A Protocol to Improve the State Scalability of Source Specific

نویسندگان

  • Jun-Hong Cui
  • Dario Maggiorini
  • Jinkyu Kim
  • Khaled Boussetta
  • Mario Gerla
چکیده

Source Specific Multicast (SSM) is a viable solution for current multicast applications, since the driving applications to date are one to many, including Internet TV, distance learning, file distribution and streaming media, etc.. It brings many benefits in billing, address allocation, and security. However, SSM still confronts the serious state scalability problem when there are a large number of simultaneous on-going multicast groups in the network. In this paper, we propose a protocol to improve the state scalability of Source Specific Multicast, which is called Aggregated Source Specific Multicast (ASSM). We design the detailed ASSM protocol and show that our solution can obtain significant multicast state reduction while achieving transparency to end-users, compatibility with existing multicast technologies and low overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A protocol to improve the state scalability of source specific multicast

Source Specific Multicast (SSM) is a viable solution for current multicast applications, since the driving applications to date are one to many, including Internet TV, distance learning, file distribution and streaming media, etc. It brings many benefits in billing, address allocation, and security. However, SSM still confronts the serious state scalability problem when there are a large number...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Dynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture

Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...

متن کامل

An Approach to Improve the State Scalability of Source Specific Multicast

Problem statement: Source Specific Multicast (SSM) is an acceptable solution for current multicast applications; since the driving applications to date are one to many, including Internet TV, distance learning, file distribution and streaming media. Approach: It was useful for billing, address allocation and security. SSM still had serious state scalability problem when there were a large numbe...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002