Summary: | 博士 === 國立清華大學 === 資訊工程學系 === 98 === In recent years, many multicast applications, such as audio, videoconferencing, one-to-many file transfer and Pay-TV, are emerging and provide us convenient daily life. Comparing with unicast, multicast can simultaneously transfer data to multiple receivers using fewer bandwidth. However, reliable multicast transmission should be guaranteed so that the data can be correctly and reliably transferred to multiple receivers. The factors of unreliability include, buffer overflow in the routers, user heterogeneity, user mobility, and other potential equipment malfunction, and etc. Although retransmission strategy by using ack-based protocols can be utilized to reach the goal of reliability in unicast communication, it does not scale well in multicast applications, where heterogeneous receivers may have different lost data blocks.
To meet the requirement of reliability for multicast applications, a new class of Forward Error Correction (FEC), called Erasure codes, has been extensively studied and applied to multicast transmission. Erasure code allows
the receiver to correct erasure without retransmission and is especially useful for those circumstances, where retransmission is impossible, such as multicast networks, wireless networks, and satellite communication, and etc. Recently, erasure code has been extensively applied to multicast net work transmission due to its higher transmission efficiency. However, many open issues are still needed to be addressed. Using conventional erasure code, the receivers are unable to verify the correctness of the receiving data packets on-the-fly, unless all data packets have been received and decoded by the receiver. In this thesis, we proposed a new erasure code to provide reliable multicast data distribution. The proposed codes
satisfy all requirements of erasure codes, and are inspired by secret sharing technology and Elliptic Curve Discrete Logarithm Problem (ECDLP). More importantly, the receivers can verify its receiving data on-the-fly by using the codes. The analysis also shows the security and feasibility of the proposed scheme.
|