IJCNIS Vol. 3, No. 1, 8 Feb. 2011
Cover page and Table of Contents: PDF (size: 349KB)
Full Text (PDF, 349KB), PP.40-46
Views: 0 Downloads: 0
WMPLS, multicast, label switching, Mobile Ad hoc network
Merging MPLS into multicast routing protocol in Mobile Ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast Routing Protocol (LSMRP) is presented in this paper.
Li Mengyang, Duan Yunna, Zhang Chunfei, "A WMPLS Based Multicast Mechanism in Mobile Ad hoc Network", International Journal of Computer Network and Information Security(IJCNIS), vol.3, no.1, pp.40-46, 2011. DOI:10.5815/ijcnis.2011.01.06
[1]Garbinato B, Rupp. P. From ad hoc networks to ad hoc applications. Telecommunications,2003. ConTEL, 2003. Proceedings of the 7th International Conference on, Vol. 1, June 11~13, 2003 pp. 145~149
[2]Sang Ho Bae, ,Sung Ju Lee,William Su ,and Mario Gerla. The design,implementation,and performance evaluation of the on-demand multicast routing protocol in multi-hop wireless networks. IEEE Network January/February 2000,pp. 70–77.
[3]Ranveer Chandra,Paramvir Bahl,and Pradeep Bahl,“Multinet: Connecting to multipleIEEE 802.11 networks using a single wireless card,” in IEEE Infocom,Hong Kong,March 2004.
[4]A. El-Gamal,J. Mammen,B. Prabhakar,and D. Shah. Throughput-delay trade-offs in wireless networks. In Proc. of IEEE Infocom, March 2004.
[5]S. Xu and T. Saadawi. “Does the IEEE 802.11 MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks?” ,IEEE Communications Magazine. 39(6) ,June 2001,pp. 130-137.
[6]Paramvir Bahl,Ranveer Chandra,and John Dunagan, “Ssch: Slotted seeded channel hopping for capacity improvement in ieee 802.11 ad-hoc wireless networks,” in ACM Mobicom,2004.
[7]N.Gupta and S.R.Das. A capacity and utilization study of mobile ad hoc networks. In proceedings of the 26th Annual Conference on Local Computer Networks, pages 576-583, November 2001.
[8]C.-Y. Koo, “Broadcast in radio networks tolerating byzantine adversarial behavior,” in Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing. ACM Press, 2004, pp. 275-282.
[9]V. Bhandari and N. H. Vaidya, “On reliable broadcast in a radio network,” Technical Report, CSL, UIUC, May 2005.
[10]A. Pelc and D. Peleg, “Broadcasting with locally bounded byzantine faults,” Information Processing Letters, vol. 93, no. 3, pp. 109–115, Feb 2005.
[11]V. Bhandari and N. H. Vaidya, “On reliable broadcast in a radio network,” in Proceedings of the 24th annual ACM symposium on Principles of distributed computing , 2005.
[12]E. M. Belding-Royer and C. E. Perkins. Evolution and Future Directions of the Ad hoc On-Demand Distance Vector Routing Protocol. Ad hoc Networks Journal, 1(1), July 2003.
[13]S. Knappe, L. Liew, V. Shah, P. Schwindt, J. Moreland, L. Hollberg, and J. Kitching, “A microfabricated atomic clock,” Appl. Phys. Lett., vol. 85, 2004.
[14]S. Nesargi and R. Prakash. MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network. In Proceedings of IEEE Infocom 2002, New York, USA, June 2002.
[15]K. Weniger. Passive Duplicate Address Detection in Mobile Ad Hoc Networks. In WCNC, Florence, Italy, February 2003.