multicast造句1. The company said the multicasting also will include high-speed transmission of data to business and home computers.
2. Refer to Multicast Addresses for multicast group address assignment.
3. The hierarchy implicitly defines the multicast overlay data paths.
4. Invalid value used for Multicast timeout. Default value used.
5. groupName: The multicast group number.
6. While multicasting within the cluster JXTA dynamically determines the best method to send a message to the cluster members, and it does so through the use of IP multicast, and virtual multicast.
7. If you stick a packet sniffer on the network, you will notice that each traffic manager has started to announce its health using IGMP/Multicast heartbeat messages.
8. This paper discusses the multimedia multicast application problem with allowable delay and high packet loss rate.
9. The invention provides a multicast path management method in a connectionless communication.
10. This paper introduces a method for high speed multicast routing lookup.
11. A multicast protocol utilizing on - demand routing strategy for mobile packet radio network is proposed.
12. Concatenates the invocation lists of the specified multicast (combinable) delegates.
13. Other IP Multicast protocols rely on certain routing protocols, such as Routing Information Protocol or Open Shortest Path First.
14. The radio system makes very efficient use of router resources in the system by creating Multicast IP groups only for the duration of a group call.
15. Based on the above work, our research on overlay multicast is performed in the following aspects, which include centralized routing algorithms, distributed routing protocols and system prototype.
16. The client sends an IGMP join message to its designated multicast router.
17. Multicast trial and the UK ISPs in general as multicasting has been proven time and agin to save vast amounts of IP bandwidth.
18. Clustering technologies often make use of a fast communication protocol, such as User Datagram Protocol (UDP) or Multicast protocols.
19. Multicast technology includes a number of aspects, such as multicast group, multicast address, multicast protocols, multicast reliability, multicast security, etc.
20. LKH (logical key hierarchy) is a basic method in secure multicast group rekeying.
21. But point-to-point transmission cant adapt the need of this operation(one point sends, multipoint receives), and it is easy to transmit audio and video of video-conferencing through IP multicast.
22. A novel appro a ch using ant algorithm is proposed to optimize the multicast routes and this app roach is fully distributed.
23. RMM will also work over InfiniBand and shared memory, and can operate in either multicast (one-to-many) or unicast (one-to-one) mode.
24. The algorithm construct a packet coding sub-network for any unicast or multicast session for the max-flow constraint.
25. User processes includes link scan task, layer 3 unicast task , layer 3 multicast task, management interface and network protocols.
26. A distributed late join algorithm with fault-tolerance based on three multicast group is proposed, which can effectively solve the problem of client's late join in collaborative CAD system.
27. We propose a one-time signature scheme with very efficient signing and verifying, and short signatures. Our scheme is well-suited for multicast source authentication.
28. However, if any host in the network wishes to send a message to this multicast group and is not interested in receiving a response, then using ACE_SOCK_Dgram for sending purposes is also sufficient.
29. Group rekeying is essential for large dynamic group security, especially for Internet multicast security, and batch rekeying is a focus among the high performance group security mechanism.
30. The logical key hierarchy (LKH) scheme is the most efficient protocol for key management in the field of multicast at present.