JournalVol.
42No.
4September2018ISSN-1110-2586UsingIPMulticastDistributeEncryptionMessageMahaSabriAltememeComputerScienceDepartment,CollegeofScienceKerbalaUniversity,Kerbala,IraqEmail:maha.
sabri@uokerbala.
edu.
iqAbstractTherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
Keyword:EncryptionMessage,ClientServer,DistributedSystem,InformationTechnology.
1.
IntroductionDistributing,asaworditusedwithadifferenttermsuchasdistributedsystem,distributedprogramminganddistributedalgorithm,infactitreferredtocomputernetworks.
Wherecomputersarephysicallydistributedindividuallywithinsomegeographicalareaandmakeaconnectionbetweenthem.
Nowadaysthesetermsareusedinamuchwidersense,evenreferringtoindependentprocessesthatrunonthesamecomputerandinteractwitheachotherbysendingmessages[2].
Generally,thecommunicationbetweentwocomputers(clientandserver)needstobereliable.
Therefore,everydeviceconnectedtoadistributedsystemsnetworkisassignedauniquenumberknownasanInternetProtocol(IPv4orIPv6)address.
TheIPispartofthecommunicationprotocolsthatallowcommunicatingbetweenthedevicesonthenetworks[1].
TherearethreemaintypesofIPv4addresses:Unicast,broadcast,andmulticast.
Unicastiddesignedtotransferapacketbetweentwohosts(node)inthenetwork.
Abroadcastisusedtosendpacketstosubnetworkdomain.
Amulticastaddressisdesignedtoenabledeliveryofpacketstothesetofhoststhathavebeenconfiguredasagroupaddressfrom244.
0.
0.
0to239.
255.
255.
255invarioussubnetworks.
Themaindisadvantagesofmulticastarenotconnectionoriented[12].
Amulticastisdeliveredtodestinationgroupmemberwiththesame"best-effort"reliabilityasaslanderedunicastIP.
ThemaindifferencebetweenamulticastIPpacketandaunicastIPpacketisthepresenceofa"groupaddress"intheDestinationAddressfieldoftheIPheader[2].
Eachhostisfreetojoinorleaveusingadatagramsocketasajoingroupatanytime.
That'smeannorestrictiononthephysicallocationorhowmanynumbersofmembersinamulticastgroup.
Themaindeviceontheinternetisrouterthatusesthegroupmembershipprotocoltolearnabouttheexistingofhostsinthenetworkthatattachedinitssubnetwork[15].
Processesthatworkbetweenonesenderandonerecipient,BrowsingSystemsandemailIsanexampleofonlineapplications.
anotherfieldItrequiresthelatestapplications,Oneuser(sender)sendsdatatoanumberofreceiversatasametime.
ThisapplicationwillusetooptimizetoabilityoforganizationabilitytoCollaborationandcommunicationwithinformation,Increasingtheimportanceofusingnetworks.
ThisfeatureinIPMulticastisanimportantadvanceinIPnetworking.
Theuseofmulticastfeaturecanbeappliedtoeasyworkandwehaveaddedasimplesecurityencryptionpackagetosendtonumberofreceivestomakeitmoresecurefordataexchangeorforfuturedevelopment.
Oneofthemainchallengesthatfacethetimeneedingtosendmessagesfromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtothegroupbecauseitneedstosendonemessageateachtimetoeachoneofthegroup.
Sowhensendsmessagetogroupcontainfiveclients,itwillneedtosendthismessagefivetimes.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyoftherecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone,andanotherchallengetoensuresecuringmulticastcommunicationisconfidentialinformationthatistransferredorreceiveenabledatamulticastingtoverify,thatthedatacontainedoriginatedshouldbesenttotheuserwithoutanother,problembecomesmorecomplexincommon,inotherwordencryptionofadocumentinasecretkeyconstitutesasignaturestrongauthenticationofdocumentandweakagainstrepudiation,inparticularsendtoagroupofrecipients.
TheobjectiveofthispaperproposesdistributeencryptionmessagebasedonIPmulticast.
withIPmulticastitwouldbeeasytosupportmanyofrecipientsasitachievedthespeedandsecrecyinthetransferofinformation.
Themainresearchobjectivesofthisstudyare:Tomeasuretheperformanceforthegrouphostsbasedonresponsetimebetweenthesenderandthemanyreceivers,Toimplementthesecurepacketforsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithmandtounderstandthedifferencebetweenbroadcast,multicast,andunicastandhowtheProtocolIndependentMulticastProtocols(IMP)tojointhenewclientwithagroup.
ThisstudyprovidesanexecutiveintroductiontoIPMulticasttobeusedamongmanygroups.
ItpresentsthebasicconceptforIPmulticast;highlightsitsadvantagesanddisadvantages,andprovidesimplementedtosecuresendingpacketbasedonencryptionalgorithms.
Italsoshowsnetworkperformancebyjoiningandaddingnewuserssimultaneouslyandthealgorithmcanshowtheefficientresponsetimeamongmanyhostseveninasecondormilli-seconds.
WhetheroneisauserofTCP/IP-basedtechnologiesoranorganizationinterestedforimplementingortakingadvantagesofIPMulticastwithinproductorservice,thisstudywillbebeneficialandlucrativeforallofthem.
Thisstudyshows"administrativelyscopeofIPv4multicastspace"tobeintherangeofIPv4from239.
0.
0.
0to239.
255.
255.
255.
Theapplicationhasbeenappliedpracticallyusinglocalareanetworkconnectedwiththeinternet.
Theapplicationputintousethesafetypelanguage"Javaprogramming"tooperatethewholeprogram.
2.
LiteratureReview2.
1MulticastProtocolsThemostfrequentlyusedtransportlayerprotocoltoemploymultipleaddressingistheUserDatagramProtocol(UDP).
Bynature,UDPisnotdependable—lossofmessagesanddeliverythatisoutoforderarequitepossible.
Dependablemulticastprotocols,e.
g.
PragmaticGeneralMulticast(PGM)havebeenevolvedtoaddlossdetectionandretransmissiontoIPmulticast.
IPmulticastiscommonlyutilizedinbusinesses,stockexchanges,andnetworkssendingmultimediamaterial.
AfrequentbusinessemploymentofIPmulticastisforIPTVapplicationssuchasdistancelearningandtelevisedcompanymeetings[30].
Liaoetal.
andWuetal.
haveofferedtomakethelossretrievaleasierviaintermediatenodessoastoshunlatencyandmessagingoverhead[1,2].
Xuetal.
haveexploitedatechniquetoprovidequalityofservicetovideoapplications[3].
Paganietal.
haveappliedamethodthatadaptivelyselectsfloodingandretrievalalongroutingtreebasedonthemobility[4].
AlotofscholarslikeAlpertonetal.
evolveatechniquewhichemploysflowcontroltoguaranteedependability[5].
2.
2PrivacyinMulticastOneofthemostimportantsecurityconcernsinmulticastismaintainingprivacyofcommunication.
Howdomultiplenetworkuserswhoareinthesamemulticast"group"exchangedatasuchthatnooneoutsidethegroupcandecipherwhatisbeingsentAnaturalwaytoguaranteethiswouldbetohaveusersshareacommonkey,calledthegroupkey,andtorequirethatallmulticasttransmissionsfromanyuserwithinthegroupbeencryptedusingthatkey.
Iftheyareguaranteedthatthegroupkeyisknownonlytogroupmembers,thensuchanencryptionprotocolwouldtriviallysolvetheprivacyproblem[28,30].
InFigure1thiswouldmeantransmittingtoallnodesinnetwork.
InFigure2illustratestransmittingtoallnodesbutprivacyinmulticast.
Exampleresearches,Brooks'set.
al(2009)appliedMulticastEncryptionInfrastructureforSecurityinSensorNetworks.
Designingsecuresensornetworksisdifficult.
Theyproposeanapproachthatusesmulticastcommunicationsandrequiresfewerencryptionsthanpairwisecommunications.
Thenetworkispartitionedintomulticastregions;eachregionismanagedbyasensornodechosentoactasakeyserver.
Thekeyserverssolicitnodesintheirneighborhoodtojointhelocalmulticasttree.
Thekeyservergeneratesabinarytreeofkeystomaintaincommunicationwithinthemulticastregionusingasharedkey.
Thisapproachsupportsadistributedkeyagreementprotocolthatidentifiesthecompromisedkeysandsupportsmembershipchangeswithminimumsystemoverhead.
Theyevaluatetheoverheadofthisapproachbyusingthenumberofmessagesandencryptionstoestimatepowerconsumption.
Usingdatafromfieldtestsofamilitarysurveillanceapplication,theyshowthatthismulticastapproachneedsfewerencryptionsthanpair-wisekeyingapproaches.
Theyalsoshowthatthisschemeiscapableofthwartingmanycommonattacks[29].
DuanandCanny(2006)presentedageneralframeworkforconstructingeffectivemulticastcryptosystemswithprovablesecurityandshowthatalineofpreviousworkonmulticastencryptionareallspecialcasesofthisgeneralapproach.
Theyprovidednewmethodsforbuildingsuchcryptosystemswithvariouslevelsofsecurity(e.
g.
,IND-CPA,IND-CCA2).
TheresultstheyobtainedenabletheconstructionofawholeclassofnewmulticastschemeswithguaranteedsecurityusingabroaderrangeofcommonprimitivessuchasOAEP.
Moreover,theywereshowthatmulticastcryptosystemswithhighlevelofsecurity(e.
g.
IND-CCA2)canbebaseduponpublickeycryptosystemswithweaker(e.
g.
CPA)securityaslongasthedecryptioncanbesecurelyandeffectively"shared".
Thisconstructionsfeaturetrulyconstant-sizedecryptionkeyswhereasthelengthsofboththeencryptionkeyandciphertextareindependentofgroupsize[24].
3.
MethodologyThemethodologyforthisworkcontainsfourphasesincludingStateproblem,SendingMessage,Pre-processingmessageandEvaluationofModel.
Wefollowthismethodologybecauseeachphaseinthismethodologyisrelatedtotheresearchandscope.
itisaveryflexibleinimplementationanditwillbesuitableforourwork.
ThestepsofthedataprocessareillustratedinFigure3.
Figure1.
TransmittingtomultiplerecipientsusingMulticastFigure2.
TransmittingtomultiplerecipientsusingprivacyinmulticastFigure3.
MessagesProcessRepresentation3.
1StateproblemThefirststepingeneralmethodologyisawarenessoftheproblem.
Theinformationaboutproblemcomefrommanysources:newdevelopmentsinindustryorinareferencediscipline.
Forthisstudytheawarenessofthechallengesthatfacethetimeneedingtosendmessagefromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtogroupbecauseitneedstosendonemessageateachtimetoeachoneofgroup.
Sowhensendmessageforgroupcontainfiveclients,itwillneedfiveoncesendmessage.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyofrecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone.
Alsowehavesuggestedhertosendmessagesinmoresecurely.
3.
2SendingMessagesThesecondphaseofthemethodologysuggestedaddingsecuritytomessagethatsendingtomanyhoststoprotectsendingmessagefrominterceptbyusingencryptionalgorithm,theencryptionkeycanbeextractedfromthemathematicalformulainFigure4showsthat,theJavacodeoftheencryptionalgorithmisgivenasFigure5.
Thisformulawillreceivethetotallengthofthestring(textmessage)fromthemethod,andifthetotalnumbermorethanFiveitwillstartdivideitbyTwountilbelessthanFive.
Finallytheresultfromtheformulawillconsiderastheencryptionkey,andthistechniqueensuresthechangeablekey,sothatonlyreceivingwhohasauthenticationcanseetheoriginalmessagebyusingdecryptionkeytobreaktheencryptionmessage.
AnapplicationdevelopedanddesignedbyusingtheJavalanguage,becauseit'ssuitabletobuildthisprojecttypeandUsingJavatoolshelptoachieveflexibilityfortheapplication.
3.
3Pre-processingmessageWedevelopthisprojectbyusingtheJavalanguage,toshowanadvantageanddis-advantageforIPmulticastwithasimpleencryptionalgorithm.
Figure5.
JavacodeforencryptionalgorithmX={X=XIFX5Figure4.
mathematicalformulaforextractingtheencryptionkey3.
4EvaluationofModelWeevaluatethisworkbyusingLAN,sowemakestestforourworkonLANnetworkthatconnectedwithroutertotheinternet.
Thefirststep,wesendmessagethatnoneedtobesecure(withoutencryption),allclientsseethecontentmessagedirectly,andrepeatsendingwithoutsecure(withencryption)thatoneclientwantonlyoneclientreadhismessageandnoonefromtheotherwillreadthecontentofthemessage.
Itwassuccessfultest,aftersendmessagewithencryptionthatwasseenforallclientbutnoonecanreadthecontentbecausetheencryption,thetargetclientwasenabledtoreadcontentmessageaftermakedecryptiontothemessage.
3.
5SimulationmodelInthismethodologywewillproposeourworkmechanismmodeltoshowmessagesendingprocessfromsendertogroupofreceivers,moreovertheprocessofsendingandreceivingencryptionmessagebetweenmanyhosts.
Sendingandreceivingblindtext:Sendingunencryptedmessagetogroupofreceivers,aswellaseveryhostreceivingthemessageatthesametime.
ThejavacodeofthispartoftheapplicationispresentedinFigure6.
Sendingandreceivingencryptedtext:SendingencryptionmessagetoagroupofreceiversasFigure7shows,aswellaseveryhostreceivingtheencryptionmessageatthesametimeasFigure8shows.
ThejavacodeofthispartoftheapplicationispresentedinFigure9.
Figure7.
explainsencryptionsendingthemessageFigure8.
explainsreceivingtheencryptionmessageFigure9.
JavacodeforsendingencryptionmessageFigure6.
JavacodeforsendingblindtextTheusercansendandreceivetheblindtextaswellastheencryptiontextasFigure10processofsendingandreceivingthemessagebetweenanytwohosts.
3.
6ExperimentalStepsInthispartwearegoingtoillustrateapplicationmechanismthatconsistsoftwosteps(loginwindowandchatwindow)thatshowsasbelow:3.
6.
1LoginwindowMainlogininterfaceasintheFigure11.
Thisapplicationrequirestheusertoperformanauthenticationprocedurewherebytheyarerequiredtoinsertausernameandpasswordinordertousethischatapplication.
Theapplicationwillbelaunchedwhentheuserenteredthecorrectusernameandpassword.
However,iftheuserenteredthewrongcombinationofusernameandpassword,theprogramwillimmediatelyshowerrorboxthatcontainamessagetoinformtheusertocorrecttheinsertedusernameandpassword.
3.
6.
2ChatWindowFigure12presentsthemainuserinterfaceforourchatapplication.
Theinterfaceincludeslabelsandbuttonsthatincreasetheapplication'susabilityandeaseofuse.
Figure10.
sendingencryptionmessageFigure11.
loginFigure12.
applicationwindowsBut,iftheuserdidn'ttypeanynametojointhechatgroupandtrytostartaconnection,theapplicationwillshowerrorboxthatcontainsmessagetoaskhimtotypehis/hername.
Usersmayconnecttotheserversimplybyclickingonthe'StartConnect'buttonprovidedonthemaininterface.
Whentheconnectionsuccessfullydone,thewindowchattingwilldisplay"Serverisstarted".
Onceaconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxareashowthatinFigure13.
Also,onceconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxarea.
Afterthat,theuserisabletouse"SendEnc.
Msg.
"tosendencryptionmessage.
Everyencryptionmessagewilldisplayinwindowchatting.
Themessagewillnotappearsameoncethatwriteonthetextarea"YourMessage"becauseitwillencryptinourAlgorithm.
Also,theencryptedmessagewilldisplayontheallhostsinthesamesamplesasaFigure14showingthatapproach.
3.
7ProgramsetupInstallationforcomputerprogramistheprocedureofactiontheprogramreadytowork.
Somecomputerprogramscanbeoperatedbyonlycopyingthemintoafolderstoredonacomputerandoperatingthem.
Otherprogramsaresuppliedinamodethatcannotbeimmediatelyexecutedandthusrequireasetupprocedure.
Wheninstalled,theprogramcanbeoperatedrepeatedly,needingnoreinstallationpriortoeachoperation.
Thechatapplicationrequirestwoprincipalthingstooperatecorrectly.
Firstly,theapplicationisconstructedusingtheJavaprogramminglanguage;hence,theuserhastoinstallJavaRuntimeEnvironment(JRE)andtheJavaDevelopmentKit(JDK).
Next,theapplicationcanoperatewithnoerroratall.
Nevertheless,theprogramstillrequirestobeconnectedtothenetworkforlinkingwithasetofIP.
3.
8ToolsCustomarily,mostcomputersusedtocommunicateusingtheNetworkProtocol;consequentlyanetworksocketispointendingbetweentwooperationconnectionstreamacrossnetworkforcomputer.
theapplicationofsocketAPIisinterfaceapplicationAPIgenerallysuppliedbytheoperatingsystem,thatpermitsapplicationprogramstocontrolandusenetworksockets.
NetworksocketAPIsgenerallyconformtotheBerkeleysocketsstandard.
AsocketaddressconsistsofanInternetProtocoladdressandaportnumber,justlikeoneendofaphoneconnectionwhichconsistsofaphonenumberandFigure13.
AppearMessageandTimeFigure14.
AppearEncryptionMessageonXHostsomeextension.
Usingthisaddress,networksocketssendreceiveddatatothesuitableapplicationoperationorthread.
Javaisalanguageusedinobject-orientedprogramming.
Ithasanion-builtapplicationprogramminginterface(API)thatcantackleimagesanduserinterfacesandthatcanbeemployedtodevisenewapplicationsorapplets.
DuetoitsdiversecollectionofAPI's,likeMacintoshandWindows,anditsplatformindependence,Javacanfurtherbeconsideredasaplatformonitsown.
Inaddition,ithasstandardlibrariesfordoingmath's,nottomentionJavaincludingnumerouslibraries.
Thejavanetpackpurveystwoclasses--SocketandServerSocket--thatexecutetheclientpartoftheconnectionandtheserverpartoftheconnection,respectively.
3.
9PlatformNetBeansIDEisoriginalforfreejavawhenmostdevelopersforsystems,thisNetBeansIDEsupportofmanylanguagesuchasJavaScript,PHP,C++andJavaFX.
NetBeansisanopen-sourceprojectdedicatedtoprovidingrocksolidsoftwaredevelopmentproducts(NetBeansIDEandNetBeansPlatform)thataddresstheneedsofdevelopers.
4.
FindingResultsandConclusionTheobjectiveofthisprojectwastodesignandimplementachatapplicationbasedonthemulticasttechnology,whichallowssendingandreceivinginstantmessagingandsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithm.
Alltheseoperationswereunderwirelesslocalareanetwork(WLAN).
TheapplicationclientsidewasimplementedonthewindowsplatformusingtheJavalanguageandtheSocketlibraryfile,whilethechatapplicationwasimplementedonNetbeansIDE7.
1usingaJavalanguage.
[17]Themainresultsthatweobtainedinthisproject;itissuccesstosendandreceivethemessagebasedonIPmulticastingtechnique.
Themessagecanbesendfromoneclienttogroupofreceivers,aswellasanyonecanjointhemulticastgroupbygettingtheapplication.
Moreover,thesecurityissueisasecondobjectthatwehaveachievedinthisproject.
Where,theclientscanreceiveciphertext,butwhocansendthattextanddecryptingitjustthatwhohastheapplicationthatwehavesuggestedasclearlyshowninFigure15.
Thisapplicationcontainencryptionalgorithmtoprovidehighsecurelevelfortopsecretetext.
TherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
ReferencesReferences[1].
W.
LiaoandM.
-Y.
Jiang.
Familyacktree(fat):Supportingreliablemulticastinmobileadhocnetworks.
IEEETransactionsonVehicularTechnology,Vol52.
No6,1675–1685,Nov2003.
[2].
S.
WuandC.
Bonnet.
Multicastroutingprotocolwithdynamiccore(mrdc).
InInternationalSymposiumonTelecommunications(IST01),Tehran,Iran,Aug2001.
[3].
D.
Xu,B.
Li,andK.
Nahrstedt.
Qos-directederrorcontrolofvideomulticastinwirelessnetworks.
In8thIEEEInternationalConferenceonComputerCommunicationsandNetworks(IEEEICCCN'99),pages257–262,Boston-Natick,MA,Oct1999.
[4].
E.
PaganiandG.
Rossi.
Reliablebroadcastinmobilemultihoppacketnetworks.
InMOBIHOC'97,1997.
[5].
K.
Almeroth,K.
Obraczka,andD.
Lucia.
Alightweightprotocolforinterconnectingheterogeneousdevicesindynamicenvironments.
InIEEEICMCS'99,1999.
[6].
R.
Chandra,V.
Ramasubramanian,andK.
Birman.
Anonymousgossip:Improvingmulticastreliabilityinmobilead-hocnetworks.
InThe21stInternationalConferenceonDistributedComputingSystems(ICDCS),Phoenix,Arizona,2001.
[7].
C.
-C.
ChiangandM.
Gerla.
Routingandmulticastinmultihop,mobilewirelessnetworks.
InIEEEICUPC'97,1997.
[8].
HodaA.
AbdelHafez,"BigDatainSmartCites:AnalysisandApplicationsinArabWorld",EgyptianComputerScienceJournal,Volume41,Issue1,January2017.
[9].
W.
WuandY.
C.
Tay.
Amris:Amulticastprotocolforadhocwirelessnetworks.
InMilitaryCommunicationsConference(AIILCOM1999),pages25–29,1999.
[10].
M.
Gerla,C.
-C.
Chiang,andL.
Zhang.
Treemulticaststrategiesinmobile,multihopwirelessnetworks.
ACM/BaltzerJournalofMobileNetworksandApplications(MONET),1999.
[11].
SajamaandZ.
J.
Haas.
Independent-treeadhocmulticastrouting(itamar).
MobileNetworksandApplications,vol8,No5:551–566,2003.
[12].
P.
-J.
Wan,G.
Calinescu,X.
-Y.
Li,andO.
Frieder.
Minimum-energybroadcastinginstaticadhocwirelessnetworks.
WirelessNetworks,vol8,No6:607–617,Nov2002.
[13].
J.
Wieselthier,G.
Nguyen,andA.
Ephremides.
Energy-limitedwirelessnetworkingwithdirectionalantennas:Thecaseofsession-basedmulticasting.
InINFOCOM'02,NewYork,NYUSA,2002.
Figure15.
SendandReceiveEncryptedMessage[14].
S.
GuoandO.
Yang.
Antennaorientationoptimizationforminimum-energymulticasttreeconstructioninwirelessadhocnetworkswithdirectionalantennas.
Inthe5thACMinternationalsymposiumonMobileadhocnetworkingandcomputing(MobiHoc04),RoppongiHills,Tokyo,Japan,2004.
[15].
S.
GuoandO.
Yang.
Minimumenergymulticastroutingforwirelessad-hocnetworkswithadaptiveantennas.
InICNP2004,Berlin,Germany,2004.
[16].
K.
Wang,C.
F.
Chiasserini,R.
R.
Rao,andJ.
Proakis.
Rise:Reducinginterferenceandsavingenergythroughmulticastinginadhocwirelessnetworks.
InIEEEMILCOM2002,Anaheim,CA,USA,2002.
[17].
C.
Hu,Y.
Hong,andJ.
Hou.
Onmitigatingthebroadcaststormproblemwithdirectionalantenna.
InICC'03,2003.
[18].
A.
K.
Das,R.
J.
MarksII,M.
A.
El-Sharkawi,P.
Arabshahi,andA.
Gray.
Maximizationoftime-to-first-failureformulticastapplicationsinwirelessnetworks:optimalsolutionusingmilp.
InIEEEMilcom,MontereyConferenceCenter,Monterey,CA,Oct2004.
[19].
C.
-C.
Chiang,M.
Gerla,andL.
Zhang.
Forwardinggroupmulticastprotocol(fgmp)formultihop,mobilewirelessnetworks.
ClusterComputing:SpecialIssueonMobileComputing,vol1.
1,No2:187–196,1998.
[20].
R.
VaishampayanandJ.
J.
Garcia-Luna-Aceves.
Efficientandrobustmulticastroutinginmobileadhocnetworks.
In1stIEEEInternationalConferenceonMobileAd-hocandSensorSystems,FortLauderdale,Florida,2004.
[21].
J.
J.
Garcia-Luna-AcevesandE.
L.
Madruga.
Amulticastroutingprotocolforad-hocnetworks.
InIEEEINFOCOM'99,NewYork,NewYork,,1999.
[22].
S.
ParkandD.
Park.
Adaptivecoremulticastroutingprotocol.
WirelessNetworks,vol10.
No1:53–60,Jan2004.
[23].
S.
Singh,C.
S.
Raghavendra,andJ.
Stepanek.
Powerefficientbroadcastinginmobileadhocnetworks.
InPIMRC'99,1999.
[24].
H.
ZhouandS.
Singh.
Content-basedmulticastformobileadhocnetworks.
InProc.
Mobihoc2000,August2000.
[25].
J.
KuriandS.
Kasera.
Reliablemulticastinmultiaccesswirelesslans.
WirelessNetworks,pages359–369,,Jul2001.
[26].
M.
NagyandS.
Singh.
Multicastschedulingalgorithmsinmobilenetworks.
ClusterComputing,1998.
[27].
S.
K.
S.
Gupta,V.
Shankar,andS.
Lalwani.
Reliablemulticastmacprotocolforwirelesslans.
InIEEEInternationalConferenceonCommunications(ICC'03),volume1,pages93–97,2003.
[28].
L.
TassiulasandA.
Ephremides.
Stabilitypropertiesofconstrainedqueueingsystemsandschedulingpoliciesformaximumthroughputinmultihopradionetworks.
IEEETransactionsonAutomaticControl,vol37,No12:1936–1948,Dec1992.
[29].
L.
TassiulasandA.
Ephremides.
Dynamicserverallocationtoparallelqueueswithrandomlyvaryingconnectivity.
IEEETrans.
Info.
Theory,vol30,No2:466–478,Mar1993.
[30].
C.
Diot,B.
N.
Levine,B.
Lyles,H.
Kassem,andD.
Balensiefen,DeploymentissuesfortheIPmulticasserviceandarchitecture.
IEEENetwork,vol14,No1:78–88,2000.
[31].
R.
R.
Brooks,BrijeshPillai,MatthewPirretti,AndMicheleC.
Weigle,MulticastEncryptionInfrastructureForSecurityInSensorNetworks,2009.
零途云是一家香港公司,主要产品香港cn2 gia线路、美国Cera线路云主机,美国CERA高防服务器,日本CN2直连服务器;同时提供香港多ip站群云服务器。即日起,购买香港/美国/日本云服务器享受9折优惠,新用户有优惠码:LINGTUYUN,使用即可打折。目前,零途云还推出性价比非常高香港多ip站群云服务器,有需要的,可以关注一下。零途云优惠码:优惠码:LINGTUYUN (新用户优惠,享受9折优...
RAKsmart商家一直以来在独立服务器、站群服务器和G口和10G口大端口流量服务器上下功夫比较大,但是在VPS主机业务上仅仅是顺带,尤其是我们看到大部分主流商家都做云服务器,而RAKsmart商家终于开始做云服务器,这次试探性的新增美国硅谷机房一个方案。月付7.59美元起,支持自定义配置,KVM虚拟化,美国硅谷机房,VPC网络/经典网络,大陆优化/精品网线路,支持Linux或者Windows操作...
CloudServer是一家新的VPS主机商,成立了差不多9个月吧,提供基于KVM架构的VPS主机,支持Linux或者Windows操作系统,数据中心在美国纽约、洛杉矶和芝加哥机房,都是ColoCrossing的机器。目前商家在LEB提供了几款特价套餐,最低月付4美元(或者$23.88/年),购买更高级别套餐还能三个月费用使用6个月,等于前半年五折了。下面列出几款特别套餐配置信息。CPU:1cor...
ecs为你推荐
湖南商标注册湖南商标注册最好的公司天天酷跑刷积分教程天天酷跑积分怎么获得 天天酷跑刷积分方法iphone越狱后怎么恢复已经越狱的iphone怎么恢复到原来的系统数据库损坏数据库坏了怎么办bt封杀为什么现在网上许多BT下载都被封了?小米手柄小米手柄和飞智手柄哪个好?中国杀毒软件排行榜中国杀软排名office2007简体中文版求office2007免费版下载地址 无需破解无需激活无须密钥南北互通从南方发往北方的产品一般是什么淘宝软文范例今天算自己能弄出来一段2500字的软文了,好不容易啊!各位大神如何写软文呢?
论坛虚拟主机 西安服务器租用 vps推荐 lnmp dns是什么 host1plus singlehop 火车票抢票攻略 申请个人网站 秒杀预告 网站卫士 微软服务器操作系统 如何建立邮箱 群英网络 攻击服务器 免备案cdn加速 闪讯网 tracker服务器 新网dns globalsign 更多