Study on: Multicast Routing Protocols: MOSPF and DVMRP

Authors

  • Rasan I. Ali Computer Science, Researcher, Iraq
  • Awaz A. Shaban Computer Science, Researcher, Iraq

DOI:

https://doi.org/10.48161/qaj.v3n1a140

Keywords:

MOSPF, DVMRP, Multicasting, Protocols

Abstract

Today’s networks are designed to reliably transmit traffic such as data from point to point i.e. unicasting, or from point to multipoint i.e. broadcasting. Multimedia places further demands on the network. First of all, multimedia traffic, such as audio or video, cannot tolerate delays in delivery like those tolerable by plain data transfer applications. Multimedia requires that data packets arrive on time and in the proper order at the client side. Real-time protocols and quality of service guarantees addresses this issue. Furthermore, multimedia requires transmitting large amount of traffic over the network and thus uses far more of the network’s bandwidth than in case of those basic network operations. Multicasting offers far more efficient way of transmitting such traffic over the Internet than unicasting or broadcasting ever would. The subject of this paper addresses the issue of efficient routing of such multicast traffic.

Downloads

Download data is not yet available.

References

. RFC 1075 “Distance Vector Multicast Routing Protocol”, D. Waitzman, C. Partridge, and S. Deering, November 1988.

. Asaad, R. R. (2021). A Study on Instruction Formats on Computer Organization and Architecture. ICONTECH INTERNATIONAL JOURNAL, 5(2), 18-24. https://doi.org/10.46291/ICONTECHvol5iss2pp18-24

. RFC 1112 “Host Extensions for IP Multicasting”, Steve Deering, August 1989.

. Asaad, R. R., Ashqi Saeed, V., & Masud Abdulhakim, R. (2021). Smart Agent and it’s effect on Artificial Intelligence: A Review Study. ICONTECH INTERNATIONAL JOURNAL, 5(4), 1-9. https://doi.org/10.46291/ICONTECHvol5iss4pp1-9

. Yahya Hussien , A., Rajab Asaad, R., & Younis Masiha, R. (2022). Review on Social Media and Digital Security. Qubahan Academic Journal, 2(2), 1–4. https://doi.org/10.48161/qaj.v2n2a119

. RFC 1584 “Multicast Extensions to OSPF”, John Moy, March 1994.

. Asaad, R. R. (2020). Implementation of a Virus with Treatment and Protection Methods. ICONTECH INTERNATIONAL JOURNAL, 4(2), 28-34. https://doi.org/10.46291/ICONTECHvol4iss2pp28-34

. “Core Based Trees (CBT) Multicast Routing Architecture”, , A. J. Ballardie, June 20, 1995.

. Asaad, R. R., Abdulrahman, S. M., & Hani, A. A. (2017). Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation. Academic Journal of Nawroz University, 6(3), 1–10. https://doi.org/10.25007/ajnu.v6n3a70

. “Hierarchical Distance Vector Multicast Routing for the MBONE”, Ajit Thyagarajan and Steve Deering, July 1995.

. Abdulfattah, G. M., Ahmad, M. N., & Asaad, R. R. (2018). A reliable binarization method for offline signature system based on unique signer’s profile. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 14(2), 573-586.

. “Protocol-Independent Multicast (PIM), Dense-Mode Protocol Specification”, , D. Estrin, D. Farinacci, V. Jacobson, C. Liu, L. Wei, P. Sharma, and A. Helmy, January 17, 1996.

. Asaad, R. R., Abdurahman, S. M., & Hani, A. A. (2017). Partial Image Encryption using RC4 Stream Cipher Approach and Embedded in an Image. Academic Journal of Nawroz University, 6(3), 40–45. https://doi.org/10.25007/ajnu.v6n3a76

. “Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification”, , S. Deering, D. Estrin, D. Farinacci, V. Jacobson, C. Liu, L. Wei, P. Sharma, and A Helmy, September 7, 1995.

. Asaad, R. R., Ahmad, H. B., & Ali, R. I. (2020). A Review: Big Data Technologies with Hadoop Distributed Filesystem and Implementing M/R. Academic Journal of Nawroz University, 9(1), 25–33. https://doi.org/10.25007/ajnu.v9n1a530.

. “Introduction to IP Multicast Routing”, An IP Multicast Initiative White Paper, http://www.ipmulticast.com/ community/whitepapers/introrouting.html

. Rajab Asaad, R., & Masoud Abdulhakim, R. (2021). The Concept of Data Mining and Knowledge Extraction Techniques. Qubahan Academic Journal, 1(2), 17–20. https://doi.org/10.48161/qaj.v1n2a43

. Asaad, R. R., & Segerey, R. I. (2018). School Management Application Using iOS. Academic Journal of Nawroz University, 7(4), 38–44. https://doi.org/10.25007/ajnu.v7n4a269.

. “How IP Multicast Works”, An IP Multicast Initiative White Paper, http://www.ipmulticast.com/community/ whitepapers/howipmcworks.html

. Asaad, R. R. (2021). Penetration Testing: Wireless Network Attacks Method on Kali Linux OS. Academic Journal of Nawroz University, 10(1), 7–12. https://doi.org/10.25007/ajnu.v10n1a998

. Zhiyong Zhang, Brij B. Gupta, Social media security and trustworthiness: Overview and new direction, Future Generation Computer Systems, Volume 86, 2018, Pages 914-925, ISSN 0167-739X, https://doi.org/10.1016/j.future.2016.10.007.

. Simerly, T. W., Tang, T. S. H., Dutt, A. M., Pledger, P. K., Breton, K. D., & Kay, A. (2011). U.S. Patent No. 7,952,609. Washington, DC: U.S. Patent and Trademark Office.

. Redmiles, E. M., Malone, A. R., & Mazurek, M. L. (2016, May). I think they're trying to tell me something: Advice sources and selection for digital security. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 272-288). IEEE.

. Gritzalis, D., Kandias, M., Stavrou, V., & Mitrou, L. (2014). History of information: the case of privacy and security in social media. In Proc. of the History of Information Conference (pp. 283-310).

. Kim, H. J. (2012). Online social media networking and assessing its security risks. International journal of security and its applications, 6(3), 11-18.

. Li, H., Wouhaybi, R. H., & Kohlenberg, T. (2015). "Security challenge assisted password proxy." U.S. Patent No. 9,223,950. Washington, DC: U.S. Patent and Trademark Office.

. Kals, S., Kirda, E., Kruegel, C., & Jovanovic, N. (2006, May). Secubat: a web vulnerability scanner. In Proceedings of the 15th international conference on World Wide Web (pp. 247-256).

. Oder, I.J.D., Oder, J.D., Cronic, K.J., Sommers, S.M. and Warner, D.W., Shift4 Corp, 2011. Secure payment card transactions. U.S. Patent 7,891,563.

. Data Reportal, (2020) Digital 2020: Global Digital Overview, https://datareportal.com/

. Asaad, Renas Rajab. (2014). An Investigation of the Neuronal Dynamics Under Noisy Rate Functions. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.

. Asaad, R. R., Abdurahman, S. M., & Hani, A. A. (2017). Partial Image Encryption using RC4 Stream Cipher Approach and Embedded in an Image. Academic Journal of Nawroz University, 6(3), 40–45. https://doi.org/10.25007/ajnu.v6n3a76

. Rajab Asaad, R., & Masoud Abdulhakim, R. (2021). The Concept of Data Mining and Knowledge Extraction Techniques. Qubahan Academic Journal, 1(2), 17–20. https://doi.org/10.48161/qaj.v1n2a43

. Asaad, R. R., Ahmad, H. B., & Ali, R. I. (2020). A Review: Big Data Technologies with Hadoop Distributed Filesystem and Implementing M/R. Academic Journal of Nawroz University, 9(1), 25–33. https://doi.org/10.25007/ajnu.v9n1a530

. Asaad, R. R. (2019). Güler and Linaro et al Model in an Investigation of the Neuronal Dynamics using noise Comparative Study. Academic Journal of Nawroz University, 8(3), 10–16. https://doi.org/10.25007/ajnu.v8n3a360

. Asaad, R. R. (2021). Penetration Testing: Wireless Network Attacks Method on Kali Linux OS. Academic Journal of Nawroz University, 10(1), 7–12. https://doi.org/10.25007/ajnu.v10n1a998

. Almufti, S., Marqas, R., & Asaad, R. (2019). Comparative study between elephant herding optimization (EHO) and U-turning ant colony optimization (U-TACO) in solving symmetric traveling salesman problem (STSP). Journal Of Advanced Computer Science & Technology, 8(2), 32.

. Asaad, R. R., & Abdulnabi, N. L. (2018). Using Local Searches Algorithms with Ant Colony Optimization for the Solution of TSP Problems. Academic Journal of Nawroz University, 7(3), 1-6. https://doi.org/10.25007/ajnu.v7n3a193

. Almufti, S., Asaad, R., & Salim, B. (2018). Review on elephant herding optimization algorithm performance in solving optimization problems. International Journal of Engineering & Technology, 7, 6109-6114.

. Asaad, R. R., & Ali, R. I. (2019). Back Propagation Neural Network(BPNN) and Sigmoid Activation Function in Multi-Layer Networks. Academic Journal of Nawroz University, 8(4), 216–221. https://doi.org/10.25007/ajnu.v8n4a464

. Rajab Asaad, R. (2021). Review on Deep Learning and Neural Network Implementation for Emotions Recognition . Qubahan Academic Journal, 1(1), 1–4. https://doi.org/10.48161/qaj.v1n1a25

. Asaad, R. R., Abdulrahman, S. M., & Hani, A. A. (2017). Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation. Academic Journal of Nawroz University, 6(3), 1–10. https://doi.org/10.25007/ajnu.v6n3a70

. Abdulfattah, G. M., Ahmad, M. N., & Asaad, R. R. (2018). A reliable binarization method for offline signature system based on unique signer’s profile. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 14(2), 573-586.

. Almufti, S. M., Ahmad, H. B., Marqas, R. B., & Asaad, R. R. (2021). Grey wolf optimizer: Overview, modifications and applications. International Research Journal of Science, Technology, Education,and Management, 1(1),1-1.

. Asaad, R. R., Sulaiman, Z. A., & Abdulmajeed, S. S. (2019). Proposed System for Education Augmented Reality Self English Learning. Academic Journal of Nawroz University, 8(3), 27–32. https://doi.org/10.25007/ajnu.v8n3a366

. Asaad, R. R. (2020). Implementation of a Virus with Treatment and Protection Methods. ICONTECH INTERNATIONAL JOURNAL, 4(2), 28-34. https://doi.org/10.46291/ICONTECHvol4iss2pp28-34

. Boya Marqas, R., M. Almufti, S., & Rajab Asaad, R. (2022). FIREBASE EFFICIENCY IN CSV DATA EXCHANGE THROUGH PHP-BASED WEBSITES. Academic Journal of Nawroz University, 11(3), 410–414. https://doi.org/10.25007/ajnu.v11n3a1480

. Ihsan, R. R., Almufti, S. M., Ormani, B. M., Asaad, R. R., & Marqas, R. B. (2021). A survey on Cat Swarm Optimization algorithm. Asian J. Res. Comput. Sci, 10, 22-32.

. Rajab Asaad, R., & Luqman Abdulnabi, N. (2022). A Review on Big Data Analytics between Security and Privacy Issue. Academic Journal of Nawroz University, 11(3), 178–184. https://doi.org/10.25007/ajnu.v11n3a1446

. Yahya Hussien , A., & Rajab Asaad, R. (2022). Review on Social Media and Digital Security. Qubahan Academic Journal, 2(2), 1–4. https://doi.org/10.48161/qaj.v2n2a119

. Asaad, R. R. (2022). Keras Deep Learning for Pupil Detection Method . Academic Journal of Nawroz University, 10(4), 240–250. https://doi.org/10.25007/ajnu.v10n4a1328

. Asaad, R. R., & Segerey, R. I. (2018). School Management Application Using iOS. Academic Journal of Nawroz University, 7(4), 38–44. https://doi.org/10.25007/ajnu.v7n4a269

. Asaad, R. R., Mustafa, R. F., & Hussien, S. I. (2020). Mortality Statistics and Cause of Death at Duhok City from The Period (2014-2019) Using R Language Data Analytics. Academic Journal of Nawroz University, 9(3), 1–7. https://doi.org/10.25007/ajnu.v9n3a699

. Asaad, R. R. (2021). A Study on Instruction Formats on Computer Organization and Architecture. ICONTECH INTERNATIONAL JOURNAL, 5(2), 18-24. https://doi.org/10.46291/ICONTECHvol5iss2pp18-24

. Asaad, R. R. (2021). Virtual reality and augmented reality technologies: A closer look. Virtual reality, 1(2).

. Asaad, R. R. A Review: Emotion Detection and Recognition with Implementation on Deep Learning/Neural Network.

. Asaad, R. R., Saeed, V. A., & Abdulhakim, R. M. (2021). Smart Agent and it’s effect on Artificial Intelligence: A Review Study. ICONTECH INTERNATIONAL JOURNAL, 5(4), 1-9.

. Asaad, R. R. A Asaad, R. R. A Review: Emotion Detection and Recognition with Implementation on Deep Learning/Neural Network.

. Ferinia, R., Kumar, D.L.S., Kumar, B.S. et al. Factors determining customers desire to analyse supply chain management in intelligent IoT. J Comb Optim 45, 72 (2023). https://doi.org/10.1007/s10878-023-01007-8

. Poornima, E., Muthu, B., Agrawal, R. et al. Fog robotics-based intelligence transportation system using line-of-sight intelligent transportation. Multimed Tools Appl (2023). https://doi.org/10.1007/s11042-023-15086-6

Published

2023-04-11

How to Cite

I. Ali, R., & A. Shaban , A. . (2023). Study on: Multicast Routing Protocols: MOSPF and DVMRP. Qubahan Academic Journal, 3(1), 13–20. https://doi.org/10.48161/qaj.v3n1a140

Issue

Section

Articles