Explore chapters and articles related to this topic
Congestion Control Approaches: Primal Algorithm, Dual Algorithm, and Primal-Dual Algorithm
Published in Liansheng Tan, Resource Allocation and Performance Optimization in Communication Networks and the Internet, 2017
A multicast (one-to-many or many-to-many distribution [167]) is group communication, where information is addressed to a group of destination computers simultaneously. Group communication has two forms: application layer multicast and network-assisted multicast. Network-assisted multi-cast makes it possible for the source to efficiently send information to a specific group in a single transmission. Copies are automatically created in other network elements such as routers, switches, and cellular network base stations, but only to network segments that currently contain members of the group. A typical example of multicast communications is the Internet protocol (IP) multicast. IP multicast is a technique for one-to-many communication over an IP infrastructure in a network. The destination nodes send join and leave messages, for example, in the case of Internet television when the user changes from one TV channel to another. IP multicast scales to a larger receiver population by not requiring prior knowledge of who or how many receivers there are. Multicast uses network infrastructure efficiently by requiring the source to send a packet only once, even if it needs to be delivered to a large number of receivers. The nodes in the network take care of replicating the packet to reach multiple receivers only when it is necessary.
Network Engineering for Audio Engineers
Published in Steve Church, Skip Pizzi, Audio Over IP, 2012
An IP multicast packet includes the multicast group address to which the packet belongs. When an audio device connected to a switch port needs to receive multicast traffic from a specific group, it joins the group by sending an IGMP report (join request) to the network. When the switch receives the join request for a specific group, it forwards any multicast traffic it receives for that group through the port on which the join request was received. When the client is ready to leave the multicast group, it sends a leave group message to the network. When the leave group request is detected, the switch will cease transmitting traffic for the designated multicast group through the port on which the leave group request was received (as long as there are no other current members of that group on the port).
Information Technology
Published in Skip Pizzi, Graham A. Jones, A Broadcast Engineering Tutorial for Non-Engineers, 2014
Finally, the data streams must be transmitted over the Internet. Each data stream is broken into packets and distributed using an Internet protocol as described earlier. However, unlike regular broadcasting, there is no guarantee that packets will arrive in a particular order, or how long packets will take to reach their destination. Thus, if the Internet backbone or the Internet access connection to a particular user is under heavy load, the distribution of the packets for the audio/video stream maybe disrupted. This can produce jumps in the picture or skips in the audio when a user is listening to the streaming content, or simply termination of the stream to that user. As broadband Internet service improves and is increasingly deployed, such difficulties will decrease, but some finite capacity limits will theoretically always apply to any computer network connection, especially when wireless access is involved. Such limits do not apply to broadcast service. The restrictions mentioned previously on how many customers can be served particularly apply to Internet distribution using the unicast model, which is by far the most common. A technique called multicast is also possible in IP networking, which can reduce such problems. Multicast makes a single stream available to many users by replicating it within the network. IP multicast requires many changes in the way the Internet interconnections and routing are set up, however, and not all service providers offer multicast capability. So in many cases, not every segment of the network between a given content source and its users will be configurable in multicast mode, so unicast distribution will still be required for all or part of the network paths involved.
In-network caching in information-centric networks for different applications: A survey
Published in Cogent Engineering, 2023
Conventionally, the content delivery techniques use the client-server model. However, moving the content from the original server to the edge of the Internet (known as local replica server) is a key solution, which has better performance in terms of lower access latency, higher data transfer rate, and less cost than the client-server model. Content distribution network (CDN) through IP multicast is a typical example to address the primary challenge of the Internet (Mosko, 2015). CDN distributes the content from the original server to the end-users through the replica servers that aim to solve the backbone network bottleneck and provide a better quality of service. The contents that are stored and served at replica servers are carefully selected so that the hit rate can approach 100% in some cases. That is to say, CDN can lead to short access delay, increase content distribution rate, and reduce network bandwidth usage significantly (Abu et al., 2014; Halloush et al., 2017; Urueña et al., 2017).
Arrangement and Accomplishment of Interconnected Networks with Virtual Reality
Published in IETE Journal of Research, 2022
DIS via IP multicast is employed for communications among any hostname and the robotic host following installation. Neither the passenger and the servers have been enhanced with Java-based DIS processors to leverage multiplex. When broadcasting the Nomadic Rest command variables across local networks, our DIS processor wraps these in DIS PDUs on the user end. The DIS interpretation receives DIS PDUs from the internet, identifies Nomad client instructions, and publishes them to the client (TCP) communications channel on the application host [26]. The host replies by broadcasting the dinosaur's modified status after executing the request. For a multi-user scenario, DIS PDUs are also employed to provide unique management of the robots. The following is a basic procedure for command transmission: Its robots are gratis after startup, and the CP is held by the robot, which fulfils applications on a “firstly came, initially serviced” premise by design. The patient's position in the VE shifts from observer to operation when they control the CP. The fresh operators broadcast his or her position many times. Because all these participants’ apps are users of the identical multiplex channel, they all change the present driver's identification. That data is needed to respond to the present landlord's future “Get robot” demand [27–29].
Securing Multicast Group Communication in IoT-Enabled Systems
Published in IETE Technical Review, 2019
Subho Shankar Basu, Somanath Tripathy
According to our problem description, if a multicast secure message is to be sent over a network, it is not worthy to use a multiple unicast. Therefore, this approach (S-CPABE) encrypts the packet using CPABE encryption and uses IP multicast to send the encrypted packet to the destined network or nodes. So in this case, all the nodes which satisfy the access structure defined by the encryptor can only decrypt the packet. If we follow raw CPABE, each individual end node (which are indeed resource constrained) has to decrypt the packet using the decrypt function. This would not be possible for the end nodes because of their inability to deal with heavy cryptographic operations like CPABE. Moreover, if multiple nodes have the same attribute configuration and satisfy the access tree in exactly the same way, then the decryption in those nodes will be identical, so redundant. Thus if there is a message destined for them, then they will decrypt the message in exactly the same way. Due to this redundancy, there is a wastage of energy as decryption phase is quite heavy in terms of computation. So considering an IoT network involving hundreds of millions of nodes, the total decryption energy consumed by the end nodes become huge. S-CPABE reduces this consumption significantly by intelligently pushing the common intensive operations to the gateway.