Stateless overlay multicast with in-packet bloom filters

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:adiwang
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Due to the difficulty of deploying Internet protocol (IP) multicast on the Internet on a large scale,overlay multicast has been considered as a promising alternative to develop the multicast communication in recent years.However,the existing overlay multicast solutions suffer from high costs to maintain the state information of nodes in the multicast forwarding tree.A stateless overlay multicast scheme is proposed,in which the multicast routing information is encoded by a bloom filter (BF) and encapsulated into the packet header without any need for maintaining the multicast forwarding tree.Our scheme leverages the node heterogeneity and proximity information in the physical topology and hierarchically constructs the transit-stub overlay topology by assigning geometric coordinates to all overlay nodes.More importantly,the scheme uses BF technology to identify the nodes and links of the multicast forwarding tree,which improves the forwarding efficiency and decreases the false-positive forwarding loop.The analytical and simulation results show that the proposal can achieve high forwarding efficiency and good scalability.
其他文献
Some emerging services such as augmented/virtual reality need high data rates.Whereas,the existing 2nd generation(2G),the 3rd generation (3G) and the 4th generation (4G) networks cannot provide such high transmission rates.To meet these requirements,the t
Ciphertext-policy attribute-based searchable encryption (CP-ABSE) can achieve fine-grained access control for data sharing and retrieval,and secure deduplication can save storage space by eliminating duplicate copies.However,there are seldom schemes suppo
Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revocation in practical applications.Based on the attribute based encryption (ABE),this scheme introduces the proxy re-encryption mechanism
A geometry-based stochastic scattering model (GBSSM) based on geometrical multiple rings and ellipses is proposed for wideband multiple-input multiple-output (MIMO) mobile-to-mobile (M2M) fading channels.The proposed GBSSM is deployed with cross-polarized
In order to study the relationship between the non-spherical atmospheric charged particles and satellite-ground quantum links attenuation.The relationship among the particle concentration,equivalent radius,charge density of the charged particle,the attenu
To extract and express the knowledge hidden in information systems,discernibility matrix and its extensions were introduced and applied successfully in many real life applications.Binary discemibility matrix,as a representative approach,has many interesti
Currently,the photovoltaic (PV) cloud network is an important research point in energy Internet.From the perspective of the robustness analysis of PV cloud network,traditional robustness index,the relative size of the giant connected component before and
Area-efficient design methodology is proposed for the analog decoding implementations of the rate-1/2 accumulate repeat-4 jagged-accumulate (AR4JA) low density parity check (LDPC) code.The proposed approach is designed using optimized decoding architectur