Science method

Multicast - Science method

Explore the latest questions and answers in Multicast, and find Multicast experts.
Questions related to Multicast
  • asked a question related to Multicast
Question
1 answer
feasible: all to one (UDP unicast or multicast) stream traffic, images from all mobiles/nodes sent to one mobile/node. TCP modified for node-to-neighbour operation or end-to-end. Can rely on synched mobiles (each using GPS signals for example). Out of band channel possible but substracted from the radio resources for user data (e.g., if OLSR is used, the TC and Hello msg can use the out-of-band channel, ... or not). With/out (perfect) rate adaptation. [Rayleigh] fading environment and SISO but MIMO like channels possible.
jfowagen@gmail.com for more info.
Relevant answer
The general concept of using TDMA in WiFi like systems is prevalent. This is known as PTMP - Point to Multipoint system. It does use a master controller generally terms Base Station Controller. The BS initiates the conversation and other units respond.
In the case of MANET since each node is also capable of being a relay and a router, it is important to rearrange. If one unit is declared BS and allowed to assign channels then TDMA becomes straight forward. The reason is TDMA requires time sync, which is provided by the BS. In the enclosed (chapter 12) observe Fig 12.6.1 where the BS for each area initiates and controls on a given channel. In MANET channels for police from a Precinct (for example) or fire personnel from the area (for example) can all have pre-designated channels assigned. Then TDMA becomes straight forward. In all cellular systems (including GSM) this method has been followed. In PTMP (made by quite a few vendors) similar method is followed.
Hope this helps
  • asked a question related to Multicast
Question
8 answers
I proposed an algorithm for multicast in smart grid and I want to compare it with the optimal tree. I tried to to write a model by myself but I finally came up with shortest path tree instead of Steiner tree. Any suggestions will be appreciated .
Relevant answer
Answer
Slightly delayed answer:
If you want to solve a geometric Steiner tree problem,
I would recommend GeoSteiner: http://geosteiner.com/
If you want to solve a Steiner tree problem in graphs,
I would recommend SCIP-Jack: http://scipjack.zib.de/
  • asked a question related to Multicast
Question
2 answers
I am looking for doing multicast IPv6 ping to nodes connected to a border router, the border router is connected in serial to a local host (Ubuntu), so how to do multicast ping from local host to the nodes?
Relevant answer
Answer
use centikos simulator
  • asked a question related to Multicast
Question
13 answers
Kindly suggest which routing algorithm is better to implement for finding the optimal route in wireless adhoc networks? 
Performance criteria :end to end delay , packet delivery ratio, throughput
Relevant answer
Answer
There is no specific answer to your question. to choose the best routing algorithm in an Ad hoc network you must specify the type of application, the size of the network, and the mobility model.
The most known routing protocols are
1- AODV and DSR as reactive protocols.
2- OLSR and DSDV as proactive Protocols.
3- ZRP and TORA as Hebrid Protocols.
I recommend to read and cite the related paper
  • asked a question related to Multicast
Question
3 answers
Consider a dual-hop system where a single source tries to send any information to a group of multicast receivers in the presence of multiple eavesdroppers. Also, assume that there is no direct link between the source and the receivers. So, to transmit the data, the best relay selection scheme is utilized to choose among multiple relays.
In this case, is the perfect channel state information (CSI) of both receivers and eavesdroppers necessary for applying the best relay selection scheme?
Relevant answer
Dear @
Same for you!
I have a question that may help us to answer your question.
Why do you want to know the channel sate information for an eaves dropper?
Only in the case that you want to nullify its recieved signal or make it less than his receiver sensitivity, you have to know its channel sate information.
Then the problem will be similar to that of the space multiplexing MIMO.
What I mean it depends on how do you want to prevent the eaves
dropping.
Best wishes
  • asked a question related to Multicast
Question
3 answers
In NDN, a node wants to broadcast an interest, that interest contains information about an other node. The neighboring nodes should receive the interest and store in their cache without sending back any data packet. in such scenario, which of following strategy is best?
  1. UDP multicast
  2. Publish- Subscribe
Relevant answer
Answer
In simple way of description, it is a Network coding algorithm where the co-operative data is allowed to be broadcasted only once, so the receiver has the option to use the data or discard it
  • asked a question related to Multicast
Question
4 answers
How can we mathematically model the reliability of a multicast or broadcast data reaching a neighboring relay?
Relevant answer
Answer
Hello Vishaka Basnayake , thanks. On researchgate we tend to click "recommend" on the answer of use, it helps people see what helps and what helps less.
Keep me posted on your investigation... You have an interesting question indeed
  • asked a question related to Multicast
Question
3 answers
The easy answer I kind of already know, yes. I learned that the main differences between wireless unicast, multicast and broadcast lies in the encryption section. Correct me if I am wrong, but I believe this to be generally the case:
- Wireless unicast is established when your mobile device contacts your network provider and provides you and your communicating partner with a cryptographic key. This key is then used to provide a secure channel such that only you two are able to read the message (even though a wireless transmitted message is basically received by every other radio device as well)
- Wireless multicast works similarly to unicast, except for the cryptographic key being provided to a group of communicating partners, such that only their devices are able to make sense of messages transmitted wirelessly.
- Wireless broadcast does not require contact with your network provider, since you broadcast your message to everyone. Hence, a cryptographic key is not necessary. Can I therefore send a message (unencrypted) from my mobile device to everyone around me (within transmission range), and how would I do this?
Relevant answer
From the transmission point of view, the mobile phone electromagnetic radiation covers an appreciable area around it and can reach any receiver exiting in this covered area. In fact the wireless communication systems have broad cast nature as their radiation covers the area around them. Only the midi um access control protocols restricts their receivers in the sense that that only the untended receiver or relievers can receive their transmitted signals. The mobile phone is working under the control of the base station in the sense that it gets its frequency, time slot or code , power level from the base station.
However , if it is wanted it could be made to work in the broadcast mode but it must possess the suitable protocols.
Best wishes
  • asked a question related to Multicast
Question
4 answers
QoS support can be made based on several mechanisms and protocols such as control admission and traffic grooming as well as contention resolution. However, security issue can decrease the QoS provision over optical networks including optical label and packet switched networks. For this reason, an advanced authentication scheme can help to assure the traffic transfer from the ingress edge node to egress edge node, in case of unicast and to several egress edge node, in case of multicast. Several authentication approaches can be used to guarantee the suitable QoS support.
Relevant answer
Answer
Dear Khlifi Yassine,
to set up connections with QoS support via WDM-based optical networks, the RSVP-TE (RFC 2747) is used as a GMPLS signaling protocol. My figure illustrates this. Here are two main Security Problems (SP):
· SP1: Security guarantee of RSVP-TE Signaling Protocol, that is the guarantee of security during the construction of an end-to-end connection with QoS support in the form of an LSP.
· SP2: Guarantee the security of communication via the established end-to-end connection with QoS support, that is the communication via LSP.
SP2 is a classic security issue - namely: the problem of security during communication between two computers. The following security protocols can be used to solve this problem:
· IPsec for the security guarantee of point-to-point communication between two IP instances, in fact between two IP addresses.
· TLS (Transport Layer Security) for the security of the connection-oriented Point-to-point communication between two TCP sockets.
· DTLS (Datagram TLS) for the security of the connectionless
Point-to-point communication between two UDP sockets.
SP1 is not a classic security problem, but the problem of the security guarantee of signaling according to RSVP-TE, i.e. the problem of securing RSVP-TE signaling when setting up LSPs. Some suggestions for solving the SP1 are already found mainly in several IETF documents, in particular in the documents of the working group KARP (Keying and Authentication for Routing Protocols). It should be noted that RSVP-TE (as well as RSVP) is located on layer 4 and RSVP has IP Protocol No = 46. For this reason, the Securing RSVP-TE Signaling Protocol solutions are based on IPsec, and IKEv2 (RFC 5996) is used as the Key Management Protocol. Some ideas for solving SP1 can be found in:
· RFC 5920: Security Framework for MPLS and GMPLS Networks
· RFC 6518: KARP Design Guidelines
· RFC 6862: KARP Overview, Threats, and Requirements
· RFC 6952: Analysis of BGP, LDP, PCEP, and MSDP Issues According to the KARP Design Guide
· draft-mahesh-karp-rsvp-te-analysis-01.txt
· Negotiation for Keying Pairwise Routing Protocols in IKEv2
draft-mahesh-karp-rkmp-05; See: 6.3.1. Transforms Substructures for RSVP-TE Authentication; the proposed mechanism secures RSVP-TE associations using the IKEv2
· Jing Zhi, Chung-Horng Lung, Xia Xu (Carleton University, Ottawa) and Srinivasan, Yi Lei (EION Inc): Securing RSVP and RSVP-TE Signaling Protocols and Their Performance Study
Good luck and best regards
Anatol Badach
  • asked a question related to Multicast
Question
3 answers
I was wondering if Facebook uni-cast or multicast an ongoing live video streaming to a group of users. For example, if a user joins a live stream, will he/she get a separate uni-cast or multicast stream.
Relevant answer
Answer
I believe that if you join a Facebook Live video after the live event has started, you will enter in the middle or the "current" location.
However, people watching the stream will not be perfectly synced. Different instances of the stream may be a few seconds before or after each other.
I would still call this multicasting.
  • asked a question related to Multicast
Question
1 answer
Looking for a way to evaluate MBMS based multicast approaches.  
Relevant answer
Answer
You can find MBMS service in NS3 LTE lena module.
  • asked a question related to Multicast
Question
2 answers
tel whether omnet supports ATM network
can we change the traffic pattern and analyze the speed of the network
Relevant answer
Answer
You can try
1. EXata Cyber
2. NS-3
3. Omnet ++
  • asked a question related to Multicast
Question
3 answers
is it same or different for all three? if it differs then how to calculate energy dissipation for unicast, multicast, and broadcast at the same distance?
Scenario: Cluster based wireless sensor network. 
Relevant answer
Answer
You should first find out if your sensor PHY or MAC layers even differentiate between unicast, multicast, and broadcast.
  • asked a question related to Multicast
Question
4 answers
I am using CCNx Protocol implemented in Contiki OS. Details of this implementation are available in the given link. And source code for this protocol is also given in attachment. In this protocol, broadcast mode is implemented. I want to use this protocol in multicast or unicast mode. Whats changes will be required. Code for broadcast mode is given in ccn_driver.c file which is present in this folder contiki/core/net/ccn.
Your advantageous and valuable help is required.
Relevant answer
Answer
I am using ubuntu 16.04 (64 bit) and unable to compile for sky or cooja on contiki 2.6. This I get while compiling on cooja simulator for sky.
msp430-gcc -DCONTIKI=1 -DCONTIKI_TARGET_SKY=1 -DWITH_CCN=1 -Os -fno-strict-aliasing -ffunction-sections -Wall -mmcu=msp430f1611 -g -DPROJECT_CONF_H=\"ccn-conf.h\" -I. -I../../platform/sky/. -I../../platform/sky/dev -I../../platform/sky/apps -I../../platform/sky/net -I../../cpu/msp430/f1xxx -I../../cpu/msp430/. -I../../cpu/msp430/dev -I../../core/dev -I../../core/lib -I../../core/net -I../../core/net/ccn -I../../core/net/mac -I../../core/net/rime -I../../core/net/rpl -I../../core/sys -I../../core/cfs -I../../core/ctk -I../../core/lib/ctk -I../../core/loader -I../../core/. -I../../platform/sky/ -MMD -c ../../core/net/ccn/ccn.c -o obj_sky/ccn.o
In file included from ../../core/net/ccn/ccn.c:33:0:
/usr/lib/gcc/msp430/4.6.3/../../../../msp430/include/signal.h:43:2: attention : #warning msp430-libc <signal.h> deprecated, using <legacymsp430.h> [-Wcpp]
../../core/net/ccn/ccn.c:39:24: erreur fatale: sys/unistd.h : Aucun fichier ou dossier de ce type
compilation terminée.
../../Makefile.include:200 : la recette pour la cible « obj_sky/ccn.o » a échouée
make: *** [obj_sky/ccn.o] Erreur 1
Please help!
  • asked a question related to Multicast
Question
2 answers
How is path synchronization implemented in time domain when two paths attempt to share the same wavelength through a fiber link?
Relevant answer
Dear Ravi, what do you mean with two paths attempt to share the same length?
if two light sources have the same wavelength and propagate at the same time in the fiber., then how can the receiver differentiate between them? One can distinguish them if they have different time slots in case of time division multiplexing , or different codes in case of  code division multiplexing. In all cases corrlelators are used for synchronization, where a local generated copy is correlated with received signal.
Best wishes
  • asked a question related to Multicast
Question
7 answers
Dear researchers?
I am a bit confuse about, when we do scheduling algorithm high proirity for something, the scheduling happened before data buffer or after?
I am wondering, if the data buffered and and buffer size is full, is that able to replace packets in the buffer with new data comes with high priorty?
Thanks
Relevant answer
Answer
No, when the packets are in the buffer, you should be able to treat them differently based on different criteria, e.g., priority. It depends on the implementation.
  • asked a question related to Multicast
Question
4 answers
Dear all, i saw several works related to Network coding and i am still not sure about  the difference between multicast and multiple unicast network communication paradigm.
As far as i understood in multicast one node sends to its successors the same information (which is of course a combination of its incoming flows).
In multiple unicast there are several sources (s_i) and each source needs to communicate to its relative sink (t_i) and each node can send different combination to its neighbours. Is it correct?
When i have a mixed case where different sources whose information needs to reach a subset of the sinks nodes...can this Still be considered multiple unicast? 
Moreover, is the Optimal Network coding (in sense of troughput) solved for a general alphabet and multiple unicast with some polynomial algorithm?
Thanks 
Gianni
Relevant answer
Answer
In multicast, you will always only send maximum one packet to each neighbour, but in multiple unicast, you will send one packet per downstream recipient.
  • asked a question related to Multicast
Question
1 answer
Please suggest the different techniques followed ..also please suggest is there any method by using Light weight cryptography...
Relevant answer
Answer
There are many good surveys on group key management that critically review existing techniques:
and a couple of RFCs: RFC 4046, RFC 2627 that describes the key management issues. Many deployment scenarios (D2D, Mobile, etc.) inherit the same problems.  
You need to choose the suitable scheme that best fulfills the requirements of D2D environment.
Hope it helps.
  • asked a question related to Multicast
Question
2 answers
mimo-ofdm, physical layer are the important key words
Relevant answer
Answer
thank u Mr.Mahmoud A.M.Albreem
  • asked a question related to Multicast
Question
2 answers
Does anyone know how to compute transmission delay of multicast in lossy wireless environment? 
Relevant answer
Answer
Thanks for your kind help.
  • asked a question related to Multicast
Question
2 answers
I'm working on multicast in smart grid and I don't know how to evaluate my method in that. I've worked a little with NS2 but it was not a good choice.
Relevant answer
Answer
We are very pleased using AnyLogic for this. See
(Published in Energy conversion and management 75 : 643-650 (2013))
  • asked a question related to Multicast
Question
2 answers
There are many techniques like ERM, MMT and so on. But is there any standardized protocol for this, used by cisco or any others?
Relevant answer
Answer
Hi Andrew. I can you recommend you a very detailed description of what you are looking for in http://www.cisco.com/c/en/us/td/docs/ios/12_2s/feature/guide/fs_mvpn.html. Hope that it will help you completely.