Share Email Print
cover

Proceedings Paper

A new mechanism for constrained-based multicast
Author(s): Youqing Cheng; Shaohua Yu
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

As to the traditional unicast and broadcast, multicast is also a kind of data transfer mode of IP network. Because multicast can save bandwidth, reduce network load, multicast is widely used on real time data transfer, video conferencing, distance education and Internet living broadcast. But multicast encounters more security challenges than unicast, such as unauthorized data sources and unauthenticated users. This paper discusses in detail about the multicast source control, multicast routing control and multicast user control. The main contribute of this paper is that a new multicast user control scheme is proposed and fully illustrated. And a whole mechanism to manage constrained-based multicast application is clearly described and implemented in this paper to achieve multicast source control, routing control and user control.

Paper Details

Date Published: 28 September 2006
PDF: 8 pages
Proc. SPIE 6354, Network Architectures, Management, and Applications IV, 63542D (28 September 2006); doi: 10.1117/12.688501
Show Author Affiliations
Youqing Cheng, Huazhong Univ. of Science and Technology (China)
Wuhan Research Institute of Posts & Telecommunications (China)
Shaohua Yu, Huazhong Univ. of Science and Technology (China)
Wuhan Research Institute of Posts & Telecommunications (China)


Published in SPIE Proceedings Vol. 6354:
Network Architectures, Management, and Applications IV
Yong Hyub Won; Gee-Kung Chang; Ken-ichi Sato; Jian Wu, Editor(s)

© SPIE. Terms of Use
Back to Top