SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD27976 | Volume – 3 | Issue – 5 | July - August 2019 Page 2533
Classroom Shared Whiteboard System using Multicast Protocol
Wit Yee Swe, Khaing Thazin Min, Khin Chan Myae Zin, Yi Yi Aung
Faculty of Computer System and Technology,
Myanmar Institute of Information and Technology, Mandalay, Myanmar
How to cite this paper: Wit Yee Swe |
Khaing Thazin Min | Khin Chan Myae Zin |
Yi Yi Aung "ClassroomSharedWhiteboard
System using Multicast Protocol"
Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019, pp.2533-2535,
https://doi.org/10.31142/ijtsrd27976
Copyright © 2019 by author(s) and
International Journal ofTrend inScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
Multiple hosts wish to receive the same data from one or more senders.
Multicast routing defines extensions toIProuterstosupportbroadcastingdata
in IP networks. Multicast data is sent and received at a multicast address
which defines a group. Data is sent and received in multicast groups via
routing trees from sender(s) to receivers. Demonstrative lectures require to
share the computer screen of the lecturer to the students as well as to make
discussion with the students. The Multicast protocol is the most suitable
method because of its capability in speed and better synchronized process.
The word "multicast" is typically used to refer to IP multicast which is often
employed for streaming media, and Internet television applications.
KEYWORDS: Reliable multicast transport protocol, multicast classroom, IP
routing, multicast lecturing
INTRODUCTION
Multicast conferencing is a rapidly-growing area of Internet use. Nowadays,
most presentations in meetings, conferences and workshop seminars areusing
Power Point presentation software magnified by LCD projectors for efficiency
and attraction. Similarly, demonstrative lectures require the same capabilityin
the classroom. When demonstrating lecture (like running a program), the
classroom require more than just presentation. This kind of application is
known as "shared whiteboard". The screen of the lecturer's computer, is
distributed to the classroom PCs. By using multicast algorithms, it minimizes
the amount of traffic sent over the network.
Active services running in the network mediate betweenthe
clients (the student) and server (the lecturer). This paper
provides an overview of the mechanisms used to support
classroom shared whiteboard data transfer with multicast
message conferencing capability. This system is used to
advertise and invite individuals to the lectures, and then
communicate among the students and the lecturer.
Related works
SLIM [3, 2] is a network layer single source multicast. As
such it is most strongly related other single source multicast
protocols, particularly [5]and[4].Thesinglesourcenetwork
layer multicast is the adequate and appropriate elementary
multicast service and sufficient for more elaborate group
communication sessions to be built upon. In fact, a multi-
sender session can easily be created using our [3] or [5, 4];
SLIM leaves such issues to session management and out of
the network layer protocol.
Several multicasttransportprotocols wereproposedtomeet
the requirements of delay-sensitive, real-time interactive
applications, such as RTP/RTCP [12] to support multi-party
multimedia conferencing tools, SRM [1] and TRM [10] to
support distributedwhiteboardtools,etc.Theseapplications
can tolerate a certain degree of data loss, but they are
sensitive to packet delay variance. On the other hand, other
protocols were proposed to meet the requirements of
reliable data distribution services, such as multipoint file
transfer. These applications are not delay-sensitive, but
require that the information is entirely received, or else the
transfer fails. The Muse protocol [6] (which was developed
to multicast news articles on the MBone), MDP [8] (the
evolution of a protocol used indisseminating satelliteimages
over MBone) and MFTP [9], RMTP [7] and TMTP [12] (other
protocols for reliable one-to-many data transmission) are
examples of this kind of protocols.Most ofthemaredesigned
to work in the MBone when the number of receivers is too
large (thousands of receivers). To reach scalability and,
therefore, to solve the feedback implosion problem, some of
them define complex hierarchical topologies and they even
introduce some non-layer 3 functionality into the network
devices.
A. Background theory
Multicast messaging architecture Multicast means that the
servers are automatically creating a tree-structure. A
number of emerging network applications require the
delivery of packets from one or more senders to a group of
receivers. These applications include streaming continuous
media (for example, the transfer of the audio, video, andtext
of a live lecture to a set of distributed lecture participants),
shared data applications (for example, a whiteboard or
teleconferencing application hat is shared among many
distributed participants). For each of these applications,
multicast is an extremely useful. The sending of a packet
from one sender to multiple receivers with a single send
operation. Multicast protocols allowa grouporchannel to be
accessed over different networks by multiple stations
(clients) for the receipt and transmit of multicast data. The
main objective of multicast protocols for transporting real-
IJTSRD27976
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27976 | Volume – 3 | Issue – 5 | July - August 2019 Page 2534
time data is to guarantee quality of service bybounding end-
to-end delay at the cost of reliability. Multicasting can
dramatically reduce the network bandwidth multimedia
applications require. Servers do not require hardware
upgrades in order to take advantage of multicasting. Clients
do not require hardware upgrades in order to take
advantage of multicasting. Because routers of recentvintage
already support multicasting, enabling multicasting on the
network is practical and cost-effective.
Types of reliable multicast protocols
1. Scalable Reliable Multicast (SRM)
2. Multicast Transport Protocol (MTP)
3. Reliable Multicast Transport Protocol (RMTP)
4. Reliable Multicast Distribution Protocol (RMDP)
5. Pretty Good Multicast (PGM)
RMTP (Global cast Communication) Reliable Multicast
Transport Protocol (RMTP) organizes all the nodes into a
tree structure. The receiving nodes are always at thebottom
of the tree. Ideally the senders are at the top. The sender
transmits messages using IP multicast, after a message is
transmitted the sender will not release the memory until it
receives a positive acknowledgement from the group. The
receivers do not send acknowledgement directly to the top
node (sender), but send hierarchical acknowledgements
(HACKs). A receiver transmits a HACK to their parent in the
tree structure. The parent gathers all HACKs from its
children and sends a HACK to its parent node one step
higher in the tree. The HACKS are propagated upward to the
top of the tree and the sender is eventually notified. This
design allows dissemination of messages to a large number
of receivers without causing ACK implosion. RLC and RMDP
in Reliable Multicast Data Distribution Protocol (RMDP),the
problem of insuring reliable data delivery to large groups,
and adaptability to heterogeneous clients is solved by
Forward Error Correction (FEC) techniquebasedon erasure
codes [11]. The basic principle behind the use of erasure
codes is that the original source data, in the form of a
sequence of k packets, along with additional n redundant
packets, are transmitted by the sender, and the redundant
data can be used to recover lost source data at the receivers.
A receiver can reconstruct the original source data once it
receives a sufficient number of (k outofn)packets.Themain
benefit of this approach is that different receivers can
recover from different lost packets using the same
redundant data. In principle, this idea can greatly reducethe
number of retransmissions, as a single retransmission of
redundant data can potentially benefit many receivers
simultaneously.
B. Applying multicast protocol
Messaging structure of multicast classroom
The network layout of the classroom as shown in Figures 1
and 2, all the classroom PCs are connected through a
network switch. For extensive usage that is if therearemore
than one classroom, PCs in each class are connected to a
network switch, and all the switches of the classrooms are
connected to a router.
The request from the students' PC are transmitted to the
server PC of the lecturer and by acceptance of the request,
the multicast transmission occurs.
Figure1. Network relation in a multicast classroom
Figure2. Network layout for classroom lecturing
System flow diagram
Figure3. Multicast classroom application system flow
diagram
Multicasting algorithm
Server algorithm
1. Start the SendTimer
2. When the SendTimer is expired, Capture the Current
Screen and save as Memory Image.
3. Change the Image to Byte array and send to
Multicaster_IP (224.100.0.1)
4. Wait for the next expire of SendTimer.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27976 | Volume – 3 | Issue – 5 | July - August 2019 Page 2535
Client algorithm
1. Start the RecvTimer
2. When the RecvTimer is expired, receive the byte array
and save as Memory Image.
3. Show the image
4. Wait for the next expire of RecvTimer.
Multicast process
Server side (Lecturer's computer)
The server side main control will be displayed. There willbe
2 options.
Figure4. Start the classroom lecturing from server
side
If "Screen Sharing" is selected, the following menu will
appear.
Figure5. Start the screen sharing
If "Start" is selected, the teacher (server) screen will be
shown to all connected clients (students).
If "Stop" is selected, the screen sharing process will
terminate
The following text message screen will appear when "Text
Messaging" is selected. The lecturer can send Instant
messages to the students.
Figure6. Start text messaging
Client side (student) Client side menu will be shown as
follows
Figure7. Start lecturing from client side
"View screen Sharing" option will let the students join the
classroom. The server screen (lecturer's screen) will be
shared to the student's computer. When teacher send
messages, the clients can see the messages from their
computers.
Figure8. Receive messaging from server side
"Text Messaging" option will let the students see the
messages sent by their lecturer.
C. Conclusion
The aim of this system is using Multicast protocol for class
room lecturing with lecture demonstration screen sharing
and classroom discussion. In practice, the use of shared
computer screen and multicast messaging is an applicable
system. This system can also assist distance learning on the
internet infrastructure and benefit students who are in
remote area.
References
[1] Floyd, S., Jacobson, V., Liu, C., McCanne, S., Zhang, L.: A
Reliable Multicast Framework for Light-weight
Sessions and Application Level Framing. IEEE/ACM
Transactions on Networking, Vol. 5, No. 6,pp.784-803,
December 1997.
[2] Gísli Hjálmtýsson, Björn Brynjúlfsson and Ólafur
Ragnar Helgason “Overcoming last-hop/first-hop
problems in IP multicast,” accepted for publication at
NGC 2003
[3] Gísli Hjálmtýsson, Björn Brynjúlfsson and Ólafur R.
Helgason, “Self-configuring Lightweight Internet
Multicast,” in preparation.
[4] H. Holbrook and B. Cain, “Source Specific Multicast for
IP,” IETF Internet Draft, work in progress, March2003.
draft-ietf-ssm-arch-02.txt.
[5] Holbrook and D. Cheriton, “IP Multicast Channels:
EXPRESS Support for Large-scale Single-Source
Applications,” In Proceedings of SIGCOMM 1999,1999.
[6] Lind, K. et al.: Drinking from the Fire hose: Multicast
USENET News. In Proc. of the winter 1994 USENIX
Conference, pp. 33-45, 1994, San Francisco, CA.
[7] Lin, J. C., Paul, S.: RMTP. A Reliable Multicast Transport
Protocol, In Proc. of Infocom96, pp. 1414-

More Related Content

What's hot

Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing over
Iaetsd Iaetsd
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distance
IJCNCJournal
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
Vinoth Chandar
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
IJERA Editor
 
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
CSCJournals
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
IJNSA Journal
 
17 18
17 1817 18
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
1crore projects
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
cscpconf
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
ingenioustech
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
IJSRD
 
MANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIO
MANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIOMANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIO
MANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIO
IJCI JOURNAL
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
csandit
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
IOSR Journals
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
IAEME Publication
 

What's hot (18)

Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing over
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distance
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
 
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
17 18
17 1817 18
17 18
 
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
MANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIO
MANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIOMANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIO
MANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIO
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 

Similar to Classroom Shared Whiteboard System using Multicast Protocol

Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
IJERD Editor
 
50 55
50 5550 55
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATIONMULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
Association of Scientists, Developers and Faculties
 
Edge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingEdge device multi-unicasting for video streaming
Edge device multi-unicasting for video streaming
Tal Lavian Ph.D.
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast Services
IOSR Journals
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...
redpel dot com
 
50120140502004
5012014050200450120140502004
50120140502004
IAEME Publication
 
Multimedia communication networks
Multimedia communication networksMultimedia communication networks
Multimedia communication networks
Mohammad Ilyas Malik
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
IJMER
 
Audio/Video Conferencing over Publish/Subscribe Messaging Systems
Audio/Video Conferencing over Publish/Subscribe Messaging SystemsAudio/Video Conferencing over Publish/Subscribe Messaging Systems
Audio/Video Conferencing over Publish/Subscribe Messaging Systems
Videoguy
 
Enhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksEnhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networks
IRJET Journal
 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
IJNSA Journal
 
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
Istabraq M. Al-Joboury
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
ijgca
 
Cm32996999
Cm32996999Cm32996999
Cm32996999
IJMER
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
IRJET Journal
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
IJCSIS Research Publications
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
ijtsrd
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
IRJET Journal
 
Ijcatr04061005
Ijcatr04061005Ijcatr04061005
Ijcatr04061005
Editor IJCATR
 

Similar to Classroom Shared Whiteboard System using Multicast Protocol (20)

Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...
 
50 55
50 5550 55
50 55
 
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATIONMULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
 
Edge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingEdge device multi-unicasting for video streaming
Edge device multi-unicasting for video streaming
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast Services
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...
 
50120140502004
5012014050200450120140502004
50120140502004
 
Multimedia communication networks
Multimedia communication networksMultimedia communication networks
Multimedia communication networks
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
 
Audio/Video Conferencing over Publish/Subscribe Messaging Systems
Audio/Video Conferencing over Publish/Subscribe Messaging SystemsAudio/Video Conferencing over Publish/Subscribe Messaging Systems
Audio/Video Conferencing over Publish/Subscribe Messaging Systems
 
Enhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksEnhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networks
 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
 
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
 
Cm32996999
Cm32996999Cm32996999
Cm32996999
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
 
Ijcatr04061005
Ijcatr04061005Ijcatr04061005
Ijcatr04061005
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

Classroom Shared Whiteboard System using Multicast Protocol

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD27976 | Volume – 3 | Issue – 5 | July - August 2019 Page 2533 Classroom Shared Whiteboard System using Multicast Protocol Wit Yee Swe, Khaing Thazin Min, Khin Chan Myae Zin, Yi Yi Aung Faculty of Computer System and Technology, Myanmar Institute of Information and Technology, Mandalay, Myanmar How to cite this paper: Wit Yee Swe | Khaing Thazin Min | Khin Chan Myae Zin | Yi Yi Aung "ClassroomSharedWhiteboard System using Multicast Protocol" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.2533-2535, https://doi.org/10.31142/ijtsrd27976 Copyright © 2019 by author(s) and International Journal ofTrend inScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT Multiple hosts wish to receive the same data from one or more senders. Multicast routing defines extensions toIProuterstosupportbroadcastingdata in IP networks. Multicast data is sent and received at a multicast address which defines a group. Data is sent and received in multicast groups via routing trees from sender(s) to receivers. Demonstrative lectures require to share the computer screen of the lecturer to the students as well as to make discussion with the students. The Multicast protocol is the most suitable method because of its capability in speed and better synchronized process. The word "multicast" is typically used to refer to IP multicast which is often employed for streaming media, and Internet television applications. KEYWORDS: Reliable multicast transport protocol, multicast classroom, IP routing, multicast lecturing INTRODUCTION Multicast conferencing is a rapidly-growing area of Internet use. Nowadays, most presentations in meetings, conferences and workshop seminars areusing Power Point presentation software magnified by LCD projectors for efficiency and attraction. Similarly, demonstrative lectures require the same capabilityin the classroom. When demonstrating lecture (like running a program), the classroom require more than just presentation. This kind of application is known as "shared whiteboard". The screen of the lecturer's computer, is distributed to the classroom PCs. By using multicast algorithms, it minimizes the amount of traffic sent over the network. Active services running in the network mediate betweenthe clients (the student) and server (the lecturer). This paper provides an overview of the mechanisms used to support classroom shared whiteboard data transfer with multicast message conferencing capability. This system is used to advertise and invite individuals to the lectures, and then communicate among the students and the lecturer. Related works SLIM [3, 2] is a network layer single source multicast. As such it is most strongly related other single source multicast protocols, particularly [5]and[4].Thesinglesourcenetwork layer multicast is the adequate and appropriate elementary multicast service and sufficient for more elaborate group communication sessions to be built upon. In fact, a multi- sender session can easily be created using our [3] or [5, 4]; SLIM leaves such issues to session management and out of the network layer protocol. Several multicasttransportprotocols wereproposedtomeet the requirements of delay-sensitive, real-time interactive applications, such as RTP/RTCP [12] to support multi-party multimedia conferencing tools, SRM [1] and TRM [10] to support distributedwhiteboardtools,etc.Theseapplications can tolerate a certain degree of data loss, but they are sensitive to packet delay variance. On the other hand, other protocols were proposed to meet the requirements of reliable data distribution services, such as multipoint file transfer. These applications are not delay-sensitive, but require that the information is entirely received, or else the transfer fails. The Muse protocol [6] (which was developed to multicast news articles on the MBone), MDP [8] (the evolution of a protocol used indisseminating satelliteimages over MBone) and MFTP [9], RMTP [7] and TMTP [12] (other protocols for reliable one-to-many data transmission) are examples of this kind of protocols.Most ofthemaredesigned to work in the MBone when the number of receivers is too large (thousands of receivers). To reach scalability and, therefore, to solve the feedback implosion problem, some of them define complex hierarchical topologies and they even introduce some non-layer 3 functionality into the network devices. A. Background theory Multicast messaging architecture Multicast means that the servers are automatically creating a tree-structure. A number of emerging network applications require the delivery of packets from one or more senders to a group of receivers. These applications include streaming continuous media (for example, the transfer of the audio, video, andtext of a live lecture to a set of distributed lecture participants), shared data applications (for example, a whiteboard or teleconferencing application hat is shared among many distributed participants). For each of these applications, multicast is an extremely useful. The sending of a packet from one sender to multiple receivers with a single send operation. Multicast protocols allowa grouporchannel to be accessed over different networks by multiple stations (clients) for the receipt and transmit of multicast data. The main objective of multicast protocols for transporting real- IJTSRD27976
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27976 | Volume – 3 | Issue – 5 | July - August 2019 Page 2534 time data is to guarantee quality of service bybounding end- to-end delay at the cost of reliability. Multicasting can dramatically reduce the network bandwidth multimedia applications require. Servers do not require hardware upgrades in order to take advantage of multicasting. Clients do not require hardware upgrades in order to take advantage of multicasting. Because routers of recentvintage already support multicasting, enabling multicasting on the network is practical and cost-effective. Types of reliable multicast protocols 1. Scalable Reliable Multicast (SRM) 2. Multicast Transport Protocol (MTP) 3. Reliable Multicast Transport Protocol (RMTP) 4. Reliable Multicast Distribution Protocol (RMDP) 5. Pretty Good Multicast (PGM) RMTP (Global cast Communication) Reliable Multicast Transport Protocol (RMTP) organizes all the nodes into a tree structure. The receiving nodes are always at thebottom of the tree. Ideally the senders are at the top. The sender transmits messages using IP multicast, after a message is transmitted the sender will not release the memory until it receives a positive acknowledgement from the group. The receivers do not send acknowledgement directly to the top node (sender), but send hierarchical acknowledgements (HACKs). A receiver transmits a HACK to their parent in the tree structure. The parent gathers all HACKs from its children and sends a HACK to its parent node one step higher in the tree. The HACKS are propagated upward to the top of the tree and the sender is eventually notified. This design allows dissemination of messages to a large number of receivers without causing ACK implosion. RLC and RMDP in Reliable Multicast Data Distribution Protocol (RMDP),the problem of insuring reliable data delivery to large groups, and adaptability to heterogeneous clients is solved by Forward Error Correction (FEC) techniquebasedon erasure codes [11]. The basic principle behind the use of erasure codes is that the original source data, in the form of a sequence of k packets, along with additional n redundant packets, are transmitted by the sender, and the redundant data can be used to recover lost source data at the receivers. A receiver can reconstruct the original source data once it receives a sufficient number of (k outofn)packets.Themain benefit of this approach is that different receivers can recover from different lost packets using the same redundant data. In principle, this idea can greatly reducethe number of retransmissions, as a single retransmission of redundant data can potentially benefit many receivers simultaneously. B. Applying multicast protocol Messaging structure of multicast classroom The network layout of the classroom as shown in Figures 1 and 2, all the classroom PCs are connected through a network switch. For extensive usage that is if therearemore than one classroom, PCs in each class are connected to a network switch, and all the switches of the classrooms are connected to a router. The request from the students' PC are transmitted to the server PC of the lecturer and by acceptance of the request, the multicast transmission occurs. Figure1. Network relation in a multicast classroom Figure2. Network layout for classroom lecturing System flow diagram Figure3. Multicast classroom application system flow diagram Multicasting algorithm Server algorithm 1. Start the SendTimer 2. When the SendTimer is expired, Capture the Current Screen and save as Memory Image. 3. Change the Image to Byte array and send to Multicaster_IP (224.100.0.1) 4. Wait for the next expire of SendTimer.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27976 | Volume – 3 | Issue – 5 | July - August 2019 Page 2535 Client algorithm 1. Start the RecvTimer 2. When the RecvTimer is expired, receive the byte array and save as Memory Image. 3. Show the image 4. Wait for the next expire of RecvTimer. Multicast process Server side (Lecturer's computer) The server side main control will be displayed. There willbe 2 options. Figure4. Start the classroom lecturing from server side If "Screen Sharing" is selected, the following menu will appear. Figure5. Start the screen sharing If "Start" is selected, the teacher (server) screen will be shown to all connected clients (students). If "Stop" is selected, the screen sharing process will terminate The following text message screen will appear when "Text Messaging" is selected. The lecturer can send Instant messages to the students. Figure6. Start text messaging Client side (student) Client side menu will be shown as follows Figure7. Start lecturing from client side "View screen Sharing" option will let the students join the classroom. The server screen (lecturer's screen) will be shared to the student's computer. When teacher send messages, the clients can see the messages from their computers. Figure8. Receive messaging from server side "Text Messaging" option will let the students see the messages sent by their lecturer. C. Conclusion The aim of this system is using Multicast protocol for class room lecturing with lecture demonstration screen sharing and classroom discussion. In practice, the use of shared computer screen and multicast messaging is an applicable system. This system can also assist distance learning on the internet infrastructure and benefit students who are in remote area. References [1] Floyd, S., Jacobson, V., Liu, C., McCanne, S., Zhang, L.: A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing. IEEE/ACM Transactions on Networking, Vol. 5, No. 6,pp.784-803, December 1997. [2] Gísli Hjálmtýsson, Björn Brynjúlfsson and Ólafur Ragnar Helgason “Overcoming last-hop/first-hop problems in IP multicast,” accepted for publication at NGC 2003 [3] Gísli Hjálmtýsson, Björn Brynjúlfsson and Ólafur R. Helgason, “Self-configuring Lightweight Internet Multicast,” in preparation. [4] H. Holbrook and B. Cain, “Source Specific Multicast for IP,” IETF Internet Draft, work in progress, March2003. draft-ietf-ssm-arch-02.txt. [5] Holbrook and D. Cheriton, “IP Multicast Channels: EXPRESS Support for Large-scale Single-Source Applications,” In Proceedings of SIGCOMM 1999,1999. [6] Lind, K. et al.: Drinking from the Fire hose: Multicast USENET News. In Proc. of the winter 1994 USENIX Conference, pp. 33-45, 1994, San Francisco, CA. [7] Lin, J. C., Paul, S.: RMTP. A Reliable Multicast Transport Protocol, In Proc. of Infocom96, pp. 1414-