Incremental deployment service of Hop by hop multicast routing protocol
#1

Incremental deployment service of Hop by hop multicast routing protocol
Abstract: IP multicast is facing a slow take-off although it has been a hotly debated topic for more than a decade. Many reasons are responsible for this status. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment of the multicast service by supporting unicast clouds. This paper presents HBH (hop-by-hop multicast routing protocol). HBH adopts the source-specific channel abstraction to simplify address allocation and implements data distribution using recursive unicast trees, which allow the transparent support of unicast- only routers. An important original feature of HBH is its tree construction algorithm that takes into account the unicast routing asymmetries. Since most multicast routing protocols rely on the unicast infrastructure, the unicast asymmetries impact the structure of the multicast trees.We show through simulation that HBH outperforms other multicast routing protocols in terms of the delay experienced by the receivers and the bandwidth consumption of the multicast trees. Additionally, we show that HBH can be incrementally deployed and that with a small fraction of HBH-enabled routers in the network HBH outperforms application-layer multicast.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: multicast routing seminar, seminar questions for incremental mining, hip hop top 10 september, seminar report on multicast routing tree, incremental project cost, multi hop network, intelligent routing protocol,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Distributed cache updating for the Dynamic source routing protocol computer science crazy 1 1,350 01-12-2012, 01:35 PM
Last Post: seminar details
  Toward Practical Opportunistic Routing With Intra-Session Network Coding seminar class 1 1,669 22-11-2012, 01:26 PM
Last Post: seminar details
  Mobile Ad-Hoc Networks Extensions to Zone Routing Proto smart paper boy 1 1,463 19-11-2012, 01:25 PM
Last Post: seminar details
  Integration of CAN Protocol in Automotives computer science topics 4 4,419 16-10-2012, 12:43 PM
Last Post: seminar details
  Secure and Policy-Compliant Source Routing electronics seminars 9 7,066 16-03-2012, 11:40 AM
Last Post: it.crusaderz
  A VEHICLE TO VEHICLE COMMUNICATION PROTOCOL FOR CO-OPERATIVE COLLISION WARNING. seminar class 1 2,313 16-02-2012, 03:37 PM
Last Post: seminar paper
  Efficient Resource Allocation for Wireless Multicast seminar class 1 1,461 15-02-2012, 02:25 PM
Last Post: seminar paper
  ITP: An Image Transport Protocol for the Internet computer science crazy 1 2,372 07-02-2012, 11:16 AM
Last Post: seminar addict
  SECURITY INTEGRATED SYSTEM BASED ON WIRELESS ACCESS PROTOCOL FOR REMOTE MONITORING & seminar surveyer 2 2,846 24-01-2012, 10:50 AM
Last Post: seminar addict
  Simulation of Dijkstra Routing Algorithm full report project topics 2 3,864 30-11-2011, 10:22 PM
Last Post: VickyBujju

Forum Jump: