2015
DOI: 10.1016/j.jnca.2014.06.006
|View full text |Cite
|
Sign up to set email alerts
|

A reliable multicast transport protocol for information-centric networks

Abstract: Abstract-In the past few years, many researchers have argued that the Internet should transition from its traditional endpointcentric architecture to an information-centric paradigm. One of the advantages of the information-centric model is that the network can easily aggregate requests for the same content and serve them via multicast. Indeed, most information-centric architectures proposed to date offer native support for multicast, promising a vast improvement in the efficiency of content distribution. Howe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…When traditional multicast scheme (TMS) being used, the transmit power of the SDAP is set to P SDAP = 1 W. To reduce the network overhead for acquiring the channel state information of the SDAP, we employ fountain codes [10] in the system. Therefore, the SDAP can generate a continuous flow of source bits from the intended message so that any collection of 0.1 Mb from the data flow can guarantee reliable recovery of the original message regardless of which portions of the bit flow were received.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…When traditional multicast scheme (TMS) being used, the transmit power of the SDAP is set to P SDAP = 1 W. To reduce the network overhead for acquiring the channel state information of the SDAP, we employ fountain codes [10] in the system. Therefore, the SDAP can generate a continuous flow of source bits from the intended message so that any collection of 0.1 Mb from the data flow can guarantee reliable recovery of the original message regardless of which portions of the bit flow were received.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…So, inspired by the ideas proposed in ref. [4], we utilize wireless multicast technology [10] to implement the energy efficiency downlink transmissions.…”
Section: Wireless Multicast Based Downlink Transmissionsmentioning
confidence: 99%
See 1 more Smart Citation
“…18 The sink can stop the recovery process whenever it wants, for example, when enough packets are received to reconstruct the content, by sending a MSG_CTRL_DONE message. First, the sensor transmits all the original data packets, and the sink returns NAKs for any missing ones.…”
Section: Error Recoverymentioning
confidence: 99%
“…If NAKs are received for the retransmissions, we retransmit again the NAKed packets, repeating this procedure until all packets are received, as in RMTPSI. 18 The sink can stop the recovery process whenever it wants, for example, when enough packets are received to reconstruct the content, by sending a MSG_CTRL_DONE message. The goal of this policy is to provide an overview of all the data quickly, and then let the application decide how many missing packets it wants to recover.…”
Section: Error Recoverymentioning
confidence: 99%