JournalVol.
42No.
4September2018ISSN-1110-2586UsingIPMulticastDistributeEncryptionMessageMahaSabriAltememeComputerScienceDepartment,CollegeofScienceKerbalaUniversity,Kerbala,IraqEmail:maha.
sabri@uokerbala.
edu.
iqAbstractTherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
Keyword:EncryptionMessage,ClientServer,DistributedSystem,InformationTechnology.
1.
IntroductionDistributing,asaworditusedwithadifferenttermsuchasdistributedsystem,distributedprogramminganddistributedalgorithm,infactitreferredtocomputernetworks.
Wherecomputersarephysicallydistributedindividuallywithinsomegeographicalareaandmakeaconnectionbetweenthem.
Nowadaysthesetermsareusedinamuchwidersense,evenreferringtoindependentprocessesthatrunonthesamecomputerandinteractwitheachotherbysendingmessages[2].
Generally,thecommunicationbetweentwocomputers(clientandserver)needstobereliable.
Therefore,everydeviceconnectedtoadistributedsystemsnetworkisassignedauniquenumberknownasanInternetProtocol(IPv4orIPv6)address.
TheIPispartofthecommunicationprotocolsthatallowcommunicatingbetweenthedevicesonthenetworks[1].
TherearethreemaintypesofIPv4addresses:Unicast,broadcast,andmulticast.
Unicastiddesignedtotransferapacketbetweentwohosts(node)inthenetwork.
Abroadcastisusedtosendpacketstosubnetworkdomain.
Amulticastaddressisdesignedtoenabledeliveryofpacketstothesetofhoststhathavebeenconfiguredasagroupaddressfrom244.
0.
0.
0to239.
255.
255.
255invarioussubnetworks.
Themaindisadvantagesofmulticastarenotconnectionoriented[12].
Amulticastisdeliveredtodestinationgroupmemberwiththesame"best-effort"reliabilityasaslanderedunicastIP.
ThemaindifferencebetweenamulticastIPpacketandaunicastIPpacketisthepresenceofa"groupaddress"intheDestinationAddressfieldoftheIPheader[2].
Eachhostisfreetojoinorleaveusingadatagramsocketasajoingroupatanytime.
That'smeannorestrictiononthephysicallocationorhowmanynumbersofmembersinamulticastgroup.
Themaindeviceontheinternetisrouterthatusesthegroupmembershipprotocoltolearnabouttheexistingofhostsinthenetworkthatattachedinitssubnetwork[15].
Processesthatworkbetweenonesenderandonerecipient,BrowsingSystemsandemailIsanexampleofonlineapplications.
anotherfieldItrequiresthelatestapplications,Oneuser(sender)sendsdatatoanumberofreceiversatasametime.
ThisapplicationwillusetooptimizetoabilityoforganizationabilitytoCollaborationandcommunicationwithinformation,Increasingtheimportanceofusingnetworks.
ThisfeatureinIPMulticastisanimportantadvanceinIPnetworking.
Theuseofmulticastfeaturecanbeappliedtoeasyworkandwehaveaddedasimplesecurityencryptionpackagetosendtonumberofreceivestomakeitmoresecurefordataexchangeorforfuturedevelopment.
Oneofthemainchallengesthatfacethetimeneedingtosendmessagesfromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtothegroupbecauseitneedstosendonemessageateachtimetoeachoneofthegroup.
Sowhensendsmessagetogroupcontainfiveclients,itwillneedtosendthismessagefivetimes.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyoftherecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone,andanotherchallengetoensuresecuringmulticastcommunicationisconfidentialinformationthatistransferredorreceiveenabledatamulticastingtoverify,thatthedatacontainedoriginatedshouldbesenttotheuserwithoutanother,problembecomesmorecomplexincommon,inotherwordencryptionofadocumentinasecretkeyconstitutesasignaturestrongauthenticationofdocumentandweakagainstrepudiation,inparticularsendtoagroupofrecipients.
TheobjectiveofthispaperproposesdistributeencryptionmessagebasedonIPmulticast.
withIPmulticastitwouldbeeasytosupportmanyofrecipientsasitachievedthespeedandsecrecyinthetransferofinformation.
Themainresearchobjectivesofthisstudyare:Tomeasuretheperformanceforthegrouphostsbasedonresponsetimebetweenthesenderandthemanyreceivers,Toimplementthesecurepacketforsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithmandtounderstandthedifferencebetweenbroadcast,multicast,andunicastandhowtheProtocolIndependentMulticastProtocols(IMP)tojointhenewclientwithagroup.
ThisstudyprovidesanexecutiveintroductiontoIPMulticasttobeusedamongmanygroups.
ItpresentsthebasicconceptforIPmulticast;highlightsitsadvantagesanddisadvantages,andprovidesimplementedtosecuresendingpacketbasedonencryptionalgorithms.
Italsoshowsnetworkperformancebyjoiningandaddingnewuserssimultaneouslyandthealgorithmcanshowtheefficientresponsetimeamongmanyhostseveninasecondormilli-seconds.
WhetheroneisauserofTCP/IP-basedtechnologiesoranorganizationinterestedforimplementingortakingadvantagesofIPMulticastwithinproductorservice,thisstudywillbebeneficialandlucrativeforallofthem.
Thisstudyshows"administrativelyscopeofIPv4multicastspace"tobeintherangeofIPv4from239.
0.
0.
0to239.
255.
255.
255.
Theapplicationhasbeenappliedpracticallyusinglocalareanetworkconnectedwiththeinternet.
Theapplicationputintousethesafetypelanguage"Javaprogramming"tooperatethewholeprogram.
2.
LiteratureReview2.
1MulticastProtocolsThemostfrequentlyusedtransportlayerprotocoltoemploymultipleaddressingistheUserDatagramProtocol(UDP).
Bynature,UDPisnotdependable—lossofmessagesanddeliverythatisoutoforderarequitepossible.
Dependablemulticastprotocols,e.
g.
PragmaticGeneralMulticast(PGM)havebeenevolvedtoaddlossdetectionandretransmissiontoIPmulticast.
IPmulticastiscommonlyutilizedinbusinesses,stockexchanges,andnetworkssendingmultimediamaterial.
AfrequentbusinessemploymentofIPmulticastisforIPTVapplicationssuchasdistancelearningandtelevisedcompanymeetings[30].
Liaoetal.
andWuetal.
haveofferedtomakethelossretrievaleasierviaintermediatenodessoastoshunlatencyandmessagingoverhead[1,2].
Xuetal.
haveexploitedatechniquetoprovidequalityofservicetovideoapplications[3].
Paganietal.
haveappliedamethodthatadaptivelyselectsfloodingandretrievalalongroutingtreebasedonthemobility[4].
AlotofscholarslikeAlpertonetal.
evolveatechniquewhichemploysflowcontroltoguaranteedependability[5].
2.
2PrivacyinMulticastOneofthemostimportantsecurityconcernsinmulticastismaintainingprivacyofcommunication.
Howdomultiplenetworkuserswhoareinthesamemulticast"group"exchangedatasuchthatnooneoutsidethegroupcandecipherwhatisbeingsentAnaturalwaytoguaranteethiswouldbetohaveusersshareacommonkey,calledthegroupkey,andtorequirethatallmulticasttransmissionsfromanyuserwithinthegroupbeencryptedusingthatkey.
Iftheyareguaranteedthatthegroupkeyisknownonlytogroupmembers,thensuchanencryptionprotocolwouldtriviallysolvetheprivacyproblem[28,30].
InFigure1thiswouldmeantransmittingtoallnodesinnetwork.
InFigure2illustratestransmittingtoallnodesbutprivacyinmulticast.
Exampleresearches,Brooks'set.
al(2009)appliedMulticastEncryptionInfrastructureforSecurityinSensorNetworks.
Designingsecuresensornetworksisdifficult.
Theyproposeanapproachthatusesmulticastcommunicationsandrequiresfewerencryptionsthanpairwisecommunications.
Thenetworkispartitionedintomulticastregions;eachregionismanagedbyasensornodechosentoactasakeyserver.
Thekeyserverssolicitnodesintheirneighborhoodtojointhelocalmulticasttree.
Thekeyservergeneratesabinarytreeofkeystomaintaincommunicationwithinthemulticastregionusingasharedkey.
Thisapproachsupportsadistributedkeyagreementprotocolthatidentifiesthecompromisedkeysandsupportsmembershipchangeswithminimumsystemoverhead.
Theyevaluatetheoverheadofthisapproachbyusingthenumberofmessagesandencryptionstoestimatepowerconsumption.
Usingdatafromfieldtestsofamilitarysurveillanceapplication,theyshowthatthismulticastapproachneedsfewerencryptionsthanpair-wisekeyingapproaches.
Theyalsoshowthatthisschemeiscapableofthwartingmanycommonattacks[29].
DuanandCanny(2006)presentedageneralframeworkforconstructingeffectivemulticastcryptosystemswithprovablesecurityandshowthatalineofpreviousworkonmulticastencryptionareallspecialcasesofthisgeneralapproach.
Theyprovidednewmethodsforbuildingsuchcryptosystemswithvariouslevelsofsecurity(e.
g.
,IND-CPA,IND-CCA2).
TheresultstheyobtainedenabletheconstructionofawholeclassofnewmulticastschemeswithguaranteedsecurityusingabroaderrangeofcommonprimitivessuchasOAEP.
Moreover,theywereshowthatmulticastcryptosystemswithhighlevelofsecurity(e.
g.
IND-CCA2)canbebaseduponpublickeycryptosystemswithweaker(e.
g.
CPA)securityaslongasthedecryptioncanbesecurelyandeffectively"shared".
Thisconstructionsfeaturetrulyconstant-sizedecryptionkeyswhereasthelengthsofboththeencryptionkeyandciphertextareindependentofgroupsize[24].
3.
MethodologyThemethodologyforthisworkcontainsfourphasesincludingStateproblem,SendingMessage,Pre-processingmessageandEvaluationofModel.
Wefollowthismethodologybecauseeachphaseinthismethodologyisrelatedtotheresearchandscope.
itisaveryflexibleinimplementationanditwillbesuitableforourwork.
ThestepsofthedataprocessareillustratedinFigure3.
Figure1.
TransmittingtomultiplerecipientsusingMulticastFigure2.
TransmittingtomultiplerecipientsusingprivacyinmulticastFigure3.
MessagesProcessRepresentation3.
1StateproblemThefirststepingeneralmethodologyisawarenessoftheproblem.
Theinformationaboutproblemcomefrommanysources:newdevelopmentsinindustryorinareferencediscipline.
Forthisstudytheawarenessofthechallengesthatfacethetimeneedingtosendmessagefromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtogroupbecauseitneedstosendonemessageateachtimetoeachoneofgroup.
Sowhensendmessageforgroupcontainfiveclients,itwillneedfiveoncesendmessage.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyofrecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone.
Alsowehavesuggestedhertosendmessagesinmoresecurely.
3.
2SendingMessagesThesecondphaseofthemethodologysuggestedaddingsecuritytomessagethatsendingtomanyhoststoprotectsendingmessagefrominterceptbyusingencryptionalgorithm,theencryptionkeycanbeextractedfromthemathematicalformulainFigure4showsthat,theJavacodeoftheencryptionalgorithmisgivenasFigure5.
Thisformulawillreceivethetotallengthofthestring(textmessage)fromthemethod,andifthetotalnumbermorethanFiveitwillstartdivideitbyTwountilbelessthanFive.
Finallytheresultfromtheformulawillconsiderastheencryptionkey,andthistechniqueensuresthechangeablekey,sothatonlyreceivingwhohasauthenticationcanseetheoriginalmessagebyusingdecryptionkeytobreaktheencryptionmessage.
AnapplicationdevelopedanddesignedbyusingtheJavalanguage,becauseit'ssuitabletobuildthisprojecttypeandUsingJavatoolshelptoachieveflexibilityfortheapplication.
3.
3Pre-processingmessageWedevelopthisprojectbyusingtheJavalanguage,toshowanadvantageanddis-advantageforIPmulticastwithasimpleencryptionalgorithm.
Figure5.
JavacodeforencryptionalgorithmX={X=XIFX5Figure4.
mathematicalformulaforextractingtheencryptionkey3.
4EvaluationofModelWeevaluatethisworkbyusingLAN,sowemakestestforourworkonLANnetworkthatconnectedwithroutertotheinternet.
Thefirststep,wesendmessagethatnoneedtobesecure(withoutencryption),allclientsseethecontentmessagedirectly,andrepeatsendingwithoutsecure(withencryption)thatoneclientwantonlyoneclientreadhismessageandnoonefromtheotherwillreadthecontentofthemessage.
Itwassuccessfultest,aftersendmessagewithencryptionthatwasseenforallclientbutnoonecanreadthecontentbecausetheencryption,thetargetclientwasenabledtoreadcontentmessageaftermakedecryptiontothemessage.
3.
5SimulationmodelInthismethodologywewillproposeourworkmechanismmodeltoshowmessagesendingprocessfromsendertogroupofreceivers,moreovertheprocessofsendingandreceivingencryptionmessagebetweenmanyhosts.
Sendingandreceivingblindtext:Sendingunencryptedmessagetogroupofreceivers,aswellaseveryhostreceivingthemessageatthesametime.
ThejavacodeofthispartoftheapplicationispresentedinFigure6.
Sendingandreceivingencryptedtext:SendingencryptionmessagetoagroupofreceiversasFigure7shows,aswellaseveryhostreceivingtheencryptionmessageatthesametimeasFigure8shows.
ThejavacodeofthispartoftheapplicationispresentedinFigure9.
Figure7.
explainsencryptionsendingthemessageFigure8.
explainsreceivingtheencryptionmessageFigure9.
JavacodeforsendingencryptionmessageFigure6.
JavacodeforsendingblindtextTheusercansendandreceivetheblindtextaswellastheencryptiontextasFigure10processofsendingandreceivingthemessagebetweenanytwohosts.
3.
6ExperimentalStepsInthispartwearegoingtoillustrateapplicationmechanismthatconsistsoftwosteps(loginwindowandchatwindow)thatshowsasbelow:3.
6.
1LoginwindowMainlogininterfaceasintheFigure11.
Thisapplicationrequirestheusertoperformanauthenticationprocedurewherebytheyarerequiredtoinsertausernameandpasswordinordertousethischatapplication.
Theapplicationwillbelaunchedwhentheuserenteredthecorrectusernameandpassword.
However,iftheuserenteredthewrongcombinationofusernameandpassword,theprogramwillimmediatelyshowerrorboxthatcontainamessagetoinformtheusertocorrecttheinsertedusernameandpassword.
3.
6.
2ChatWindowFigure12presentsthemainuserinterfaceforourchatapplication.
Theinterfaceincludeslabelsandbuttonsthatincreasetheapplication'susabilityandeaseofuse.
Figure10.
sendingencryptionmessageFigure11.
loginFigure12.
applicationwindowsBut,iftheuserdidn'ttypeanynametojointhechatgroupandtrytostartaconnection,theapplicationwillshowerrorboxthatcontainsmessagetoaskhimtotypehis/hername.
Usersmayconnecttotheserversimplybyclickingonthe'StartConnect'buttonprovidedonthemaininterface.
Whentheconnectionsuccessfullydone,thewindowchattingwilldisplay"Serverisstarted".
Onceaconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxareashowthatinFigure13.
Also,onceconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxarea.
Afterthat,theuserisabletouse"SendEnc.
Msg.
"tosendencryptionmessage.
Everyencryptionmessagewilldisplayinwindowchatting.
Themessagewillnotappearsameoncethatwriteonthetextarea"YourMessage"becauseitwillencryptinourAlgorithm.
Also,theencryptedmessagewilldisplayontheallhostsinthesamesamplesasaFigure14showingthatapproach.
3.
7ProgramsetupInstallationforcomputerprogramistheprocedureofactiontheprogramreadytowork.
Somecomputerprogramscanbeoperatedbyonlycopyingthemintoafolderstoredonacomputerandoperatingthem.
Otherprogramsaresuppliedinamodethatcannotbeimmediatelyexecutedandthusrequireasetupprocedure.
Wheninstalled,theprogramcanbeoperatedrepeatedly,needingnoreinstallationpriortoeachoperation.
Thechatapplicationrequirestwoprincipalthingstooperatecorrectly.
Firstly,theapplicationisconstructedusingtheJavaprogramminglanguage;hence,theuserhastoinstallJavaRuntimeEnvironment(JRE)andtheJavaDevelopmentKit(JDK).
Next,theapplicationcanoperatewithnoerroratall.
Nevertheless,theprogramstillrequirestobeconnectedtothenetworkforlinkingwithasetofIP.
3.
8ToolsCustomarily,mostcomputersusedtocommunicateusingtheNetworkProtocol;consequentlyanetworksocketispointendingbetweentwooperationconnectionstreamacrossnetworkforcomputer.
theapplicationofsocketAPIisinterfaceapplicationAPIgenerallysuppliedbytheoperatingsystem,thatpermitsapplicationprogramstocontrolandusenetworksockets.
NetworksocketAPIsgenerallyconformtotheBerkeleysocketsstandard.
AsocketaddressconsistsofanInternetProtocoladdressandaportnumber,justlikeoneendofaphoneconnectionwhichconsistsofaphonenumberandFigure13.
AppearMessageandTimeFigure14.
AppearEncryptionMessageonXHostsomeextension.
Usingthisaddress,networksocketssendreceiveddatatothesuitableapplicationoperationorthread.
Javaisalanguageusedinobject-orientedprogramming.
Ithasanion-builtapplicationprogramminginterface(API)thatcantackleimagesanduserinterfacesandthatcanbeemployedtodevisenewapplicationsorapplets.
DuetoitsdiversecollectionofAPI's,likeMacintoshandWindows,anditsplatformindependence,Javacanfurtherbeconsideredasaplatformonitsown.
Inaddition,ithasstandardlibrariesfordoingmath's,nottomentionJavaincludingnumerouslibraries.
Thejavanetpackpurveystwoclasses--SocketandServerSocket--thatexecutetheclientpartoftheconnectionandtheserverpartoftheconnection,respectively.
3.
9PlatformNetBeansIDEisoriginalforfreejavawhenmostdevelopersforsystems,thisNetBeansIDEsupportofmanylanguagesuchasJavaScript,PHP,C++andJavaFX.
NetBeansisanopen-sourceprojectdedicatedtoprovidingrocksolidsoftwaredevelopmentproducts(NetBeansIDEandNetBeansPlatform)thataddresstheneedsofdevelopers.
4.
FindingResultsandConclusionTheobjectiveofthisprojectwastodesignandimplementachatapplicationbasedonthemulticasttechnology,whichallowssendingandreceivinginstantmessagingandsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithm.
Alltheseoperationswereunderwirelesslocalareanetwork(WLAN).
TheapplicationclientsidewasimplementedonthewindowsplatformusingtheJavalanguageandtheSocketlibraryfile,whilethechatapplicationwasimplementedonNetbeansIDE7.
1usingaJavalanguage.
[17]Themainresultsthatweobtainedinthisproject;itissuccesstosendandreceivethemessagebasedonIPmulticastingtechnique.
Themessagecanbesendfromoneclienttogroupofreceivers,aswellasanyonecanjointhemulticastgroupbygettingtheapplication.
Moreover,thesecurityissueisasecondobjectthatwehaveachievedinthisproject.
Where,theclientscanreceiveciphertext,butwhocansendthattextanddecryptingitjustthatwhohastheapplicationthatwehavesuggestedasclearlyshowninFigure15.
Thisapplicationcontainencryptionalgorithmtoprovidehighsecurelevelfortopsecretetext.
TherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
ReferencesReferences[1].
W.
LiaoandM.
-Y.
Jiang.
Familyacktree(fat):Supportingreliablemulticastinmobileadhocnetworks.
IEEETransactionsonVehicularTechnology,Vol52.
No6,1675–1685,Nov2003.
[2].
S.
WuandC.
Bonnet.
Multicastroutingprotocolwithdynamiccore(mrdc).
InInternationalSymposiumonTelecommunications(IST01),Tehran,Iran,Aug2001.
[3].
D.
Xu,B.
Li,andK.
Nahrstedt.
Qos-directederrorcontrolofvideomulticastinwirelessnetworks.
In8thIEEEInternationalConferenceonComputerCommunicationsandNetworks(IEEEICCCN'99),pages257–262,Boston-Natick,MA,Oct1999.
[4].
E.
PaganiandG.
Rossi.
Reliablebroadcastinmobilemultihoppacketnetworks.
InMOBIHOC'97,1997.
[5].
K.
Almeroth,K.
Obraczka,andD.
Lucia.
Alightweightprotocolforinterconnectingheterogeneousdevicesindynamicenvironments.
InIEEEICMCS'99,1999.
[6].
R.
Chandra,V.
Ramasubramanian,andK.
Birman.
Anonymousgossip:Improvingmulticastreliabilityinmobilead-hocnetworks.
InThe21stInternationalConferenceonDistributedComputingSystems(ICDCS),Phoenix,Arizona,2001.
[7].
C.
-C.
ChiangandM.
Gerla.
Routingandmulticastinmultihop,mobilewirelessnetworks.
InIEEEICUPC'97,1997.
[8].
HodaA.
AbdelHafez,"BigDatainSmartCites:AnalysisandApplicationsinArabWorld",EgyptianComputerScienceJournal,Volume41,Issue1,January2017.
[9].
W.
WuandY.
C.
Tay.
Amris:Amulticastprotocolforadhocwirelessnetworks.
InMilitaryCommunicationsConference(AIILCOM1999),pages25–29,1999.
[10].
M.
Gerla,C.
-C.
Chiang,andL.
Zhang.
Treemulticaststrategiesinmobile,multihopwirelessnetworks.
ACM/BaltzerJournalofMobileNetworksandApplications(MONET),1999.
[11].
SajamaandZ.
J.
Haas.
Independent-treeadhocmulticastrouting(itamar).
MobileNetworksandApplications,vol8,No5:551–566,2003.
[12].
P.
-J.
Wan,G.
Calinescu,X.
-Y.
Li,andO.
Frieder.
Minimum-energybroadcastinginstaticadhocwirelessnetworks.
WirelessNetworks,vol8,No6:607–617,Nov2002.
[13].
J.
Wieselthier,G.
Nguyen,andA.
Ephremides.
Energy-limitedwirelessnetworkingwithdirectionalantennas:Thecaseofsession-basedmulticasting.
InINFOCOM'02,NewYork,NYUSA,2002.
Figure15.
SendandReceiveEncryptedMessage[14].
S.
GuoandO.
Yang.
Antennaorientationoptimizationforminimum-energymulticasttreeconstructioninwirelessadhocnetworkswithdirectionalantennas.
Inthe5thACMinternationalsymposiumonMobileadhocnetworkingandcomputing(MobiHoc04),RoppongiHills,Tokyo,Japan,2004.
[15].
S.
GuoandO.
Yang.
Minimumenergymulticastroutingforwirelessad-hocnetworkswithadaptiveantennas.
InICNP2004,Berlin,Germany,2004.
[16].
K.
Wang,C.
F.
Chiasserini,R.
R.
Rao,andJ.
Proakis.
Rise:Reducinginterferenceandsavingenergythroughmulticastinginadhocwirelessnetworks.
InIEEEMILCOM2002,Anaheim,CA,USA,2002.
[17].
C.
Hu,Y.
Hong,andJ.
Hou.
Onmitigatingthebroadcaststormproblemwithdirectionalantenna.
InICC'03,2003.
[18].
A.
K.
Das,R.
J.
MarksII,M.
A.
El-Sharkawi,P.
Arabshahi,andA.
Gray.
Maximizationoftime-to-first-failureformulticastapplicationsinwirelessnetworks:optimalsolutionusingmilp.
InIEEEMilcom,MontereyConferenceCenter,Monterey,CA,Oct2004.
[19].
C.
-C.
Chiang,M.
Gerla,andL.
Zhang.
Forwardinggroupmulticastprotocol(fgmp)formultihop,mobilewirelessnetworks.
ClusterComputing:SpecialIssueonMobileComputing,vol1.
1,No2:187–196,1998.
[20].
R.
VaishampayanandJ.
J.
Garcia-Luna-Aceves.
Efficientandrobustmulticastroutinginmobileadhocnetworks.
In1stIEEEInternationalConferenceonMobileAd-hocandSensorSystems,FortLauderdale,Florida,2004.
[21].
J.
J.
Garcia-Luna-AcevesandE.
L.
Madruga.
Amulticastroutingprotocolforad-hocnetworks.
InIEEEINFOCOM'99,NewYork,NewYork,,1999.
[22].
S.
ParkandD.
Park.
Adaptivecoremulticastroutingprotocol.
WirelessNetworks,vol10.
No1:53–60,Jan2004.
[23].
S.
Singh,C.
S.
Raghavendra,andJ.
Stepanek.
Powerefficientbroadcastinginmobileadhocnetworks.
InPIMRC'99,1999.
[24].
H.
ZhouandS.
Singh.
Content-basedmulticastformobileadhocnetworks.
InProc.
Mobihoc2000,August2000.
[25].
J.
KuriandS.
Kasera.
Reliablemulticastinmultiaccesswirelesslans.
WirelessNetworks,pages359–369,,Jul2001.
[26].
M.
NagyandS.
Singh.
Multicastschedulingalgorithmsinmobilenetworks.
ClusterComputing,1998.
[27].
S.
K.
S.
Gupta,V.
Shankar,andS.
Lalwani.
Reliablemulticastmacprotocolforwirelesslans.
InIEEEInternationalConferenceonCommunications(ICC'03),volume1,pages93–97,2003.
[28].
L.
TassiulasandA.
Ephremides.
Stabilitypropertiesofconstrainedqueueingsystemsandschedulingpoliciesformaximumthroughputinmultihopradionetworks.
IEEETransactionsonAutomaticControl,vol37,No12:1936–1948,Dec1992.
[29].
L.
TassiulasandA.
Ephremides.
Dynamicserverallocationtoparallelqueueswithrandomlyvaryingconnectivity.
IEEETrans.
Info.
Theory,vol30,No2:466–478,Mar1993.
[30].
C.
Diot,B.
N.
Levine,B.
Lyles,H.
Kassem,andD.
Balensiefen,DeploymentissuesfortheIPmulticasserviceandarchitecture.
IEEENetwork,vol14,No1:78–88,2000.
[31].
R.
R.
Brooks,BrijeshPillai,MatthewPirretti,AndMicheleC.
Weigle,MulticastEncryptionInfrastructureForSecurityInSensorNetworks,2009.
今天上午有网友在群里聊到是不是有新注册域名的海外域名商家的优惠活动。如果我们并非一定要在国外注册域名的话,最近年中促销期间,国内的服务商优惠力度还是比较大的,以前我们可能较多选择海外域名商家注册域名在于海外商家便宜,如今这几年国内的商家价格也不贵的。比如在前一段时间有分享到几个商家的年中活动:1、DNSPOD域名欢购活动 - 提供域名抢购活动、DNS解析折扣、SSL证书活动2、难得再次关注新网商家...
我们一般的站长或者企业服务器配置WEB环境会用到免费版本的宝塔面板。但是如果我们需要较多的付费插件扩展,或者是有需要企业功能应用的,短期来说我们可能选择按件按月付费的比较好,但是如果我们长期使用的话,有些网友认为选择宝塔面板企业版或者专业版是比较划算的。这样在年中大促618的时候,我们也可以看到宝塔面板也有发布促销活动。企业版年付899元,专业版永久授权1888元起步。对于有需要的网友来说,还是值...
atcloud怎么样?atcloud刚刚发布了最新的8折优惠码,该商家主要提供常规cloud(VPS)和storage(大硬盘存储)系列VPS,其数据中心分布在美国(俄勒冈、弗吉尼亚)、加拿大、英国、法国、德国、新加坡,所有VPS默认提供480Gbps的超高DDoS防御。Atcloud高防VPS。atcloud.net,2020年成立,主要提供基于KVM虚拟架构的VPS、只能DNS解析、域名、SS...
ecs为你推荐
天府热线天府热线怎么老是进不去?淘宝收费淘宝交易收取的费用是多少自助建站自助建站可信吗?数码资源网手机练习打字的软件办公协同软件免费的多人协同办公软件哪些,我了解的有钉钉、企业微信,其他的还有么?网店推广网站开网店如何做推广?腾讯文章腾讯新闻的精选微信里面收藏的文章在哪里怎么点亮qq空间图标QQ空间的图标怎么点亮xp系统停止服务Windowsxp系统为什么停止服务免费免费建站最好的免费建站
鲁诺vps 域名服务器的作用 新网域名管理 域名抢注工具 highfrequency linode iisphpmysql 好看的桌面背景大图 淘宝双十一2018 台湾谷歌网址 ca4249 网站木马检测工具 699美元 卡巴斯基试用版 空间合租 根服务器 美国凤凰城 我的世界服务器ip 东莞服务器托管 深圳域名 更多