Multi-Connectivity for Multicast Video Streaming in Cellular Networks
The escalating demand for high-quality video streaming poses a major challenge for communication networks today. Catering to these bandwidth-hungry video streaming services places a huge burden on the limited spectral resources of communication networks,
Sadaf ul Zuhra +3 more
doaj +1 more source
Protection remontante des communications multicast
La protection des communications multicast devient de plus en plus importante avec l'avènement et la multiplication des applications multicast temps réel telles que la vidéo à la demande, la vidéo conférence, le jeu en réseau, etc. Ces applications sont sensibles aux ruptures des communications et ont besoin de tourner sur des réseaux robustes et ...
Saidi, Mohand Yazid +2 more
openaire +1 more source
Multicast time-expanded graph-based collective communication scheduling scheme
Collective communication latency has become a major performance bottleneck in large-scale distributed training.. To address the limitations of existing methods in terms of insufficient topology awareness and high computational complexity, a topology ...
Liu Fei +4 more
doaj
A Novel Real Time Framework for Cluster Based Multicast Communication in Vehicular Ad Hoc Networks
In a vehicular ad hoc network (VANET), the vehicles communicate with each other to develop an intelligent transport system (ITS) which provides safety and convenience while driving.
Waqar Farooq +2 more
doaj +1 more source
Secure multicast communications
The basic aim of this thesis is to survey the concept of multicasting and security issues surrounding multicast. It provides insights into the issues related to IP multicast security and to the possible directions of future developments. Three main areas were identified and discussed, namely multicast key management, multicast data authentication, and
openaire +1 more source
MSA-SDMN: multicast source authentication scheme for multi-domain software defined mobile networks
Multicast services provide an efficient way of conserving resources and reducing network traffic for multicast senders. However, ensuring security, particularly source authentication, is crucial for applications such as online news, IPTV, video streaming,
Hamdi Eltaief +2 more
doaj +1 more source
Multicast communication protocol based on quantum key distribution against trojan horse attacking
A multicast communication protocol over quantum channel against Trojan horse attacking was proposed, in the network with one source quantum node and M target quantum nodes.
Hong-yang MA, Xing-kui FAN
doaj +2 more sources
A Scalable Video Multicast Scheme Based on User Demand Perception and D2D Communication. [PDF]
Ouyang R +5 more
europepmc +1 more source
DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output. [PDF]
Pramitarini Y +3 more
europepmc +1 more source

