Dynamic traffic of multicast communication in the Software Defined Network environment focused less though it is more natural and practical. In multicast communication, the traffic is dynamic due to the dynamic group memberships (i.e., participants join and leave the group anytime), which are not explored much in the previous research works. The multicast in dynamic traffic requires a method to handle dynamic group membership and minimum tree alteration for every join and leave of participants from the multicast group. This paper proposes a multicast tree construction algorithm, which considers receiving devices and network capability as base parameters to construct the multicast path. The proposed routing method uses Dijkstra's Shortest Path algorithm for initial tree formation, identifies a multicast path, and processes the Shortest Path Tree to reduce the overall hop count and path cost. The multicast tree generated by the proposed enables the dynamic join and leaves of participating devices with reduced tree alteration using more common paths to reach the devices. The implementation and results show that the proposed method works efficiently in resource utilization with a reduced hop count and quality for multicast communication in static and dynamic scenarios. Also, the results demonstrate that the proposed method generates a stable common path for multicast communication.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8630018 | PMC |
http://dx.doi.org/10.1038/s41598-021-02292-1 | DOI Listing |
Comput Struct Biotechnol J
December 2024
Department of Mathematics and Computer Science, University of Marburg, Hans-Meerwein-Str. 6, D-35043, Marburg, Germany.
Sci Rep
October 2024
School of Built Environment, Engineering and Computing, Leeds Beckett University, LS6 3QS, Leeds, UK.
With technology development, the growing self-communicating devices in IoT networks require specific naming and identification, mainly provided by IPv6 addresses. The IPv6 address in the IoT network is generated by using the stateless auto address configuration (SLAAC) mechanism, and its uniqueness is ensured by the DAD protocol. Recent research suggests that IPv6 deployment can be a risky decision due to the existing SLAAC-based addressing scheme and the DAD protocol being prone to reconnaissance and denial of service (DoS) attacks.
View Article and Find Full Text PDFFront Neurosci
June 2024
Central Institute of Engineering, Electronics and Analytics: Electronic Systems (ZEA-2), Forschungszentrum Jülich GmbH, Jülich, Germany.
Introduction: Great knowledge was gained about the computational substrate of the brain, but the way in which components and entities interact to perform information processing still remains a secret. Complex and large-scale network models have been developed to unveil processes at the ensemble level taking place over a large range of timescales. They challenge any kind of simulation platform, so that efficient implementations need to be developed that gain from focusing on a set of relevant models.
View Article and Find Full Text PDFSensors (Basel)
April 2024
Wireless Networks Lab, Institute for Information Transmission Problems of the Russian Academy of Sciences, Moscow 127051, Russia.
Many emerging applications, such as factory automation, electric power distribution, and intelligent transportation systems, require multicast Ultra-Reliable Low-Latency Communications (mURLLC). Since 3GPP Release 17, 5G systems natively support multicast functionality, including multicast Hybrid Automatic Repeat Request and various feedback schemes. Although these features can be promising for mURLLC, the specifications and existing studies fall short in offering guidance on their efficient usage.
View Article and Find Full Text PDFEntropy (Basel)
March 2024
School of Information Science and Engineering, Southeast University, Nanjing 211189, China.
D2D coded caching, originally introduced by Ji, Caire, and Molisch, significantly improves communication efficiency by applying the multi-cast technology proposed by Maddah-Ali and Niesen to the D2D network. Most prior works on D2D coded caching are based on the assumption that all users will request content at the beginning of the delivery phase. However, in practice, this is often not the case.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!