2016
DOI: 10.1109/lcomm.2016.2566642
|View full text |Cite
|
Sign up to set email alerts
|

RAMCAST: Reliable and Adaptive Multicast over IEEE 802.11n WLANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…This is because we limited the number of the channel by an attenuation factor &. The figure also shows that as the number of channels increases, the average PSNR obtained FIGURE 6 Average PSNR of all multicast users for BPSO, ESA and Greedy…”
Section: Evaluation Of the Proposed Bpso Algorithmmentioning
confidence: 94%
See 1 more Smart Citation
“…This is because we limited the number of the channel by an attenuation factor &. The figure also shows that as the number of channels increases, the average PSNR obtained FIGURE 6 Average PSNR of all multicast users for BPSO, ESA and Greedy…”
Section: Evaluation Of the Proposed Bpso Algorithmmentioning
confidence: 94%
“…Wireless video multicasting is also a hot topic currently and many schemes have been proposed for it, for example, Ad-Hoc based video multicast scheme [4], 4G based video multicast scheme [5], Wi-Fi-based video multicast scheme [6][7][8]. However, TVWS based video multicast is rarely mentioned.…”
Section: Related Workmentioning
confidence: 99%
“…Those unary signals are used as NACK messages and for a receiver-side rate selection mechanism. In contrast, RAMCAST [11] and FlexVi [12] use such unary signals as a collision resistant NACK mechanism, where the dedicated OFDM subcarriers are used for a bitmap representing individual packets of a block.…”
Section: A Mac Layer Multicast Reliabilitymentioning
confidence: 99%
“…Proof:. We claim, without loss of generality for the proof [15], that Λ C ={u 1 , u 2 ,…,u n }\{u i , u j }, where u j is the attacked user. The set of non-corrupted nodes must contain two or more elements because if there is only one, u j , then it is very easy to compute = Since that function accomplishes all the Chinese Remainder Theorem's requirements, then Encryptj is an injective function and also bijective in Rang(Encryptj).…”
Section: Securitymentioning
confidence: 99%
“…Hence, sending a smaller number of frames (a single frame for a number of users instead of a number of unicast Protocol Data Unit, that sends a number of MPDUs together, and A-MSDU (Aggregated Media Access Control Service Data Unit), that makes the same at MSDU level [3]. The use of these aggregation mechanisms for sending multicast frames has been proposed in the literature [15,16].…”
Section: Channel Utilization Efficiencymentioning
confidence: 99%