Supported by the National Science and Technology Major Projects(2011ZX03005-004-03);Jiangsu University Natural Science Basic Research Project(10KJA510037);Nanjing University of Posts and Telecommunications (NJUPT)Introduction of Talent Project(NY209002);NJUPT Broadband Wireless Communication and Sensor Network Technology Key Laboratory of the Ministry of Education Research Fund Project(NYKL201108);Jiangsu Provincial Science and Technology Support Program of Industrial Projects(No.BE2013019);Jiangsu Construction Engineering College Dominant Disciplines Funded Projects(Information and Communication Engineering)
In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit power.To avoid it,this paper put ...
A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that...
Supported by the National 863 Projects of China(2009AA01Z205);the Fund of National Laboratory(P080010);the Natural Science Foundation of China(60872010,60972016);the Program for New Century Excellent Talents in University (NCET070339);the Funds for Distinguished Young Scientists of Hubei,China(2009 CDA150)
Network coding is able to address output conflicts when fanout splitting is allowed for multicast switching.Hence,it successfully achieves a larger rate region than non-coding approaches in crossbar switches.However,n...
Supported by the National High Technology Research and Development Program of China(863 Program,No.2009-AAZ249);the Major Special Project of China(2010ZX03003-003-01)
In wireless multicast, some users may fail to receive data as a result of bad channel con-ditions. The throughput of traditional multicast strategy is constrained by the node with the worst channel condition. In this ...
Supported by the National High-Tech Research and De-velopment Plan of China (No. 2007AA01Z2a1);the Na-tional Grand Fundamental Research 973 Program of China (No. 2007CB307102)
PIM-SM(Protocol Independent Multicast-Sparse Mode) is a main multicast routing pro-tocol in the IPv6(Internet Protocol version 6).It can use either a shared tree or a shortest path tree to deliver data packets,consequ...
the National Natural Science Foundation of China (No.60502004)
In this paper,the sharing schemes of multicast in survivable Wavelength-Division Multi-plexed(WDM) networks are studied and the concept of Shared Risk Link Group(SRLG) is considered.While the network resources are sha...
Supported by the National 863 High-tech Program of China (No.2003AA121560) and High-tech Project of Jiangsu Province (No.BG2003001).
This paper investigates the maximal achievable multi-rate throughput problem of a multicast ses-sion at the presence of network coding. Deviating from previous works which focus on single-rate network coding, our work...
To provide scalable and simple Quality of Service(QoS) mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studicd and a so-called subsequ...
A multicast replication algorithm is proposed for shared memory switches. It uses a dedicated FIFO to multicast by replicating cells at receiver and the FIFO is operating with shared memory in parallel. Speedup is use...
Supported by the National Natural Science Foundation of China(No.90204003)and National"863"Project(2001AAl21052)
MPLS(Multi-Protocol Label Switching) VPN(Virtual Private Network) traffic has been deployed widely, but currently only supports unicast. This paper briefly introduces several available MPLS VPN multicast approaches, a...