JournalVol.
42No.
4September2018ISSN-1110-2586UsingIPMulticastDistributeEncryptionMessageMahaSabriAltememeComputerScienceDepartment,CollegeofScienceKerbalaUniversity,Kerbala,IraqEmail:maha.
sabri@uokerbala.
edu.
iqAbstractTherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
Keyword:EncryptionMessage,ClientServer,DistributedSystem,InformationTechnology.
1.
IntroductionDistributing,asaworditusedwithadifferenttermsuchasdistributedsystem,distributedprogramminganddistributedalgorithm,infactitreferredtocomputernetworks.
Wherecomputersarephysicallydistributedindividuallywithinsomegeographicalareaandmakeaconnectionbetweenthem.
Nowadaysthesetermsareusedinamuchwidersense,evenreferringtoindependentprocessesthatrunonthesamecomputerandinteractwitheachotherbysendingmessages[2].
Generally,thecommunicationbetweentwocomputers(clientandserver)needstobereliable.
Therefore,everydeviceconnectedtoadistributedsystemsnetworkisassignedauniquenumberknownasanInternetProtocol(IPv4orIPv6)address.
TheIPispartofthecommunicationprotocolsthatallowcommunicatingbetweenthedevicesonthenetworks[1].
TherearethreemaintypesofIPv4addresses:Unicast,broadcast,andmulticast.
Unicastiddesignedtotransferapacketbetweentwohosts(node)inthenetwork.
Abroadcastisusedtosendpacketstosubnetworkdomain.
Amulticastaddressisdesignedtoenabledeliveryofpacketstothesetofhoststhathavebeenconfiguredasagroupaddressfrom244.
0.
0.
0to239.
255.
255.
255invarioussubnetworks.
Themaindisadvantagesofmulticastarenotconnectionoriented[12].
Amulticastisdeliveredtodestinationgroupmemberwiththesame"best-effort"reliabilityasaslanderedunicastIP.
ThemaindifferencebetweenamulticastIPpacketandaunicastIPpacketisthepresenceofa"groupaddress"intheDestinationAddressfieldoftheIPheader[2].
Eachhostisfreetojoinorleaveusingadatagramsocketasajoingroupatanytime.
That'smeannorestrictiononthephysicallocationorhowmanynumbersofmembersinamulticastgroup.
Themaindeviceontheinternetisrouterthatusesthegroupmembershipprotocoltolearnabouttheexistingofhostsinthenetworkthatattachedinitssubnetwork[15].
Processesthatworkbetweenonesenderandonerecipient,BrowsingSystemsandemailIsanexampleofonlineapplications.
anotherfieldItrequiresthelatestapplications,Oneuser(sender)sendsdatatoanumberofreceiversatasametime.
ThisapplicationwillusetooptimizetoabilityoforganizationabilitytoCollaborationandcommunicationwithinformation,Increasingtheimportanceofusingnetworks.
ThisfeatureinIPMulticastisanimportantadvanceinIPnetworking.
Theuseofmulticastfeaturecanbeappliedtoeasyworkandwehaveaddedasimplesecurityencryptionpackagetosendtonumberofreceivestomakeitmoresecurefordataexchangeorforfuturedevelopment.
Oneofthemainchallengesthatfacethetimeneedingtosendmessagesfromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtothegroupbecauseitneedstosendonemessageateachtimetoeachoneofthegroup.
Sowhensendsmessagetogroupcontainfiveclients,itwillneedtosendthismessagefivetimes.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyoftherecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone,andanotherchallengetoensuresecuringmulticastcommunicationisconfidentialinformationthatistransferredorreceiveenabledatamulticastingtoverify,thatthedatacontainedoriginatedshouldbesenttotheuserwithoutanother,problembecomesmorecomplexincommon,inotherwordencryptionofadocumentinasecretkeyconstitutesasignaturestrongauthenticationofdocumentandweakagainstrepudiation,inparticularsendtoagroupofrecipients.
TheobjectiveofthispaperproposesdistributeencryptionmessagebasedonIPmulticast.
withIPmulticastitwouldbeeasytosupportmanyofrecipientsasitachievedthespeedandsecrecyinthetransferofinformation.
Themainresearchobjectivesofthisstudyare:Tomeasuretheperformanceforthegrouphostsbasedonresponsetimebetweenthesenderandthemanyreceivers,Toimplementthesecurepacketforsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithmandtounderstandthedifferencebetweenbroadcast,multicast,andunicastandhowtheProtocolIndependentMulticastProtocols(IMP)tojointhenewclientwithagroup.
ThisstudyprovidesanexecutiveintroductiontoIPMulticasttobeusedamongmanygroups.
ItpresentsthebasicconceptforIPmulticast;highlightsitsadvantagesanddisadvantages,andprovidesimplementedtosecuresendingpacketbasedonencryptionalgorithms.
Italsoshowsnetworkperformancebyjoiningandaddingnewuserssimultaneouslyandthealgorithmcanshowtheefficientresponsetimeamongmanyhostseveninasecondormilli-seconds.
WhetheroneisauserofTCP/IP-basedtechnologiesoranorganizationinterestedforimplementingortakingadvantagesofIPMulticastwithinproductorservice,thisstudywillbebeneficialandlucrativeforallofthem.
Thisstudyshows"administrativelyscopeofIPv4multicastspace"tobeintherangeofIPv4from239.
0.
0.
0to239.
255.
255.
255.
Theapplicationhasbeenappliedpracticallyusinglocalareanetworkconnectedwiththeinternet.
Theapplicationputintousethesafetypelanguage"Javaprogramming"tooperatethewholeprogram.
2.
LiteratureReview2.
1MulticastProtocolsThemostfrequentlyusedtransportlayerprotocoltoemploymultipleaddressingistheUserDatagramProtocol(UDP).
Bynature,UDPisnotdependable—lossofmessagesanddeliverythatisoutoforderarequitepossible.
Dependablemulticastprotocols,e.
g.
PragmaticGeneralMulticast(PGM)havebeenevolvedtoaddlossdetectionandretransmissiontoIPmulticast.
IPmulticastiscommonlyutilizedinbusinesses,stockexchanges,andnetworkssendingmultimediamaterial.
AfrequentbusinessemploymentofIPmulticastisforIPTVapplicationssuchasdistancelearningandtelevisedcompanymeetings[30].
Liaoetal.
andWuetal.
haveofferedtomakethelossretrievaleasierviaintermediatenodessoastoshunlatencyandmessagingoverhead[1,2].
Xuetal.
haveexploitedatechniquetoprovidequalityofservicetovideoapplications[3].
Paganietal.
haveappliedamethodthatadaptivelyselectsfloodingandretrievalalongroutingtreebasedonthemobility[4].
AlotofscholarslikeAlpertonetal.
evolveatechniquewhichemploysflowcontroltoguaranteedependability[5].
2.
2PrivacyinMulticastOneofthemostimportantsecurityconcernsinmulticastismaintainingprivacyofcommunication.
Howdomultiplenetworkuserswhoareinthesamemulticast"group"exchangedatasuchthatnooneoutsidethegroupcandecipherwhatisbeingsentAnaturalwaytoguaranteethiswouldbetohaveusersshareacommonkey,calledthegroupkey,andtorequirethatallmulticasttransmissionsfromanyuserwithinthegroupbeencryptedusingthatkey.
Iftheyareguaranteedthatthegroupkeyisknownonlytogroupmembers,thensuchanencryptionprotocolwouldtriviallysolvetheprivacyproblem[28,30].
InFigure1thiswouldmeantransmittingtoallnodesinnetwork.
InFigure2illustratestransmittingtoallnodesbutprivacyinmulticast.
Exampleresearches,Brooks'set.
al(2009)appliedMulticastEncryptionInfrastructureforSecurityinSensorNetworks.
Designingsecuresensornetworksisdifficult.
Theyproposeanapproachthatusesmulticastcommunicationsandrequiresfewerencryptionsthanpairwisecommunications.
Thenetworkispartitionedintomulticastregions;eachregionismanagedbyasensornodechosentoactasakeyserver.
Thekeyserverssolicitnodesintheirneighborhoodtojointhelocalmulticasttree.
Thekeyservergeneratesabinarytreeofkeystomaintaincommunicationwithinthemulticastregionusingasharedkey.
Thisapproachsupportsadistributedkeyagreementprotocolthatidentifiesthecompromisedkeysandsupportsmembershipchangeswithminimumsystemoverhead.
Theyevaluatetheoverheadofthisapproachbyusingthenumberofmessagesandencryptionstoestimatepowerconsumption.
Usingdatafromfieldtestsofamilitarysurveillanceapplication,theyshowthatthismulticastapproachneedsfewerencryptionsthanpair-wisekeyingapproaches.
Theyalsoshowthatthisschemeiscapableofthwartingmanycommonattacks[29].
DuanandCanny(2006)presentedageneralframeworkforconstructingeffectivemulticastcryptosystemswithprovablesecurityandshowthatalineofpreviousworkonmulticastencryptionareallspecialcasesofthisgeneralapproach.
Theyprovidednewmethodsforbuildingsuchcryptosystemswithvariouslevelsofsecurity(e.
g.
,IND-CPA,IND-CCA2).
TheresultstheyobtainedenabletheconstructionofawholeclassofnewmulticastschemeswithguaranteedsecurityusingabroaderrangeofcommonprimitivessuchasOAEP.
Moreover,theywereshowthatmulticastcryptosystemswithhighlevelofsecurity(e.
g.
IND-CCA2)canbebaseduponpublickeycryptosystemswithweaker(e.
g.
CPA)securityaslongasthedecryptioncanbesecurelyandeffectively"shared".
Thisconstructionsfeaturetrulyconstant-sizedecryptionkeyswhereasthelengthsofboththeencryptionkeyandciphertextareindependentofgroupsize[24].
3.
MethodologyThemethodologyforthisworkcontainsfourphasesincludingStateproblem,SendingMessage,Pre-processingmessageandEvaluationofModel.
Wefollowthismethodologybecauseeachphaseinthismethodologyisrelatedtotheresearchandscope.
itisaveryflexibleinimplementationanditwillbesuitableforourwork.
ThestepsofthedataprocessareillustratedinFigure3.
Figure1.
TransmittingtomultiplerecipientsusingMulticastFigure2.
TransmittingtomultiplerecipientsusingprivacyinmulticastFigure3.
MessagesProcessRepresentation3.
1StateproblemThefirststepingeneralmethodologyisawarenessoftheproblem.
Theinformationaboutproblemcomefrommanysources:newdevelopmentsinindustryorinareferencediscipline.
Forthisstudytheawarenessofthechallengesthatfacethetimeneedingtosendmessagefromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtogroupbecauseitneedstosendonemessageateachtimetoeachoneofgroup.
Sowhensendmessageforgroupcontainfiveclients,itwillneedfiveoncesendmessage.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyofrecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone.
Alsowehavesuggestedhertosendmessagesinmoresecurely.
3.
2SendingMessagesThesecondphaseofthemethodologysuggestedaddingsecuritytomessagethatsendingtomanyhoststoprotectsendingmessagefrominterceptbyusingencryptionalgorithm,theencryptionkeycanbeextractedfromthemathematicalformulainFigure4showsthat,theJavacodeoftheencryptionalgorithmisgivenasFigure5.
Thisformulawillreceivethetotallengthofthestring(textmessage)fromthemethod,andifthetotalnumbermorethanFiveitwillstartdivideitbyTwountilbelessthanFive.
Finallytheresultfromtheformulawillconsiderastheencryptionkey,andthistechniqueensuresthechangeablekey,sothatonlyreceivingwhohasauthenticationcanseetheoriginalmessagebyusingdecryptionkeytobreaktheencryptionmessage.
AnapplicationdevelopedanddesignedbyusingtheJavalanguage,becauseit'ssuitabletobuildthisprojecttypeandUsingJavatoolshelptoachieveflexibilityfortheapplication.
3.
3Pre-processingmessageWedevelopthisprojectbyusingtheJavalanguage,toshowanadvantageanddis-advantageforIPmulticastwithasimpleencryptionalgorithm.
Figure5.
JavacodeforencryptionalgorithmX={X=XIFX5Figure4.
mathematicalformulaforextractingtheencryptionkey3.
4EvaluationofModelWeevaluatethisworkbyusingLAN,sowemakestestforourworkonLANnetworkthatconnectedwithroutertotheinternet.
Thefirststep,wesendmessagethatnoneedtobesecure(withoutencryption),allclientsseethecontentmessagedirectly,andrepeatsendingwithoutsecure(withencryption)thatoneclientwantonlyoneclientreadhismessageandnoonefromtheotherwillreadthecontentofthemessage.
Itwassuccessfultest,aftersendmessagewithencryptionthatwasseenforallclientbutnoonecanreadthecontentbecausetheencryption,thetargetclientwasenabledtoreadcontentmessageaftermakedecryptiontothemessage.
3.
5SimulationmodelInthismethodologywewillproposeourworkmechanismmodeltoshowmessagesendingprocessfromsendertogroupofreceivers,moreovertheprocessofsendingandreceivingencryptionmessagebetweenmanyhosts.
Sendingandreceivingblindtext:Sendingunencryptedmessagetogroupofreceivers,aswellaseveryhostreceivingthemessageatthesametime.
ThejavacodeofthispartoftheapplicationispresentedinFigure6.
Sendingandreceivingencryptedtext:SendingencryptionmessagetoagroupofreceiversasFigure7shows,aswellaseveryhostreceivingtheencryptionmessageatthesametimeasFigure8shows.
ThejavacodeofthispartoftheapplicationispresentedinFigure9.
Figure7.
explainsencryptionsendingthemessageFigure8.
explainsreceivingtheencryptionmessageFigure9.
JavacodeforsendingencryptionmessageFigure6.
JavacodeforsendingblindtextTheusercansendandreceivetheblindtextaswellastheencryptiontextasFigure10processofsendingandreceivingthemessagebetweenanytwohosts.
3.
6ExperimentalStepsInthispartwearegoingtoillustrateapplicationmechanismthatconsistsoftwosteps(loginwindowandchatwindow)thatshowsasbelow:3.
6.
1LoginwindowMainlogininterfaceasintheFigure11.
Thisapplicationrequirestheusertoperformanauthenticationprocedurewherebytheyarerequiredtoinsertausernameandpasswordinordertousethischatapplication.
Theapplicationwillbelaunchedwhentheuserenteredthecorrectusernameandpassword.
However,iftheuserenteredthewrongcombinationofusernameandpassword,theprogramwillimmediatelyshowerrorboxthatcontainamessagetoinformtheusertocorrecttheinsertedusernameandpassword.
3.
6.
2ChatWindowFigure12presentsthemainuserinterfaceforourchatapplication.
Theinterfaceincludeslabelsandbuttonsthatincreasetheapplication'susabilityandeaseofuse.
Figure10.
sendingencryptionmessageFigure11.
loginFigure12.
applicationwindowsBut,iftheuserdidn'ttypeanynametojointhechatgroupandtrytostartaconnection,theapplicationwillshowerrorboxthatcontainsmessagetoaskhimtotypehis/hername.
Usersmayconnecttotheserversimplybyclickingonthe'StartConnect'buttonprovidedonthemaininterface.
Whentheconnectionsuccessfullydone,thewindowchattingwilldisplay"Serverisstarted".
Onceaconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxareashowthatinFigure13.
Also,onceconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxarea.
Afterthat,theuserisabletouse"SendEnc.
Msg.
"tosendencryptionmessage.
Everyencryptionmessagewilldisplayinwindowchatting.
Themessagewillnotappearsameoncethatwriteonthetextarea"YourMessage"becauseitwillencryptinourAlgorithm.
Also,theencryptedmessagewilldisplayontheallhostsinthesamesamplesasaFigure14showingthatapproach.
3.
7ProgramsetupInstallationforcomputerprogramistheprocedureofactiontheprogramreadytowork.
Somecomputerprogramscanbeoperatedbyonlycopyingthemintoafolderstoredonacomputerandoperatingthem.
Otherprogramsaresuppliedinamodethatcannotbeimmediatelyexecutedandthusrequireasetupprocedure.
Wheninstalled,theprogramcanbeoperatedrepeatedly,needingnoreinstallationpriortoeachoperation.
Thechatapplicationrequirestwoprincipalthingstooperatecorrectly.
Firstly,theapplicationisconstructedusingtheJavaprogramminglanguage;hence,theuserhastoinstallJavaRuntimeEnvironment(JRE)andtheJavaDevelopmentKit(JDK).
Next,theapplicationcanoperatewithnoerroratall.
Nevertheless,theprogramstillrequirestobeconnectedtothenetworkforlinkingwithasetofIP.
3.
8ToolsCustomarily,mostcomputersusedtocommunicateusingtheNetworkProtocol;consequentlyanetworksocketispointendingbetweentwooperationconnectionstreamacrossnetworkforcomputer.
theapplicationofsocketAPIisinterfaceapplicationAPIgenerallysuppliedbytheoperatingsystem,thatpermitsapplicationprogramstocontrolandusenetworksockets.
NetworksocketAPIsgenerallyconformtotheBerkeleysocketsstandard.
AsocketaddressconsistsofanInternetProtocoladdressandaportnumber,justlikeoneendofaphoneconnectionwhichconsistsofaphonenumberandFigure13.
AppearMessageandTimeFigure14.
AppearEncryptionMessageonXHostsomeextension.
Usingthisaddress,networksocketssendreceiveddatatothesuitableapplicationoperationorthread.
Javaisalanguageusedinobject-orientedprogramming.
Ithasanion-builtapplicationprogramminginterface(API)thatcantackleimagesanduserinterfacesandthatcanbeemployedtodevisenewapplicationsorapplets.
DuetoitsdiversecollectionofAPI's,likeMacintoshandWindows,anditsplatformindependence,Javacanfurtherbeconsideredasaplatformonitsown.
Inaddition,ithasstandardlibrariesfordoingmath's,nottomentionJavaincludingnumerouslibraries.
Thejavanetpackpurveystwoclasses--SocketandServerSocket--thatexecutetheclientpartoftheconnectionandtheserverpartoftheconnection,respectively.
3.
9PlatformNetBeansIDEisoriginalforfreejavawhenmostdevelopersforsystems,thisNetBeansIDEsupportofmanylanguagesuchasJavaScript,PHP,C++andJavaFX.
NetBeansisanopen-sourceprojectdedicatedtoprovidingrocksolidsoftwaredevelopmentproducts(NetBeansIDEandNetBeansPlatform)thataddresstheneedsofdevelopers.
4.
FindingResultsandConclusionTheobjectiveofthisprojectwastodesignandimplementachatapplicationbasedonthemulticasttechnology,whichallowssendingandreceivinginstantmessagingandsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithm.
Alltheseoperationswereunderwirelesslocalareanetwork(WLAN).
TheapplicationclientsidewasimplementedonthewindowsplatformusingtheJavalanguageandtheSocketlibraryfile,whilethechatapplicationwasimplementedonNetbeansIDE7.
1usingaJavalanguage.
[17]Themainresultsthatweobtainedinthisproject;itissuccesstosendandreceivethemessagebasedonIPmulticastingtechnique.
Themessagecanbesendfromoneclienttogroupofreceivers,aswellasanyonecanjointhemulticastgroupbygettingtheapplication.
Moreover,thesecurityissueisasecondobjectthatwehaveachievedinthisproject.
Where,theclientscanreceiveciphertext,butwhocansendthattextanddecryptingitjustthatwhohastheapplicationthatwehavesuggestedasclearlyshowninFigure15.
Thisapplicationcontainencryptionalgorithmtoprovidehighsecurelevelfortopsecretetext.
TherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
ReferencesReferences[1].
W.
LiaoandM.
-Y.
Jiang.
Familyacktree(fat):Supportingreliablemulticastinmobileadhocnetworks.
IEEETransactionsonVehicularTechnology,Vol52.
No6,1675–1685,Nov2003.
[2].
S.
WuandC.
Bonnet.
Multicastroutingprotocolwithdynamiccore(mrdc).
InInternationalSymposiumonTelecommunications(IST01),Tehran,Iran,Aug2001.
[3].
D.
Xu,B.
Li,andK.
Nahrstedt.
Qos-directederrorcontrolofvideomulticastinwirelessnetworks.
In8thIEEEInternationalConferenceonComputerCommunicationsandNetworks(IEEEICCCN'99),pages257–262,Boston-Natick,MA,Oct1999.
[4].
E.
PaganiandG.
Rossi.
Reliablebroadcastinmobilemultihoppacketnetworks.
InMOBIHOC'97,1997.
[5].
K.
Almeroth,K.
Obraczka,andD.
Lucia.
Alightweightprotocolforinterconnectingheterogeneousdevicesindynamicenvironments.
InIEEEICMCS'99,1999.
[6].
R.
Chandra,V.
Ramasubramanian,andK.
Birman.
Anonymousgossip:Improvingmulticastreliabilityinmobilead-hocnetworks.
InThe21stInternationalConferenceonDistributedComputingSystems(ICDCS),Phoenix,Arizona,2001.
[7].
C.
-C.
ChiangandM.
Gerla.
Routingandmulticastinmultihop,mobilewirelessnetworks.
InIEEEICUPC'97,1997.
[8].
HodaA.
AbdelHafez,"BigDatainSmartCites:AnalysisandApplicationsinArabWorld",EgyptianComputerScienceJournal,Volume41,Issue1,January2017.
[9].
W.
WuandY.
C.
Tay.
Amris:Amulticastprotocolforadhocwirelessnetworks.
InMilitaryCommunicationsConference(AIILCOM1999),pages25–29,1999.
[10].
M.
Gerla,C.
-C.
Chiang,andL.
Zhang.
Treemulticaststrategiesinmobile,multihopwirelessnetworks.
ACM/BaltzerJournalofMobileNetworksandApplications(MONET),1999.
[11].
SajamaandZ.
J.
Haas.
Independent-treeadhocmulticastrouting(itamar).
MobileNetworksandApplications,vol8,No5:551–566,2003.
[12].
P.
-J.
Wan,G.
Calinescu,X.
-Y.
Li,andO.
Frieder.
Minimum-energybroadcastinginstaticadhocwirelessnetworks.
WirelessNetworks,vol8,No6:607–617,Nov2002.
[13].
J.
Wieselthier,G.
Nguyen,andA.
Ephremides.
Energy-limitedwirelessnetworkingwithdirectionalantennas:Thecaseofsession-basedmulticasting.
InINFOCOM'02,NewYork,NYUSA,2002.
Figure15.
SendandReceiveEncryptedMessage[14].
S.
GuoandO.
Yang.
Antennaorientationoptimizationforminimum-energymulticasttreeconstructioninwirelessadhocnetworkswithdirectionalantennas.
Inthe5thACMinternationalsymposiumonMobileadhocnetworkingandcomputing(MobiHoc04),RoppongiHills,Tokyo,Japan,2004.
[15].
S.
GuoandO.
Yang.
Minimumenergymulticastroutingforwirelessad-hocnetworkswithadaptiveantennas.
InICNP2004,Berlin,Germany,2004.
[16].
K.
Wang,C.
F.
Chiasserini,R.
R.
Rao,andJ.
Proakis.
Rise:Reducinginterferenceandsavingenergythroughmulticastinginadhocwirelessnetworks.
InIEEEMILCOM2002,Anaheim,CA,USA,2002.
[17].
C.
Hu,Y.
Hong,andJ.
Hou.
Onmitigatingthebroadcaststormproblemwithdirectionalantenna.
InICC'03,2003.
[18].
A.
K.
Das,R.
J.
MarksII,M.
A.
El-Sharkawi,P.
Arabshahi,andA.
Gray.
Maximizationoftime-to-first-failureformulticastapplicationsinwirelessnetworks:optimalsolutionusingmilp.
InIEEEMilcom,MontereyConferenceCenter,Monterey,CA,Oct2004.
[19].
C.
-C.
Chiang,M.
Gerla,andL.
Zhang.
Forwardinggroupmulticastprotocol(fgmp)formultihop,mobilewirelessnetworks.
ClusterComputing:SpecialIssueonMobileComputing,vol1.
1,No2:187–196,1998.
[20].
R.
VaishampayanandJ.
J.
Garcia-Luna-Aceves.
Efficientandrobustmulticastroutinginmobileadhocnetworks.
In1stIEEEInternationalConferenceonMobileAd-hocandSensorSystems,FortLauderdale,Florida,2004.
[21].
J.
J.
Garcia-Luna-AcevesandE.
L.
Madruga.
Amulticastroutingprotocolforad-hocnetworks.
InIEEEINFOCOM'99,NewYork,NewYork,,1999.
[22].
S.
ParkandD.
Park.
Adaptivecoremulticastroutingprotocol.
WirelessNetworks,vol10.
No1:53–60,Jan2004.
[23].
S.
Singh,C.
S.
Raghavendra,andJ.
Stepanek.
Powerefficientbroadcastinginmobileadhocnetworks.
InPIMRC'99,1999.
[24].
H.
ZhouandS.
Singh.
Content-basedmulticastformobileadhocnetworks.
InProc.
Mobihoc2000,August2000.
[25].
J.
KuriandS.
Kasera.
Reliablemulticastinmultiaccesswirelesslans.
WirelessNetworks,pages359–369,,Jul2001.
[26].
M.
NagyandS.
Singh.
Multicastschedulingalgorithmsinmobilenetworks.
ClusterComputing,1998.
[27].
S.
K.
S.
Gupta,V.
Shankar,andS.
Lalwani.
Reliablemulticastmacprotocolforwirelesslans.
InIEEEInternationalConferenceonCommunications(ICC'03),volume1,pages93–97,2003.
[28].
L.
TassiulasandA.
Ephremides.
Stabilitypropertiesofconstrainedqueueingsystemsandschedulingpoliciesformaximumthroughputinmultihopradionetworks.
IEEETransactionsonAutomaticControl,vol37,No12:1936–1948,Dec1992.
[29].
L.
TassiulasandA.
Ephremides.
Dynamicserverallocationtoparallelqueueswithrandomlyvaryingconnectivity.
IEEETrans.
Info.
Theory,vol30,No2:466–478,Mar1993.
[30].
C.
Diot,B.
N.
Levine,B.
Lyles,H.
Kassem,andD.
Balensiefen,DeploymentissuesfortheIPmulticasserviceandarchitecture.
IEEENetwork,vol14,No1:78–88,2000.
[31].
R.
R.
Brooks,BrijeshPillai,MatthewPirretti,AndMicheleC.
Weigle,MulticastEncryptionInfrastructureForSecurityInSensorNetworks,2009.
便宜的香港vps多少钱?现在国外VPS主机的价格已经很便宜了,美国VPS主机最低一个月只要十几元,但同样免备案的香港VPS价格贵不贵呢?或者说便宜的香港VPS多少钱?香港vps主机价格要比美国机房的贵一些,但比国内的又便宜不少,所以目前情况是同等配置下,美国VPS比香港的便宜,香港VPS比国内(指大陆地区)的便宜。目前,最便宜香港vps低至3元/首月、18元/月起,今天云服务器网(www.yunt...
pia云怎么样?pia云是一家2018的开办的国人商家,原名叫哔哔云,目前整合到了魔方云平台上,商家主要销售VPS服务,采用KVM虚拟架构 ,机房有美国洛杉矶、中国香港和深圳地区,洛杉矶为crea机房,三网回程CN2 GIA,带20G防御。目前,Pia云优惠促销,年付全场8折起,香港超极速CN2季付活动,4核4G15M云服务器仅240元/季起,香港CN2、美国三网CN2深圳BGP优质云服务器超高性...
HostNamaste是一家成立于2016年3月的印度IDC商家,目前有美国洛杉矶、达拉斯、杰克逊维尔、法国鲁贝、俄罗斯莫斯科、印度孟买、加拿大魁北克机房。其中洛杉矶是Quadranet也就是我们常说的QN机房(也有CC机房,可发工单让客服改机房);达拉斯是ColoCrossing也就是我们常说的CC机房;杰克逊维尔和法国鲁贝是OVH的高防机房。采用主流的OpenVZ和KVM架构,支持ipv6,免...
ecs为你推荐
推广方法营业推广的方式有哪些行业关键词机械行业最热门的关键词有哪些!!!唱吧电脑版官方下载唱吧有电脑版吗如何建立一个网站怎样能创建一个网站彩信中心移动的彩信中心是?主页是?收不到彩信,怎么设置?iphone越狱后怎么恢复苹果手机越狱后怎么恢复开机滚动条电脑开机滚动条要走好几次淘宝网页显示不正常淘宝网页不能正常显示mate8价格手机华为mat8售价多少ios系统ios系统有哪些版本?
新秒杀 国外php空间 建站代码 网盘申请 彩虹ip gg广告 架设服务器 中国电信测网速 cdn加速原理 搜索引擎提交入口 服务器硬件防火墙 raid10 闪讯官网 谷歌台湾 畅行云 google搜索打不开 cdn加速技术 建站论坛 远程登录 cloudflare 更多