5 research outputs found

    An XCAST Multicast Implementation for the OverSim Simulator

    Get PDF
    The development of hybrid multicast simulation models is required for analyzing proposed hybrid multicast architectures such as those from the IRTF Scalable Adaptive Multicastw Research Group. However most network layer simulators don't scale to the number of nodes needed for analyzing large overlays, and most overlay simulators don't have multicast routing models needed for analyzing hybrid approaches. In this work we have extended the OverSim simulator and INET framework which run on OMNET++ to include a multi-destination multicast routing protocol (XCAST). This paper describes our implementation experience

    Secure and Efficient Connectionless Multicast Scheme for Wireless Sensor Network using IBE

    Get PDF
    Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an open problem. As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. The characteristic of WSNs such as power limitations, computation capability and storage resources make the development of efficient security scheme a great challenge especially for multicast applications. In connectionless multicast, the source explicitly encodes the list of destinations in the connectionless header and then sends the data packet to a router. These connectionless multicast protocols like xcast [51] in MANET and uCast (Unified Connectionless Multicast) [1] in WSNs are designed for small networks. They do not keep any state information relevant to ongoing multicast deliveries at intermediate nodes. All secure multicast scheme are designed for connection originated multicast are based on group creation and management making. This design makes it inapplicable to be applied for connectionless multicast because it does not create groups. This means that there is no secure connectionless multicast scheme designed for WSNs till now. This thesis presents a secure and efficient connectionless multicast scheme in WSNs using identity based encryption (IBE). In proposed solution, each node in the network can request a secure communication with a group of node from a base station. The base station will be responsible for creating and sending the session key. Only nodes in the multicast group will receive and use the session key to establish a secure communication between them

    Hybrid Multicasting Using Automatic Multicast Tunnels (AMT)

    Get PDF
    Native Multicast plays an important role in distributing and managing delivery of some of the most popular Internet applications, such as IPTV and media delivery. However, due to patchy support and the existence of multiple approaches for Native Multicast, the support for Native Multicast is fragmented into isolated areas termed Multicast Islands. This renders Native Multicast unfit to be used as an Internet wide application. Instead, Application Layer Multicast, which does not have such network requirements but is more expensive in terms of bandwidth and overhead, can be used to connect the native multicast islands. This thesis proposes Opportunistic Native Multicast (ONM) which employs Application LayerMulticast (ALM), on top of a DHT-based P2P overlay network, and AutomaticMulticast Tunnelling (AMT) to connect these islands. ALM will be used for discovery and initiating the AMT tunnels. The tunnels will encapsulate the traffic going between islands' Primary Nodes (PNs). AMT was used for its added benefits such as security and being better at traffic shaping and Quality Of Service (QoS). While different approaches for connecting multicast islands exists, the system proposed in the thesis was designed with the following characteristics in mind: scalability, availability, interoperability, self-adaptation and efficiency. Importantly, by utilising AMT tunnels, this approach has unique properties that improve network security and management

    Structured Peer-to-Peer Overlays for NATed Churn Intensive Networks

    Get PDF
    The wide-spread coverage and ubiquitous presence of mobile networks has propelled the usage and adoption of mobile phones to an unprecedented level around the globe. The computing capabilities of these mobile phones have improved considerably, supporting a vast range of third party applications. Simultaneously, Peer-to-Peer (P2P) overlay networks have experienced a tremendous growth in terms of usage as well as popularity in recent years particularly in fixed wired networks. In particular, Distributed Hash Table (DHT) based Structured P2P overlay networks offer major advantages to users of mobile devices and networks such as scalable, fault tolerant and self-managing infrastructure which does not exhibit single points of failure. Integrating P2P overlays on the mobile network seems a logical progression; considering the popularities of both technologies. However, it imposes several challenges that need to be handled, such as the limited hardware capabilities of mobile phones and churn (i.e. the frequent join and leave of nodes within a network) intensive mobile networks offering limited yet expensive bandwidth availability. This thesis investigates the feasibility of extending P2P to mobile networks so that users can take advantage of both these technologies: P2P and mobile networks. This thesis utilises OverSim, a P2P simulator, to experiment with the performance of various P2P overlays, considering high churn and bandwidth consumption which are the two most crucial constraints of mobile networks. The experiment results show that Kademlia and EpiChord are the two most appropriate P2P overlays that could be implemented in mobile networks. Furthermore, Network Address Translation (NAT) is a major barrier to the adoption of P2P overlays in mobile networks. Integrating NAT traversal approaches with P2P overlays is a crucial step for P2P overlays to operate successfully on mobile networks. This thesis presents a general approach of NAT traversal for ring based overlays without the use of a single dedicated server which is then implemented in OverSim. Several experiments have been performed under NATs to determine the suitability of the chosen P2P overlays under NATed environments. The results show that the performance of these overlays is comparable in terms of successful lookups in both NATed and non-NATed environments; with Kademlia and EpiChord exhibiting the best performance. The presence of NATs and also the level of churn in a network influence the routing techniques used in P2P overlays. Recursive routing is more resilient to IP connectivity restrictions posed by NATs but not very robust in high churn environments, whereas iterative routing is more suitable to high churn networks, but difficult to use in NATed environments. Kademlia supports both these routing schemes whereas EpiChord only supports the iterating routing. This undermines the usefulness of EpiChord in NATed environments. In order to harness the advantages of both routing schemes, this thesis presents an adaptive routing scheme, called Churn Aware Routing Protocol (ChARP), combining recursive and iterative lookups where nodes can switch between recursive and iterative routing depending on their lifetimes. The proposed approach has been implemented in OverSim and several experiments have been carried out. The experiment results indicate an improved performance which in turn validates the applicability and suitability of ChARP in NATed environments

    QuON: Ein P2P-Protokoll für skalierbare und latenzarme virtuelle Welten

    Get PDF
    corecore