EgyptianComputerScience

ecs  时间:2021-03-02  阅读:()
JournalVol.
42No.
4September2018ISSN-1110-2586UsingIPMulticastDistributeEncryptionMessageMahaSabriAltememeComputerScienceDepartment,CollegeofScienceKerbalaUniversity,Kerbala,IraqEmail:maha.
sabri@uokerbala.
edu.
iqAbstractTherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
Keyword:EncryptionMessage,ClientServer,DistributedSystem,InformationTechnology.
1.
IntroductionDistributing,asaworditusedwithadifferenttermsuchasdistributedsystem,distributedprogramminganddistributedalgorithm,infactitreferredtocomputernetworks.
Wherecomputersarephysicallydistributedindividuallywithinsomegeographicalareaandmakeaconnectionbetweenthem.
Nowadaysthesetermsareusedinamuchwidersense,evenreferringtoindependentprocessesthatrunonthesamecomputerandinteractwitheachotherbysendingmessages[2].
Generally,thecommunicationbetweentwocomputers(clientandserver)needstobereliable.
Therefore,everydeviceconnectedtoadistributedsystemsnetworkisassignedauniquenumberknownasanInternetProtocol(IPv4orIPv6)address.
TheIPispartofthecommunicationprotocolsthatallowcommunicatingbetweenthedevicesonthenetworks[1].
TherearethreemaintypesofIPv4addresses:Unicast,broadcast,andmulticast.
Unicastiddesignedtotransferapacketbetweentwohosts(node)inthenetwork.
Abroadcastisusedtosendpacketstosubnetworkdomain.
Amulticastaddressisdesignedtoenabledeliveryofpacketstothesetofhoststhathavebeenconfiguredasagroupaddressfrom244.
0.
0.
0to239.
255.
255.
255invarioussubnetworks.
Themaindisadvantagesofmulticastarenotconnectionoriented[12].
Amulticastisdeliveredtodestinationgroupmemberwiththesame"best-effort"reliabilityasaslanderedunicastIP.
ThemaindifferencebetweenamulticastIPpacketandaunicastIPpacketisthepresenceofa"groupaddress"intheDestinationAddressfieldoftheIPheader[2].
Eachhostisfreetojoinorleaveusingadatagramsocketasajoingroupatanytime.
That'smeannorestrictiononthephysicallocationorhowmanynumbersofmembersinamulticastgroup.
Themaindeviceontheinternetisrouterthatusesthegroupmembershipprotocoltolearnabouttheexistingofhostsinthenetworkthatattachedinitssubnetwork[15].
Processesthatworkbetweenonesenderandonerecipient,BrowsingSystemsandemailIsanexampleofonlineapplications.
anotherfieldItrequiresthelatestapplications,Oneuser(sender)sendsdatatoanumberofreceiversatasametime.
ThisapplicationwillusetooptimizetoabilityoforganizationabilitytoCollaborationandcommunicationwithinformation,Increasingtheimportanceofusingnetworks.
ThisfeatureinIPMulticastisanimportantadvanceinIPnetworking.
Theuseofmulticastfeaturecanbeappliedtoeasyworkandwehaveaddedasimplesecurityencryptionpackagetosendtonumberofreceivestomakeitmoresecurefordataexchangeorforfuturedevelopment.
Oneofthemainchallengesthatfacethetimeneedingtosendmessagesfromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtothegroupbecauseitneedstosendonemessageateachtimetoeachoneofthegroup.
Sowhensendsmessagetogroupcontainfiveclients,itwillneedtosendthismessagefivetimes.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyoftherecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone,andanotherchallengetoensuresecuringmulticastcommunicationisconfidentialinformationthatistransferredorreceiveenabledatamulticastingtoverify,thatthedatacontainedoriginatedshouldbesenttotheuserwithoutanother,problembecomesmorecomplexincommon,inotherwordencryptionofadocumentinasecretkeyconstitutesasignaturestrongauthenticationofdocumentandweakagainstrepudiation,inparticularsendtoagroupofrecipients.
TheobjectiveofthispaperproposesdistributeencryptionmessagebasedonIPmulticast.
withIPmulticastitwouldbeeasytosupportmanyofrecipientsasitachievedthespeedandsecrecyinthetransferofinformation.
Themainresearchobjectivesofthisstudyare:Tomeasuretheperformanceforthegrouphostsbasedonresponsetimebetweenthesenderandthemanyreceivers,Toimplementthesecurepacketforsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithmandtounderstandthedifferencebetweenbroadcast,multicast,andunicastandhowtheProtocolIndependentMulticastProtocols(IMP)tojointhenewclientwithagroup.
ThisstudyprovidesanexecutiveintroductiontoIPMulticasttobeusedamongmanygroups.
ItpresentsthebasicconceptforIPmulticast;highlightsitsadvantagesanddisadvantages,andprovidesimplementedtosecuresendingpacketbasedonencryptionalgorithms.
Italsoshowsnetworkperformancebyjoiningandaddingnewuserssimultaneouslyandthealgorithmcanshowtheefficientresponsetimeamongmanyhostseveninasecondormilli-seconds.
WhetheroneisauserofTCP/IP-basedtechnologiesoranorganizationinterestedforimplementingortakingadvantagesofIPMulticastwithinproductorservice,thisstudywillbebeneficialandlucrativeforallofthem.
Thisstudyshows"administrativelyscopeofIPv4multicastspace"tobeintherangeofIPv4from239.
0.
0.
0to239.
255.
255.
255.
Theapplicationhasbeenappliedpracticallyusinglocalareanetworkconnectedwiththeinternet.
Theapplicationputintousethesafetypelanguage"Javaprogramming"tooperatethewholeprogram.
2.
LiteratureReview2.
1MulticastProtocolsThemostfrequentlyusedtransportlayerprotocoltoemploymultipleaddressingistheUserDatagramProtocol(UDP).
Bynature,UDPisnotdependable—lossofmessagesanddeliverythatisoutoforderarequitepossible.
Dependablemulticastprotocols,e.
g.
PragmaticGeneralMulticast(PGM)havebeenevolvedtoaddlossdetectionandretransmissiontoIPmulticast.
IPmulticastiscommonlyutilizedinbusinesses,stockexchanges,andnetworkssendingmultimediamaterial.
AfrequentbusinessemploymentofIPmulticastisforIPTVapplicationssuchasdistancelearningandtelevisedcompanymeetings[30].
Liaoetal.
andWuetal.
haveofferedtomakethelossretrievaleasierviaintermediatenodessoastoshunlatencyandmessagingoverhead[1,2].
Xuetal.
haveexploitedatechniquetoprovidequalityofservicetovideoapplications[3].
Paganietal.
haveappliedamethodthatadaptivelyselectsfloodingandretrievalalongroutingtreebasedonthemobility[4].
AlotofscholarslikeAlpertonetal.
evolveatechniquewhichemploysflowcontroltoguaranteedependability[5].
2.
2PrivacyinMulticastOneofthemostimportantsecurityconcernsinmulticastismaintainingprivacyofcommunication.
Howdomultiplenetworkuserswhoareinthesamemulticast"group"exchangedatasuchthatnooneoutsidethegroupcandecipherwhatisbeingsentAnaturalwaytoguaranteethiswouldbetohaveusersshareacommonkey,calledthegroupkey,andtorequirethatallmulticasttransmissionsfromanyuserwithinthegroupbeencryptedusingthatkey.
Iftheyareguaranteedthatthegroupkeyisknownonlytogroupmembers,thensuchanencryptionprotocolwouldtriviallysolvetheprivacyproblem[28,30].
InFigure1thiswouldmeantransmittingtoallnodesinnetwork.
InFigure2illustratestransmittingtoallnodesbutprivacyinmulticast.
Exampleresearches,Brooks'set.
al(2009)appliedMulticastEncryptionInfrastructureforSecurityinSensorNetworks.
Designingsecuresensornetworksisdifficult.
Theyproposeanapproachthatusesmulticastcommunicationsandrequiresfewerencryptionsthanpairwisecommunications.
Thenetworkispartitionedintomulticastregions;eachregionismanagedbyasensornodechosentoactasakeyserver.
Thekeyserverssolicitnodesintheirneighborhoodtojointhelocalmulticasttree.
Thekeyservergeneratesabinarytreeofkeystomaintaincommunicationwithinthemulticastregionusingasharedkey.
Thisapproachsupportsadistributedkeyagreementprotocolthatidentifiesthecompromisedkeysandsupportsmembershipchangeswithminimumsystemoverhead.
Theyevaluatetheoverheadofthisapproachbyusingthenumberofmessagesandencryptionstoestimatepowerconsumption.
Usingdatafromfieldtestsofamilitarysurveillanceapplication,theyshowthatthismulticastapproachneedsfewerencryptionsthanpair-wisekeyingapproaches.
Theyalsoshowthatthisschemeiscapableofthwartingmanycommonattacks[29].
DuanandCanny(2006)presentedageneralframeworkforconstructingeffectivemulticastcryptosystemswithprovablesecurityandshowthatalineofpreviousworkonmulticastencryptionareallspecialcasesofthisgeneralapproach.
Theyprovidednewmethodsforbuildingsuchcryptosystemswithvariouslevelsofsecurity(e.
g.
,IND-CPA,IND-CCA2).
TheresultstheyobtainedenabletheconstructionofawholeclassofnewmulticastschemeswithguaranteedsecurityusingabroaderrangeofcommonprimitivessuchasOAEP.
Moreover,theywereshowthatmulticastcryptosystemswithhighlevelofsecurity(e.
g.
IND-CCA2)canbebaseduponpublickeycryptosystemswithweaker(e.
g.
CPA)securityaslongasthedecryptioncanbesecurelyandeffectively"shared".
Thisconstructionsfeaturetrulyconstant-sizedecryptionkeyswhereasthelengthsofboththeencryptionkeyandciphertextareindependentofgroupsize[24].
3.
MethodologyThemethodologyforthisworkcontainsfourphasesincludingStateproblem,SendingMessage,Pre-processingmessageandEvaluationofModel.
Wefollowthismethodologybecauseeachphaseinthismethodologyisrelatedtotheresearchandscope.
itisaveryflexibleinimplementationanditwillbesuitableforourwork.
ThestepsofthedataprocessareillustratedinFigure3.
Figure1.
TransmittingtomultiplerecipientsusingMulticastFigure2.
TransmittingtomultiplerecipientsusingprivacyinmulticastFigure3.
MessagesProcessRepresentation3.
1StateproblemThefirststepingeneralmethodologyisawarenessoftheproblem.
Theinformationaboutproblemcomefrommanysources:newdevelopmentsinindustryorinareferencediscipline.
Forthisstudytheawarenessofthechallengesthatfacethetimeneedingtosendmessagefromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtogroupbecauseitneedstosendonemessageateachtimetoeachoneofgroup.
Sowhensendmessageforgroupcontainfiveclients,itwillneedfiveoncesendmessage.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyofrecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone.
Alsowehavesuggestedhertosendmessagesinmoresecurely.
3.
2SendingMessagesThesecondphaseofthemethodologysuggestedaddingsecuritytomessagethatsendingtomanyhoststoprotectsendingmessagefrominterceptbyusingencryptionalgorithm,theencryptionkeycanbeextractedfromthemathematicalformulainFigure4showsthat,theJavacodeoftheencryptionalgorithmisgivenasFigure5.
Thisformulawillreceivethetotallengthofthestring(textmessage)fromthemethod,andifthetotalnumbermorethanFiveitwillstartdivideitbyTwountilbelessthanFive.
Finallytheresultfromtheformulawillconsiderastheencryptionkey,andthistechniqueensuresthechangeablekey,sothatonlyreceivingwhohasauthenticationcanseetheoriginalmessagebyusingdecryptionkeytobreaktheencryptionmessage.
AnapplicationdevelopedanddesignedbyusingtheJavalanguage,becauseit'ssuitabletobuildthisprojecttypeandUsingJavatoolshelptoachieveflexibilityfortheapplication.
3.
3Pre-processingmessageWedevelopthisprojectbyusingtheJavalanguage,toshowanadvantageanddis-advantageforIPmulticastwithasimpleencryptionalgorithm.
Figure5.
JavacodeforencryptionalgorithmX={X=XIFX5Figure4.
mathematicalformulaforextractingtheencryptionkey3.
4EvaluationofModelWeevaluatethisworkbyusingLAN,sowemakestestforourworkonLANnetworkthatconnectedwithroutertotheinternet.
Thefirststep,wesendmessagethatnoneedtobesecure(withoutencryption),allclientsseethecontentmessagedirectly,andrepeatsendingwithoutsecure(withencryption)thatoneclientwantonlyoneclientreadhismessageandnoonefromtheotherwillreadthecontentofthemessage.
Itwassuccessfultest,aftersendmessagewithencryptionthatwasseenforallclientbutnoonecanreadthecontentbecausetheencryption,thetargetclientwasenabledtoreadcontentmessageaftermakedecryptiontothemessage.
3.
5SimulationmodelInthismethodologywewillproposeourworkmechanismmodeltoshowmessagesendingprocessfromsendertogroupofreceivers,moreovertheprocessofsendingandreceivingencryptionmessagebetweenmanyhosts.
Sendingandreceivingblindtext:Sendingunencryptedmessagetogroupofreceivers,aswellaseveryhostreceivingthemessageatthesametime.
ThejavacodeofthispartoftheapplicationispresentedinFigure6.
Sendingandreceivingencryptedtext:SendingencryptionmessagetoagroupofreceiversasFigure7shows,aswellaseveryhostreceivingtheencryptionmessageatthesametimeasFigure8shows.
ThejavacodeofthispartoftheapplicationispresentedinFigure9.
Figure7.
explainsencryptionsendingthemessageFigure8.
explainsreceivingtheencryptionmessageFigure9.
JavacodeforsendingencryptionmessageFigure6.
JavacodeforsendingblindtextTheusercansendandreceivetheblindtextaswellastheencryptiontextasFigure10processofsendingandreceivingthemessagebetweenanytwohosts.
3.
6ExperimentalStepsInthispartwearegoingtoillustrateapplicationmechanismthatconsistsoftwosteps(loginwindowandchatwindow)thatshowsasbelow:3.
6.
1LoginwindowMainlogininterfaceasintheFigure11.
Thisapplicationrequirestheusertoperformanauthenticationprocedurewherebytheyarerequiredtoinsertausernameandpasswordinordertousethischatapplication.
Theapplicationwillbelaunchedwhentheuserenteredthecorrectusernameandpassword.
However,iftheuserenteredthewrongcombinationofusernameandpassword,theprogramwillimmediatelyshowerrorboxthatcontainamessagetoinformtheusertocorrecttheinsertedusernameandpassword.
3.
6.
2ChatWindowFigure12presentsthemainuserinterfaceforourchatapplication.
Theinterfaceincludeslabelsandbuttonsthatincreasetheapplication'susabilityandeaseofuse.
Figure10.
sendingencryptionmessageFigure11.
loginFigure12.
applicationwindowsBut,iftheuserdidn'ttypeanynametojointhechatgroupandtrytostartaconnection,theapplicationwillshowerrorboxthatcontainsmessagetoaskhimtotypehis/hername.
Usersmayconnecttotheserversimplybyclickingonthe'StartConnect'buttonprovidedonthemaininterface.
Whentheconnectionsuccessfullydone,thewindowchattingwilldisplay"Serverisstarted".
Onceaconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxareashowthatinFigure13.
Also,onceconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxarea.
Afterthat,theuserisabletouse"SendEnc.
Msg.
"tosendencryptionmessage.
Everyencryptionmessagewilldisplayinwindowchatting.
Themessagewillnotappearsameoncethatwriteonthetextarea"YourMessage"becauseitwillencryptinourAlgorithm.
Also,theencryptedmessagewilldisplayontheallhostsinthesamesamplesasaFigure14showingthatapproach.
3.
7ProgramsetupInstallationforcomputerprogramistheprocedureofactiontheprogramreadytowork.
Somecomputerprogramscanbeoperatedbyonlycopyingthemintoafolderstoredonacomputerandoperatingthem.
Otherprogramsaresuppliedinamodethatcannotbeimmediatelyexecutedandthusrequireasetupprocedure.
Wheninstalled,theprogramcanbeoperatedrepeatedly,needingnoreinstallationpriortoeachoperation.
Thechatapplicationrequirestwoprincipalthingstooperatecorrectly.
Firstly,theapplicationisconstructedusingtheJavaprogramminglanguage;hence,theuserhastoinstallJavaRuntimeEnvironment(JRE)andtheJavaDevelopmentKit(JDK).
Next,theapplicationcanoperatewithnoerroratall.
Nevertheless,theprogramstillrequirestobeconnectedtothenetworkforlinkingwithasetofIP.
3.
8ToolsCustomarily,mostcomputersusedtocommunicateusingtheNetworkProtocol;consequentlyanetworksocketispointendingbetweentwooperationconnectionstreamacrossnetworkforcomputer.
theapplicationofsocketAPIisinterfaceapplicationAPIgenerallysuppliedbytheoperatingsystem,thatpermitsapplicationprogramstocontrolandusenetworksockets.
NetworksocketAPIsgenerallyconformtotheBerkeleysocketsstandard.
AsocketaddressconsistsofanInternetProtocoladdressandaportnumber,justlikeoneendofaphoneconnectionwhichconsistsofaphonenumberandFigure13.
AppearMessageandTimeFigure14.
AppearEncryptionMessageonXHostsomeextension.
Usingthisaddress,networksocketssendreceiveddatatothesuitableapplicationoperationorthread.
Javaisalanguageusedinobject-orientedprogramming.
Ithasanion-builtapplicationprogramminginterface(API)thatcantackleimagesanduserinterfacesandthatcanbeemployedtodevisenewapplicationsorapplets.
DuetoitsdiversecollectionofAPI's,likeMacintoshandWindows,anditsplatformindependence,Javacanfurtherbeconsideredasaplatformonitsown.
Inaddition,ithasstandardlibrariesfordoingmath's,nottomentionJavaincludingnumerouslibraries.
Thejavanetpackpurveystwoclasses--SocketandServerSocket--thatexecutetheclientpartoftheconnectionandtheserverpartoftheconnection,respectively.
3.
9PlatformNetBeansIDEisoriginalforfreejavawhenmostdevelopersforsystems,thisNetBeansIDEsupportofmanylanguagesuchasJavaScript,PHP,C++andJavaFX.
NetBeansisanopen-sourceprojectdedicatedtoprovidingrocksolidsoftwaredevelopmentproducts(NetBeansIDEandNetBeansPlatform)thataddresstheneedsofdevelopers.
4.
FindingResultsandConclusionTheobjectiveofthisprojectwastodesignandimplementachatapplicationbasedonthemulticasttechnology,whichallowssendingandreceivinginstantmessagingandsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithm.
Alltheseoperationswereunderwirelesslocalareanetwork(WLAN).
TheapplicationclientsidewasimplementedonthewindowsplatformusingtheJavalanguageandtheSocketlibraryfile,whilethechatapplicationwasimplementedonNetbeansIDE7.
1usingaJavalanguage.
[17]Themainresultsthatweobtainedinthisproject;itissuccesstosendandreceivethemessagebasedonIPmulticastingtechnique.
Themessagecanbesendfromoneclienttogroupofreceivers,aswellasanyonecanjointhemulticastgroupbygettingtheapplication.
Moreover,thesecurityissueisasecondobjectthatwehaveachievedinthisproject.
Where,theclientscanreceiveciphertext,butwhocansendthattextanddecryptingitjustthatwhohastheapplicationthatwehavesuggestedasclearlyshowninFigure15.
Thisapplicationcontainencryptionalgorithmtoprovidehighsecurelevelfortopsecretetext.
TherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
ReferencesReferences[1].
W.
LiaoandM.
-Y.
Jiang.
Familyacktree(fat):Supportingreliablemulticastinmobileadhocnetworks.
IEEETransactionsonVehicularTechnology,Vol52.
No6,1675–1685,Nov2003.
[2].
S.
WuandC.
Bonnet.
Multicastroutingprotocolwithdynamiccore(mrdc).
InInternationalSymposiumonTelecommunications(IST01),Tehran,Iran,Aug2001.
[3].
D.
Xu,B.
Li,andK.
Nahrstedt.
Qos-directederrorcontrolofvideomulticastinwirelessnetworks.
In8thIEEEInternationalConferenceonComputerCommunicationsandNetworks(IEEEICCCN'99),pages257–262,Boston-Natick,MA,Oct1999.
[4].
E.
PaganiandG.
Rossi.
Reliablebroadcastinmobilemultihoppacketnetworks.
InMOBIHOC'97,1997.
[5].
K.
Almeroth,K.
Obraczka,andD.
Lucia.
Alightweightprotocolforinterconnectingheterogeneousdevicesindynamicenvironments.
InIEEEICMCS'99,1999.
[6].
R.
Chandra,V.
Ramasubramanian,andK.
Birman.
Anonymousgossip:Improvingmulticastreliabilityinmobilead-hocnetworks.
InThe21stInternationalConferenceonDistributedComputingSystems(ICDCS),Phoenix,Arizona,2001.
[7].
C.
-C.
ChiangandM.
Gerla.
Routingandmulticastinmultihop,mobilewirelessnetworks.
InIEEEICUPC'97,1997.
[8].
HodaA.
AbdelHafez,"BigDatainSmartCites:AnalysisandApplicationsinArabWorld",EgyptianComputerScienceJournal,Volume41,Issue1,January2017.
[9].
W.
WuandY.
C.
Tay.
Amris:Amulticastprotocolforadhocwirelessnetworks.
InMilitaryCommunicationsConference(AIILCOM1999),pages25–29,1999.
[10].
M.
Gerla,C.
-C.
Chiang,andL.
Zhang.
Treemulticaststrategiesinmobile,multihopwirelessnetworks.
ACM/BaltzerJournalofMobileNetworksandApplications(MONET),1999.
[11].
SajamaandZ.
J.
Haas.
Independent-treeadhocmulticastrouting(itamar).
MobileNetworksandApplications,vol8,No5:551–566,2003.
[12].
P.
-J.
Wan,G.
Calinescu,X.
-Y.
Li,andO.
Frieder.
Minimum-energybroadcastinginstaticadhocwirelessnetworks.
WirelessNetworks,vol8,No6:607–617,Nov2002.
[13].
J.
Wieselthier,G.
Nguyen,andA.
Ephremides.
Energy-limitedwirelessnetworkingwithdirectionalantennas:Thecaseofsession-basedmulticasting.
InINFOCOM'02,NewYork,NYUSA,2002.
Figure15.
SendandReceiveEncryptedMessage[14].
S.
GuoandO.
Yang.
Antennaorientationoptimizationforminimum-energymulticasttreeconstructioninwirelessadhocnetworkswithdirectionalantennas.
Inthe5thACMinternationalsymposiumonMobileadhocnetworkingandcomputing(MobiHoc04),RoppongiHills,Tokyo,Japan,2004.
[15].
S.
GuoandO.
Yang.
Minimumenergymulticastroutingforwirelessad-hocnetworkswithadaptiveantennas.
InICNP2004,Berlin,Germany,2004.
[16].
K.
Wang,C.
F.
Chiasserini,R.
R.
Rao,andJ.
Proakis.
Rise:Reducinginterferenceandsavingenergythroughmulticastinginadhocwirelessnetworks.
InIEEEMILCOM2002,Anaheim,CA,USA,2002.
[17].
C.
Hu,Y.
Hong,andJ.
Hou.
Onmitigatingthebroadcaststormproblemwithdirectionalantenna.
InICC'03,2003.
[18].
A.
K.
Das,R.
J.
MarksII,M.
A.
El-Sharkawi,P.
Arabshahi,andA.
Gray.
Maximizationoftime-to-first-failureformulticastapplicationsinwirelessnetworks:optimalsolutionusingmilp.
InIEEEMilcom,MontereyConferenceCenter,Monterey,CA,Oct2004.
[19].
C.
-C.
Chiang,M.
Gerla,andL.
Zhang.
Forwardinggroupmulticastprotocol(fgmp)formultihop,mobilewirelessnetworks.
ClusterComputing:SpecialIssueonMobileComputing,vol1.
1,No2:187–196,1998.
[20].
R.
VaishampayanandJ.
J.
Garcia-Luna-Aceves.
Efficientandrobustmulticastroutinginmobileadhocnetworks.
In1stIEEEInternationalConferenceonMobileAd-hocandSensorSystems,FortLauderdale,Florida,2004.
[21].
J.
J.
Garcia-Luna-AcevesandE.
L.
Madruga.
Amulticastroutingprotocolforad-hocnetworks.
InIEEEINFOCOM'99,NewYork,NewYork,,1999.
[22].
S.
ParkandD.
Park.
Adaptivecoremulticastroutingprotocol.
WirelessNetworks,vol10.
No1:53–60,Jan2004.
[23].
S.
Singh,C.
S.
Raghavendra,andJ.
Stepanek.
Powerefficientbroadcastinginmobileadhocnetworks.
InPIMRC'99,1999.
[24].
H.
ZhouandS.
Singh.
Content-basedmulticastformobileadhocnetworks.
InProc.
Mobihoc2000,August2000.
[25].
J.
KuriandS.
Kasera.
Reliablemulticastinmultiaccesswirelesslans.
WirelessNetworks,pages359–369,,Jul2001.
[26].
M.
NagyandS.
Singh.
Multicastschedulingalgorithmsinmobilenetworks.
ClusterComputing,1998.
[27].
S.
K.
S.
Gupta,V.
Shankar,andS.
Lalwani.
Reliablemulticastmacprotocolforwirelesslans.
InIEEEInternationalConferenceonCommunications(ICC'03),volume1,pages93–97,2003.
[28].
L.
TassiulasandA.
Ephremides.
Stabilitypropertiesofconstrainedqueueingsystemsandschedulingpoliciesformaximumthroughputinmultihopradionetworks.
IEEETransactionsonAutomaticControl,vol37,No12:1936–1948,Dec1992.
[29].
L.
TassiulasandA.
Ephremides.
Dynamicserverallocationtoparallelqueueswithrandomlyvaryingconnectivity.
IEEETrans.
Info.
Theory,vol30,No2:466–478,Mar1993.
[30].
C.
Diot,B.
N.
Levine,B.
Lyles,H.
Kassem,andD.
Balensiefen,DeploymentissuesfortheIPmulticasserviceandarchitecture.
IEEENetwork,vol14,No1:78–88,2000.
[31].
R.
R.
Brooks,BrijeshPillai,MatthewPirretti,AndMicheleC.
Weigle,MulticastEncryptionInfrastructureForSecurityInSensorNetworks,2009.

CloudCone:洛杉矶MC机房KVM月付1.99美元起,支持支付宝/PayPal

CloudCone是一家成立于2017年的国外VPS主机商,提供独立服务器租用和VPS主机,其中VPS基于KVM架构,多个不同系列,譬如常规VPS、大硬盘VPS等等,数据中心在洛杉矶MC机房。商家2021年Flash Sale活动继续,最低每月1.99美元,支持7天退款到账户,支持使用PayPal或者支付宝付款,先充值后下单的方式。下面列出几款VPS主机配置信息。CPU:1core内存:768MB...

收到几个新商家投稿(HostMem,无忧云,青云互联,TTcloud,亚洲云端,趣米云),一起发布排名不分先后

7月份已经过去了一半,炎热的夏季已经来临了,主机圈也开始了大量的夏季促销攻势,近期收到一些商家投稿信息,提供欧美或者亚洲地区主机产品,价格优惠,这里做一个汇总,方便大家参考,排名不分先后,以邮件顺序,少部分因为促销具有一定的时效性,价格已经恢复故暂未列出。HostMem部落曾经分享过一次Hostmem的信息,这是一家提供动态云和经典云的国人VPS商家,其中动态云硬件按小时计费,流量按需使用;而经典...

国内云服务器 1核 2G 2M 15元/月 萤光云

标题【萤光云双十二 全场6折 15元/月 续费同价】今天站长给大家推荐一家国内云厂商的双十二活动。萤光云总部位于福建福州,其成立于2002 年。主打高防云服务器产品,主要提供福州、北京、上海 BGP 和香港 CN2 节点。萤光云的高防云服务器自带 50G 防御,适合高防建站、游戏高防等业务。这家厂商本次双十二算是性价比很高了。全线产品6折,上海 BGP 云服务器折扣更大 5.5 折(测试了一下是金...

ecs为你推荐
windows优化大师怎么用Windows优化大师怎么用中国电信互联星空互联星空是什么?是电信公司的吗?金山杀毒怎么样金山杀毒怎么样?ghostxp3GhostXP3电脑公司特别版V499怎么安装渗透测试软件测试与渗透测试那个工作有前途pwlosera,pw是什么,是不认识的人发的短信。请解释::不兼容手机软件与系统不兼容应该怎么办ios7固件下载iOS的固件有正版盗版之分吗?我看到了蜂威网有iOS7的固件想下载试用一下,那里是测试版是正版吗雅虎天盾高手进来看看我该怎么办 新装的ie8 内存使用率达到100%了idc前线穿越火线河北的服务器好卡 有人知道怎么回事嘛 知道的速回
国内ip代理 网站虚拟主机空间 vps优惠码cnyvps 特价空间 网页背景图片 789电视 me空间社区 秒杀汇 共享主机 metalink 华为云盘 四川电信商城 个人免费邮箱 购买空间 国外代理服务器 新网dns accountsuspended phpwind论坛 火山互联 瓦工招聘 更多