21 research outputs found
Review of multicast QoS routing protocols for mobile ad hoc networks
A Mobile Ad hoc NETwork (MANET) is consisting of a
collection of wireless mobile nodes, which form a temporary
network without relying on any existing infrastructure or
centralized administration. Since the bandwidth of MANETs is
limited and shared between the participating nodes in the
network, it is important to efficiently utilize the network
bandwidth. Multicasting can minimize the link bandwidth
consumption and reduce the communication cost by sending the
same data to multiple participants. Multicast service is critical for
applications that need collaboration of team of users.
Multicasting in MANETs becomes a hot research area due to the
increasing popularity of group communication applications such
as video conferencing and interactive television. Recently,
multimedia and group-oriented computing gains more popularity
for users of ad hoc networks. So, effective Quality of Service
(QoS) multicasting protocol plays significant role in MANETs.
In this paper, we are presenting an overview of set of the most
recent QoS multicast routing protocols that have been proposed
in order to provide the researchers with a clear view of what has
been done in this field
Issues in location-based multicast routing in manets
Mobile Ad Hoc Networks (MANETs) are an autonomous system of a set of mobile nodes connected by shared wireless links, forming a temporary network without relying on any
infrastructure. MANETs characteristics include self-organizing, self-configuring, multihop communication, continuous mobility and strict resource limitation. These characteristics coupled with the characteristics of the wireless communication medium make routing protocols one of the major issues to consider in MANET
Classifications of multicast routing In mobile ad hoc networks
Multicasting is a useful communication scheme that facilitates group communication. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages. Multicast is a relatively unexplored research area, when it is compared with Unicast [I]. Over the past few years, several multicast routing protocols have been proposed for Ad-Hoc networks. In this chapter, we first provide a classification approach of the
multicasting techniques in mobile Ad-Hoc networks, followed by the description of theexisting approaches that support QoS in mobile Ad-Hoc networks using multicasting scheme.
We concentrate on hierarchical multicast routing protocols and position-based protocols, because of its relationship to our research. We will highlight their advantages and outline their limitation
Qualitive study on multicast routing protocols in manets
MANETs are considered for many commercial applications, including home networks,nomadic computing, community networks and emergency response networks. Also, there are
many applications of MANETs that involve point-to-multipoint or multipoint-to-multipoint communication patterns. Disaster recovery, search and rescue, military applications, videoconferencing or class room settings, public events, interactive television, temporary offices
and multi-partiy gaming are common examples of these application [1]. As a consequence, multicast routing has received significant attention over the recent day
Multicast security : issues and solutions
The rapid growth of multicast communications has lead to wide use of the Internet for both individual and commercial distributed applications. Multicast communication is defined
as an efficient way to distribute rich media to multiple users or participants simultaneously over the Internet. This is efficient in many applications including Internet video transmissions, news feeds, stock quotes, software updates, live multiparty conferencing, online video games and shared whiteboards. Thus, the need for secure transmission of multicast streams is considered as an important issue. However, potential security threats to multicast communications are similar to those encountered in unicast transmissions. These threats include the unauthorized creation, alteration ,destruction and illegitimate use of data. In case of multicast traffic, the inherent broad scope of a multicast session, the potential for attacks may be greater than that countered in unicast traffic. It is required to secure these services
while maintaining the trade-off between efficiency and performanc