• Title/Summary/Keyword: Group Multicast

Search Result 321, Processing Time 0.027 seconds

Solving Cluster Based Multicast Routing Problems Using A Simulated Annealing Algorithm (시뮬레이티디 어닐링 알고리즘을 이용한 클러스터 기반의 멀티캐스트 라우팅 문제 해법)

  • Kang Myung-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.189-194
    • /
    • 2004
  • This paper proposes a Simulated Annealing(SA) algorithm for cluster-based Multicast Routing problems. Multicasting, the transmission of data to a group, can be solved from constructing multicast tree, that is. the whole network is partitioned to some clusters and the clusters are constructed by multicast tree. Multicast tree can be constructed by minimum-cost Steiner tree. In this paper, an SA algorithm is used in the minimum-cost Steiner tree. Especially, in SA, the cooling schedule is an important factor for the algorithm. Hence, in this paper, a cooling schedule is proposed for SA for multicast routing problems and analyzed the simulation results.

  • PDF

A Study on the Application method of Server Router for Reliable Multicast (신뢰성 있는 멀티캐스트를 위한 서버라우터의 활용 방안에 관한 연구)

  • Choi, Won-Hyuck;Lee, Kwang-Jae;Kim, Jung-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1483-1486
    • /
    • 2002
  • Multicast protocols are efficient methods of group communication, but they do not support the various transmission protocol services like a reliability guarantee, FTP, or Telnet that TCPs do. The purpose of this dissertation is to find a method to utilize sewer routers to form multicasts that can simultaneously transport multicast packets and TCP packets. For multicast network scalability and error recovery the existing SRM method has been used. Three packets per TCP transmission control window size are used for transport and an ACK is used for flow control. A CBR and a SRM is used for UDP traffic control. Divided on whether a UDP multicast packet and TCP unicast packet is used simultaneously or only a UDP multicast packet transport is used, the multicast receiver with the longest delay is measured on the number of packets and its data receiving rate. It can be seen that the UDP packet and the TCP's IP packet can be simultaneously used in a server router.

  • PDF

A hierarchical Xcast++ mechanism for multicast services in mobile communication environment (이동 통신망 환경에서 멀티캐스트를 제공하기 위한 계층적 Xcast++ 기법)

  • Kim Tae-Soo;Lee Kwang-Hui
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.55-70
    • /
    • 2005
  • In order to provide mobile hosts with multicast service in mobile communication environment, we proposed a multicast mechanism named HXcast++ which is an extended version of the existing Xcast++ with hierarchical architecture, We assured that mobile hosts could get multicast service through an optimal path regardless of their location by making DR(Designated Router) join a group on behalf of the mobile hosts, In this present research we introduced hierarchical architecture in order to reduce the maintenance cost resulting from frequent handoff. We also proposed a GMA (Group Management Agent) based group management mechanism which enables the mobile hosts to join the group without waiting for a new IGMP Membership Query. A fast handoff method with L2 Mobile Trigger was, in this work, employed in order to reduce the amount of the packet loss which occurs as a result of the handoff, We also managed to curtail the packet loss caused by the latency of the group join by using a buffering and forward mechanism.

  • PDF

A Key Distribution Protocol for Secure Multicasting in Large Dynamic Groups (대규모 동적 그룹에서 안전한 멀티캐스트를 위한 키 분배 프로토콜)

  • Kim, Tae-Yeon;Kim, Young-Kyoon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.597-604
    • /
    • 2002
  • Changing group key is necessary for the remaining members when a new member joins or a member leaves the group in multicast communications. It is required to guarantee perfect forward and backward confidentiality. Unfortunately, in large groups with frequent membership changes, key changes become the primary bottleneck for scalable group. In this paper, we propose a novel approach for providing efficient group key distribution in large and dynamic groups. Unlike existing secure multicast protocols, our protocol is scalable to large groups because both the frequency and computational overhead of re-keying is determined by the size of a subgroup instead of the size of the whole group, and offers mechanism to prevent the subgroup managers with group access control from having any access to the multicast data that are transfered by sender. It also provides security service for preserving privacy in wireless computing environments.

Performance Evaluation of Group Key Management Scheme Blocking Collusion Attack (공모공격의 차단기능을 갖는 그룹 키 관리기법의 성능평가)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.2
    • /
    • pp.111-124
    • /
    • 2006
  • Multicast services are provided on the Internet in fast increasing. Therefore it is important to keep security for multicast communication. If a member of the group is removed, new group key has to be generated and distributed to all remaining members of group. Minimizing number of messages and operation cost for generation of the composite keys to be used to encrypting group key are important evaluating criteria of multicast key management scheme since generation and distribution of new keys for rekeying require expensive operation. Periodic batch rekeying can reduce these important parameters rather than rekeying sequentially in fashion one after another. In this paper, Hamming distance is calculated between every members to be removed. In batch rekeying the members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm in the case of removing several members simultaneously, our scheme has advantages of reducing messages and operation cost for generation of the composite keys and eliminating possibility of collusion attack for rekeying. We evaluate performance of round assignment algorithm through simulation and show that our scheme is excellent after performance comparison of existent schemes and our scheme.

  • PDF

Trends on Xcast Technologies (Xcast 기술 동향)

  • Shin, M.G.;Kim, Y.J.
    • Electronics and Telecommunications Trends
    • /
    • v.16 no.5 s.71
    • /
    • pp.85-93
    • /
    • 2001
  • 본 고에서는 최근 IETF를 중심으로 새롭게 제안되고 있는 Xcast(Explicit Multicast) 기술에 관해 소개한다. Xcast 멀티캐스트 방식은 IBM의 SGM(Small Group Multicast), Alcatel의 CLM(Connectionless Multicast), Fujitsu의 MDO6(Multiple Destination Option for IPv6) 제안을 수정, Xcast로 통합한 것으로 기존 IP 멀티캐스트 방식과는 달리, IP 패킷 내에 수신자 목록을 명시적으로 포함하여 전송함으로써 소규모 그룹 통신을 위해 적합한 새로운 멀티캐스트 통신 방식이다. 본 고에서는 Xcast 기본 프로토콜 규격을 중심으로 최근 기술동향 및 국내 Xcast-KR 연구동향 등을 소개한다.

A Novel Authenticated Group Key Distribution Scheme

  • Shi, Run-hua;Zhong, Hong;Zhang, Shun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.935-949
    • /
    • 2016
  • In this paper, we present a novel authenticated group key distribution scheme for large and dynamic multicast groups without employing traditional symmetric and asymmetric cryptographic operations. The security of our scheme is mainly based on the basic theories for solving linear equations. In our scheme, a large group is divided into many subgroups, where each subgroup is managed by a subgroup key manager (SGKM) and a group key generation center (GKGC) further manages all SGKMs. The group key is generated by the GKGC and then propagated to all group members through the SGKMs, such that only authorized group members can recover the group key but unauthorized users cannot. In addition, all authorized group members can verify the authenticity of group keys by a public one-way function. The analysis results show that our scheme is secure and efficient, and especially it is very appropriate for secure multicast communications in large and dynamic client-server networks.

Implementation of Group Key Management Protocol for Multicasting Information Security (멀티캐스팅 정보보안을 위한 그룹키 관리 프로토콜 구현)

  • Hong Jong-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.177-182
    • /
    • 2004
  • The existing group key management architectures applied to a small scale routing protocols may have many overheads with key distribution. Therefore this paper proposes a group key management protocol in PIM-SM multicast group communication. This method divide multicast groups with RP, and subgroup key managers are established in each RP and can be transmitted groups keys. And this does not have needs of the data translation and the new key distribution for path change. This does not have needs of the data translation and the new key distribution for path change, so the data transmission time can be reduced.

  • PDF

Design and Implementation of Dynamic Group Key Management Protocol for Multicast Information Security (전자상거래를 위한 멀티캐스트 그를 키 관리 프로토콜 설계 및 구현)

  • 홍종준;김태우
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.99-107
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication under electronic commerce. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after checking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

Design and Evaluation of NACK Based Reliable Multicast Protocol (NACK 기반 신뢰적 멀티캐스트 프로토콜의 설계 및 평가)

  • Jung Sun-Hwa;Park Seok-Cheon
    • Journal of Internet Computing and Services
    • /
    • v.4 no.3
    • /
    • pp.47-55
    • /
    • 2003
  • Multicast protocols ore developed in order to support group communications efficiently, However. there still exist some issues to be solved for deploy multicast protocol in the public internet. This paper refers problem of existing Reliable Multicast Protocols and redesigns component function, and proposes enhanced reliable multicast transport protocol, This paper proposed a improved multicast transport scheme in NACK based reliable multicast. This scheme is much faster than by sender-initiated or receiver-initiated recovery and latency is smaller. Designed components are implemented in UNIX environment using C programming longuage. Then the protocol was evaluated performance through simulation. As the result, proposed protocol is better than existing protocols in both of transmission delay and packet loss. Especially, proposed protocol in this paper con be used in multicast services needed high reliability.

  • PDF