ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 4)

Publication Date:

Authors : ;

Page : 65-71

Keywords : Multicast Network; Bandwidth; Transmission; Multicast Protocols.;

Source : Downloadexternal Find it from : Google Scholarexternal


In the current network architecture Network coding algorithms usually encourages the flow of transmission in the network medium. The difficulty of multicast connections over implicit packet networks cause exceed amount of cost and introduces a new procedure for evaluating the presentation of wireless network by exploring the complexity of high throughput via lower bandwidth. Multicast routing for wired as well as wireless networks has focused on metrics that estimates the quality of data to maximize the throughput efficiency, and the nodes must collaborate in order to compute the path metric and forward data. Network Coding helps boost up the throughput efficiency and reduce the cost of data transmission, especially for one-to-many multicast applications. An interesting problem is to understand and count the coding advantage and cost advantage that is the potential benefits of network coding, as compared to routing, in terms of increasing throughput and reducing transmission cost, respectively. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. It also explores the use of network in wireless multicast and investigates its effectiveness and efficiency of cost. In this system we identify novel attacks against high-efficiency data transfer multicast protocols in wireless networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. The proposed system shows that these attacks are very effective against multicast protocols based on high-throughput and it is so difficult to stop packets while transferring to destinations. While it maximizes throughput and efficiency, it also increases attack effectiveness in the absence of defense mechanisms. This approach to defend against the identified attacks combines measurement-based detection and accusation-based reaction techniques. The entire architecture proves that the upper- and lower-bounds on multicast coding advantage and cost advantage in these models.

Last modified: 2015-04-21 22:57:27