2004
DOI: 10.1007/978-3-540-24693-0_67
|View full text |Cite
|
Sign up to set email alerts
|

Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment

Abstract: Abstract.While network-level multicast has tremendous potential for increasing the efficiency of group-oriented applications, the adoption of network-level multicast has been tepid at best. In this paper, we propose a novel concept entitled stealth multicast that allows for practical adoption of network-level multicast on a domain-wise basis rather than global scale. In the stealth multicast model, similar unicast packets are dynamically assembled into virtual groups for multicast transmission across the domai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Striegel proposed a stealth multicast feature in [4]. Routers equipped with this function encapsulate multiple unicast packets with the same data payload into a multicast or ALM packet.…”
Section: Multicast-like Transmission Mechanismsmentioning
confidence: 99%
“…Striegel proposed a stealth multicast feature in [4]. Routers equipped with this function encapsulate multiple unicast packets with the same data payload into a multicast or ALM packet.…”
Section: Multicast-like Transmission Mechanismsmentioning
confidence: 99%
“…A short paper presenting the theoretical ideas for stealth multicast was presented in [19]. However this paper moves beyond our initial concept of stealth multicast in several key ways.…”
Section: Related Workmentioning
confidence: 99%
“…However this paper moves beyond our initial concept of stealth multicast in several key ways. First, the paper in [19] used DSMCast with tree encapsulation as the method for multicast transport. This caused significant overhead to the data packet to be introduced, thus limiting the benefit of stealth multicast.…”
Section: Related Workmentioning
confidence: 99%
“…SMC is a method of converting redundant unicast Internet traffic into efficient multicast packets. This is enabled by the use of a module called a Virtual Group Detection Manager (VGDM) [3]. A VGDM performs similarity analysis on packet payloads and, based on predefined heuristics, caches the packet or forwards it on to its destination.…”
Section: Stealth Multicastmentioning
confidence: 99%
“…In cases such as Asymmetric DSL, the upstream bandwidth is even more constrained than the downstream. Bandwidth conservation techniques such as Application Layer Multicast (ALM) and Stealth Multicast (SMC) [3] are able to reduce these bandwidth demands, but are not compatible with security protocols such as those used in SSL or IPSec. This leaves hosts to choose between security and bandwidth while the situation demands that both exist together.…”
Section: Introductionmentioning
confidence: 99%