Keyword Search Result

[Keyword] IP multicast(14hit)

1-14hit
  • Evaluation of Reliable Multicast Delivery in Base Station Diversity Systems

    Katsuhiro NAITO  Kazuo MORI  Hideo KOBAYASHI  

     
    LETTER-Internet

      Vol:
    E93-B No:6
      Page(s):
    1615-1619

    This paper proposes a multicast delivery system using base station diversity for cellular systems. Conventional works utilize single wireless link communication to achieve reliable multicast. In cellular systems, received signal intensity declines in cell edge areas. Therefore, wireless terminals in cell edge areas suffer from many transmission errors due to low received signal intensity. Additionally, multi-path fading also causes dynamic fluctuation of received signal intensity. Wireless terminals also suffer from transmission errors due to the multi-path fading. The proposed system utilizes multiple wireless link communication to improve transmission performance. Each wireless terminal communicates with some neighbor base stations, and combines frame information which arrives from different base stations. Numerical results demonstrate that the proposed system can achieve multicast data delivery with a short transmission period and can reduce consumed wireless resource due to retransmission.

  • Internet Group Management Protocol for IPTV Services in Passive Optical Network

    Eunjo LEE  Sungkwon PARK  

     
    LETTER

      Vol:
    E93-B No:2
      Page(s):
    293-296

    We propose a new Internet group management protocol (IGMP) which can be used in passive optical network (PON) especially for IPTV services which dramatically reduces the channel change response time caused by traditional IGMP. In this paper, the newly proposed IGMP is introduced in detail and performance analysis is also included. Simulation results demonstrated the performance of the newly proposed IGMP, whereby, viewers can watch the shared IPTV channels without the channel change response time when channel request reaches a threshold.

  • A Solution for Irregular IP Multicast Packet Flooding -- For Heavy Traffic IP Multicast Communication

    Makoto MISUMI  Shin-ichi NAKAGAWA  Ken-ichi CHINEN  Yoichi SHINODA  Katsunori YAMAOKA  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    68-76

    When an IP Multicast network is constructed on a switch-based network, many IP Multicast packet broadcasts are generated, and these broadcasts cause trouble for all of the other kinds of communication. To solve this problem, implementing IGMP Snooping on various switches has been proposed. However, some switches have insufficient IP Multicast packet-handling capability. This problem is also mentioned in RFC4541. In this paper, we propose the IGMP Snooping Activator (ISA) mechanism as a way to solve the IP Multicast packet-handling problem. The ISA transmits dummy IGMP Queries to maintain the IP Multicast network, and it joins the flooding IP Multicast group to activate IGMP Snooping in switches that are unable to handle IP Multicast packets. The experimental evaluation shows the effectiveness of our proposed method: the network load decreases because of the method's effective restraint of IP Multicast packet flooding.

  • Cost Analysis of BestRelay Retransmission Trees for Reliable Multicasting

    Chang-Han KIM  Jae-Heon YANG  Ikjun YEOM  

     
    PAPER-Network

      Vol:
    E90-B No:3
      Page(s):
    527-537

    In this paper, we address how to construct efficient retransmission trees for reliable multicast. Efficiency of retransmission trees mainly depends on locations of repairers, which are in charge of retransmitting lost packets. We propose an algorithm for each receiver to find a repairer for efficient recovery. The resulting tree for retransmission is organized by pairs of a receiver and a repairer which is the host "nearest" to the receiver among the multicast group members "nearer" to the sender. We formally prove that the proposed algorithm realizes reliable multicast with only constant times of a lower bound cost achievable through impractical router support. We also evaluate the algorithm through extensive simulations.

  • Architecture for IP Multicast Deployment: Challenges and Practice Open Access

    Hitoshi ASAEDA  Shinsuke SUZUKI  Katsushi KOBAYASHI  Jun MURAI  

     
    INVITED PAPER

      Vol:
    E89-B No:4
      Page(s):
    1044-1051

    IP multicast technology is highly advantageous for various applications and future needs in the Internet. Yet, it is generally recognized that the IP multicast routing protocol is fairly complex and non-scalable and requires additional maintenance and operational cost to network administrators. Although there has been much research related to IP multicast and most router vendors already support basic IP multicast routing protocols, there is still a big gap between what is reported as the state-of-the-art in the literature from what is implemented in practice. In this paper, we clarify the complexities of traditional multicast communication and describe possible solutions using the one-to-many multicast communication model called Source-Specific Multicast (SSM). We explain this communication model and the corresponding routing architecture and examine the statistics obtained for the number of multicast routing entries in our backbone router, which is connected to the international backbone. We also introduce our international collaboration activities that are contributing to the deployment and promotion of IP multicast services in the Internet.

  • A Multicast Based Anonymous Information Sharing Protocol for Peer-to-Peer Systems

    Baoliu YE  Minyi GUO  Jingyang ZHOU  Daoxu CHEN  

     
    PAPER-Peer-to-Peer Computing

      Vol:
    E89-D No:2
      Page(s):
    581-588

    A fundamental problem in a pure Peer-to-Peer (P2P) file sharing system is how to protect the anonymity of peer nodes when providing efficient data access services. Most of existing work mainly focus on how to provide the initiator anonymity, but neglect the anonymity of the responder. In this paper, we propose a multicast-based protocol, called Mapper, for efficient file sharing with mutual anonymity. By seamlessly combining the technologies of multi-proxy and IP multicast together, the proposed protocol guarantees mutual anonymity during the entire session of file retrieval. Furthermore, Mapper replicates requested files inside the multicast group, so file distribution can be adjusted adaptively and the cost for multicast can be further reduced. Results of both simulations and theoretical analyses demonstrate that Mapper possesses the merits of scalability, reliability, and high adaptability.

  • Construction of a Robust Multicast Tree for Application-Level Multicast

    Taku NOGUCHI  Miki YAMAMOTO  

     
    PAPER-Multicast

      Vol:
    E88-B No:12
      Page(s):
    4427-4434

    Application-level multicast (ALM) is a feasible alternative to IP multicast. In ALM, multicast related features, such as group membership management, multicast routing and packet replication, are implemented at end-hosts instead of routers. A multicast distribution tree is constructed in the application layer, so all nodes in this tree are end-hosts. Packet transmission between end-hosts uses conventional IP unicast service. Therefore, all end-hosts can enjoy multicast communications without IP multicast service. However, ALM has a serious problem that the multicast distribution tree is intrinsically fragile and an end-host failure causes tree partitions. In this paper, to deal with this problem, we propose a new tree construction protocol which makes outdegrees of intermediate nodes be balanced. The degree-balanced distribution tree can reduce the average number of nodes decoupled by tree partitions. To investigate performance of our protocol, it is compared with an existing ALM protocol. Our simulation results show that our protocol outperforms the existing protocol from the viewpoints of robustness, loss probability and receiver-perceived delay.

  • TDBMA--A Novel Multicast Algorithm for IPv6-Based Mobile Networks

    Wu-Hsiao HSU  

     
    PAPER

      Vol:
    E88-B No:7
      Page(s):
    2826-2836

    IP multicasting has naturally been considered the ideal technique to be used with multimedia communications but is difficult to mobile hosts due to the addition of mobility in the host group. In this paper, we propose a novel multicast algorithm, namely time and distance-based multicast algorithm (TDBMA), for IPv6-based mobile networks. TDBMA intends to trade off between the shortest delivery path and the frequency of the multicast tree reconfiguration. When a mobile host (MH) moves into a new foreign network which is managed by a foreign network router and re-subscribes to an existing multicast tree, the foreign network router uses the TDBMA to determine whether the MH joins the multicast tree directly or receives the tunneled multicast packets from its home agent (HA). The TDBMA is subject to two key factors, called time and distance. The visited foreign network router can join the multicast tree directly only when the value of both time and distance is true. The simulation results have shown that TDBMA has better performance than other algorithms, especially in the case where the number of MHs is large.

  • An Efficient Multicast Distribution Scheme Combining Erasure Codes and Direct Requests

    Jun TAKAHASHI  Hideki TODE  Koso MURAKAMI  

     
    PAPER

      Vol:
    E88-B No:4
      Page(s):
    1374-1382

    For the efficient multicast distribution services on the Internet, suppressing the influence of packet loss is important issues. As a solution of this problem, Forward Error Correction (FEC) based on Reed-Solomon codes is usually used. However, in the case of content delivery services for a large amount of data, this approach is not suitable. In this paper, we focus on the erasure codes which are new approach of FEC and propose the efficient multicast video distribution method which combines the multicast distribution using erasure codes and direct request to the server. We implement proposal method and confirm its efficiency from the viewpoints of redundancy and processing time.

  • A QoS Aware Multicast Routing Protocol with Scalability in Terms of Link State Advertisement

    Toshihiko KATO  Seiji UENO  Shigeki MUKAIYAMA  

     
    PAPER

      Vol:
    E86-D No:11
      Page(s):
    2352-2360

    Recently routing protocols for QoS aware multicast are actively studied, but there are few studies focusing on the scalability of link state advertisement when the available bandwidth of a link is updated along with the QoS aware multicast tree construction. This paper proposes a new QoS aware multicast routing protocol that is scalable in terms of the link state advertisement exchange. Our protocol has the following features; (1) A multicast network is divided into domains, and the advertisement of information on links within a domain is limited within the domain. (2) Among the border multicast routers, only the link state information of inter-domain links is advertised. As a result, the number of link state advertisement messages will be drastically reduced. (3) When a multicast tree spreads over multiple domains, the tree construction needs to be performed without information on links in other domains, and it is possible that the construction may fail. In order to cope with this problem, the crank back mechanism of a tree construction is introduced. This paper describes the detailed procedures and the message formats of our protocol. It also describes the evaluation of the number of exchanged link state advertisement messages and shows that our protocol can reduce the number comparing with the conventional protocols.

  • A Technique for Constructing Dependable Internet Server Cluster

    Mamoru OHARA  Masayuki ARAI  Satoshi FUKUMOTO  Kazuhiko IWASAKI  

     
    PAPER-Fault Tolerance

      Vol:
    E86-D No:10
      Page(s):
    2198-2208

    An approach is proposed for constructing a dependable server cluster composed only of server nodes with all nodes running the same algorithm. The cluster propagates an IP multicast address as the server address, and clients multicast requests to the cluster. A local proxy running on each client machine enables conventional client software designed for unicasting to communicate with the cluster without having to be modified. Evaluation of a prototype system providing domain name service showed that a cluster using this technique has high dependability with acceptable performance degradation.

  • Multicast Communications--Present and Future

    Miki YAMAMOTO  

     
    INVITED PAPER

      Vol:
    E86-B No:6
      Page(s):
    1754-1767

    Multicast communications have been expected as an effective way to disseminate information to potentially large number of receivers. IP multicast is a well- known multicast protocol for the Internet. However, IP multicast has several technical problems to be resolved until it is widely deployed in the Internet. These includes service-model of multicast group, reliable transport protocol, congestion control and security. A lot of researches trying to resolve these technical problems make multicast communications a hot research area in these couple of decades. This paper overviews the present style of IP multicast and clearlify technical issues of the present multicast communications. The paper also surveys important approaches to these problems and discuss about future directions of multicast communications.

  • Performance Evaluation of Local Recovery Group Configuration in Reliable Multicast

    Miki YAMAMOTO  Takashi HASHIMOTO  Hiromasa IKEDA  

     
    PAPER-Internet

      Vol:
    E83-B No:12
      Page(s):
    2675-2684

    In reliable multicast communications, retransmission control plays an important role from the viewpoint of scalability. Previous works show that the implosion of control packets, e.g. ACKs or NAKs, degrades the total performance of reliable multicast communications. Local recovery which enables receivers receiving a packet successfully to initiate recovering a lost packet may have the possibility to solve this scalability problem. This paper presents the performance evaluation of local recovery caused by grouping receiving nodes in reliable multicast communication. There seems to be many features dominating the performance of local recovery, the number of nodes in a group, the shared loss occurring simultaneously at multiple receivers and so on. When the number of receivers in a group increases, the geographical expansion of a group will degrade the delay performance of the receivers. In a configuration where most nodes in a local-recovery group suffer from shared loss, the failure of local recovery degrades the total performance. Our simulation results under a hierarchical network topology like the real Internet show that a local-recovery group configuration with two-adjacent MANs grouping performs well.

  • NAK-Based Flow Control Scheme for Reliable Multicast Communications

    Miki YAMAMOTO  Yoshitsugu SAWA  Shinji FUKATSU  Hiromasa IKEDA  

     
    PAPER-Switching and Communication Processing

      Vol:
    E82-B No:5
      Page(s):
    712-720

    In reliable multicast communications, lost information due to packet loss should be re-multicasted. NAK-based retransmission scheme is said to be effective for scalable reliable multicast communications because it can avoid implosion of control packets. When the source sends packets faster than receiver's ability, packet loss due to buffer overflow occurs constantly at corresponding receivers. With this constant packet loss, implosion of control packets degrades total throughput seriously even in the case of NAK-based retransmission scheme. In order to prevent this kind of constant packet loss at receivers, flow control scheme should be implemented for reliable multicast communications. In the paper, we propose a new flow control scheme suitable for NAK-based retransmission scheme. From the viewpoint of flow control, receiving a NAK indicates that transmission rate is too high. However, in multicast communications, multiple NAKs may be generated for a corresponding packet. If the transmission rate is decreased simly by receiving a NAK, the rate may be decreased excessively. In the paper, logging information of transmission rate stored at the sender is proposed to be effective to prevent the transmission rate. Performance evaluation by computer simulation shows that the proposed scheme notably improves throughput performance compared with the case of no flow control.

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.