Browse > Article
http://dx.doi.org/10.9766/KIMST.2012.15.6.770

Constructing κ-redundant Data Delivery Structure for Multicast in a Military Hybrid Network  

Bang, June-Ho (아주대학교 대학원 컴퓨터공학과)
Cho, Young-Jong (아주대학교 대학원 컴퓨터공학과)
Kang, Kyungran (아주대학교 대학원 컴퓨터공학과)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.15, no.6, 2012 , pp. 770-778 More about this Journal
Abstract
In this paper, we propose a multi-path construction scheme to improve the survivability of a multicast session in military hybrid networks. A military hybrid network consists of a static backbone network and multiple mobile stub networks where some nodes are frequently susceptible to be disconnected due to link failure and node mobility. To improve the survivability of multicast sessions, we propose a construction scheme of ${\kappa}$ redundant multi-paths to each receiver. In order to take account of different characteristics of static and mobile networks, we propose quite different multi-path setup approaches for the backbone and stub networks, respectively, and combine them at the boundary point called gateway. We prove that our proposed scheme ensures that each receiver of a multicast session has ${\kappa}$ redundant paths to the common source. Through simulations, we evaluate the performance of the proposed schemes from three aspects : network survivability, recovery cost, and end-to-end delay.
Keywords
Military Hybrid Network; Multicasting; Multi-Path Routing; ${\kappa}$-Connected m-Dominating Set;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. J. Kim, J. S. Lee, D. K. Kim, "An Architecture Information Assurance Model for TICN(Tactical Information Communication Network)", in MITA, pp. 289-292, 2009.
2 R. Leung, J. Liu, E. Poon, Ah-Lot. Chan, B. Li., "MP-DSR : A QoS-Aware Multi-Path Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks", In Proc. of 26th Annual IEEE Conference on Local Computer Networks, pp. 132-141, 2001.
3 Z. Xie, H. Leng, Z. Chen, and J. Zhang, "Finding Arc and Vertex-Disjoint Paths in Networks", In Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 539-544, 2009.
4 MT. Thai, N. Zhang, R. Tiwari, X. Xu, "On Approximation Algorithms of k-connected m-dominating Sets in Disk Graphs", Theoretical Computer Science, Vol. 385, No. 1-3, pp. 49-59, May 2007.   DOI   ScienceOn
5 Wu. Y, Wang. F, Thai. MT, Li. Y, "Constructing k-connected m-dominating Sets in Wireless Sensor Networks", In Military Communications Conference, pp. 1-7, 2007.
6 Y. Li, Y. Wu, C. Ai, and R. Beyah, "On the Construction of k-connected m-dominating Sets in Wireless Networks", Journal of Combinatorial Optimization, Vol. 23, No. 1, pp. 118-139, Apr 2011.
7 R. Leung, J. Liu, E. Poon, Ah-Lot. Chan, B. Li., "MP-DSR : A QoS-Aware Multi-Path Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks", In Local Computer Networks, pp. 132-141, 2001.
8 F. Dai, J. Wu, "On Constructing k-connected k-dominating Set in Wireless Ad Hoc and Sensor Networks", Journal of Parallel and Distributed Computing, Vol. 66, No. 7, pp. 947-958, Jul 2006.   DOI   ScienceOn
9 I. F. Akyildiz, X. Wang, W. Wang, "Wireless Mesh Networks : A Survey," Computer Networks, Vol. 47 No. 4, pp. 445-487, Mar 2005.   DOI   ScienceOn
10 J. Luo, D. Ye, X. Liu, and M. Fan, "A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks", IEEE Communications Surveys and Tutorials, Vol. 11, No. 1, pp. 78-91, Jan 2009.
11 R. Diestel, Graph Theory, 4th Edition. Heidelberg, Germany : Springer-Verlag, pp. 35-71, 2010.
12 P. Heegaard, K. S Trivedi, "Network Survivability Modeling", Computer Networks, Vol. 53, No. 9, pp. 1215-1234, Mar 2009.   DOI   ScienceOn