SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 305
CCAG: GOSSIP BASED RELIABLE MULTICAST PROTOCOL
Smita Kapse1
, Amita Meshram2
, Supriya Thombre3
, Nilima Jichkar4
, Itrat Fatema5
1
Assistant Professor, 2
Assistant Professor, 3
Assistant Professor, 4
Assistant Professor, Department of Computer Technology,
YCCE, Nagpur, Maharashtra, India
5
Assistant Professor, Department of Computer Technology, ACET, Nagpur, Maharashtra, India
Abstract
The essential requirement in MANET is now group communication or multicasting since it is used in applications such as network news
dissemination, collaborative computing, disaster relief operation, sensor network, military services. In this type of application reliability
plays an important role. Designing a reliable multicast protocol in MANET is challenging task due to the dynamic topology, limited
bandwidth, constraints of node capability, and frequent disconnections in MANET. In this paper, we propose a scheme called
Congestion Control Anonymous Gossip(CCAG) to improve the reliable packet delivery of multicast routing protocols and decrease the
variation in the number of packets received by the different nodes. It also consider the issues of reliability, low end to end delay, control
overhead and packet delivery in mobile ad-hoc networks. The propose scheme works in two phases. In the first phase any suitable
protocol is used to multicast the message to the group, while in second phase, the gossip protocol tries to recover lost messages.
Keywords: Ad-hoc Wireless network, Anonymous Gossip, MAODV, Packet delivery Reliability, Locality of gossip,
Congestion.
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
An adhoc network is a dynamically reconfigurable wireless
network without any fixed infrastructure. Such type of network
have several resource constraints like bandwidth, battery
power, and demands like latency and other types of QoS,
reliability and security etc. This type of network is specifically
useful in situations like military and disaster relief operation
etc. In such an application multicast is a natural requirement.
The transmission of packets to a group of zero or more hosts
identified by a single destination address is called multicasting
[16]. Large number of multicast protocols are available in
adhoc network like MAODV [5], ODMRP [14], MCEDAR [9]
etc. but this protocol does not provide reliability guarantees due
to
1 Mobility and congestion.
2 Transient partition.
3 Maintenance of multicast structure.
In a wired network the basic technique used for recovering the
lost messages are
1 Flooding
2 Gossip
In flooding any node that receives the packet retransmits to its
entire neighbor hence routing messages are propagated
unnecessary and hence congestion in the network increases.
Gossip [15][6] is a control form of flooding in this the messages
are slowly propagated without congesting the network.
Classical gossip technique used in wired network recovers lost
messages but it requires partial or full knowledge of other
group members.
Hence these methods are impractical in adhoc network due to
several constraints of adhoc network.
Hence we are implementing a protocol which makes use of
gossip technique called Congestion Control Anonymous
Gossip (CCAG) which provides
1 Reliability guarantees
2 Eliminates the variation in the number of packets
received by group member.
3 Less control overhead.
4 High packet delivery.
2. CONGESTION CONTROL ANONYMOUS
GOSSIP PROTOCOL
A gossip based reliable multicast protocol[4] involves two
phases as depicted in following figure
Fig-1: Use of Gossip with Existing Multicast protocol
In the first phase, any suitable unreliable protocol is used to
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 306
multicast the message m, to be sent to the group. In this
experiment we are using the multicast adhoc on demand
distance vector routing protocol to disseminate the message
unreliably. In the second phase, gossip protocol is used to
recover lost messages from other members of the group that
might have received it. This phase consists of periodically
repeated gossip rounds in the background as more and more
messages are multicast. A single gossip round can potentially
recover many lost messages. A single round of gossip consists
of the following steps:
• Node A randomly chooses another member of the
group, say B.
• A sends B the information about messages it has
received or not received.
• B checks to see if it has received any of the messages
listed by A.
• Then A and B could exchange messages which are not
a part of each other’s message history.
To implement the CCAG protocol we include the concept of
following:
• Anonymous Gossip.
• Locality of Gossip.
• Cached Gossip.
• Pull mode of message exchange.
2.1 Anonymous Gossip
AG does not require any member to know the other members of
the multicast group. A new type of message called gossip
message [1][2] is used. This message has the following five
fields:
• Group Address: Address of the multicast group
• Source Address: Address of the node sending the
gossip message
• Lost Buffer: An array of fixed size, which carries
sequence numbers of messages that the source node
believes it has lost
• Number Lost: The size of the Lost Array
• Expected Sequence Number: The sequence number
of the next message that the source expects
Following Steps are used to implement Anonymous Gossip
• If all the packets are not receive successfully then
• Generate the gossip message.
• Pick a node at random
• Send a digest of local contents to the peer.
• Propagate the message among multicast tree.
• If group member then
accept and unicast gossip reply
Else
propagate gossip message to next node.
2.2 Locality of Gossip
Locality of gossip[3] refers to the gossip locally i.e. with nearer
member with a very high probability and with distant nodes
occasionally. Which results in low control overhead?
Following Steps are used to implement Locality of Gossip
• Maintain an additional nearest_member field in MRT
table of MAODV protocol.
• If gossip message is received then next hop with
smallest nearest member value is hosen with higher
probability than with greatest nearest member value.
• Validity of nearest_member is maintain byWhen new
member join send MACT message When existing
member leaves send Prune message
• Each node send the modify message along the route
2.3 Cached Gossip
Cached Gossip [16][2] uses the unicast routes to gossip with
those nodes whose membership is already known. The
inclusion of the algorithm adversely affect the delay recorded in
locating/delivering packets: whenever a node leaves the group;
a new node joins the group; or there is a need for
reconfiguration leading to topological changes.
Following Steps are used to implement Cached Gossip
• Every group member maintain member_cache
• Table consists of (node_add, num_hopes,
last_gossip).
• If (member_cache table full )then If (member with
greatest no. of hopes) delete it Else delete member
with most recent last_gossip
• member_cache table is updated with each gossip
reply, data packet or maintenance packet.
2.4 Pull Mode of Message Exchange
Because of the importance of the direction of information
exchange. The proposed protocol implements a pull mode of
message exchange.
Following Steps are used to implement Pull mode of message
exchange.
• Each group node maintains Lost_table and History
_table.
• Lost_table( sender_add, seq_no) entry is made when
• sequence no greater than expected seq. no is received.
• History_table contains most recent messages received
• If (receive gossip message) then compare Lost_table
with History _table If (message found) then unicast
gossip reply to initiator Else propagate gossip message
to next node
The following figure depicts the complete CCAG protocol
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 307
Fig2: The Complete CCAG Protocol
3. SIMULATION
3.1 Implementation Environment
Operating System : Cent O.S.6.0 NS2 version :
ns-allinone-2.33 Gnu Plot : GNU4.2.5 Perl Script
3.2 Simulation Environment
The network N consists of |N| nodes with same transmission
and communication capabilities, communicating through
bidirectional wireless links between each other. A multicast
group G is a subset of N with nG nodes.
The following assumptions are made :
• Simulation area : 1800 * 900 meters
• Simulation duration: 100 sec.
• Physical/ MAC layer: IEEE 802.11 at 2 Mbps,
250m transmission range
• Mobility model : Random way point model with no
pause time.
• Every node has unique physical ID.
• The transmission radius for each node is fixed.
• Network consist of single multicast group.
• All the nodes join the group at the beginning of the
simulation and remains in it throughout the run period.
33 Performance Metrics
After executing the tcl script the trace file is generated this
contains a lot of information that may not be required to analyze
the performance of a protocol. We are interested in those
information that is sufficient to predict the efficiency of a
protocol. The following performance metrics are needed to be
consider to analyze and compare the performance of MAODV
and CCAG protocol.
• Packet delivery Ratio: It is the ratio of number of data
packets received by the destinations to the number of data
packets sent by the source
PDR% = (TRP / TSP) * 100
Where, PDR: Packet delivery Ratio TRP: Total Received
Packets TSP: Total Sent Packets
PDR is used to compare MAODV protocol with CCAG
protocol. As it describes the loss rate that is seen by the
protocol this in turn affects the maximum throughput that
the network can support. This metric characterizes both
completeness and correctness of the protocol.
• Congestion overhead: It gives the evaluation of the
efficiency of a routing protocol and so if this
parameter is low it means that less overhead is
introduced in the network and the result is network is
less congested and less collision and interference
occur.
It is the ratio of total number of routing signaling
packets transmitted during the simulation in terms of
total number of packets received.
CO = TRSP/ TXP
Where,
CO: Congestion overhead
TRSP: Total of Routing Signaling Packets TXP: Total
of transmitted Packets .
• Data packets received by each node: It is used to
calculate the variation in the number of packets
received by each node. In this we calculate the number
of data packets received by each node over a time
• End to end delay: End-to-end delay is considered as
the average time taken by a packet to reach an Node
from the time it leaves the sender. When a data packet
is first created by the source, it is tagged with a send
time. Subsequently, each node that receives the packet
calculates the end-to-end delay by subtracting the time
the packet was received with the initial send time.
3.4 Simulation Result and Analysis
Graphs are one of the ways to analyze and compare the result of
the trace file. To plot the graph in NS2.33 we are using the
software GNUPLOT which gives more appropriate scale. To
plot the graph we have to first extract the desired field from the
trace file. To do this we had written Perl script. The following
are the graphs showing the outputs of the two protocols
MAODV Vs CCAG. They show the performance metrics that
are discussed in the above section.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 308
Fig-3: Packet delivery Ratio
Fig- 4: Congestion overhead
Fig- 5: Data packets received by each node
Fig- 6: End to End Delay
CONCLUSIONS
Reliable Multicasting is an important requirement in the
MANET. Hence by considering this requirement we design and
implemented congestion control anonymous Gossip protocol
for Adhoc network which provides the reliability guarantees. It
uses MAODV protocol to dissipate the messages unreliably
and on top of that CCAG protocol is used. The performance
comparison between MAODV and CCAG using graph shows
that CCAG gives 22% improvement in the performance as
compare to MAODV protocol. The results show that CCAG
reduces congestion, increases Packet delivery ratio and also
reduces the variation in the number of packets received by
different group members.
REFERENCES
[1] Ms. Smita A Kawade, Mr. K. N. Hande. “Congestion
control anonymous Gossip: Probabilistic reliable
multicast in adhoc network”, International conference on
knowledge and networking in ICT ERA, Chennai, India,
January 2009.
[2] Onifade F.W. Olufade *, Longe O. Babatope, Akanmu
A. Samson. “Congestion Controlled Anonymous
Gossip: A Scalable Method For Providing
Probabilistic Guarantees To Multicast Reliability In
Mobile Ad-Hoc Networks.” International Journal of
Computing and ICT Research, Vol. 1, No. 2, December
2007
[3] Weijia Jia, Dingzhu Lu, Guojun Wang, Lizhuo Zhang,
“Local Retransmission based gossip protocol in mobile
adhoc networks” 2007 IEEE
[4] Yifen WEI, Gaogang XIE Zhongcheng LI, “ A
hierarchical Cross layer protocol for group
communication in MANET.2007 IEEE
[5] Beini Ouyang and Xiaoyan Hong, Yunjung Yi “A
Comparison of Reliable Multicast Protocols for
Mobile Ad Hoc Networks” 2005 IEEE
[6] Zülküf Genç, Öznur Özkasap “Peer-to-Peer Epidemic
Algorithms for Reliable Multicasting in Ad Hoc
Networks” Proceedings Of World Academy Of Science,
Engineering And Technology Volume 3 January 2005
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 309
Issn 1307-6884
[7] Chunqiang Tang, Rong N. Chang and Crostopher Ward,
“GoCast: Gossip Enhanced overlay multicastfor fast and
depenadable group communication” 2005 IEEE
[8] Ayalvadi J. Ganesh,Anne Marie Kermarrec, and Laurent
Massoulie, ”Peer to peer membership management for
gossip based protocol ” IEEE February 2003
[9] Vollset, E. and Ezhilchelvan, P. ”A Survey of Reliable
Broadcast Protocols for Mobile Ad-hoc Networks”,
Technological Report, School of Computing Science,
University of Newcastle, Jun 2003
[10] Jun Luo Patrick Th. Eugster Jean-Pierre Hubaux “Route
Driven Gossip: Probabilistic Reliable Multicast in Ad
Hoc Networks” IEEE INFOCOM 2003
[11] Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K.
Tripathi “A Framework for Reliable Routing in Mobile
Ad Hoc Networks” IEEE INFOCOM 2003
[12] Miguel Castro, Peter Druschel, Anne-Marie Kermarrec
and Antony Rowstron, ”SCRIBE:A large scale and
decentralized application level multicast infrastructure.
IEEE October 2002.
[13] K. Tang, K. Obraczka, S. -J. Lee, and M. Gerla.
“Congestion controlled adaptive lightweight multicast in
wireless mobile ad hoc networks”. In Proceedings of
ISCC, 2002.
[14] E. M. Royer and C. E. Perkins,” Multicast Ad Hoc
On-Demand Distance Vector (MAODV) Routing
Protocol”, IETF, July 2000.
[15] Kenneth P. Birman, Mark Hayden, Oznur Ozkasap,
Zhen Xiao, Mihai Badiuand Yaron Minsky. 1999.
“Bimodal Multicast” ACM Transactions on Computer
Systems, Vol. 17, Issue 2, pp 41 – 88.
[16] Vinod Kone, Atanu Roy Chowdhary, Sukumar Nandi
“A Caching Mechanism To Improve The Reliability Of
Multicasting In Multihop MANET”
[17] Sanjoy Paul, K. K. Sabnani, J. C. Lin, S.
Bhattacharya.“Reliable Multicast Transport Protocol
(RMTP)”. IEEE Journal on Selected Areas in
Communications, special Issue on Network Support for
Multipoint communication, April 97, Vol 15, No. 3
[18] Sally Floyd, Van Jacobson, Steve McCanne,
Ching-Gung Liu and Lixia Zhang. “A Reliable Multicast
Framework for Light Weight Sessions and application
Level Framing”. In Proceedings of the ’95 Symposium
On Communication Architectures and Protocols
(SIGCOMM). ACM. August1995, Cambridge MA.
[19] C. Siva Ram Murthy and B. S. Manoj “Ad-Hoc Wireless
Networks Architecture and protocols”

Contenu connexe

Tendances

A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Publishing House
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Journals
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileeSAT Publishing House
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networkseSAT Journals
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...eSAT Journals
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolZac Darcy
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
 
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...eSAT Journals
 
Energy in Wireless Sensor Network
Energy in Wireless Sensor NetworkEnergy in Wireless Sensor Network
Energy in Wireless Sensor NetworkBADALKUMAR56
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621IJRAT
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classificationShivi Shukla
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network usingIAEME Publication
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packeteSAT Publishing House
 

Tendances (20)

A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
Safe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANETSafe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANET
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
 
Energy in Wireless Sensor Network
Energy in Wireless Sensor NetworkEnergy in Wireless Sensor Network
Energy in Wireless Sensor Network
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network using
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 

En vedette

Realization of high performance run time loadable mips soft-core processor
Realization of high performance run time loadable mips soft-core processorRealization of high performance run time loadable mips soft-core processor
Realization of high performance run time loadable mips soft-core processoreSAT Publishing House
 
Concrete based on alkali activated fly ash from one power plant in serbia
Concrete based on alkali activated fly ash from one power plant in serbiaConcrete based on alkali activated fly ash from one power plant in serbia
Concrete based on alkali activated fly ash from one power plant in serbiaeSAT Publishing House
 
Analysis of grading techniques in xlpe cable insulation by fem
Analysis of grading techniques in xlpe cable insulation by femAnalysis of grading techniques in xlpe cable insulation by fem
Analysis of grading techniques in xlpe cable insulation by femeSAT Publishing House
 
“Remedies over the obstacles in implementing automation in indian infrastruct...
“Remedies over the obstacles in implementing automation in indian infrastruct...“Remedies over the obstacles in implementing automation in indian infrastruct...
“Remedies over the obstacles in implementing automation in indian infrastruct...eSAT Publishing House
 
Grid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctionsGrid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctionseSAT Publishing House
 
Comparative studies on flotation of kasolite using cationic and anionic surfa...
Comparative studies on flotation of kasolite using cationic and anionic surfa...Comparative studies on flotation of kasolite using cationic and anionic surfa...
Comparative studies on flotation of kasolite using cationic and anionic surfa...eSAT Publishing House
 
Stability and surface free energy analysis of a liquid drop on a horizontal c...
Stability and surface free energy analysis of a liquid drop on a horizontal c...Stability and surface free energy analysis of a liquid drop on a horizontal c...
Stability and surface free energy analysis of a liquid drop on a horizontal c...eSAT Publishing House
 
Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...eSAT Publishing House
 
The effect of rotor disc clearance on the lift performance of contra rotating...
The effect of rotor disc clearance on the lift performance of contra rotating...The effect of rotor disc clearance on the lift performance of contra rotating...
The effect of rotor disc clearance on the lift performance of contra rotating...eSAT Publishing House
 
Capacity and performance analysis of suame
Capacity and performance analysis of suameCapacity and performance analysis of suame
Capacity and performance analysis of suameeSAT Publishing House
 
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...eSAT Publishing House
 
Study of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamsStudy of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamseSAT Publishing House
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issueseSAT Publishing House
 
Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...eSAT Publishing House
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
Blood flow through stenosed inclined tubes with
Blood flow through stenosed inclined tubes withBlood flow through stenosed inclined tubes with
Blood flow through stenosed inclined tubes witheSAT Publishing House
 
Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-eSAT Publishing House
 
Emotional telugu speech signals classification based on k nn classifier
Emotional telugu speech signals classification based on k nn classifierEmotional telugu speech signals classification based on k nn classifier
Emotional telugu speech signals classification based on k nn classifiereSAT Publishing House
 
Color and texture based image retrieval a proposed
Color and texture based image retrieval a proposedColor and texture based image retrieval a proposed
Color and texture based image retrieval a proposedeSAT Publishing House
 

En vedette (20)

Realization of high performance run time loadable mips soft-core processor
Realization of high performance run time loadable mips soft-core processorRealization of high performance run time loadable mips soft-core processor
Realization of high performance run time loadable mips soft-core processor
 
Concrete based on alkali activated fly ash from one power plant in serbia
Concrete based on alkali activated fly ash from one power plant in serbiaConcrete based on alkali activated fly ash from one power plant in serbia
Concrete based on alkali activated fly ash from one power plant in serbia
 
Analysis of grading techniques in xlpe cable insulation by fem
Analysis of grading techniques in xlpe cable insulation by femAnalysis of grading techniques in xlpe cable insulation by fem
Analysis of grading techniques in xlpe cable insulation by fem
 
“Remedies over the obstacles in implementing automation in indian infrastruct...
“Remedies over the obstacles in implementing automation in indian infrastruct...“Remedies over the obstacles in implementing automation in indian infrastruct...
“Remedies over the obstacles in implementing automation in indian infrastruct...
 
Grid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctionsGrid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctions
 
Comparative studies on flotation of kasolite using cationic and anionic surfa...
Comparative studies on flotation of kasolite using cationic and anionic surfa...Comparative studies on flotation of kasolite using cationic and anionic surfa...
Comparative studies on flotation of kasolite using cationic and anionic surfa...
 
Stability and surface free energy analysis of a liquid drop on a horizontal c...
Stability and surface free energy analysis of a liquid drop on a horizontal c...Stability and surface free energy analysis of a liquid drop on a horizontal c...
Stability and surface free energy analysis of a liquid drop on a horizontal c...
 
Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...
 
Simulation of convolutional encoder
Simulation of convolutional encoderSimulation of convolutional encoder
Simulation of convolutional encoder
 
The effect of rotor disc clearance on the lift performance of contra rotating...
The effect of rotor disc clearance on the lift performance of contra rotating...The effect of rotor disc clearance on the lift performance of contra rotating...
The effect of rotor disc clearance on the lift performance of contra rotating...
 
Capacity and performance analysis of suame
Capacity and performance analysis of suameCapacity and performance analysis of suame
Capacity and performance analysis of suame
 
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
 
Study of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamsStudy of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beams
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
 
Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...Numerical simulation of friction stir butt welding processes for az91 magnesi...
Numerical simulation of friction stir butt welding processes for az91 magnesi...
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
Blood flow through stenosed inclined tubes with
Blood flow through stenosed inclined tubes withBlood flow through stenosed inclined tubes with
Blood flow through stenosed inclined tubes with
 
Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-
 
Emotional telugu speech signals classification based on k nn classifier
Emotional telugu speech signals classification based on k nn classifierEmotional telugu speech signals classification based on k nn classifier
Emotional telugu speech signals classification based on k nn classifier
 
Color and texture based image retrieval a proposed
Color and texture based image retrieval a proposedColor and texture based image retrieval a proposed
Color and texture based image retrieval a proposed
 

Similaire à Ccag gossip based reliable multicast protocol

Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwardingeSAT Publishing House
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)eSAT Publishing House
 
Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlaneSAT Publishing House
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
Performance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryPerformance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryeSAT Journals
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit iJAIGANESH SEKAR
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...eSAT Publishing House
 
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIPSURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIPIJESM JOURNAL
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using eSAT Journals
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaeSAT Publishing House
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networkseSAT Journals
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkeSAT Publishing House
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Journals
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 

Similaire à Ccag gossip based reliable multicast protocol (20)

Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
 
Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlan
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
Performance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryPerformance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetry
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
 
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIPSURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIP
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdma
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Dernier (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

Ccag gossip based reliable multicast protocol

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 305 CCAG: GOSSIP BASED RELIABLE MULTICAST PROTOCOL Smita Kapse1 , Amita Meshram2 , Supriya Thombre3 , Nilima Jichkar4 , Itrat Fatema5 1 Assistant Professor, 2 Assistant Professor, 3 Assistant Professor, 4 Assistant Professor, Department of Computer Technology, YCCE, Nagpur, Maharashtra, India 5 Assistant Professor, Department of Computer Technology, ACET, Nagpur, Maharashtra, India Abstract The essential requirement in MANET is now group communication or multicasting since it is used in applications such as network news dissemination, collaborative computing, disaster relief operation, sensor network, military services. In this type of application reliability plays an important role. Designing a reliable multicast protocol in MANET is challenging task due to the dynamic topology, limited bandwidth, constraints of node capability, and frequent disconnections in MANET. In this paper, we propose a scheme called Congestion Control Anonymous Gossip(CCAG) to improve the reliable packet delivery of multicast routing protocols and decrease the variation in the number of packets received by the different nodes. It also consider the issues of reliability, low end to end delay, control overhead and packet delivery in mobile ad-hoc networks. The propose scheme works in two phases. In the first phase any suitable protocol is used to multicast the message to the group, while in second phase, the gossip protocol tries to recover lost messages. Keywords: Ad-hoc Wireless network, Anonymous Gossip, MAODV, Packet delivery Reliability, Locality of gossip, Congestion. ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION An adhoc network is a dynamically reconfigurable wireless network without any fixed infrastructure. Such type of network have several resource constraints like bandwidth, battery power, and demands like latency and other types of QoS, reliability and security etc. This type of network is specifically useful in situations like military and disaster relief operation etc. In such an application multicast is a natural requirement. The transmission of packets to a group of zero or more hosts identified by a single destination address is called multicasting [16]. Large number of multicast protocols are available in adhoc network like MAODV [5], ODMRP [14], MCEDAR [9] etc. but this protocol does not provide reliability guarantees due to 1 Mobility and congestion. 2 Transient partition. 3 Maintenance of multicast structure. In a wired network the basic technique used for recovering the lost messages are 1 Flooding 2 Gossip In flooding any node that receives the packet retransmits to its entire neighbor hence routing messages are propagated unnecessary and hence congestion in the network increases. Gossip [15][6] is a control form of flooding in this the messages are slowly propagated without congesting the network. Classical gossip technique used in wired network recovers lost messages but it requires partial or full knowledge of other group members. Hence these methods are impractical in adhoc network due to several constraints of adhoc network. Hence we are implementing a protocol which makes use of gossip technique called Congestion Control Anonymous Gossip (CCAG) which provides 1 Reliability guarantees 2 Eliminates the variation in the number of packets received by group member. 3 Less control overhead. 4 High packet delivery. 2. CONGESTION CONTROL ANONYMOUS GOSSIP PROTOCOL A gossip based reliable multicast protocol[4] involves two phases as depicted in following figure Fig-1: Use of Gossip with Existing Multicast protocol In the first phase, any suitable unreliable protocol is used to
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 306 multicast the message m, to be sent to the group. In this experiment we are using the multicast adhoc on demand distance vector routing protocol to disseminate the message unreliably. In the second phase, gossip protocol is used to recover lost messages from other members of the group that might have received it. This phase consists of periodically repeated gossip rounds in the background as more and more messages are multicast. A single gossip round can potentially recover many lost messages. A single round of gossip consists of the following steps: • Node A randomly chooses another member of the group, say B. • A sends B the information about messages it has received or not received. • B checks to see if it has received any of the messages listed by A. • Then A and B could exchange messages which are not a part of each other’s message history. To implement the CCAG protocol we include the concept of following: • Anonymous Gossip. • Locality of Gossip. • Cached Gossip. • Pull mode of message exchange. 2.1 Anonymous Gossip AG does not require any member to know the other members of the multicast group. A new type of message called gossip message [1][2] is used. This message has the following five fields: • Group Address: Address of the multicast group • Source Address: Address of the node sending the gossip message • Lost Buffer: An array of fixed size, which carries sequence numbers of messages that the source node believes it has lost • Number Lost: The size of the Lost Array • Expected Sequence Number: The sequence number of the next message that the source expects Following Steps are used to implement Anonymous Gossip • If all the packets are not receive successfully then • Generate the gossip message. • Pick a node at random • Send a digest of local contents to the peer. • Propagate the message among multicast tree. • If group member then accept and unicast gossip reply Else propagate gossip message to next node. 2.2 Locality of Gossip Locality of gossip[3] refers to the gossip locally i.e. with nearer member with a very high probability and with distant nodes occasionally. Which results in low control overhead? Following Steps are used to implement Locality of Gossip • Maintain an additional nearest_member field in MRT table of MAODV protocol. • If gossip message is received then next hop with smallest nearest member value is hosen with higher probability than with greatest nearest member value. • Validity of nearest_member is maintain byWhen new member join send MACT message When existing member leaves send Prune message • Each node send the modify message along the route 2.3 Cached Gossip Cached Gossip [16][2] uses the unicast routes to gossip with those nodes whose membership is already known. The inclusion of the algorithm adversely affect the delay recorded in locating/delivering packets: whenever a node leaves the group; a new node joins the group; or there is a need for reconfiguration leading to topological changes. Following Steps are used to implement Cached Gossip • Every group member maintain member_cache • Table consists of (node_add, num_hopes, last_gossip). • If (member_cache table full )then If (member with greatest no. of hopes) delete it Else delete member with most recent last_gossip • member_cache table is updated with each gossip reply, data packet or maintenance packet. 2.4 Pull Mode of Message Exchange Because of the importance of the direction of information exchange. The proposed protocol implements a pull mode of message exchange. Following Steps are used to implement Pull mode of message exchange. • Each group node maintains Lost_table and History _table. • Lost_table( sender_add, seq_no) entry is made when • sequence no greater than expected seq. no is received. • History_table contains most recent messages received • If (receive gossip message) then compare Lost_table with History _table If (message found) then unicast gossip reply to initiator Else propagate gossip message to next node The following figure depicts the complete CCAG protocol
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 307 Fig2: The Complete CCAG Protocol 3. SIMULATION 3.1 Implementation Environment Operating System : Cent O.S.6.0 NS2 version : ns-allinone-2.33 Gnu Plot : GNU4.2.5 Perl Script 3.2 Simulation Environment The network N consists of |N| nodes with same transmission and communication capabilities, communicating through bidirectional wireless links between each other. A multicast group G is a subset of N with nG nodes. The following assumptions are made : • Simulation area : 1800 * 900 meters • Simulation duration: 100 sec. • Physical/ MAC layer: IEEE 802.11 at 2 Mbps, 250m transmission range • Mobility model : Random way point model with no pause time. • Every node has unique physical ID. • The transmission radius for each node is fixed. • Network consist of single multicast group. • All the nodes join the group at the beginning of the simulation and remains in it throughout the run period. 33 Performance Metrics After executing the tcl script the trace file is generated this contains a lot of information that may not be required to analyze the performance of a protocol. We are interested in those information that is sufficient to predict the efficiency of a protocol. The following performance metrics are needed to be consider to analyze and compare the performance of MAODV and CCAG protocol. • Packet delivery Ratio: It is the ratio of number of data packets received by the destinations to the number of data packets sent by the source PDR% = (TRP / TSP) * 100 Where, PDR: Packet delivery Ratio TRP: Total Received Packets TSP: Total Sent Packets PDR is used to compare MAODV protocol with CCAG protocol. As it describes the loss rate that is seen by the protocol this in turn affects the maximum throughput that the network can support. This metric characterizes both completeness and correctness of the protocol. • Congestion overhead: It gives the evaluation of the efficiency of a routing protocol and so if this parameter is low it means that less overhead is introduced in the network and the result is network is less congested and less collision and interference occur. It is the ratio of total number of routing signaling packets transmitted during the simulation in terms of total number of packets received. CO = TRSP/ TXP Where, CO: Congestion overhead TRSP: Total of Routing Signaling Packets TXP: Total of transmitted Packets . • Data packets received by each node: It is used to calculate the variation in the number of packets received by each node. In this we calculate the number of data packets received by each node over a time • End to end delay: End-to-end delay is considered as the average time taken by a packet to reach an Node from the time it leaves the sender. When a data packet is first created by the source, it is tagged with a send time. Subsequently, each node that receives the packet calculates the end-to-end delay by subtracting the time the packet was received with the initial send time. 3.4 Simulation Result and Analysis Graphs are one of the ways to analyze and compare the result of the trace file. To plot the graph in NS2.33 we are using the software GNUPLOT which gives more appropriate scale. To plot the graph we have to first extract the desired field from the trace file. To do this we had written Perl script. The following are the graphs showing the outputs of the two protocols MAODV Vs CCAG. They show the performance metrics that are discussed in the above section.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 308 Fig-3: Packet delivery Ratio Fig- 4: Congestion overhead Fig- 5: Data packets received by each node Fig- 6: End to End Delay CONCLUSIONS Reliable Multicasting is an important requirement in the MANET. Hence by considering this requirement we design and implemented congestion control anonymous Gossip protocol for Adhoc network which provides the reliability guarantees. It uses MAODV protocol to dissipate the messages unreliably and on top of that CCAG protocol is used. The performance comparison between MAODV and CCAG using graph shows that CCAG gives 22% improvement in the performance as compare to MAODV protocol. The results show that CCAG reduces congestion, increases Packet delivery ratio and also reduces the variation in the number of packets received by different group members. REFERENCES [1] Ms. Smita A Kawade, Mr. K. N. Hande. “Congestion control anonymous Gossip: Probabilistic reliable multicast in adhoc network”, International conference on knowledge and networking in ICT ERA, Chennai, India, January 2009. [2] Onifade F.W. Olufade *, Longe O. Babatope, Akanmu A. Samson. “Congestion Controlled Anonymous Gossip: A Scalable Method For Providing Probabilistic Guarantees To Multicast Reliability In Mobile Ad-Hoc Networks.” International Journal of Computing and ICT Research, Vol. 1, No. 2, December 2007 [3] Weijia Jia, Dingzhu Lu, Guojun Wang, Lizhuo Zhang, “Local Retransmission based gossip protocol in mobile adhoc networks” 2007 IEEE [4] Yifen WEI, Gaogang XIE Zhongcheng LI, “ A hierarchical Cross layer protocol for group communication in MANET.2007 IEEE [5] Beini Ouyang and Xiaoyan Hong, Yunjung Yi “A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks” 2005 IEEE [6] Zülküf Genç, Öznur Özkasap “Peer-to-Peer Epidemic Algorithms for Reliable Multicasting in Ad Hoc Networks” Proceedings Of World Academy Of Science, Engineering And Technology Volume 3 January 2005
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 309 Issn 1307-6884 [7] Chunqiang Tang, Rong N. Chang and Crostopher Ward, “GoCast: Gossip Enhanced overlay multicastfor fast and depenadable group communication” 2005 IEEE [8] Ayalvadi J. Ganesh,Anne Marie Kermarrec, and Laurent Massoulie, ”Peer to peer membership management for gossip based protocol ” IEEE February 2003 [9] Vollset, E. and Ezhilchelvan, P. ”A Survey of Reliable Broadcast Protocols for Mobile Ad-hoc Networks”, Technological Report, School of Computing Science, University of Newcastle, Jun 2003 [10] Jun Luo Patrick Th. Eugster Jean-Pierre Hubaux “Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks” IEEE INFOCOM 2003 [11] Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K. Tripathi “A Framework for Reliable Routing in Mobile Ad Hoc Networks” IEEE INFOCOM 2003 [12] Miguel Castro, Peter Druschel, Anne-Marie Kermarrec and Antony Rowstron, ”SCRIBE:A large scale and decentralized application level multicast infrastructure. IEEE October 2002. [13] K. Tang, K. Obraczka, S. -J. Lee, and M. Gerla. “Congestion controlled adaptive lightweight multicast in wireless mobile ad hoc networks”. In Proceedings of ISCC, 2002. [14] E. M. Royer and C. E. Perkins,” Multicast Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol”, IETF, July 2000. [15] Kenneth P. Birman, Mark Hayden, Oznur Ozkasap, Zhen Xiao, Mihai Badiuand Yaron Minsky. 1999. “Bimodal Multicast” ACM Transactions on Computer Systems, Vol. 17, Issue 2, pp 41 – 88. [16] Vinod Kone, Atanu Roy Chowdhary, Sukumar Nandi “A Caching Mechanism To Improve The Reliability Of Multicasting In Multihop MANET” [17] Sanjoy Paul, K. K. Sabnani, J. C. Lin, S. Bhattacharya.“Reliable Multicast Transport Protocol (RMTP)”. IEEE Journal on Selected Areas in Communications, special Issue on Network Support for Multipoint communication, April 97, Vol 15, No. 3 [18] Sally Floyd, Van Jacobson, Steve McCanne, Ching-Gung Liu and Lixia Zhang. “A Reliable Multicast Framework for Light Weight Sessions and application Level Framing”. In Proceedings of the ’95 Symposium On Communication Architectures and Protocols (SIGCOMM). ACM. August1995, Cambridge MA. [19] C. Siva Ram Murthy and B. S. Manoj “Ad-Hoc Wireless Networks Architecture and protocols”