JournalVol.
42No.
4September2018ISSN-1110-2586UsingIPMulticastDistributeEncryptionMessageMahaSabriAltememeComputerScienceDepartment,CollegeofScienceKerbalaUniversity,Kerbala,IraqEmail:maha.
sabri@uokerbala.
edu.
iqAbstractTherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
Keyword:EncryptionMessage,ClientServer,DistributedSystem,InformationTechnology.
1.
IntroductionDistributing,asaworditusedwithadifferenttermsuchasdistributedsystem,distributedprogramminganddistributedalgorithm,infactitreferredtocomputernetworks.
Wherecomputersarephysicallydistributedindividuallywithinsomegeographicalareaandmakeaconnectionbetweenthem.
Nowadaysthesetermsareusedinamuchwidersense,evenreferringtoindependentprocessesthatrunonthesamecomputerandinteractwitheachotherbysendingmessages[2].
Generally,thecommunicationbetweentwocomputers(clientandserver)needstobereliable.
Therefore,everydeviceconnectedtoadistributedsystemsnetworkisassignedauniquenumberknownasanInternetProtocol(IPv4orIPv6)address.
TheIPispartofthecommunicationprotocolsthatallowcommunicatingbetweenthedevicesonthenetworks[1].
TherearethreemaintypesofIPv4addresses:Unicast,broadcast,andmulticast.
Unicastiddesignedtotransferapacketbetweentwohosts(node)inthenetwork.
Abroadcastisusedtosendpacketstosubnetworkdomain.
Amulticastaddressisdesignedtoenabledeliveryofpacketstothesetofhoststhathavebeenconfiguredasagroupaddressfrom244.
0.
0.
0to239.
255.
255.
255invarioussubnetworks.
Themaindisadvantagesofmulticastarenotconnectionoriented[12].
Amulticastisdeliveredtodestinationgroupmemberwiththesame"best-effort"reliabilityasaslanderedunicastIP.
ThemaindifferencebetweenamulticastIPpacketandaunicastIPpacketisthepresenceofa"groupaddress"intheDestinationAddressfieldoftheIPheader[2].
Eachhostisfreetojoinorleaveusingadatagramsocketasajoingroupatanytime.
That'smeannorestrictiononthephysicallocationorhowmanynumbersofmembersinamulticastgroup.
Themaindeviceontheinternetisrouterthatusesthegroupmembershipprotocoltolearnabouttheexistingofhostsinthenetworkthatattachedinitssubnetwork[15].
Processesthatworkbetweenonesenderandonerecipient,BrowsingSystemsandemailIsanexampleofonlineapplications.
anotherfieldItrequiresthelatestapplications,Oneuser(sender)sendsdatatoanumberofreceiversatasametime.
ThisapplicationwillusetooptimizetoabilityoforganizationabilitytoCollaborationandcommunicationwithinformation,Increasingtheimportanceofusingnetworks.
ThisfeatureinIPMulticastisanimportantadvanceinIPnetworking.
Theuseofmulticastfeaturecanbeappliedtoeasyworkandwehaveaddedasimplesecurityencryptionpackagetosendtonumberofreceivestomakeitmoresecurefordataexchangeorforfuturedevelopment.
Oneofthemainchallengesthatfacethetimeneedingtosendmessagesfromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtothegroupbecauseitneedstosendonemessageateachtimetoeachoneofthegroup.
Sowhensendsmessagetogroupcontainfiveclients,itwillneedtosendthismessagefivetimes.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyoftherecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone,andanotherchallengetoensuresecuringmulticastcommunicationisconfidentialinformationthatistransferredorreceiveenabledatamulticastingtoverify,thatthedatacontainedoriginatedshouldbesenttotheuserwithoutanother,problembecomesmorecomplexincommon,inotherwordencryptionofadocumentinasecretkeyconstitutesasignaturestrongauthenticationofdocumentandweakagainstrepudiation,inparticularsendtoagroupofrecipients.
TheobjectiveofthispaperproposesdistributeencryptionmessagebasedonIPmulticast.
withIPmulticastitwouldbeeasytosupportmanyofrecipientsasitachievedthespeedandsecrecyinthetransferofinformation.
Themainresearchobjectivesofthisstudyare:Tomeasuretheperformanceforthegrouphostsbasedonresponsetimebetweenthesenderandthemanyreceivers,Toimplementthesecurepacketforsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithmandtounderstandthedifferencebetweenbroadcast,multicast,andunicastandhowtheProtocolIndependentMulticastProtocols(IMP)tojointhenewclientwithagroup.
ThisstudyprovidesanexecutiveintroductiontoIPMulticasttobeusedamongmanygroups.
ItpresentsthebasicconceptforIPmulticast;highlightsitsadvantagesanddisadvantages,andprovidesimplementedtosecuresendingpacketbasedonencryptionalgorithms.
Italsoshowsnetworkperformancebyjoiningandaddingnewuserssimultaneouslyandthealgorithmcanshowtheefficientresponsetimeamongmanyhostseveninasecondormilli-seconds.
WhetheroneisauserofTCP/IP-basedtechnologiesoranorganizationinterestedforimplementingortakingadvantagesofIPMulticastwithinproductorservice,thisstudywillbebeneficialandlucrativeforallofthem.
Thisstudyshows"administrativelyscopeofIPv4multicastspace"tobeintherangeofIPv4from239.
0.
0.
0to239.
255.
255.
255.
Theapplicationhasbeenappliedpracticallyusinglocalareanetworkconnectedwiththeinternet.
Theapplicationputintousethesafetypelanguage"Javaprogramming"tooperatethewholeprogram.
2.
LiteratureReview2.
1MulticastProtocolsThemostfrequentlyusedtransportlayerprotocoltoemploymultipleaddressingistheUserDatagramProtocol(UDP).
Bynature,UDPisnotdependable—lossofmessagesanddeliverythatisoutoforderarequitepossible.
Dependablemulticastprotocols,e.
g.
PragmaticGeneralMulticast(PGM)havebeenevolvedtoaddlossdetectionandretransmissiontoIPmulticast.
IPmulticastiscommonlyutilizedinbusinesses,stockexchanges,andnetworkssendingmultimediamaterial.
AfrequentbusinessemploymentofIPmulticastisforIPTVapplicationssuchasdistancelearningandtelevisedcompanymeetings[30].
Liaoetal.
andWuetal.
haveofferedtomakethelossretrievaleasierviaintermediatenodessoastoshunlatencyandmessagingoverhead[1,2].
Xuetal.
haveexploitedatechniquetoprovidequalityofservicetovideoapplications[3].
Paganietal.
haveappliedamethodthatadaptivelyselectsfloodingandretrievalalongroutingtreebasedonthemobility[4].
AlotofscholarslikeAlpertonetal.
evolveatechniquewhichemploysflowcontroltoguaranteedependability[5].
2.
2PrivacyinMulticastOneofthemostimportantsecurityconcernsinmulticastismaintainingprivacyofcommunication.
Howdomultiplenetworkuserswhoareinthesamemulticast"group"exchangedatasuchthatnooneoutsidethegroupcandecipherwhatisbeingsentAnaturalwaytoguaranteethiswouldbetohaveusersshareacommonkey,calledthegroupkey,andtorequirethatallmulticasttransmissionsfromanyuserwithinthegroupbeencryptedusingthatkey.
Iftheyareguaranteedthatthegroupkeyisknownonlytogroupmembers,thensuchanencryptionprotocolwouldtriviallysolvetheprivacyproblem[28,30].
InFigure1thiswouldmeantransmittingtoallnodesinnetwork.
InFigure2illustratestransmittingtoallnodesbutprivacyinmulticast.
Exampleresearches,Brooks'set.
al(2009)appliedMulticastEncryptionInfrastructureforSecurityinSensorNetworks.
Designingsecuresensornetworksisdifficult.
Theyproposeanapproachthatusesmulticastcommunicationsandrequiresfewerencryptionsthanpairwisecommunications.
Thenetworkispartitionedintomulticastregions;eachregionismanagedbyasensornodechosentoactasakeyserver.
Thekeyserverssolicitnodesintheirneighborhoodtojointhelocalmulticasttree.
Thekeyservergeneratesabinarytreeofkeystomaintaincommunicationwithinthemulticastregionusingasharedkey.
Thisapproachsupportsadistributedkeyagreementprotocolthatidentifiesthecompromisedkeysandsupportsmembershipchangeswithminimumsystemoverhead.
Theyevaluatetheoverheadofthisapproachbyusingthenumberofmessagesandencryptionstoestimatepowerconsumption.
Usingdatafromfieldtestsofamilitarysurveillanceapplication,theyshowthatthismulticastapproachneedsfewerencryptionsthanpair-wisekeyingapproaches.
Theyalsoshowthatthisschemeiscapableofthwartingmanycommonattacks[29].
DuanandCanny(2006)presentedageneralframeworkforconstructingeffectivemulticastcryptosystemswithprovablesecurityandshowthatalineofpreviousworkonmulticastencryptionareallspecialcasesofthisgeneralapproach.
Theyprovidednewmethodsforbuildingsuchcryptosystemswithvariouslevelsofsecurity(e.
g.
,IND-CPA,IND-CCA2).
TheresultstheyobtainedenabletheconstructionofawholeclassofnewmulticastschemeswithguaranteedsecurityusingabroaderrangeofcommonprimitivessuchasOAEP.
Moreover,theywereshowthatmulticastcryptosystemswithhighlevelofsecurity(e.
g.
IND-CCA2)canbebaseduponpublickeycryptosystemswithweaker(e.
g.
CPA)securityaslongasthedecryptioncanbesecurelyandeffectively"shared".
Thisconstructionsfeaturetrulyconstant-sizedecryptionkeyswhereasthelengthsofboththeencryptionkeyandciphertextareindependentofgroupsize[24].
3.
MethodologyThemethodologyforthisworkcontainsfourphasesincludingStateproblem,SendingMessage,Pre-processingmessageandEvaluationofModel.
Wefollowthismethodologybecauseeachphaseinthismethodologyisrelatedtotheresearchandscope.
itisaveryflexibleinimplementationanditwillbesuitableforourwork.
ThestepsofthedataprocessareillustratedinFigure3.
Figure1.
TransmittingtomultiplerecipientsusingMulticastFigure2.
TransmittingtomultiplerecipientsusingprivacyinmulticastFigure3.
MessagesProcessRepresentation3.
1StateproblemThefirststepingeneralmethodologyisawarenessoftheproblem.
Theinformationaboutproblemcomefrommanysources:newdevelopmentsinindustryorinareferencediscipline.
Forthisstudytheawarenessofthechallengesthatfacethetimeneedingtosendmessagefromonesendertogroupthosereceivethismessage,thiswaybyusingunicasttakesmoretimeforsendingtogroupbecauseitneedstosendonemessageateachtimetoeachoneofgroup.
Sowhensendmessageforgroupcontainfiveclients,itwillneedfiveoncesendmessage.
Ontheotherhand,withIPMulticastitwouldbeeasytosupportmanyofrecipients.
Bymulticastwillreducetimesoitcanperviousmessagesendonlyone.
Alsowehavesuggestedhertosendmessagesinmoresecurely.
3.
2SendingMessagesThesecondphaseofthemethodologysuggestedaddingsecuritytomessagethatsendingtomanyhoststoprotectsendingmessagefrominterceptbyusingencryptionalgorithm,theencryptionkeycanbeextractedfromthemathematicalformulainFigure4showsthat,theJavacodeoftheencryptionalgorithmisgivenasFigure5.
Thisformulawillreceivethetotallengthofthestring(textmessage)fromthemethod,andifthetotalnumbermorethanFiveitwillstartdivideitbyTwountilbelessthanFive.
Finallytheresultfromtheformulawillconsiderastheencryptionkey,andthistechniqueensuresthechangeablekey,sothatonlyreceivingwhohasauthenticationcanseetheoriginalmessagebyusingdecryptionkeytobreaktheencryptionmessage.
AnapplicationdevelopedanddesignedbyusingtheJavalanguage,becauseit'ssuitabletobuildthisprojecttypeandUsingJavatoolshelptoachieveflexibilityfortheapplication.
3.
3Pre-processingmessageWedevelopthisprojectbyusingtheJavalanguage,toshowanadvantageanddis-advantageforIPmulticastwithasimpleencryptionalgorithm.
Figure5.
JavacodeforencryptionalgorithmX={X=XIFX5Figure4.
mathematicalformulaforextractingtheencryptionkey3.
4EvaluationofModelWeevaluatethisworkbyusingLAN,sowemakestestforourworkonLANnetworkthatconnectedwithroutertotheinternet.
Thefirststep,wesendmessagethatnoneedtobesecure(withoutencryption),allclientsseethecontentmessagedirectly,andrepeatsendingwithoutsecure(withencryption)thatoneclientwantonlyoneclientreadhismessageandnoonefromtheotherwillreadthecontentofthemessage.
Itwassuccessfultest,aftersendmessagewithencryptionthatwasseenforallclientbutnoonecanreadthecontentbecausetheencryption,thetargetclientwasenabledtoreadcontentmessageaftermakedecryptiontothemessage.
3.
5SimulationmodelInthismethodologywewillproposeourworkmechanismmodeltoshowmessagesendingprocessfromsendertogroupofreceivers,moreovertheprocessofsendingandreceivingencryptionmessagebetweenmanyhosts.
Sendingandreceivingblindtext:Sendingunencryptedmessagetogroupofreceivers,aswellaseveryhostreceivingthemessageatthesametime.
ThejavacodeofthispartoftheapplicationispresentedinFigure6.
Sendingandreceivingencryptedtext:SendingencryptionmessagetoagroupofreceiversasFigure7shows,aswellaseveryhostreceivingtheencryptionmessageatthesametimeasFigure8shows.
ThejavacodeofthispartoftheapplicationispresentedinFigure9.
Figure7.
explainsencryptionsendingthemessageFigure8.
explainsreceivingtheencryptionmessageFigure9.
JavacodeforsendingencryptionmessageFigure6.
JavacodeforsendingblindtextTheusercansendandreceivetheblindtextaswellastheencryptiontextasFigure10processofsendingandreceivingthemessagebetweenanytwohosts.
3.
6ExperimentalStepsInthispartwearegoingtoillustrateapplicationmechanismthatconsistsoftwosteps(loginwindowandchatwindow)thatshowsasbelow:3.
6.
1LoginwindowMainlogininterfaceasintheFigure11.
Thisapplicationrequirestheusertoperformanauthenticationprocedurewherebytheyarerequiredtoinsertausernameandpasswordinordertousethischatapplication.
Theapplicationwillbelaunchedwhentheuserenteredthecorrectusernameandpassword.
However,iftheuserenteredthewrongcombinationofusernameandpassword,theprogramwillimmediatelyshowerrorboxthatcontainamessagetoinformtheusertocorrecttheinsertedusernameandpassword.
3.
6.
2ChatWindowFigure12presentsthemainuserinterfaceforourchatapplication.
Theinterfaceincludeslabelsandbuttonsthatincreasetheapplication'susabilityandeaseofuse.
Figure10.
sendingencryptionmessageFigure11.
loginFigure12.
applicationwindowsBut,iftheuserdidn'ttypeanynametojointhechatgroupandtrytostartaconnection,theapplicationwillshowerrorboxthatcontainsmessagetoaskhimtotypehis/hername.
Usersmayconnecttotheserversimplybyclickingonthe'StartConnect'buttonprovidedonthemaininterface.
Whentheconnectionsuccessfullydone,thewindowchattingwilldisplay"Serverisstarted".
Onceaconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxareashowthatinFigure13.
Also,onceconnectionwiththeserverisestablished,ausermayhavetheoptiontocontinueonusingtextchattingbywritingtheirmessageinthe'YourMessage'textboxarea.
Afterthat,theuserisabletouse"SendEnc.
Msg.
"tosendencryptionmessage.
Everyencryptionmessagewilldisplayinwindowchatting.
Themessagewillnotappearsameoncethatwriteonthetextarea"YourMessage"becauseitwillencryptinourAlgorithm.
Also,theencryptedmessagewilldisplayontheallhostsinthesamesamplesasaFigure14showingthatapproach.
3.
7ProgramsetupInstallationforcomputerprogramistheprocedureofactiontheprogramreadytowork.
Somecomputerprogramscanbeoperatedbyonlycopyingthemintoafolderstoredonacomputerandoperatingthem.
Otherprogramsaresuppliedinamodethatcannotbeimmediatelyexecutedandthusrequireasetupprocedure.
Wheninstalled,theprogramcanbeoperatedrepeatedly,needingnoreinstallationpriortoeachoperation.
Thechatapplicationrequirestwoprincipalthingstooperatecorrectly.
Firstly,theapplicationisconstructedusingtheJavaprogramminglanguage;hence,theuserhastoinstallJavaRuntimeEnvironment(JRE)andtheJavaDevelopmentKit(JDK).
Next,theapplicationcanoperatewithnoerroratall.
Nevertheless,theprogramstillrequirestobeconnectedtothenetworkforlinkingwithasetofIP.
3.
8ToolsCustomarily,mostcomputersusedtocommunicateusingtheNetworkProtocol;consequentlyanetworksocketispointendingbetweentwooperationconnectionstreamacrossnetworkforcomputer.
theapplicationofsocketAPIisinterfaceapplicationAPIgenerallysuppliedbytheoperatingsystem,thatpermitsapplicationprogramstocontrolandusenetworksockets.
NetworksocketAPIsgenerallyconformtotheBerkeleysocketsstandard.
AsocketaddressconsistsofanInternetProtocoladdressandaportnumber,justlikeoneendofaphoneconnectionwhichconsistsofaphonenumberandFigure13.
AppearMessageandTimeFigure14.
AppearEncryptionMessageonXHostsomeextension.
Usingthisaddress,networksocketssendreceiveddatatothesuitableapplicationoperationorthread.
Javaisalanguageusedinobject-orientedprogramming.
Ithasanion-builtapplicationprogramminginterface(API)thatcantackleimagesanduserinterfacesandthatcanbeemployedtodevisenewapplicationsorapplets.
DuetoitsdiversecollectionofAPI's,likeMacintoshandWindows,anditsplatformindependence,Javacanfurtherbeconsideredasaplatformonitsown.
Inaddition,ithasstandardlibrariesfordoingmath's,nottomentionJavaincludingnumerouslibraries.
Thejavanetpackpurveystwoclasses--SocketandServerSocket--thatexecutetheclientpartoftheconnectionandtheserverpartoftheconnection,respectively.
3.
9PlatformNetBeansIDEisoriginalforfreejavawhenmostdevelopersforsystems,thisNetBeansIDEsupportofmanylanguagesuchasJavaScript,PHP,C++andJavaFX.
NetBeansisanopen-sourceprojectdedicatedtoprovidingrocksolidsoftwaredevelopmentproducts(NetBeansIDEandNetBeansPlatform)thataddresstheneedsofdevelopers.
4.
FindingResultsandConclusionTheobjectiveofthisprojectwastodesignandimplementachatapplicationbasedonthemulticasttechnology,whichallowssendingandreceivinginstantmessagingandsendingtheencryptionmessagesbetweenmanyhostsusingsomeencryptionalgorithm.
Alltheseoperationswereunderwirelesslocalareanetwork(WLAN).
TheapplicationclientsidewasimplementedonthewindowsplatformusingtheJavalanguageandtheSocketlibraryfile,whilethechatapplicationwasimplementedonNetbeansIDE7.
1usingaJavalanguage.
[17]Themainresultsthatweobtainedinthisproject;itissuccesstosendandreceivethemessagebasedonIPmulticastingtechnique.
Themessagecanbesendfromoneclienttogroupofreceivers,aswellasanyonecanjointhemulticastgroupbygettingtheapplication.
Moreover,thesecurityissueisasecondobjectthatwehaveachievedinthisproject.
Where,theclientscanreceiveciphertext,butwhocansendthattextanddecryptingitjustthatwhohastheapplicationthatwehavesuggestedasclearlyshowninFigure15.
Thisapplicationcontainencryptionalgorithmtoprovidehighsecurelevelfortopsecretetext.
TherearemanyaspectshavebeendiscussedinthisstudyforIPmulticasting.
Itcanbeusedinmanyapplicationssuchaschattinginlocalareanetwork,marketingandalsocanbeusedineducationalservices.
ThispapershowssuchIPmulticastingofhowcreateanduseitinmanyapplication.
ThispaperalsodiscussedmanyissuesforIPmulticastsuchasaddingandleavingthejoingroup,advantagesanddisadvantagesofIPmulticasting.
TheprototypehasbeenappliedinWLANbysendingsecuremessagesfromoneclienttomanyrecipients.
Furthermore,itshowsthetimebetweenmanyrecipientsforsendingandreceivingsuchmessagesbasedonesimplesecurityalgorithmsformoresecurity.
ReferencesReferences[1].
W.
LiaoandM.
-Y.
Jiang.
Familyacktree(fat):Supportingreliablemulticastinmobileadhocnetworks.
IEEETransactionsonVehicularTechnology,Vol52.
No6,1675–1685,Nov2003.
[2].
S.
WuandC.
Bonnet.
Multicastroutingprotocolwithdynamiccore(mrdc).
InInternationalSymposiumonTelecommunications(IST01),Tehran,Iran,Aug2001.
[3].
D.
Xu,B.
Li,andK.
Nahrstedt.
Qos-directederrorcontrolofvideomulticastinwirelessnetworks.
In8thIEEEInternationalConferenceonComputerCommunicationsandNetworks(IEEEICCCN'99),pages257–262,Boston-Natick,MA,Oct1999.
[4].
E.
PaganiandG.
Rossi.
Reliablebroadcastinmobilemultihoppacketnetworks.
InMOBIHOC'97,1997.
[5].
K.
Almeroth,K.
Obraczka,andD.
Lucia.
Alightweightprotocolforinterconnectingheterogeneousdevicesindynamicenvironments.
InIEEEICMCS'99,1999.
[6].
R.
Chandra,V.
Ramasubramanian,andK.
Birman.
Anonymousgossip:Improvingmulticastreliabilityinmobilead-hocnetworks.
InThe21stInternationalConferenceonDistributedComputingSystems(ICDCS),Phoenix,Arizona,2001.
[7].
C.
-C.
ChiangandM.
Gerla.
Routingandmulticastinmultihop,mobilewirelessnetworks.
InIEEEICUPC'97,1997.
[8].
HodaA.
AbdelHafez,"BigDatainSmartCites:AnalysisandApplicationsinArabWorld",EgyptianComputerScienceJournal,Volume41,Issue1,January2017.
[9].
W.
WuandY.
C.
Tay.
Amris:Amulticastprotocolforadhocwirelessnetworks.
InMilitaryCommunicationsConference(AIILCOM1999),pages25–29,1999.
[10].
M.
Gerla,C.
-C.
Chiang,andL.
Zhang.
Treemulticaststrategiesinmobile,multihopwirelessnetworks.
ACM/BaltzerJournalofMobileNetworksandApplications(MONET),1999.
[11].
SajamaandZ.
J.
Haas.
Independent-treeadhocmulticastrouting(itamar).
MobileNetworksandApplications,vol8,No5:551–566,2003.
[12].
P.
-J.
Wan,G.
Calinescu,X.
-Y.
Li,andO.
Frieder.
Minimum-energybroadcastinginstaticadhocwirelessnetworks.
WirelessNetworks,vol8,No6:607–617,Nov2002.
[13].
J.
Wieselthier,G.
Nguyen,andA.
Ephremides.
Energy-limitedwirelessnetworkingwithdirectionalantennas:Thecaseofsession-basedmulticasting.
InINFOCOM'02,NewYork,NYUSA,2002.
Figure15.
SendandReceiveEncryptedMessage[14].
S.
GuoandO.
Yang.
Antennaorientationoptimizationforminimum-energymulticasttreeconstructioninwirelessadhocnetworkswithdirectionalantennas.
Inthe5thACMinternationalsymposiumonMobileadhocnetworkingandcomputing(MobiHoc04),RoppongiHills,Tokyo,Japan,2004.
[15].
S.
GuoandO.
Yang.
Minimumenergymulticastroutingforwirelessad-hocnetworkswithadaptiveantennas.
InICNP2004,Berlin,Germany,2004.
[16].
K.
Wang,C.
F.
Chiasserini,R.
R.
Rao,andJ.
Proakis.
Rise:Reducinginterferenceandsavingenergythroughmulticastinginadhocwirelessnetworks.
InIEEEMILCOM2002,Anaheim,CA,USA,2002.
[17].
C.
Hu,Y.
Hong,andJ.
Hou.
Onmitigatingthebroadcaststormproblemwithdirectionalantenna.
InICC'03,2003.
[18].
A.
K.
Das,R.
J.
MarksII,M.
A.
El-Sharkawi,P.
Arabshahi,andA.
Gray.
Maximizationoftime-to-first-failureformulticastapplicationsinwirelessnetworks:optimalsolutionusingmilp.
InIEEEMilcom,MontereyConferenceCenter,Monterey,CA,Oct2004.
[19].
C.
-C.
Chiang,M.
Gerla,andL.
Zhang.
Forwardinggroupmulticastprotocol(fgmp)formultihop,mobilewirelessnetworks.
ClusterComputing:SpecialIssueonMobileComputing,vol1.
1,No2:187–196,1998.
[20].
R.
VaishampayanandJ.
J.
Garcia-Luna-Aceves.
Efficientandrobustmulticastroutinginmobileadhocnetworks.
In1stIEEEInternationalConferenceonMobileAd-hocandSensorSystems,FortLauderdale,Florida,2004.
[21].
J.
J.
Garcia-Luna-AcevesandE.
L.
Madruga.
Amulticastroutingprotocolforad-hocnetworks.
InIEEEINFOCOM'99,NewYork,NewYork,,1999.
[22].
S.
ParkandD.
Park.
Adaptivecoremulticastroutingprotocol.
WirelessNetworks,vol10.
No1:53–60,Jan2004.
[23].
S.
Singh,C.
S.
Raghavendra,andJ.
Stepanek.
Powerefficientbroadcastinginmobileadhocnetworks.
InPIMRC'99,1999.
[24].
H.
ZhouandS.
Singh.
Content-basedmulticastformobileadhocnetworks.
InProc.
Mobihoc2000,August2000.
[25].
J.
KuriandS.
Kasera.
Reliablemulticastinmultiaccesswirelesslans.
WirelessNetworks,pages359–369,,Jul2001.
[26].
M.
NagyandS.
Singh.
Multicastschedulingalgorithmsinmobilenetworks.
ClusterComputing,1998.
[27].
S.
K.
S.
Gupta,V.
Shankar,andS.
Lalwani.
Reliablemulticastmacprotocolforwirelesslans.
InIEEEInternationalConferenceonCommunications(ICC'03),volume1,pages93–97,2003.
[28].
L.
TassiulasandA.
Ephremides.
Stabilitypropertiesofconstrainedqueueingsystemsandschedulingpoliciesformaximumthroughputinmultihopradionetworks.
IEEETransactionsonAutomaticControl,vol37,No12:1936–1948,Dec1992.
[29].
L.
TassiulasandA.
Ephremides.
Dynamicserverallocationtoparallelqueueswithrandomlyvaryingconnectivity.
IEEETrans.
Info.
Theory,vol30,No2:466–478,Mar1993.
[30].
C.
Diot,B.
N.
Levine,B.
Lyles,H.
Kassem,andD.
Balensiefen,DeploymentissuesfortheIPmulticasserviceandarchitecture.
IEEENetwork,vol14,No1:78–88,2000.
[31].
R.
R.
Brooks,BrijeshPillai,MatthewPirretti,AndMicheleC.
Weigle,MulticastEncryptionInfrastructureForSecurityInSensorNetworks,2009.
香港ceranetworks提速啦是成立于2012年的十分老牌的一个商家这次给大家评测的是 香港ceranetworks 8核16G 100M 这款产品 提速啦老板真的是豪气每次都给高配我测试 不像别的商家每次就给1核1G,废话不多说开始跑脚本。香港ceranetworks 2核2G 50G硬盘20M 69元/月30M 99元/月50M 219元/月100M 519元/月香港ceranetwork...
木木云怎么样?木木云品牌成立于18年,此为贵州木木云科技有限公司旗下新运营高端的服务器的平台,目前已上线美国中部大盘鸡,母鸡采用E5-267X系列,硬盘全部组成阵列。目前,木木云美国vps进行了优惠促销,1核1G/500M带宽/1T硬盘/4T流量,仅35元/月。点击进入:木木云官方网站地址木木云优惠码:提供了一个您专用的优惠码: yuntue目前我们有如下产品套餐:DV型 1H 1G 500M带宽...
puaex怎么样?puaex是一家去年成立的国人商家,本站也分享过几次,他家主要销售香港商宽的套餐,给的全部为G口带宽,而且是不限流量的,目前有WTT和HKBN两种线路的方面,虽然商家的价格比较贵,但是每次补一些货,就会被抢空,之前一直都是断货的状态,目前商家进行了补货,有需要这种类型机器的朋友可以入手。点击进入:puaex商家官方网站Puaex香港vds套餐:全部为KVM虚拟架构,G口的带宽,可...
ecs为你推荐
photoimpact教程怎样用photoimpact制作漫画网点?是PI不是PS!行业关键词如何进行关键词分析?万网核心代理万网代理商?中国万网认证核心分销商?bluestacksBlueStacks安卓模拟器官方版怎么用?依赖注入什么是侵入性?还有依赖注入?申请证书一、如何申请证书?硬盘人克隆一个人需要多少人多长时间啊淘宝网页显示不正常淘宝网显示不正常安装迅雷看看播放器迅雷看看播放器下了安装不了网站优化方案网站建设及优化的方案
com域名注册1元 备案未注册域名 网通服务器租用 burstnet nerd 60g硬盘 南昌服务器托管 空间出租 架设服务器 hostker 秒杀预告 网站木马检测工具 流量计费 中国电信测速网 免费高速空间 paypal注册教程 无限流量 浙江服务器 lamp怎么读 lamp是什么意思 更多