[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (35)

Search Parameters:
Keywords = multicast traffic

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 472 KiB  
Article
Multi-Connectivity for Multicast Video Streaming in Cellular Networks
by Sadaf ul Zuhra, Prasanna Chaporkar, Abhay Karandikar and H. Vincent Poor
Network 2024, 4(2), 175-195; https://doi.org/10.3390/network4020009 - 6 May 2024
Viewed by 1126
Abstract
The escalating demand for high-quality video streaming poses a major challenge for communication networks today. Catering to these bandwidth-hungry video streaming services places a huge burden on the limited spectral resources of communication networks, limiting the resources available for other services as well. [...] Read more.
The escalating demand for high-quality video streaming poses a major challenge for communication networks today. Catering to these bandwidth-hungry video streaming services places a huge burden on the limited spectral resources of communication networks, limiting the resources available for other services as well. Large volumes of video traffic can lead to severe network congestion, particularly during live streaming events, which require sending the same content to a large number of users simultaneously. For such applications, multicast transmission can effectively combat network congestion while meeting the demands of all the users by serving groups of users requesting the same content over shared spectral resources. Streaming services can further benefit from multi-connectivity, which allows users to receive content from multiple base stations simultaneously. Integrating multi-connectivity within multicast streaming can improve the system resource utilization while also providing seamless connectivity to multicast users. Toward this end, this work studied the impact of using multi-connectivity (MC) alongside wireless multicast for meeting the resource requirements of video streaming. Our findings show that MC substantially enhances the performance of multicast streaming, particularly benefiting cell-edge users who often experience poor channel conditions. We especially considered the number of users that can be simultaneously served by multi-connected multicast systems. It was observed that about 60% of the users that are left unserved under single-connectivity multicast are successfully served using the same resources by employing multi-connectivity in multicast transmissions. We prove that the optimal resource allocation problem for MC multicast is NP-hard. As a solution, we present a greedy approximation algorithm with an approximation factor of (11/e). Furthermore, we establish that no other polynomial-time algorithm can offer a superior approximation. To generate realistic video traffic patterns in our simulations, we made use of traces from actual videos. Our results clearly demonstrate that multi-connectivity leads to significant enhancements in the performance of multicast streaming. Full article
Show Figures

Figure 1

Figure 1
<p>MBMS architecture.</p>
Full article ">Figure 2
<p>Comparisons of the average number of users left unserved under CGA and the optimal resource allocation as a function of (<b>a</b>) an increasing number of users and (<b>b</b>) increasing cell radii (number of users <math display="inline"><semantics> <mrow> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 3
<p>Average number of packets successfully delivered using MC multicasting as a function of an increasing number of users under centralized (Algorithm 3) and distributed (Algorithm 4) resource allocation algorithms.</p>
Full article ">Figure 4
<p>Comparisons of the average number of packets (out of 10,000) successfully delivered under SC and MC multicasting. Resource allocation was performed using the proposed CGA algorithm (Algorithm 3), and the results are plotted as a function of (<b>a</b>) an increasing number of users and (<b>b</b>) increasing cell radii.</p>
Full article ">Figure 5
<p>Comparisons of the average number of users left unserved under SC and MC multicasting. Resource allocation was performed using the proposed CGA algorithm (Algorithm 3), and the results are plotted as a function of (<b>a</b>) an increasing number of users and (<b>b</b>) increasing cell radii.</p>
Full article ">Figure 6
<p>Comparisons of (<b>a</b>) the average number of packets successfully delivered (out of 133,121) and (<b>b</b>) the average number of users left unserved under SC and MC multicasting while transmitting a real-time video stream. Realistic video traffic patterns were generated using traces of a video of the Tokyo Olympics [<a href="#B11-network-04-00009" class="html-bibr">11</a>].</p>
Full article ">Figure 7
<p>Comparisons of (<b>a</b>) the average number of packets successfully delivered (out of 133,121) and (<b>b</b>) the average number of users left unserved under MC multicasting and MBSFN while transmitting a real-time video stream. Realistic video traffic patterns were generated using traces of a video of the Tokyo Olympics [<a href="#B11-network-04-00009" class="html-bibr">11</a>].</p>
Full article ">
17 pages, 429 KiB  
Article
SUDC: Synchronous Update with the Division and Combination of SRv6 Policy
by Yuze Liu, Weihong Wu, Ying Wang, Jiang Liu and Fan Yang
Future Internet 2024, 16(4), 140; https://doi.org/10.3390/fi16040140 - 22 Apr 2024
Viewed by 2523
Abstract
With the expansion of network scale, new network services are emerging. Segment Routing over IPv6 (SRv6) can meet the diverse needs of more new services due to its excellent scalability and programmability. In the intelligent 6-Generation (6G) scenario, frequent SRv6 Traffic Engineering (TE) [...] Read more.
With the expansion of network scale, new network services are emerging. Segment Routing over IPv6 (SRv6) can meet the diverse needs of more new services due to its excellent scalability and programmability. In the intelligent 6-Generation (6G) scenario, frequent SRv6 Traffic Engineering (TE) policy updates will result in the serious problem of unsynchronized updates across routers. Existing solutions suffer from issues such as long update cycles or large data overhead. To optimize the policy-update process, this paper proposes a scheme called Synchronous Update with the Division and Combination of SRv6 Policy (SUDC). Based on the characteristics of the SRv6 TE policy, SUDC divides the policies and introduces Bit Index Explicit Replication IPv6 Encapsulation (BIERv6) to multicast the policy blocks derived from policy dividing. The contribution of this paper is to propose the policy-dividing and combination mechanism and the policy-dividing algorithm. The simulation results demonstrate that compared with the existing schemes, the update overhead and update cycle of SUDC are reduced by 46.71% and 46.6%, respectively. The problem of unsynchronized updates across routers has been further improved. Full article
Show Figures

Figure 1

Figure 1
<p>The architecture of SUDC.</p>
Full article ">Figure 2
<p>An example of SUDC.</p>
Full article ">Figure 3
<p>The core idea of policy-dividing algorithm.</p>
Full article ">Figure 4
<p>The role of the dictionary tree.</p>
Full article ">Figure 5
<p>Number of times for policy distribution.</p>
Full article ">Figure 6
<p>Coexisting time of new and legacy policies.</p>
Full article ">Figure 7
<p>Propagation time of policies in the network.</p>
Full article ">Figure 8
<p>Timeliness cost of SUDC.</p>
Full article ">
20 pages, 1160 KiB  
Article
Resource-Efficient Multicast URLLC Service in 5G Systems
by Artem Krasilov, Irina Lebedeva, Ruslan Yusupov and Evgeny Khorov
Sensors 2024, 24(8), 2536; https://doi.org/10.3390/s24082536 - 15 Apr 2024
Viewed by 961
Abstract
Many emerging applications, such as factory automation, electric power distribution, and intelligent transportation systems, require multicast Ultra-Reliable Low-Latency Communications (mURLLC). Since 3GPP Release 17, 5G systems natively support multicast functionality, including multicast Hybrid Automatic Repeat Request and various feedback schemes. Although these features [...] Read more.
Many emerging applications, such as factory automation, electric power distribution, and intelligent transportation systems, require multicast Ultra-Reliable Low-Latency Communications (mURLLC). Since 3GPP Release 17, 5G systems natively support multicast functionality, including multicast Hybrid Automatic Repeat Request and various feedback schemes. Although these features can be promising for mURLLC, the specifications and existing studies fall short in offering guidance on their efficient usage. This paper presents the first comprehensive system-level evaluation of mURLLC, leveraging insights from 3GPP specifications. It points out (i) how mURLLC differs from traditional multicast broadband wireless communications, and (ii) which approaches to provide mURLLC require changing the paradigm compared with the existing solutions. Finally, the paper provides recommendations on how to satisfy strict mURLLC requirements efficiently, i.e., with low channel resource consumption, which increases the capacity of 5G systems for mURLLC. Simulation results show that proper configuration of multicast mechanisms and the corresponding algorithms for mURLLC traffic can reduce resource consumption up to three times compared to the baseline solutions proposed for broadband multicast traffic, which significantly increases the system capacity. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Figure 1
<p>System model illustration.</p>
Full article ">Figure 2
<p>Scenario with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> UEs, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>64</mn> </mrow> </semantics></math> antennas at gNB, 3 kmph mobility, and <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mrow> <mi>S</mi> <mi>R</mi> <mi>S</mi> </mrow> </msub> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> ms: (<b>a</b>) LOS channel, (<b>b</b>) NLOS channel.</p>
Full article ">Figure 3
<p>Scenario with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> UEs, <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math> antennas at gNB, 3 kmph mobility, and <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mrow> <mi>S</mi> <mi>R</mi> <mi>S</mi> </mrow> </msub> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> ms: (<b>a</b>) LOS channel, (<b>b</b>) NLOS channel.</p>
Full article ">Figure 4
<p>Scenario with 3 kmph mobility, a single TX, the NACK-only feedback scheme, <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mn>1</mn> </msub> <mo>=</mo> <mi>P</mi> <mi>L</mi> <msup> <mi>R</mi> <mrow> <mi>Q</mi> <mi>o</mi> <mi>S</mi> </mrow> </msup> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mrow> <mi>S</mi> <mi>R</mi> <mi>S</mi> </mrow> </msub> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> ms.</p>
Full article ">Figure 5
<p>Scenario with 3 kmph mobility and <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mrow> <mi>S</mi> <mi>R</mi> <mi>S</mi> </mrow> </msub> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> ms: (<b>a</b>) downlink resource consumption, (<b>b</b>) scheduler execution time.</p>
Full article ">Figure 6
<p>Scenario with 3 kmph mobility and <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mrow> <mi>S</mi> <mi>R</mi> <mi>S</mi> </mrow> </msub> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> ms: (<b>a</b>) downlink resource consumption, (<b>b</b>) overall resource consumption, (<b>c</b>) packet loss ratio, (<b>d</b>) average MCS.</p>
Full article ">Figure 7
<p>Scenario with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> UEs, 3 kmph mobility, and <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mrow> <mi>S</mi> <mi>R</mi> <mi>S</mi> </mrow> </msub> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> ms: (<b>a</b>) NLOS, (<b>b</b>) LOS.</p>
Full article ">Figure 8
<p>Scenario with different <math display="inline"><semantics> <msub> <mi>T</mi> <mrow> <mi>S</mi> <mi>R</mi> <mi>S</mi> </mrow> </msub> </semantics></math> and UE mobility: (<b>a</b>) downlink resource consumption, (<b>b</b>) overall resource consumption.</p>
Full article ">
28 pages, 5023 KiB  
Article
Lightweight and Secure Multi-Message Multi-Receiver Certificateless Signcryption Scheme for the Internet of Vehicles
by Guishuang Xu, Xinchun Yin and Xincheng Li
Electronics 2023, 12(24), 4908; https://doi.org/10.3390/electronics12244908 - 6 Dec 2023
Cited by 1 | Viewed by 1328
Abstract
The Internet of Vehicles (IoV) improves traffic efficiency and enhances driving safety through the real-time collection and analysis of traffic-related data. Numerous secure and privacy-preserving communication protocols have been proposed for the IoV. However, various security threats, privacy leakage, and inefficient communications remain [...] Read more.
The Internet of Vehicles (IoV) improves traffic efficiency and enhances driving safety through the real-time collection and analysis of traffic-related data. Numerous secure and privacy-preserving communication protocols have been proposed for the IoV. However, various security threats, privacy leakage, and inefficient communications remain unaddressed. Therefore, a lightweight and secure multi-message multi-receiver certificateless signcryption (LS-MRCLSC) scheme based on elliptic curve cryptography (ECC) is proposed. The proposed scheme guarantees secure communication and promotes messaging efficiency with multi-cast mode. Multiple key generation centers (KGCs) collaborate to generate and update the system master key (SMK) using Feldman’s verifiable secret-sharing (FVSS) algorithm, avoiding the single point of failure (SPoF) problem. Formal security proofs under the random oracle model (ROM) demonstrate that the proposed scheme meets requirements such as data confidentiality, message unforgeability, anonymity, and unlinkability. Performance evaluations confirm that the LS-MRCLSC scheme is better than similar schemes in terms of efficiency, feasibility, and scalability. Full article
(This article belongs to the Special Issue Cyber-Security in Smart Cities: Challenges and Solution)
Show Figures

Figure 1

Figure 1
<p>The system model of our LS-MRCLSC scheme.</p>
Full article ">Figure 2
<p>Overview of the LS-MRCLSC scheme.</p>
Full article ">Figure 3
<p>Orange Pi Zero 2.</p>
Full article ">Figure 4
<p>The implementation of the proposed LS-MRCLSC scheme.</p>
Full article ">Figure 5
<p>Computation costs of signcryption compared to schemes in [<a href="#B7-electronics-12-04908" class="html-bibr">7</a>,<a href="#B8-electronics-12-04908" class="html-bibr">8</a>,<a href="#B9-electronics-12-04908" class="html-bibr">9</a>,<a href="#B10-electronics-12-04908" class="html-bibr">10</a>,<a href="#B11-electronics-12-04908" class="html-bibr">11</a>].</p>
Full article ">Figure 6
<p>Computation costs of unsigncryption compared to schemes in [<a href="#B7-electronics-12-04908" class="html-bibr">7</a>,<a href="#B8-electronics-12-04908" class="html-bibr">8</a>,<a href="#B9-electronics-12-04908" class="html-bibr">9</a>,<a href="#B10-electronics-12-04908" class="html-bibr">10</a>,<a href="#B11-electronics-12-04908" class="html-bibr">11</a>].</p>
Full article ">Figure 7
<p>Total time cost of the sender with increasing receivers compared to schemes in [<a href="#B7-electronics-12-04908" class="html-bibr">7</a>,<a href="#B8-electronics-12-04908" class="html-bibr">8</a>,<a href="#B9-electronics-12-04908" class="html-bibr">9</a>,<a href="#B10-electronics-12-04908" class="html-bibr">10</a>,<a href="#B11-electronics-12-04908" class="html-bibr">11</a>].</p>
Full article ">Figure 8
<p>Communication costs compared to schemes in [<a href="#B7-electronics-12-04908" class="html-bibr">7</a>,<a href="#B8-electronics-12-04908" class="html-bibr">8</a>,<a href="#B9-electronics-12-04908" class="html-bibr">9</a>,<a href="#B10-electronics-12-04908" class="html-bibr">10</a>,<a href="#B11-electronics-12-04908" class="html-bibr">11</a>].</p>
Full article ">Figure 9
<p>Communication cost of the sender with increasing receivers compared to schemes in [<a href="#B7-electronics-12-04908" class="html-bibr">7</a>,<a href="#B8-electronics-12-04908" class="html-bibr">8</a>,<a href="#B9-electronics-12-04908" class="html-bibr">9</a>,<a href="#B10-electronics-12-04908" class="html-bibr">10</a>,<a href="#B11-electronics-12-04908" class="html-bibr">11</a>].</p>
Full article ">
22 pages, 2246 KiB  
Article
ICN-Based Enhanced Content Delivery for CDN
by Lei Gao and Xiaoyong Zhu
Future Internet 2023, 15(12), 390; https://doi.org/10.3390/fi15120390 - 30 Nov 2023
Cited by 2 | Viewed by 2380
Abstract
With the rapid growth of internet traffic, the traditional host-to-host TCP/IP architecture is subject to many service limitations faced with content-oriented applications. Various novel network architectures have been proposed to solve these limitations, among which Information-Centric Networking (ICN) is one of the most [...] Read more.
With the rapid growth of internet traffic, the traditional host-to-host TCP/IP architecture is subject to many service limitations faced with content-oriented applications. Various novel network architectures have been proposed to solve these limitations, among which Information-Centric Networking (ICN) is one of the most prominent. ICN features the decoupling of content (service) from the physical devices storing (providing) it through location-independent naming, and offers inherent enhancement to network performance, such as multicast and in-network caching. ICN in-network caching has been extensively studied, and we believe that it may also be the main incentive for ISPs to deploy ICN. A CDN (content delivery network) is a typical content-oriented network paradigm that aims to provide the fast delivery of content. In this paper, we leverage the advantages of the in-network caching of ICN to enhance the content delivery efficiency of CDN by integrating ICN as a service. First, we present our design of a content delivery network enhanced with ICN, called IECDN. Additionally, we formulate a mathematical model to optimize the performance of our proposed design and conduct a series of evaluations. The results indicate that our proposed design provides significant performance gains while reducing bandwidth consumption and shows better resilience to traffic surge. Full article
Show Figures

Figure 1

Figure 1
<p>An overview of content delivery network enhanced with ICN (IECDN).</p>
Full article ">Figure 2
<p>Flow diagram of content request and retrieval process.</p>
Full article ">Figure 3
<p>ID-based ICN protocol stack.</p>
Full article ">Figure 4
<p>The design diagram of the HTTP-ICN gateway.</p>
Full article ">Figure 5
<p>Protocol conversion from HTTP to ID-based ICN protocol.</p>
Full article ">Figure 6
<p>The Abilene topology used for IECDN.</p>
Full article ">Figure 7
<p>Comparison of total bandwidth consumption (<b>a</b>) and average delay (<b>b</b>) under different cache sizes between IECDN and conventional CDN.</p>
Full article ">Figure 8
<p>Comparison of total bandwidth consumption (<b>a</b>) and average delay (<b>b</b>) under different alpha parameter between IECDN and conventional CDN.</p>
Full article ">Figure 9
<p>The trend of total bandwidth consumption in Abilene (<b>a</b>) and Geant2, (<b>b</b>) topology as content demand frequency increases.</p>
Full article ">Figure 10
<p>Average manifest size under different chunk sizes.</p>
Full article ">
18 pages, 9473 KiB  
Article
Dynamic and Energy Efficient Cache Scheduling Framework for IoMT over ICN
by Abdullah Alourani, Muhammad Sardaraz, Muhammad Tahir and Muhammad Saud Khan
Appl. Sci. 2023, 13(21), 11840; https://doi.org/10.3390/app132111840 - 29 Oct 2023
Viewed by 1668
Abstract
The Internet of Medical Things (IoMT) is the network of medical devices, hardware infrastructure, and software applications used to connect the healthcare information technology. Massive traffic growth and user expectations cause challenges in the current exhausting models of IoMT data. To reduce the [...] Read more.
The Internet of Medical Things (IoMT) is the network of medical devices, hardware infrastructure, and software applications used to connect the healthcare information technology. Massive traffic growth and user expectations cause challenges in the current exhausting models of IoMT data. To reduce the IoMT traffic, Information Centric Network (ICN) is a suitable technique. ICN uses persistent naming multicast communication that reduces the response time. ICN in IoMT provides a promising feature to reduce the overhead due to the distribution of commonly accessed contents. Some parameters such as energy consumption, communication cost, etc., influence the performance of sensors in the IoMT network. Excessive and unbalanced energy consumption degrades the network performance and lifetime. This article presents a framework called Dynamic Cache Scheme (DCS) that implements energy-efficient cache scheduling in IoMT over ICN to reduce network traffic. The proposed framework establishes a balance between the multi-hop traffic and data item freshness. The technique improves the freshness of data; thus, updated data are provided to the end-users via the effective utilization of caching in IoMT. The proposed framework is tested on important parameters, i.e., cache-hit-ratio, stretch, and content retrieval latency. The results obtained are compared with the state-of-the-art models. Results’ analysis shows that the proposed framework outperforms the compared models in terms of cache-hit-ratio, stretch, and content retrieval latency by 59.42%, 32.66%, and 18.8%, respectively. In the future, it is intended to explore the applicability of DCS in more scenarios and optimize further. Full article
(This article belongs to the Special Issue eHealth Innovative Approaches and Applications)
Show Figures

Figure 1

Figure 1
<p>Workflow of popular content over the network. (<b>a</b>) Has no caching content (<b>b</b>) Both routers have the same content but the content of <math display="inline"><semantics> <mrow> <mi>R</mi> <mn>1</mn> </mrow> </semantics></math> is older than the content of <math display="inline"><semantics> <mrow> <mi>R</mi> <mn>2</mn> </mrow> </semantics></math>. (<b>c</b>) After some time, the content of <math display="inline"><semantics> <mrow> <mi>R</mi> <mn>2</mn> </mrow> </semantics></math> expires. (<b>d</b>) Client needs less popular content, which is cached at <math display="inline"><semantics> <mrow> <mi>R</mi> <mn>2</mn> </mrow> </semantics></math>. The age of the content is determined by the distance from the server or source node.</p>
Full article ">Figure 2
<p>The architecture of the proposed system. The architecture presents the workflow of interest packets sent from biomedical sensor devices toward the cloud data source. Content producers and content consumers have caching nodes that cache the popular data for short lifetime. If the ordinary request comes over the network, it is forwarded to CS to check; if found, then it is sent to the consumer, or otherwise forwarded to PIT to check for any other entry in PIT. If it exists, then we discard the existing entry and add updated entry against this request; if data are not present, it is further sent to FIB to broadcast.</p>
Full article ">Figure 3
<p>Comparative analysis of cache-hit ratio with cache sizes and popularity of (<b>a</b>) 500 and 0.8, (<b>b</b>) 1000 and 0.8, (<b>c</b>) 500 and 1.2, and (<b>d</b>) 1000 and 1.2.</p>
Full article ">Figure 4
<p>Comparative analysis of latency with cache sizes and popularity of (<b>a</b>) 500 and 0.8, (<b>b</b>) 1000 and 0.8, (<b>c</b>) 500 and 1.2, and (<b>d</b>) 1000 and 1.2.</p>
Full article ">Figure 5
<p>Comparative analysis of stretch with cache sizes and popularity of (<b>a</b>) 500 and 0.8, (<b>b</b>) 1000 and 0.8, (<b>c</b>) 500 and 1.2, and (<b>d</b>) 1000 and 1.2.</p>
Full article ">
19 pages, 2879 KiB  
Article
A Scalable Video Multicast Scheme Based on User Demand Perception and D2D Communication
by Ruiqi Ouyang, Xuanrui Xiong, Mingkai Fu, Jie Wang, Shixiong Chen and Osama Alfarraj
Sensors 2023, 23(17), 7325; https://doi.org/10.3390/s23177325 - 22 Aug 2023
Cited by 1 | Viewed by 1021
Abstract
With the widespread application of 5G technology, there has been a significant surge in wireless video service demand and video traffic due to the proliferation of smart terminal devices and multimedia applications. However, the complexity of terminal devices, heterogeneous transmission channels, and the [...] Read more.
With the widespread application of 5G technology, there has been a significant surge in wireless video service demand and video traffic due to the proliferation of smart terminal devices and multimedia applications. However, the complexity of terminal devices, heterogeneous transmission channels, and the rapid growth of video traffic present new challenges for wireless network-based video applications. Although scalable video coding technology effectively improves video transmission efficiency in complex networks, traditional cellular base stations may struggle to handle video transmissions for all users simultaneously, particularly in large-scale networks. To tackle this issue, we propose a scalable video multicast scheme based on user demand perception and Device-to-Device (D2D) communication, aiming to enhance the D2D multicast network transmission performance of scalable videos in cellular D2D hybrid networks. Firstly, we analyze user interests by considering their video viewing history and factors like video popularity to determine their willingness for video pushing, thereby increasing the number of users receiving multicast clusters. Secondly, we design a cluster head selection algorithm that considers users’ channel quality, social parameters, and video quality requirements. Performance results demonstrate that the proposed scheme effectively attracts potential request users to join multicast clusters, increases the number of users in the clusters, and meets diverse user demands for video quality. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Figure 1
<p>Cluster-based methodology using a grid-based approach.</p>
Full article ">Figure 2
<p>Physical and social domains among end devices.</p>
Full article ">Figure 3
<p>Illustration of interference in D2D multicast communication.</p>
Full article ">Figure 4
<p>Influence of different parameters and potential requesting user count on utility value. (<b>a</b>) Utility values and user willingness to accept thresholds, (<b>b</b>) utility values and popularity factors, (<b>c</b>) utility values and number of videos.</p>
Full article ">Figure 5
<p>Effect of different parameters and scenarios on the degree of utility. (<b>a</b>) Utility values and popularity factors, (<b>b</b>) utility and number of videos.</p>
Full article ">Figure 6
<p>Relationship between utility values and variability in video quality requirements.</p>
Full article ">
24 pages, 518 KiB  
Article
Optimal Resource Allocation for Loss-Tolerant Multicast Video Streaming
by Sadaf ul Zuhra, Karl-Ludwig Besser, Prasanna Chaporkar, Abhay Karandikar and H. Vincent Poor
Entropy 2023, 25(7), 1045; https://doi.org/10.3390/e25071045 - 11 Jul 2023
Cited by 2 | Viewed by 1849
Abstract
In video streaming applications, especially during live streaming events, video traffic can account for a significant portion of the network traffic and can lead to severe network congestion. For such applications, multicast provides an efficient means to deliver the same content to a [...] Read more.
In video streaming applications, especially during live streaming events, video traffic can account for a significant portion of the network traffic and can lead to severe network congestion. For such applications, multicast provides an efficient means to deliver the same content to a large number of users simultaneously. However, in multicast, if the base station transmits content at rates higher than what can be decoded by users with the worst channels, these users will experience outages. This makes the multicast system’s performance dependent on the weakest users in the system. Interestingly, video streams can tolerate some packet loss without a significant degradation in the quality experienced by the users. This property can be leveraged to improve the multicast system’s performance by reducing the dependence of the multicast transmissions on the weakest users. In this work, we design a loss-tolerant video multicasting system that allows for some controlled packet loss while satisfying the quality requirements of the users. In particular, we solve the resource allocation problem in a multimedia broadcast multicast services (MBMS) system by transforming it into the problem of stabilizing a virtual queuing system. We propose two loss-optimal policies and demonstrate their effectiveness using numerical examples with realistic traffic patterns from real video streams. It is shown that the proposed policies are able to keep the loss encountered by every user below its tolerable loss. The proposed policies are also able to achieve a significantly lower peak SNR degradation than the existing schemes. Full article
(This article belongs to the Collection Feature Papers in Information Theory)
Show Figures

Figure 1

Figure 1
<p>Considered MBMS system in which <span class="html-italic">M</span> users subscribe to one of <span class="html-italic">L</span> video streams. Each UE <span class="html-italic">k</span> has an average loss tolerance <math display="inline"><semantics><msub><mover accent="true"><mo>ℓ</mo><mo>˜</mo></mover><mi>k</mi></msub></semantics></math>. The base station maintains a virtual queuing system <math display="inline"><semantics><mi mathvariant="script">Q</mi></semantics></math>, which keeps track of the packet losses for the individual users. Based on the state of <math display="inline"><semantics><mi mathvariant="script">Q</mi></semantics></math>, the resource allocation policy <math display="inline"><semantics><mo>Γ</mo></semantics></math> assigns a PRB to each group <math display="inline"><semantics><mrow><mi>i</mi><mo>∈</mo><mo>{</mo><mn>1</mn><mo>,</mo><mn>2</mn><mo>,</mo><mo>…</mo><mo>,</mo><mi>L</mi><mo>}</mo></mrow></semantics></math>, which corresponds to transmitting the data at rate <math display="inline"><semantics><msub><mi>R</mi><mi>i</mi></msub></semantics></math>.</p>
Full article ">Figure 2
<p>Differences between the tolerable losses <math display="inline"><semantics><msub><mover accent="true"><mo>ℓ</mo><mo>˜</mo></mover><mi>k</mi></msub></semantics></math> and the average losses encountered by the video traces <math display="inline"><semantics><mover><msubsup><mo>ℓ</mo><mi>k</mi><mo>Γ</mo></msubsup><mo>¯</mo></mover></semantics></math> under policies LORA, p-LORA, and EXP-Q.</p>
Full article ">Figure 3
<p>Average losses of all UEs and video streams over time for different policies.</p>
Full article ">Figure 4
<p>Comprarison of the PSNR degradation for different videos.</p>
Full article ">Figure 5
<p>Differences between the encountered losses <math display="inline"><semantics><mrow><msup><mo>ℓ</mo><mo>Γ</mo></msup><mrow><mo>[</mo><mi>t</mi><mo>]</mo></mrow></mrow></semantics></math> for one UE at time <span class="html-italic">t</span> of a video stream and the average packet loss <math display="inline"><semantics><mover><msup><mo>ℓ</mo><mo>Γ</mo></msup><mo>¯</mo></mover></semantics></math> for policy <math display="inline"><semantics><mo>Γ</mo></semantics></math>. A high peak indicates a burst of packet loss, which can result in degradation in the video quality.</p>
Full article ">Figure 6
<p>Average loss for different combinations of the number of video streams <span class="html-italic">L</span> and the number of users per stream <span class="html-italic">K</span>. The solid lines indicate the results for <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>3</mn></mrow></semantics></math>, the dashed lines for <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>4</mn></mrow></semantics></math>, and the dash-dotted lines for <math display="inline"><semantics><mrow><mi>L</mi><mo>=</mo><mn>5</mn></mrow></semantics></math>.</p>
Full article ">
29 pages, 550 KiB  
Article
Coded Caching for Broadcast Networks with User Cooperation
by Zhenhao Huang, Jiahui Chen, Xiaowen You, Shuai Ma and Youlong Wu
Entropy 2022, 24(8), 1034; https://doi.org/10.3390/e24081034 - 27 Jul 2022
Cited by 2 | Viewed by 2168
Abstract
Caching technique is a promising approach to reduce the heavy traffic load and improve user latency experience for the Internet of Things (IoT). In this paper, by exploiting edge cache resources and communication opportunities in device-to-device (D2D) networks and broadcast networks, two novel [...] Read more.
Caching technique is a promising approach to reduce the heavy traffic load and improve user latency experience for the Internet of Things (IoT). In this paper, by exploiting edge cache resources and communication opportunities in device-to-device (D2D) networks and broadcast networks, two novel coded caching schemes are proposed that greatly reduce transmission latency for the centralized and decentralized caching settings, respectively. In addition to the multicast gain, both schemes obtain an additional cooperation gain offered by user cooperation and an additional parallel gain offered by the parallel transmission among the server and users. With a newly established lower bound on the transmission delay, we prove that the centralized coded caching scheme is order-optimal, i.e., achieving a constant multiplicative gap within the minimum transmission delay. The decentralized coded caching scheme is also order-optimal if each user’s cache size is larger than a threshold which approaches zero as the total number of users tends to infinity. Moreover, theoretical analysis shows that to reduce the transmission delay, the number of users sending signals simultaneously should be appropriately chosen according to the user’s cache size, and always letting more users send information in parallel could cause high transmission delay. Full article
(This article belongs to the Special Issue Information Theoretic Methods for Future Communication Systems)
Show Figures

Figure 1

Figure 1
<p>Caching system considered in this paper. A server connects with <span class="html-italic">K</span> cache-enabled users and the users can cooperate through a flexible network.</p>
Full article ">Figure 2
<p>Centralized cooperation gain and parallel gain when <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mo movablelimits="true" form="prefix">max</mo> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Transmission delay when <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mo movablelimits="true" form="prefix">max</mo> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>. The upper bounds are achieved under the centralized caching scenario.</p>
Full article ">Figure 4
<p>Decentralized cooperation gain and parallel gain when <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Transmission delay when <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mo movablelimits="true" form="prefix">max</mo> </msub> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>. The upper bounds are achieved under the decentralized random caching scenario.</p>
Full article ">
13 pages, 1663 KiB  
Article
Partial-Failure Segregated Spectrum Assignment for Multicast Traffic in Flex-Grid Optical Networks
by Yang Qiu
Photonics 2022, 9(7), 488; https://doi.org/10.3390/photonics9070488 - 12 Jul 2022
Viewed by 1597
Abstract
In this paper, we propose a new algorithm called the partial-failure segregated multicasting routing and spectrum assignment (PFS MRSA) algorithm to improve the service blocking performance of the multicast transmission in flex-grid optical networks (FGONs). By segregating one failure destination leaf-node from a [...] Read more.
In this paper, we propose a new algorithm called the partial-failure segregated multicasting routing and spectrum assignment (PFS MRSA) algorithm to improve the service blocking performance of the multicast transmission in flex-grid optical networks (FGONs). By segregating one failure destination leaf-node from a blocked multicast request and accommodating the failure destination leaf-node and the remaining multicast request independently, the success probability of accommodating the originally blocked multicast request can be greatly increased. In this way, the proposed PFS MRSA algorithm can effectively reduce the service blocking probability for the multicast services in FGONs. Simulation results show that the proposed PFS MRSA algorithm achieves significant reduction in service blocking probability when compared with the conventional MRSA algorithms, and such reduction can even reach 100% in some scenarios with low traffic load. Full article
(This article belongs to the Special Issue Advances in Optical Communication and Network)
Show Figures

Figure 1

Figure 1
<p>An illustrative example for the path routing and spectrum allocation in a six-node network when employing the proposed PFS MRSA algorithm: (<b>a</b>) the employed network topology and the node architecture; (<b>b</b>) the spectrum utilization on each link before multicast request <span class="html-italic">M</span><sub>0</sub> arrives; (<b>c</b>) the path routing and spectrum allocation for <span class="html-italic">M</span><sub>0</sub> when the proposed algorithm is used.</p>
Full article ">Figure 2
<p>Flow chart of the proposed PFS MRSA algorithm.</p>
Full article ">Figure 3
<p>14-node NSFNET.</p>
Full article ">Figure 4
<p>24-node USNET.</p>
Full article ">Figure 5
<p>Simulation results on service blocking probability in different network architectures under scenario one: (<b>a</b>) in NSFNET and (<b>b</b>) in USNET.</p>
Full article ">Figure 6
<p>Simulation results on service blocking probability in different network architectures under scenario two: (<b>a</b>) in NSFNET and (<b>b</b>) in USNET.</p>
Full article ">Figure 7
<p>Simulation results on service blocking probability in different network architectures under scenario three: (<b>a</b>) in NSFNET and (<b>b</b>) in USNET.</p>
Full article ">
36 pages, 7325 KiB  
Article
Network Architecture for IEC61850-90-5 Communication: Case Study of Evaluating R-GOOSE over 5G for Communication-Based Protection
by Peyman Jafary, Antti Supponen and Sami Repo
Energies 2022, 15(11), 3915; https://doi.org/10.3390/en15113915 - 25 May 2022
Cited by 10 | Viewed by 4647
Abstract
The smart grid includes wide-area applications in which inter-substation communication is required to realize innovative monitoring, protection, and control solutions. Internet-based data exchange, i.e., communication over Internet Protocol (IP), is regarded as the latest trend for inter-substation communication. Interoperability can be achieved via [...] Read more.
The smart grid includes wide-area applications in which inter-substation communication is required to realize innovative monitoring, protection, and control solutions. Internet-based data exchange, i.e., communication over Internet Protocol (IP), is regarded as the latest trend for inter-substation communication. Interoperability can be achieved via the use of standardized IEC 61850-90-5 messages communicating over IP. Wide-area applications can obtain benefits from IP-multicast technologies and use a one-to-many communication model among substations communicating across a communication network. Cellular Internet is being considered as a potential cost-efficient solution which can be used for the IP-multicast communication. However, it requires knowledge of communicating uncommon IP-multicast traffic over the Internet. Moreover, it presents challenges in terms of cybersecurity and real-time requirements. These challenges must be overcome to realize authentic and correct operation of the wide-area applications. There is thus a need to examine communication security and to evaluate if the communication network characteristics satisfy the application real-time requirement. This paper investigates the secure communication of IEC61850-90-5 multicast messages over the public communication network and proposes two network architectures using the Generic Routing Encapsulation (GRE) tunnel and multipoint GRE (mGRE) within Dynamic Multipoint VPN (DMVPN). Additionally, this paper evaluates the feasibility of cellular (5G and 4G) Internet for the communication of multicast Routable Generic Object Oriented Substation Events (R-GOOSE) messages in wide-area protection applications. For this purpose, we introduce a lab setup to experiment the transmission of R-GOOSE messages within the proposed network architectures. The lab setup contains both software and hardware components. A software application is developed to publish multicast R-GOOSE with a fresh timestamp acquired from time synchronization equipment. These messages are transmitted over the Internet by computer networking devices that support cellular communication. The communication latency of the transmitted messages is measured and analyzed statistically. The statistical analysis results are discussed to evaluate performance of R-GOOSE over cellular Internet for two communication-based protection applications: Logic Selectivity and Loss-of-Main protection schemes. Full article
(This article belongs to the Special Issue Distribution Grid Management Based on the Use of 5G Communication)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Frame structures of SV/GOOSE and R-SV/R-GOOSE.</p>
Full article ">Figure 2
<p>Multicast communication of R-SV/R-GOOSE from Substation 1 to Substation 2 and 3.</p>
Full article ">Figure 3
<p>Multicast communication of Routable-Tunneled SV/GOOSE from Substation 1 to Substation 2 and 3.</p>
Full article ">Figure 4
<p>Routable GOOSE (R-GOOSE) vs. Routable-Tunneled GOOSE.</p>
Full article ">Figure 5
<p>IP-Multicast communication from Substation 1 to Substation 2 and 3 via private utility network.</p>
Full article ">Figure 6
<p>IP-Multicast communication from Substation 1 to Substation 2 and 3 via public IP network.</p>
Full article ">Figure 7
<p>GDOI components (GCKS and GMs) for securing R-SV/R-GOOSE messages in multicast communication from Substation 1 to Substation 2 and 3.</p>
Full article ">Figure 8
<p>Communication of secured R-SV/R-GOOSE within centralized security architecture.</p>
Full article ">Figure 9
<p>Decentralized security architectures: Fully Connected (<b>left</b>) and Hierarchical (<b>right</b>).</p>
Full article ">Figure 10
<p>IEC61850-90-5 session protocol—security related information in the session header.</p>
Full article ">Figure 11
<p>(<b>a</b>) None-secured R-SV/R-GOOSE, (<b>b</b>) Signed R-SV/R-GOOSE, (<b>c</b>) Encrypted R-SV/R-GOOSE, (<b>d</b>) Signed and Encrypted R-SV/R-GOOSE.</p>
Full article ">Figure 12
<p>GDOI components (GCKS and GMs) in GET VPN architecture.</p>
Full article ">Figure 13
<p>Securing R-SV/R-GOOSE messages by IPsec Tunnel Mode with Address Preservation.</p>
Full article ">Figure 14
<p>Secured messages in the secured communication path (Defense-in-Depth Security for multicast communication via private WAN).</p>
Full article ">Figure 15
<p>Secured messages in the secured communication path (Defense-in-Depth Security for multicast communication via public WAN).</p>
Full article ">Figure 16
<p>Non-secured R-SV/R-GOOSE messages encapsulated by GRE and secured by ESP over IPsec tunnel between edge routers.</p>
Full article ">Figure 17
<p>P2M architecture for multicast R-SV/R-GOOSE over public WAN (Internet) with separate GRE tunnels.</p>
Full article ">Figure 18
<p>P2M architecture for multicast R-SV/R-GOOSE over public WAN (Internet) with mGRE within DMVPN.</p>
Full article ">Figure 19
<p>Test setup for communication latency measurement of R-GOOSE messages.</p>
Full article ">Figure 20
<p>GPS time synchronization of sender (Raspberry Pi) and receiver (Linux PC).</p>
Full article ">Figure 21
<p>Sending time and arrival time of R-GOOSE message in Wireshark.</p>
Full article ">
26 pages, 5423 KiB  
Article
Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities
by Muhammad Asif, Zeeshan Aziz, Maaz Bin Ahmad, Adnan Khalid, Hammad Abdul Waris and Asfandyar Gilani
Sensors 2022, 22(7), 2604; https://doi.org/10.3390/s22072604 - 29 Mar 2022
Cited by 43 | Viewed by 4951
Abstract
Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies. Conventional security and privacy architectures are inapplicable in the spectrum of IoT due to [...] Read more.
Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies. Conventional security and privacy architectures are inapplicable in the spectrum of IoT due to its resource constraints. To overcome this problem, this paper presents a Blockchain-based security mechanism that enables secure authorized access to smart city resources. The presented mechanism comprises the ACE (Authentication and Authorization for Constrained Environments) framework-based authorization Blockchain and the OSCAR (Object Security Architecture for the Internet of Things) object security model. The Blockchain lays out a flexible and trustless authorization mechanism, while OSCAR makes use of a public ledger to structure multicast groups for authorized clients. Moreover, a meteor-based application is developed to provide a user-friendly interface for heterogeneous technologies belonging to the smart city. The users would be able to interact with and control their smart city resources such as traffic lights, smart electric meters, surveillance cameras, etc., through this application. To evaluate the performance and feasibility of the proposed mechanism, the authorization Blockchain is implemented on top of the Ethereum network. The authentication mechanism is developed in the node.js server and a smart city is simulated with the help of Raspberry Pi B+. Furthermore, mocha and chai frameworks are used to assess the performance of the system. Experimental results reveal that the authentication response time is less than 100 ms even if the average hand-shaking time increases with the number of clients. Full article
(This article belongs to the Special Issue New Trends for Securing the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Smart cities main features.</p>
Full article ">Figure 2
<p>Blockchain transaction process.</p>
Full article ">Figure 3
<p>Ethereum Blockchain architecture.</p>
Full article ">Figure 4
<p>Parent–child relationship among blocks in Blockchain.</p>
Full article ">Figure 5
<p>Relationship between transactions and blocks in Blockchain.</p>
Full article ">Figure 6
<p>Block header and its contents.</p>
Full article ">Figure 7
<p>Block diagram of the proposed solution.</p>
Full article ">Figure 8
<p>Blockchain network.</p>
Full article ">Figure 9
<p>Smart contract deployed on the Blockchain.</p>
Full article ">Figure 10
<p>Raspberry Pi utilized GPIO pins.</p>
Full article ">Figure 11
<p>Sample smart contracts.</p>
Full article ">Figure 12
<p>User information.</p>
Full article ">Figure 13
<p>Average time to accomplish the DTLS handshake.</p>
Full article ">Figure 14
<p>Performance of the resource server.</p>
Full article ">Figure 15
<p>Average latency with varying transaction rate.</p>
Full article ">Figure 16
<p>Transaction average latencies with varying number of nodes.</p>
Full article ">Figure 17
<p>Transaction throughput with varying transaction rate.</p>
Full article ">Figure 18
<p>CPU usage with varying transaction rate.</p>
Full article ">Figure 19
<p>Average latency with varying transaction rate for different block sizes.</p>
Full article ">Figure 20
<p>Resource publishing.</p>
Full article ">Figure 21
<p>Client dashboard.</p>
Full article ">Figure 22
<p>Resource description.</p>
Full article ">
19 pages, 16814 KiB  
Article
A LoRaWAN Network Architecture with MQTT2MULTICAST
by Jorge Navarro-Ortiz, Natalia Chinchilla-Romero, Felix Delgado-Ferro and Juan Jose Ramos-Munoz
Electronics 2022, 11(6), 872; https://doi.org/10.3390/electronics11060872 - 10 Mar 2022
Cited by 5 | Viewed by 3620
Abstract
In this work, an architecture for IoT networks oriented towards environmental sustainability is presented. Due to the suitability of its characteristics in terms of coverage, power and support of a large number of devices, an enhanced LoRaWAN network has been chosen as the [...] Read more.
In this work, an architecture for IoT networks oriented towards environmental sustainability is presented. Due to the suitability of its characteristics in terms of coverage, power and support of a large number of devices, an enhanced LoRaWAN network has been chosen as the basis for this proposal. The architecture is completed with the virtualization of the different LoRaWAN network entities and the usage of a software-defined network for their interconnection. The publication and subscription to environmental data is carried out by using the MQTT protocol. MQTT has been optimized thanks to the use of the SDN network and the use of edge computing resources, which allows multicasting of published data. Thanks to our developed MQTT2MULTICAST protocol, latency is improved by approx. 90% and the traffic load within the SDN network is reduced by 55%. An scalability analysis shows that this solution is able to support tens of thousands of LoRaWAN gateways. The proposed architecture has been implemented using commercial equipment as a proof of concept. Full article
(This article belongs to the Special Issue 5G and Low Power Wide Area Networks for the IoT)
Show Figures

Figure 1

Figure 1
<p>LoRaWAN network architecture.</p>
Full article ">Figure 2
<p>LoRaWAN device classes.</p>
Full article ">Figure 3
<p>Proposal for an IoT network architecture for the collection, processing and use of environmental variables.</p>
Full article ">Figure 4
<p>MQTT messages between publisher and subscriber through the broker.</p>
Full article ">Figure 5
<p>MQTT2MULTICAST message exchange.</p>
Full article ">Figure 6
<p>MQTT2MULTICAST flowchart from the MQTT proxy point of view.</p>
Full article ">Figure 7
<p>Message exchange between the different entities in the proposed LoRaWAN network architecture.</p>
Full article ">Figure 8
<p>Simple tree topology for the SDN network for initial testing.</p>
Full article ">Figure 9
<p>Proof of concept implementation.</p>
Full article ">Figure 10
<p>Operation of MQTT proxies on edge switches.</p>
Full article ">Figure 11
<p>Example of visualization of environmental variables.</p>
Full article ">Figure 12
<p>Delay between sending MQTT Publish messages (publisher) and their reception (subscriber).</p>
Full article ">Figure 13
<p>Packets retransmitted within the SDN network due to one incoming packet using unicast, e.g., with typical MQTT brokers.</p>
Full article ">Figure 14
<p>Packets retransmitted within the SDN network due to one incoming packet using multicast, e.g., with our MQTT proxies.</p>
Full article ">Figure 15
<p>Example of packets retransmitted within the SDN network.</p>
Full article ">Figure 16
<p>Comparison of traffic due to multicast routing between PIM &amp; IGMP and MQTT2MULTICAST.</p>
Full article ">Figure 17
<p>Total number of paths and Time to generate all possible multicast paths.</p>
Full article ">
14 pages, 1570 KiB  
Article
Addressing Challenges of Distance Learning in the Pandemic with Edge Intelligence Enabled Multicast and Caching Solution
by Kashif Bilal, Junaid Shuja, Aiman Erbad, Waleed Alasmary, Eisa Alanazi and Abdullah Alourani
Sensors 2022, 22(3), 1092; https://doi.org/10.3390/s22031092 - 31 Jan 2022
Cited by 13 | Viewed by 3087
Abstract
The COVID-19 pandemic has affected the world socially and economically changing behaviors towards medical facilities, public gatherings, workplaces, and education. Educational institutes have been shutdown sporadically across the globe forcing teachers and students to adopt distance learning techniques. Due to the closure of [...] Read more.
The COVID-19 pandemic has affected the world socially and economically changing behaviors towards medical facilities, public gatherings, workplaces, and education. Educational institutes have been shutdown sporadically across the globe forcing teachers and students to adopt distance learning techniques. Due to the closure of educational institutes, work and learn from home methods have burdened the network resources and considerably decreased a viewer’s Quality of Experience (QoE). The situation calls for innovative techniques to handle the surging load of video traffic on cellular networks. In the scenario of distance learning, there is ample opportunity to realize multi-cast delivery instead of a conventional unicast. However, the existing 5G architecture does not support service-less multi-cast. In this article, we advance the case of Virtual Network Function (VNF) based service-less architecture for video multicast. Multicasting a video session for distance learning significantly lowers the burden on core and Radio Access Networks (RAN) as demonstrated by evaluation over a real-world dataset. We debate the role of Edge Intelligence (EI) for enabling multicast and edge caching for distance learning to complement the performance of the proposed VNF architecture. EI offers the determination of users that are part of a multicast session based on location, session, and cell information. Moreover, user preferences and network’s contextual information can differentiate between live and cached access patterns optimizing edge caching decisions. While exploring the opportunities of EI-enabled distance learning, we demonstrate a significant reduction in network operator resource utilization and an increase in user QoE for VNF based multicast transmission. Full article
(This article belongs to the Special Issue Next Generation 6G Based Sensor Networks for Smart City Application)
Show Figures

Figure 1

Figure 1
<p>eMBMS architecture.</p>
Full article ">Figure 2
<p>The concept of multi-cast, machine learning, and distance learning.</p>
Full article ">Figure 3
<p>Data fetched from CDN.</p>
Full article ">Figure 4
<p>Bandwidth consumption at backhaul link unicast vs. multicast.</p>
Full article ">Figure 5
<p>QoE score (multicast vs. unicast).</p>
Full article ">Figure 6
<p>Resource blocks used (multicast vs. unicast).</p>
Full article ">
18 pages, 4795 KiB  
Article
A Single-Rate Multicast Congestion Control (SRMCC) Mechanism in Information-Centric Networking
by Yingjie Duan, Hong Ni, Xiaoyong Zhu and Xu Wang
Future Internet 2022, 14(2), 38; https://doi.org/10.3390/fi14020038 - 25 Jan 2022
Cited by 2 | Viewed by 3086
Abstract
Information-centric networking (ICN) is expected to be a candidate for future internet architecture, and it supports features such as multicast that improves bandwidth utilization and transmission efficiency. However, multicast itself does not provide congestion control. When multiple multicast groups coexist, multicast traffic may [...] Read more.
Information-centric networking (ICN) is expected to be a candidate for future internet architecture, and it supports features such as multicast that improves bandwidth utilization and transmission efficiency. However, multicast itself does not provide congestion control. When multiple multicast groups coexist, multicast traffic may exhaust all network resources, and cause network congestion and packet loss. Additionally, traditional IP multicast congestion control mechanisms cannot be directly applied to ICN architecture. Therefore, it is necessary to consider an effective congestion control mechanism for ICN multicast. This paper proposes a single-rate multicast congestion control mechanism, called SRMCC. It supports router-assisted awareness of the network congestion state and congestion control message aggregation. Moreover, the fair shared rate estimation method is innovatively proposed to achieve protocol fairness. Most importantly, it adjusts the rate according to different congestion states indicated by the queue occupancy ratio. By introducing a rate selection factor, it can achieve a balance between packet loss rate and throughput. Experimental results show that our proposal outperforms other mechanisms in throughput, packet loss rate, total bandwidth utilization, and overhead, and achieves protocol fairness and better TCP friendliness. Full article
(This article belongs to the Section Network Virtualization and Edge/Fog Computing)
Show Figures

Figure 1

Figure 1
<p>The overview of SRMCC mechanism.</p>
Full article ">Figure 2
<p>The format of MCC messages.</p>
Full article ">Figure 3
<p>The aggregation of MCC messages.</p>
Full article ">Figure 4
<p>The simulation topology.</p>
Full article ">Figure 5
<p>Experiments on the setting of value <math display="inline"><semantics> <mi>γ</mi> </semantics></math>. (<b>a</b>) The throughput ratio of multicast traffic to TCP traffic under different rate selection factors <math display="inline"><semantics> <mi>γ</mi> </semantics></math>; (<b>b</b>) The packet loss rate of multicast traffic under different rate selection factors <math display="inline"><semantics> <mi>γ</mi> </semantics></math>.</p>
Full article ">Figure 6
<p>The basic performance of SRMCC. (<b>a</b>) The variation in throughput over time under four multicast groups; (<b>b</b>) The variation in packet loss rate under different numbers of multicast groups; (<b>c</b>) The variation in total bandwidth utilization under different numbers of multicast groups.</p>
Full article ">Figure 7
<p>The variation in throughput over time under different scenarios. (<b>a</b>) The variation in throughput over time under scenario 1; (<b>b</b>) The variation in throughput over time under scenario 2; (<b>c</b>) The variation in throughput over time under scenario 3; (<b>d</b>) The variation in throughput over time under scenario 4.</p>
Full article ">Figure 8
<p>The comparison of average throughput of multicast and TCP under different scenarios. (<b>a</b>) The comparison of average throughput of multicast and TCP under scenario 1; (<b>b</b>) The comparison of average throughput of multicast and TCP under scenario 2; (<b>c</b>) The comparison of average throughput of multicast and TCP under scenario 3; (<b>d</b>) The comparison of average throughput of multicast and TCP under scenario 4.</p>
Full article ">Figure 8 Cont.
<p>The comparison of average throughput of multicast and TCP under different scenarios. (<b>a</b>) The comparison of average throughput of multicast and TCP under scenario 1; (<b>b</b>) The comparison of average throughput of multicast and TCP under scenario 2; (<b>c</b>) The comparison of average throughput of multicast and TCP under scenario 3; (<b>d</b>) The comparison of average throughput of multicast and TCP under scenario 4.</p>
Full article ">Figure 9
<p>The variation in bandwidth utilization under different scenarios. (<b>a</b>) The bandwidth utilization of multicast traffic under different scenarios; (<b>b</b>) The total bandwidth utilization of all traffic under different scenarios.</p>
Full article ">Figure 10
<p>The variation in packet loss rate under different scenarios.</p>
Full article ">Figure 11
<p>The variation in the number of feedback packets under different scenarios.</p>
Full article ">
Back to TopTop