP

Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP Thomas Kunz and Ed Cheng Carleton University tkunz@sce.carleton.ca Abstract. Multicasting can efficiently support a variety of applications that

More information

MULTICAST EXTENSIONS TO OSPF (MOSPF)

MULTICAST EXTENSIONS TO OSPF (MOSPF) MULTICAST EXTENSIONS TO OSPF (MOSPF) Version 2 of the Open Shortest Path First (OSPF) routing protocol is defined in RFC-1583. It is an Interior Gateway Protocol (IGP) specifically designed to distribute

More information

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks ICACT Transactions on on the Advanced Communications Technology (TACT) Vol. Vol. 2, 2, Issue Issue 3, 3, May May 2013 2013 233 A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Review. Some slides are in courtesy of J. Kurose and K. Ross

Review. Some slides are in courtesy of J. Kurose and K. Ross Review The Internet (IP) Protocol Datagram format IP fragmentation ICMP: Internet Control Message Protocol NAT: Network Address Translation Routing in the Internet Intra-AS routing: RIP and OSPF Inter-AS

More information

An Implementation Study of the AODV Routing Protocol

An Implementation Study of the AODV Routing Protocol An Implementation Study of the AODV Routing Protocol Elizabeth M. Royer Dept. of Electrical & Computer Engineering University of California, Santa Barbara Santa Barbara, CA 93106 eroyer@alpha.ece.ucsb.edu

More information

ETSF10 Internet Protocols Routing on the Internet

ETSF10 Internet Protocols Routing on the Internet ETSF10 Internet Protocols Routing on the Internet 2013, Part 2, Lecture 1.2 Jens Andersson (Kaan Bür) Routing on the Internet Unicast routing protocols (part 2) [ed.5 ch.20.3] Multicast routing, IGMP [ed.5

More information

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not

More information

Large-Scale Mobile Multimedia Service Management in Next Generation Networks Ψ

Large-Scale Mobile Multimedia Service Management in Next Generation Networks Ψ Large-Scale Mobile Multimedia Service Management in Next Generation Networks Ψ Daniel Negru 1, Ahmed Mehaoua 1, Anastasios Kourtis and Eric LeBars 1 CNS-PiSM Lab., University of Versailles, 45, avenue

More information

Addressing: when mobile is moving around. Mobile Registration. Principles of Mobile Routing. Mobility via Indirect Routing

Addressing: when mobile is moving around. Mobile Registration. Principles of Mobile Routing. Mobility via Indirect Routing Wireless Networks Wireless Networks Kai Shen Advantages of wireless links: Mobility, easy setup Wireless s: Infrastructured wireless s Ad hoc wireless s Often, but sometimes fixed location /8/009 CSC 57/57

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN

FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN SANGHEON PACK AND YANGHEE CHOI School of Computer Science and Engineering, Seoul National University, Seoul, Korea

More information

Internet Mobility 4x4. Stuart Cheshire and Mary Baker

Internet Mobility 4x4. Stuart Cheshire and Mary Baker Internet Mobility 4x4 Stuart Cheshire and Mary Baker Basic Mobile IP - from mobile hosts Mobile host uses its home IP address as source address Lower latency Still transparent to correspondent host No

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service PUBLISHED IN: PROCEEDINGS OF THE EUROPEAN WIRELESS 2006 CONFERENCE 1 Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service George Xylomenos, Konstantinos Katsaros

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks Receiver Based Multicasting Protocol for Wireless Sensor Networks Madesha M Assistant Professor, Department of CSE Sahyadri College of Engineering and Management Chaya D Lecturer, Department of CSE H.M.S

More information

Advanced Networking. Multicast

Advanced Networking. Multicast Advanced Networking Multicast Renato Lo Cigno Renato.LoCigno@dit.unitn.it Homepage: disi.unitn.it/locigno/index.php/teaching-duties/advanced-networking Multicasting Addresses that refer to group of hosts

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

Location Management Agent for SCTP Handover in Mobile Network

Location Management Agent for SCTP Handover in Mobile Network Location Management Agent for SCTP Handover in Mobile Network Yong-Jin Lee Department of Technology Education, Korea National University of Education 250 Taesungtapyon-ro, Heungduk-ku, Cheongju, South

More information

Developing IP Muiticast Networks

Developing IP Muiticast Networks Developing IP Muiticast Networks Volume I Beau Williamson Cisco SYSTEMS CISCO PRESS Cisco Press 201 West 103rd Street Indianapolis, IN 46290 USA Table of Contents Introduction xviii Part I Fundamentals

More information

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees Chapter 4 roadmap 4. Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What s Inside a Router 4.4 The Internet (IP) Protocol 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

An Efficient Routing Protocol with Group Management for Peer-to-Peer Multicast Applications

An Efficient Routing Protocol with Group Management for Peer-to-Peer Multicast Applications An Efficient Routing Protocol with Group Management for Peer-to-Peer Multicast Applications Ning Wang & George Pavlou entre for ommunication Systems Research University of Surrey United Kingdom {N.Wang,

More information

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes: Overview Protocol Independent Multicast for IPv6 () provides IPv6 multicast forwarding by leveraging static routes or IPv6 unicast routing tables generated by any IPv6 unicast routing protocol, such as

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

More information

Application Layer Multicast Algorithm

Application Layer Multicast Algorithm Application Layer Multicast Algorithm Sergio Machado Universitat Politècnica de Catalunya Castelldefels Javier Ozón Universitat Politècnica de Catalunya Castelldefels Abstract This paper presents a multicast

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 12 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Limiters

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

A Cost-Effective Approach to Selective IP Paging Scheme Using Explicit Multicast 1

A Cost-Effective Approach to Selective IP Paging Scheme Using Explicit Multicast 1 A Cost-Effective Approach to Selective IP Paging Scheme Using Explicit Multicast 1 Sangheon Pack Kyoungae Kim Yanghee Choi 31-518, Seoul National University, Shilim-dong, Kwanak-gu, Seoul, Korea Abstract

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

A Survey on Signaling Load in Mobility Management

A Survey on Signaling Load in Mobility Management ISSN: 2231-4946 Volume IV, Special Issue, December 2014 International Journal of Computer Applications in Engineering Sciences Special Issue on Advances in Computer and Communications www.caesjournals.org

More information

Multicast EECS 122: Lecture 16

Multicast EECS 122: Lecture 16 Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

The Overlay Multicast Protocol (OMP): A Proposed Solution to Improving Scalability of Multicasting in MPLS Networks

The Overlay Multicast Protocol (OMP): A Proposed Solution to Improving Scalability of Multicasting in MPLS Networks The Overlay Multicast Protocol (): A Proposed Solution to Improving Scalability of Multicasting in MPLS Networks Hind O. Al-Misbahi King Abdulaziz University, Saudi Arabia ha.almis@gmail.com Abstract With

More information

School of Computer Science

School of Computer Science Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman TR-OU-TNRL-10-105 September 2010 Telecommunication & Network Research Lab School of Computer Science THE UNIVERSITY OF

More information

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center

More information

IP Multicast Routing Protocols

IP Multicast Routing Protocols IP Multicast Routing Protocols Term Paper By : Priyank Porwal (97255) Course : Advanced Computer Networks (CS625) Instructor : Dr. Dheeraj Sanghi Department of CSE, IIT Kanpur. April, 2000. Table of Contents

More information

Multicast Routing and Its Protocols

Multicast Routing and Its Protocols Multicast Routing and Its Protocols Mithun B Patil Nkocet,Solapur,Maharashtra,India Abstract: In the age of multimedia and high-speed networks, multicast is one of the mechanisms by which the power of

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services Hui-Kai Su 1,*, Wen-Hsu Hsiao 2, Jian-Ting Pan 3, Chen-Hung Liao 4, Kim-Joan Chen 3, and Chien-Min Wu 5 1 Dept. of Electrical

More information

Multicast. Midterm. EECS 122: Lecture 16. University of California Berkeley. Exam was not meant to be easy

Multicast. Midterm. EECS 122: Lecture 16. University of California Berkeley. Exam was not meant to be easy Multicast EECS : Lecture 6 Department of Electrical Engineering and Computer Sciences University of California Berkeley Midterm Exam was not meant to e easy Mean: 5 Median: 5 Std Dev: 8 Performance quite

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves

More information