Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245852
Namuk Kim, H. Yun, Jeong-Ju Yoo, Tae-Yeon Kim, Byeong-Whi Kim, Minho Kang
In this paper, we deal with the multicast service management to efficiently support the broadcasting TV and the near real time high quality VoD (video on demand) service though the data communication networks. This is an emerging issue of the next generation network. Until now, several network architectures have been proposed but most of these have been concentrated on increase of the basic network bandwidth or induced the higher system complexity. The hybrid WDM-PON guarantees both kinds of traffic the independent and stable service by introducing the shared broadcast wavelength for multicast group traffic service. The proposed dynamic multicast group scheduling (DMGS) based on hybrid WDM-PON efficiently supports the common Internet traffic as well as the large number of multicast groups by maximizing the service share-index of registered multicast groups which uses the broadcast wavelength in real time
{"title":"Advanced multicast service scheduling mechanism with IGMP snooping in WDM-PON","authors":"Namuk Kim, H. Yun, Jeong-Ju Yoo, Tae-Yeon Kim, Byeong-Whi Kim, Minho Kang","doi":"10.1109/ICACT.2005.245852","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245852","url":null,"abstract":"In this paper, we deal with the multicast service management to efficiently support the broadcasting TV and the near real time high quality VoD (video on demand) service though the data communication networks. This is an emerging issue of the next generation network. Until now, several network architectures have been proposed but most of these have been concentrated on increase of the basic network bandwidth or induced the higher system complexity. The hybrid WDM-PON guarantees both kinds of traffic the independent and stable service by introducing the shared broadcast wavelength for multicast group traffic service. The proposed dynamic multicast group scheduling (DMGS) based on hybrid WDM-PON efficiently supports the common Internet traffic as well as the large number of multicast groups by maximizing the service share-index of registered multicast groups which uses the broadcast wavelength in real time","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246176
Yang-Hui Chang, T. Chung
Nowadays, a video conference service is a provider-dependent service, in which conferencing users must manually pre-install same conferencing software before a conferencing session startups. Furthermore, the conferencing users must comply with requirements of the un-adaptable service. In this paper, we propose an active video conference service (AVCoS) over Yuan active networks (YAN) [Yang-Hui Chang et al. (2002)]. Following YAN architecture, AVCoS consists of application, value-added and network generic layer components. The components are extendable, replaceable and deployable. Via service compositions of YAN, AVCoS allows a user can customize a template service describing profile, called "ASDI", which describes how to composite those components. Therefore, the user can adapt functionalities of the service by a homepage to meet current conference node environment and network environment Then, Active Service Deployment Protocol (ASDP) will deploy software components of AVCoS to active nodes and the users on the fly according to customized ASDI. Thus, AVCoS adapts itself to meet heterogeneous users
目前,视频会议业务是依赖于供应商的业务,会议用户在会议开始之前必须手动预装相同的会议软件。此外,会议用户还必须满足不适应业务的要求。在本文中,我们提出了一种基于元有源网络(YAN)的有源视频会议服务(AVCoS) [Chang Yang-Hui et al.(2002)]。avco采用YAN架构,由应用层、增值层和网络通用层组成。这些组件是可扩展、可替换和可部署的。通过YAN的服务组合,avco允许用户自定义描述概要文件的模板服务,称为“ASDI”,它描述了如何组合这些组件。因此,用户可以通过一个主页来调整服务的功能,以适应当前的会议节点环境和网络环境。然后,ASDP (Active service Deployment Protocol)将根据定制的ASDI,动态地将avco的软件组件部署到活动节点和用户。因此,AVCoS可以适应不同类型的用户
{"title":"AVCoS: the component-based video conference service overactive networks","authors":"Yang-Hui Chang, T. Chung","doi":"10.1109/ICACT.2005.246176","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246176","url":null,"abstract":"Nowadays, a video conference service is a provider-dependent service, in which conferencing users must manually pre-install same conferencing software before a conferencing session startups. Furthermore, the conferencing users must comply with requirements of the un-adaptable service. In this paper, we propose an active video conference service (AVCoS) over Yuan active networks (YAN) [Yang-Hui Chang et al. (2002)]. Following YAN architecture, AVCoS consists of application, value-added and network generic layer components. The components are extendable, replaceable and deployable. Via service compositions of YAN, AVCoS allows a user can customize a template service describing profile, called \"ASDI\", which describes how to composite those components. Therefore, the user can adapt functionalities of the service by a homepage to meet current conference node environment and network environment Then, Active Service Deployment Protocol (ASDP) will deploy software components of AVCoS to active nodes and the users on the fly according to customized ASDI. Thus, AVCoS adapts itself to meet heterogeneous users","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245999
Ali Tinati, B. Mozaffary
In this paper a novel method for cancellation of broadband/narrowband noise from speech signals is proposed. Independent component analysis (ICA) and wavelet packet approaches have been combined for blind noise separation from mixtures of speech signals. ICA method is used to estimate matrix A, which defines how the mixture signals have been mixed. Wavelet packets are used for de-correlation of approximation of noise and speech. This algorithm is applied to real data with high SNRs and has been able to completely retrieve speech signal from white background noise successfully
{"title":"A novel method for noise cancellation of speech signals using wavelet packets","authors":"Ali Tinati, B. Mozaffary","doi":"10.1109/ICACT.2005.245999","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245999","url":null,"abstract":"In this paper a novel method for cancellation of broadband/narrowband noise from speech signals is proposed. Independent component analysis (ICA) and wavelet packet approaches have been combined for blind noise separation from mixtures of speech signals. ICA method is used to estimate matrix A, which defines how the mixture signals have been mixed. Wavelet packets are used for de-correlation of approximation of noise and speech. This algorithm is applied to real data with high SNRs and has been able to completely retrieve speech signal from white background noise successfully","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246009
Yunbiao Guo, Xingang You, Chuntian Zhang, Lan Hu, Linna Zhou
Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax. This letter presents a steganalytic scheme to detect the message embedded in facsimile using run-length modification method. The detection is based on estimation of the original run-length distribution from the stego-facsimile, which is done by filtering stego-facsimile with corresponding filter. Experimental result indicates that relative modifications as small as 10% of usable run-length can be reliably detected
{"title":"Steganalysis of facsimile","authors":"Yunbiao Guo, Xingang You, Chuntian Zhang, Lan Hu, Linna Zhou","doi":"10.1109/ICACT.2005.246009","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246009","url":null,"abstract":"Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax. This letter presents a steganalytic scheme to detect the message embedded in facsimile using run-length modification method. The detection is based on estimation of the original run-length distribution from the stego-facsimile, which is done by filtering stego-facsimile with corresponding filter. Experimental result indicates that relative modifications as small as 10% of usable run-length can be reliably detected","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245954
Seungwon Shin, Kiyoung Kim, Jongsoo Jang
There are a lot of studies that have measured TCP traffic, but none of them provide the investigation results of TCP SYN packet. In this paper, we show and explain common behavior of TCP SYN packets in traces from a research center using various statistical analysis methods. We selected three parameters to find the behavior of TCP SYN traffic - number of received SYN packets in every 10 ms, SYN PPS (packet per second), and SYN/TCP (ratio between SYN packets and total TCP packets every in 10ms). Our analysis mechanisms are divided into two groups. We started our examination with general statistical tool to provide the knowledge of data distribution. In the second place, we applied change point detection algorithm to our traces to discover the change of state. We summarized our findings in two main categories, qualitative and quantitative. In qualitative findings, we exhibit the characteristics of arising TCP connection and the amount of SYN packet existing in real network and also expose which parameter can explain the characteristics of SYN traffic well. Quantitative findings provide lots of numerical examples to support qualitative findings
{"title":"Analysis of TCP SYN traffic: an empirical study","authors":"Seungwon Shin, Kiyoung Kim, Jongsoo Jang","doi":"10.1109/ICACT.2005.245954","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245954","url":null,"abstract":"There are a lot of studies that have measured TCP traffic, but none of them provide the investigation results of TCP SYN packet. In this paper, we show and explain common behavior of TCP SYN packets in traces from a research center using various statistical analysis methods. We selected three parameters to find the behavior of TCP SYN traffic - number of received SYN packets in every 10 ms, SYN PPS (packet per second), and SYN/TCP (ratio between SYN packets and total TCP packets every in 10ms). Our analysis mechanisms are divided into two groups. We started our examination with general statistical tool to provide the knowledge of data distribution. In the second place, we applied change point detection algorithm to our traces to discover the change of state. We summarized our findings in two main categories, qualitative and quantitative. In qualitative findings, we exhibit the characteristics of arising TCP connection and the amount of SYN packet existing in real network and also expose which parameter can explain the characteristics of SYN traffic well. Quantitative findings provide lots of numerical examples to support qualitative findings","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245932
HyangDuck Cho, JaeKyun Park, Keumsang Lim, Jong-Woo Kim, Wooshick Kim
The wired wireless integration network (WWIN) can be sorted out two approach ways of fixed mobile convergence (FMC) and fixed mobile integration (FMI). FMC means the convergence of the existing wired network and wireless network. The FMC infrastructure consists of wired and wireless network infra. Therefore a mobile device needs the function of connection method on the FMC infrastructure. Handover is one of methods for channel connect and connection control. Authors develop the mobile controlled handover algorithm, which can keep channel continuity in the wired wireless mixture network environment that consists of WLAN, CDMA and wired network. Mobile controlled handover algorithm accesses data by using transport layer and TCP/IP through each network in the wired wireless mixture network environment. User can move freely by using PDA in the wired wireless mixture network environment. Mobile controlled handover maintains the channel and the seamless transmission from PDA to server to provide real time service continuity. The channel of mobile controlled handover and the result of data transmission are presented by using data recorded on server. It is expected that the result of this thesis will contribute for a study on FMC network by using the wired wireless mixture network
{"title":"The mobile controlled handover method for fixed mobile convergence between WLAN, CDMA and LAN","authors":"HyangDuck Cho, JaeKyun Park, Keumsang Lim, Jong-Woo Kim, Wooshick Kim","doi":"10.1109/ICACT.2005.245932","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245932","url":null,"abstract":"The wired wireless integration network (WWIN) can be sorted out two approach ways of fixed mobile convergence (FMC) and fixed mobile integration (FMI). FMC means the convergence of the existing wired network and wireless network. The FMC infrastructure consists of wired and wireless network infra. Therefore a mobile device needs the function of connection method on the FMC infrastructure. Handover is one of methods for channel connect and connection control. Authors develop the mobile controlled handover algorithm, which can keep channel continuity in the wired wireless mixture network environment that consists of WLAN, CDMA and wired network. Mobile controlled handover algorithm accesses data by using transport layer and TCP/IP through each network in the wired wireless mixture network environment. User can move freely by using PDA in the wired wireless mixture network environment. Mobile controlled handover maintains the channel and the seamless transmission from PDA to server to provide real time service continuity. The channel of mobile controlled handover and the result of data transmission are presented by using data recorded on server. It is expected that the result of this thesis will contribute for a study on FMC network by using the wired wireless mixture network","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123684002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245868
Hyunhwa Seo, B. Ryu, J. Won, Choong-Ho Cho, Hyong-Woo Lee
Currently, IEEE 802.16a wireless MAN supports the contention based OFDMA-CDMA ranging subsystem for ranging operation (initial ranging, periodic ranging, bandwidth request). This system is basically similar to slotted ALOHA (K. Leonard and S.S. Lam, April 1975), but the frame size (code-slot/frame) allocated for random access or ranging request is relatively big and can be altered by the dynamic adjustment of downlink and uplink subframe size on the MAC frame of OFDMA-PHY system. In this paper, the design performance analytical model for correct interpretation of ranging subsystem is presented. Until now, the Internet traffic study have achieved wire net, but there is still a need for Internet traffic study that correctly reflects the radio environment. In this paper, the performance analysis result of this paper can perform the reference mark for random access protocol in OFDMA-CDMA ranging system. Traffic modeling can also be used to prepare the network resources in radio networks
目前,IEEE 802.16a无线城域网支持基于争用的OFDMA-CDMA测距子系统进行测距操作(初始测距、周期测距、带宽请求)。该系统基本类似于有槽ALOHA (K. Leonard and S.S. Lam, April 1975),但分配给随机访问或测距请求的帧大小(码槽/帧)比较大,可以通过OFDMA-PHY系统MAC帧上的下行和上行子帧大小的动态调整来改变。本文提出了测距子系统正确判读的设计性能分析模型。到目前为止,互联网流量研究已经实现了有线网络,但仍然需要正确反映无线电环境的互联网流量研究。本文的性能分析结果可以为OFDMA-CDMA测距系统中的随机接入协议提供参考。通信量建模还可以用于无线网络中网络资源的准备
{"title":"Design of performance analysis model for efficient random access protocol in CDMA based OFDMA-PHY system","authors":"Hyunhwa Seo, B. Ryu, J. Won, Choong-Ho Cho, Hyong-Woo Lee","doi":"10.1109/ICACT.2005.245868","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245868","url":null,"abstract":"Currently, IEEE 802.16a wireless MAN supports the contention based OFDMA-CDMA ranging subsystem for ranging operation (initial ranging, periodic ranging, bandwidth request). This system is basically similar to slotted ALOHA (K. Leonard and S.S. Lam, April 1975), but the frame size (code-slot/frame) allocated for random access or ranging request is relatively big and can be altered by the dynamic adjustment of downlink and uplink subframe size on the MAC frame of OFDMA-PHY system. In this paper, the design performance analytical model for correct interpretation of ranging subsystem is presented. Until now, the Internet traffic study have achieved wire net, but there is still a need for Internet traffic study that correctly reflects the radio environment. In this paper, the performance analysis result of this paper can perform the reference mark for random access protocol in OFDMA-CDMA ranging system. Traffic modeling can also be used to prepare the network resources in radio networks","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246010
Ju-Han Kim, Kiyoung Moon
In this paper, we design key management protocols and services with unified single interface, which extend the scheme and services of XKMS, for various kinds of security information such as, private key, secret key, biometric information, security tokens for Web service, and the like. The model we propose modifies and extends the protocols and services such as key registration, reissue, revocation, recovery, location service and validation for only public key pair to provide a way to manage other security information including public key pair. We also describe the processes and structures of the model comparing to legacy them of XKMS model
{"title":"Design of unified key management model using XKMS","authors":"Ju-Han Kim, Kiyoung Moon","doi":"10.1109/ICACT.2005.246010","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246010","url":null,"abstract":"In this paper, we design key management protocols and services with unified single interface, which extend the scheme and services of XKMS, for various kinds of security information such as, private key, secret key, biometric information, security tokens for Web service, and the like. The model we propose modifies and extends the protocols and services such as key registration, reissue, revocation, recovery, location service and validation for only public key pair to provide a way to manage other security information including public key pair. We also describe the processes and structures of the model comparing to legacy them of XKMS model","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128827611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246000
Ki-nam Kim, Jin-Ho Kim, Jung-Hoon Song, Sung-Joon Cho
In this paper, multi-band orthogonal frequency division multiplexing (MB-OFDM) system is analyzed as a strong candidate for wireless personal area network (WPAN) standard. MB-OFDM system provides the information data rate from 53.3 Mbps to 480 Mbps according to the used bandwidth. Also, the frequency/time-domain spreading schemes supply the frequency diversity gain but they decrease the transmission efficiency per unit time. To compensate this problem, the transmit diversity scheme is proposed where a symbol is repeatedly transmitted at the space domain. The bit error rate (BER) performance of the proposed system is confirmed by simulation
{"title":"Improvement of the transmission efficiency with transmit diversity scheme in multi-band OFDM systems","authors":"Ki-nam Kim, Jin-Ho Kim, Jung-Hoon Song, Sung-Joon Cho","doi":"10.1109/ICACT.2005.246000","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246000","url":null,"abstract":"In this paper, multi-band orthogonal frequency division multiplexing (MB-OFDM) system is analyzed as a strong candidate for wireless personal area network (WPAN) standard. MB-OFDM system provides the information data rate from 53.3 Mbps to 480 Mbps according to the used bandwidth. Also, the frequency/time-domain spreading schemes supply the frequency diversity gain but they decrease the transmission efficiency per unit time. To compensate this problem, the transmit diversity scheme is proposed where a symbol is repeatedly transmitted at the space domain. The bit error rate (BER) performance of the proposed system is confirmed by simulation","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128752604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246063
H. Shekhar, M.A.A. Kumar, K. Ramanatha
Multicast routing protocols proposed for mobile ad hoc networks have certain limitations. Most of these protocols try to discover the route on-demand by flooding route request messages, which results in increased end-to-end latency and also consumes considerable amount of network bandwidth. These limitations make protocols not suitable for real-time multimedia communication. In this paper, we have presented an efficient mobile agents aided multicast routing (MAMR) protocol which overcomes these limitations. The protocol is a hybrid protocol where intelligent mobile agents can been integrated with existing on-demand multicast routing protocols such as multicast ad hoc on-demand distance vector (MAODV) routing protocol, on-demand multicast routing protocol (ODMRP) routing protocol and others. Here, the mobile agents move around the network and collect the routing information. This routing information assists on-demand multicast routing protocols in discovering the route in a definite path instead of flooding the route request messages, thereby achieving better end-to-end latency and reduced control traffic in the network. We have used MAODV protocol as an underlying protocol with mobile agents. The proposed MAMR protocol and MAODV have been compared through extensive simulations with end-to-end latency, packet delivery ratio and control overhead as performance parameters
{"title":"Mobile agents aided multicast routing in mobile ad hoc networks","authors":"H. Shekhar, M.A.A. Kumar, K. Ramanatha","doi":"10.1109/ICACT.2005.246063","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246063","url":null,"abstract":"Multicast routing protocols proposed for mobile ad hoc networks have certain limitations. Most of these protocols try to discover the route on-demand by flooding route request messages, which results in increased end-to-end latency and also consumes considerable amount of network bandwidth. These limitations make protocols not suitable for real-time multimedia communication. In this paper, we have presented an efficient mobile agents aided multicast routing (MAMR) protocol which overcomes these limitations. The protocol is a hybrid protocol where intelligent mobile agents can been integrated with existing on-demand multicast routing protocols such as multicast ad hoc on-demand distance vector (MAODV) routing protocol, on-demand multicast routing protocol (ODMRP) routing protocol and others. Here, the mobile agents move around the network and collect the routing information. This routing information assists on-demand multicast routing protocols in discovering the route in a definite path instead of flooding the route request messages, thereby achieving better end-to-end latency and reduced control traffic in the network. We have used MAODV protocol as an underlying protocol with mobile agents. The proposed MAMR protocol and MAODV have been compared through extensive simulations with end-to-end latency, packet delivery ratio and control overhead as performance parameters","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"89 23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}