Weakly secure multicast transmission topology construction method based on network coding for integer transmission rate

A technology of transmission rate and network coding, applied in the field of secure multicast data transmission

Active Publication Date: 2021-02-02
SUZHOU UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a network coding-based weakly secure multicast transmission topology construction method for integer transmission rates, so as to solve the problem that no one has proposed an integer transmission rate-oriented optimization method for multicast transmission under weak security conditions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weakly secure multicast transmission topology construction method based on network coding for integer transmission rate
  • Weakly secure multicast transmission topology construction method based on network coding for integer transmission rate
  • Weakly secure multicast transmission topology construction method based on network coding for integer transmission rate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] Example: see figure 1 Shown is a flow chart of a network coding-based weakly secure multicast transmission topology construction method for integer transmission rates.

[0034] Specific methods include:

[0035] A: Obtain the parameters of the network where the weak security multicast based on network coding of the integer transmission rate is located.

[0036] The specific parameters of the network where the weak security multicast based on network coding with the integer transmission rate is located are:

[0037] A1: Expresses the set of node parameters in the network where the multicast is located (including the source node of the multicast, all destination nodes, other nodes, namely intermediate nodes);

[0038] A2: Express the parameters of the link in the network where the multicast is located: whether there is a communication link; the capacity of the communication link between nodes, that is, the highest transmission rate;

[0039] A3: Parameters related to c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a weakly secure multicast transmission topology construction method based on network coding for integer transmission rates, which obtains the parameters of the network where it is located; expresses the network where it is located as a directed graph, and the directed graph is composed of nodes and edges, and the nodes include Source node, intermediate node and destination node, if there is a communication link between the two nodes, connect an edge with this direction between the two nodes; the capacity of each directed edge is equal to the capacity of the corresponding communication link Capacity, the cost is equal to the cost of the corresponding communication link; according to the directed graph to establish the mathematical model of the transmission topology based on the network coding weak security multicast of the integer transmission rate; use the integer linear programming solution method to solve the problem, and obtain the integer transmission rate Transmission topology construction scheme for weakly secure multicast based on network coding. The present invention realizes the weak security multicast based on network coding with an integer transmission rate. Under the condition of meeting the weak security requirements, the construction of the transmission topology maximizes the security transmission throughput in the network, and at the same time ensures the minimum throughput when the maximum throughput is reached. The transmission cost realizes network efficiency and cost optimization.

Description

technical field [0001] The invention relates to the field of secure multicast data transmission, in particular to a network coding-based weakly secure multicast transmission topology construction method for integer transmission rates. Background technique [0002] In the past fifteen years, Network Coding has brought important breakthroughs and developments to the field of network communication. The concept of network coding was first proposed by R.A, N.C, et al. two thousand years ago. Network coding involves related fields such as graph theory, information theory, and coding theory. [0003] Network coding is to encode different information (flows) on internal nodes in the communication network, and then forward them to downstream nodes. According to the maximum flow-minimum cut theorem, the maximum transmission rate between the data sender and the receiver cannot exceed the minimum cut value between the two parties, and the traditional multicast routing method generally...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/751H04L12/761H04L29/06H04L45/02H04L45/16
CPCH04L45/02H04L45/16H04L63/164H04L65/611
Inventor 王进赵瑞敏李领治张书奎朱艳琴
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products