SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 305
CCAG: GOSSIP BASED RELIABLE MULTICAST PROTOCOL
Smita Kapse1
, Amita Meshram2
, Supriya Thombre3
, Nilima Jichkar4
, Itrat Fatema5
1
Assistant Professor, 2
Assistant Professor, 3
Assistant Professor, 4
Assistant Professor, Department of Computer Technology,
YCCE, Nagpur, Maharashtra, India
5
Assistant Professor, Department of Computer Technology, ACET, Nagpur, Maharashtra, India
Abstract
The essential requirement in MANET is now group communication or multicasting since it is used in applications such as network news
dissemination, collaborative computing, disaster relief operation, sensor network, military services. In this type of application reliability
plays an important role. Designing a reliable multicast protocol in MANET is challenging task due to the dynamic topology, limited
bandwidth, constraints of node capability, and frequent disconnections in MANET. In this paper, we propose a scheme called
Congestion Control Anonymous Gossip(CCAG) to improve the reliable packet delivery of multicast routing protocols and decrease the
variation in the number of packets received by the different nodes. It also consider the issues of reliability, low end to end delay, control
overhead and packet delivery in mobile ad-hoc networks. The propose scheme works in two phases. In the first phase any suitable
protocol is used to multicast the message to the group, while in second phase, the gossip protocol tries to recover lost messages.
Keywords: Ad-hoc Wireless network, Anonymous Gossip, MAODV, Packet delivery Reliability, Locality of gossip,
Congestion.
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
An adhoc network is a dynamically reconfigurable wireless
network without any fixed infrastructure. Such type of network
have several resource constraints like bandwidth, battery
power, and demands like latency and other types of QoS,
reliability and security etc. This type of network is specifically
useful in situations like military and disaster relief operation
etc. In such an application multicast is a natural requirement.
The transmission of packets to a group of zero or more hosts
identified by a single destination address is called multicasting
[16]. Large number of multicast protocols are available in
adhoc network like MAODV [5], ODMRP [14], MCEDAR [9]
etc. but this protocol does not provide reliability guarantees due
to
1 Mobility and congestion.
2 Transient partition.
3 Maintenance of multicast structure.
In a wired network the basic technique used for recovering the
lost messages are
1 Flooding
2 Gossip
In flooding any node that receives the packet retransmits to its
entire neighbor hence routing messages are propagated
unnecessary and hence congestion in the network increases.
Gossip [15][6] is a control form of flooding in this the messages
are slowly propagated without congesting the network.
Classical gossip technique used in wired network recovers lost
messages but it requires partial or full knowledge of other
group members.
Hence these methods are impractical in adhoc network due to
several constraints of adhoc network.
Hence we are implementing a protocol which makes use of
gossip technique called Congestion Control Anonymous
Gossip (CCAG) which provides
1 Reliability guarantees
2 Eliminates the variation in the number of packets
received by group member.
3 Less control overhead.
4 High packet delivery.
2. CONGESTION CONTROL ANONYMOUS
GOSSIP PROTOCOL
A gossip based reliable multicast protocol[4] involves two
phases as depicted in following figure
Fig-1: Use of Gossip with Existing Multicast protocol
In the first phase, any suitable unreliable protocol is used to
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 306
multicast the message m, to be sent to the group. In this
experiment we are using the multicast adhoc on demand
distance vector routing protocol to disseminate the message
unreliably. In the second phase, gossip protocol is used to
recover lost messages from other members of the group that
might have received it. This phase consists of periodically
repeated gossip rounds in the background as more and more
messages are multicast. A single gossip round can potentially
recover many lost messages. A single round of gossip consists
of the following steps:
• Node A randomly chooses another member of the
group, say B.
• A sends B the information about messages it has
received or not received.
• B checks to see if it has received any of the messages
listed by A.
• Then A and B could exchange messages which are not
a part of each other’s message history.
To implement the CCAG protocol we include the concept of
following:
• Anonymous Gossip.
• Locality of Gossip.
• Cached Gossip.
• Pull mode of message exchange.
2.1 Anonymous Gossip
AG does not require any member to know the other members of
the multicast group. A new type of message called gossip
message [1][2] is used. This message has the following five
fields:
• Group Address: Address of the multicast group
• Source Address: Address of the node sending the
gossip message
• Lost Buffer: An array of fixed size, which carries
sequence numbers of messages that the source node
believes it has lost
• Number Lost: The size of the Lost Array
• Expected Sequence Number: The sequence number
of the next message that the source expects
Following Steps are used to implement Anonymous Gossip
• If all the packets are not receive successfully then
• Generate the gossip message.
• Pick a node at random
• Send a digest of local contents to the peer.
• Propagate the message among multicast tree.
• If group member then
accept and unicast gossip reply
Else
propagate gossip message to next node.
2.2 Locality of Gossip
Locality of gossip[3] refers to the gossip locally i.e. with nearer
member with a very high probability and with distant nodes
occasionally. Which results in low control overhead?
Following Steps are used to implement Locality of Gossip
• Maintain an additional nearest_member field in MRT
table of MAODV protocol.
• If gossip message is received then next hop with
smallest nearest member value is hosen with higher
probability than with greatest nearest member value.
• Validity of nearest_member is maintain byWhen new
member join send MACT message When existing
member leaves send Prune message
• Each node send the modify message along the route
2.3 Cached Gossip
Cached Gossip [16][2] uses the unicast routes to gossip with
those nodes whose membership is already known. The
inclusion of the algorithm adversely affect the delay recorded in
locating/delivering packets: whenever a node leaves the group;
a new node joins the group; or there is a need for
reconfiguration leading to topological changes.
Following Steps are used to implement Cached Gossip
• Every group member maintain member_cache
• Table consists of (node_add, num_hopes,
last_gossip).
• If (member_cache table full )then If (member with
greatest no. of hopes) delete it Else delete member
with most recent last_gossip
• member_cache table is updated with each gossip
reply, data packet or maintenance packet.
2.4 Pull Mode of Message Exchange
Because of the importance of the direction of information
exchange. The proposed protocol implements a pull mode of
message exchange.
Following Steps are used to implement Pull mode of message
exchange.
• Each group node maintains Lost_table and History
_table.
• Lost_table( sender_add, seq_no) entry is made when
• sequence no greater than expected seq. no is received.
• History_table contains most recent messages received
• If (receive gossip message) then compare Lost_table
with History _table If (message found) then unicast
gossip reply to initiator Else propagate gossip message
to next node
The following figure depicts the complete CCAG protocol
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 307
Fig2: The Complete CCAG Protocol
3. SIMULATION
3.1 Implementation Environment
Operating System : Cent O.S.6.0 NS2 version :
ns-allinone-2.33 Gnu Plot : GNU4.2.5 Perl Script
3.2 Simulation Environment
The network N consists of |N| nodes with same transmission
and communication capabilities, communicating through
bidirectional wireless links between each other. A multicast
group G is a subset of N with nG nodes.
The following assumptions are made :
• Simulation area : 1800 * 900 meters
• Simulation duration: 100 sec.
• Physical/ MAC layer: IEEE 802.11 at 2 Mbps,
250m transmission range
• Mobility model : Random way point model with no
pause time.
• Every node has unique physical ID.
• The transmission radius for each node is fixed.
• Network consist of single multicast group.
• All the nodes join the group at the beginning of the
simulation and remains in it throughout the run period.
33 Performance Metrics
After executing the tcl script the trace file is generated this
contains a lot of information that may not be required to analyze
the performance of a protocol. We are interested in those
information that is sufficient to predict the efficiency of a
protocol. The following performance metrics are needed to be
consider to analyze and compare the performance of MAODV
and CCAG protocol.
• Packet delivery Ratio: It is the ratio of number of data
packets received by the destinations to the number of data
packets sent by the source
PDR% = (TRP / TSP) * 100
Where, PDR: Packet delivery Ratio TRP: Total Received
Packets TSP: Total Sent Packets
PDR is used to compare MAODV protocol with CCAG
protocol. As it describes the loss rate that is seen by the
protocol this in turn affects the maximum throughput that
the network can support. This metric characterizes both
completeness and correctness of the protocol.
• Congestion overhead: It gives the evaluation of the
efficiency of a routing protocol and so if this
parameter is low it means that less overhead is
introduced in the network and the result is network is
less congested and less collision and interference
occur.
It is the ratio of total number of routing signaling
packets transmitted during the simulation in terms of
total number of packets received.
CO = TRSP/ TXP
Where,
CO: Congestion overhead
TRSP: Total of Routing Signaling Packets TXP: Total
of transmitted Packets .
• Data packets received by each node: It is used to
calculate the variation in the number of packets
received by each node. In this we calculate the number
of data packets received by each node over a time
• End to end delay: End-to-end delay is considered as
the average time taken by a packet to reach an Node
from the time it leaves the sender. When a data packet
is first created by the source, it is tagged with a send
time. Subsequently, each node that receives the packet
calculates the end-to-end delay by subtracting the time
the packet was received with the initial send time.
3.4 Simulation Result and Analysis
Graphs are one of the ways to analyze and compare the result of
the trace file. To plot the graph in NS2.33 we are using the
software GNUPLOT which gives more appropriate scale. To
plot the graph we have to first extract the desired field from the
trace file. To do this we had written Perl script. The following
are the graphs showing the outputs of the two protocols
MAODV Vs CCAG. They show the performance metrics that
are discussed in the above section.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 308
Fig-3: Packet delivery Ratio
Fig- 4: Congestion overhead
Fig- 5: Data packets received by each node
Fig- 6: End to End Delay
CONCLUSIONS
Reliable Multicasting is an important requirement in the
MANET. Hence by considering this requirement we design and
implemented congestion control anonymous Gossip protocol
for Adhoc network which provides the reliability guarantees. It
uses MAODV protocol to dissipate the messages unreliably
and on top of that CCAG protocol is used. The performance
comparison between MAODV and CCAG using graph shows
that CCAG gives 22% improvement in the performance as
compare to MAODV protocol. The results show that CCAG
reduces congestion, increases Packet delivery ratio and also
reduces the variation in the number of packets received by
different group members.
REFERENCES
[1] Ms. Smita A Kawade, Mr. K. N. Hande. “Congestion
control anonymous Gossip: Probabilistic reliable
multicast in adhoc network”, International conference on
knowledge and networking in ICT ERA, Chennai, India,
January 2009.
[2] Onifade F.W. Olufade *, Longe O. Babatope, Akanmu
A. Samson. “Congestion Controlled Anonymous
Gossip: A Scalable Method For Providing
Probabilistic Guarantees To Multicast Reliability In
Mobile Ad-Hoc Networks.” International Journal of
Computing and ICT Research, Vol. 1, No. 2, December
2007
[3] Weijia Jia, Dingzhu Lu, Guojun Wang, Lizhuo Zhang,
“Local Retransmission based gossip protocol in mobile
adhoc networks” 2007 IEEE
[4] Yifen WEI, Gaogang XIE Zhongcheng LI, “ A
hierarchical Cross layer protocol for group
communication in MANET.2007 IEEE
[5] Beini Ouyang and Xiaoyan Hong, Yunjung Yi “A
Comparison of Reliable Multicast Protocols for
Mobile Ad Hoc Networks” 2005 IEEE
[6] Zülküf Genç, Öznur Özkasap “Peer-to-Peer Epidemic
Algorithms for Reliable Multicasting in Ad Hoc
Networks” Proceedings Of World Academy Of Science,
Engineering And Technology Volume 3 January 2005
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 309
Issn 1307-6884
[7] Chunqiang Tang, Rong N. Chang and Crostopher Ward,
“GoCast: Gossip Enhanced overlay multicastfor fast and
depenadable group communication” 2005 IEEE
[8] Ayalvadi J. Ganesh,Anne Marie Kermarrec, and Laurent
Massoulie, ”Peer to peer membership management for
gossip based protocol ” IEEE February 2003
[9] Vollset, E. and Ezhilchelvan, P. ”A Survey of Reliable
Broadcast Protocols for Mobile Ad-hoc Networks”,
Technological Report, School of Computing Science,
University of Newcastle, Jun 2003
[10] Jun Luo Patrick Th. Eugster Jean-Pierre Hubaux “Route
Driven Gossip: Probabilistic Reliable Multicast in Ad
Hoc Networks” IEEE INFOCOM 2003
[11] Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K.
Tripathi “A Framework for Reliable Routing in Mobile
Ad Hoc Networks” IEEE INFOCOM 2003
[12] Miguel Castro, Peter Druschel, Anne-Marie Kermarrec
and Antony Rowstron, ”SCRIBE:A large scale and
decentralized application level multicast infrastructure.
IEEE October 2002.
[13] K. Tang, K. Obraczka, S. -J. Lee, and M. Gerla.
“Congestion controlled adaptive lightweight multicast in
wireless mobile ad hoc networks”. In Proceedings of
ISCC, 2002.
[14] E. M. Royer and C. E. Perkins,” Multicast Ad Hoc
On-Demand Distance Vector (MAODV) Routing
Protocol”, IETF, July 2000.
[15] Kenneth P. Birman, Mark Hayden, Oznur Ozkasap,
Zhen Xiao, Mihai Badiuand Yaron Minsky. 1999.
“Bimodal Multicast” ACM Transactions on Computer
Systems, Vol. 17, Issue 2, pp 41 – 88.
[16] Vinod Kone, Atanu Roy Chowdhary, Sukumar Nandi
“A Caching Mechanism To Improve The Reliability Of
Multicasting In Multihop MANET”
[17] Sanjoy Paul, K. K. Sabnani, J. C. Lin, S.
Bhattacharya.“Reliable Multicast Transport Protocol
(RMTP)”. IEEE Journal on Selected Areas in
Communications, special Issue on Network Support for
Multipoint communication, April 97, Vol 15, No. 3
[18] Sally Floyd, Van Jacobson, Steve McCanne,
Ching-Gung Liu and Lixia Zhang. “A Reliable Multicast
Framework for Light Weight Sessions and application
Level Framing”. In Proceedings of the ’95 Symposium
On Communication Architectures and Protocols
(SIGCOMM). ACM. August1995, Cambridge MA.
[19] C. Siva Ram Murthy and B. S. Manoj “Ad-Hoc Wireless
Networks Architecture and protocols”

More Related Content

PDF
Gossip based reliable multicast protocol
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
PDF
Sen 214 simple secure multicast transmission
PDF
PDF
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
PDF
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
PDF
Packet hiding methods for preventing selective jamming attacks
Gossip based reliable multicast protocol
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
Sen 214 simple secure multicast transmission
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
Packet hiding methods for preventing selective jamming attacks

What's hot (20)

PDF
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
PDF
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
PDF
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
PDF
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
PDF
Advisedly delayed packet attack on tcp based mobile
PDF
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
PDF
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PDF
Safe Trust Alert Routing in MANET
PDF
A novel approach for preventing black hole
PDF
Communication synchronization in cluster based wireless sensor network a re...
PDF
Impact of black hole attack on aodv routing protocol
PDF
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
PDF
Ijcatr04051009
PDF
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
PDF
Energy in Wireless Sensor Network
PDF
Paper id 42201621
PPTX
Intro to DTN and routing classification
PDF
“Optimizing the data transmission between multiple nodes during link failure ...
PDF
Routing in delay tolerant network using
PDF
Performance investigation of re shuffling packet
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
Safe Trust Alert Routing in MANET
A novel approach for preventing black hole
Communication synchronization in cluster based wireless sensor network a re...
Impact of black hole attack on aodv routing protocol
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
Ijcatr04051009
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Energy in Wireless Sensor Network
Paper id 42201621
Intro to DTN and routing classification
“Optimizing the data transmission between multiple nodes during link failure ...
Routing in delay tolerant network using
Performance investigation of re shuffling packet
Ad

Viewers also liked (20)

PDF
Realization of high performance run time loadable mips soft-core processor
PDF
Concrete based on alkali activated fly ash from one power plant in serbia
PDF
Analysis of grading techniques in xlpe cable insulation by fem
PDF
“Remedies over the obstacles in implementing automation in indian infrastruct...
PDF
Grid fabrication of traffic maintenance system clustering at road junctions
PDF
Comparative studies on flotation of kasolite using cationic and anionic surfa...
PDF
Stability and surface free energy analysis of a liquid drop on a horizontal c...
PDF
Economical placement of shear walls in a moment resisting frame for earthquak...
PDF
Simulation of convolutional encoder
PDF
The effect of rotor disc clearance on the lift performance of contra rotating...
PDF
Capacity and performance analysis of suame
PDF
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
PDF
Study of fiber optic sensor using concrete beams
PDF
Online social network mining current trends and research issues
PDF
Numerical simulation of friction stir butt welding processes for az91 magnesi...
PDF
Enhanced security in spontaneous wireless ad hoc
PDF
Blood flow through stenosed inclined tubes with
PDF
Comparative analysis of singularities of 3 prs and 3-
PDF
Emotional telugu speech signals classification based on k nn classifier
PDF
Color and texture based image retrieval a proposed
Realization of high performance run time loadable mips soft-core processor
Concrete based on alkali activated fly ash from one power plant in serbia
Analysis of grading techniques in xlpe cable insulation by fem
“Remedies over the obstacles in implementing automation in indian infrastruct...
Grid fabrication of traffic maintenance system clustering at road junctions
Comparative studies on flotation of kasolite using cationic and anionic surfa...
Stability and surface free energy analysis of a liquid drop on a horizontal c...
Economical placement of shear walls in a moment resisting frame for earthquak...
Simulation of convolutional encoder
The effect of rotor disc clearance on the lift performance of contra rotating...
Capacity and performance analysis of suame
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Study of fiber optic sensor using concrete beams
Online social network mining current trends and research issues
Numerical simulation of friction stir butt welding processes for az91 magnesi...
Enhanced security in spontaneous wireless ad hoc
Blood flow through stenosed inclined tubes with
Comparative analysis of singularities of 3 prs and 3-
Emotional telugu speech signals classification based on k nn classifier
Color and texture based image retrieval a proposed
Ad

Similar to Ccag gossip based reliable multicast protocol (20)

PPT
Chapter 11
PDF
PDF
Internet of things protocols for resource constrained applications
PPT
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
PPTX
Network fundamental
PPTX
Final Presentation on the Network layer
PPT
Group Communication (Distributed computing)
PPT
Communicationsystems2
PPT
It 3-icmp-igmp
PDF
An approximation delay between consecutive requests for congestion control in...
PPTX
networking concepts and its theory for engineering
PPTX
Network protocols and vulnerabilities
PPT
5 sharing-app
PDF
Osi model
PDF
DS Unit-4-Communication .pdf
PPTX
CCNP v6 Route: Implementing IP Routing Chapter 2
PPTX
CCNP Route EIGRP Overview
PPTX
4 transport-sharing
PPTX
Routing Protocol in detail
Chapter 11
Internet of things protocols for resource constrained applications
Enhanced Interior Gateway Routing Protocol (EIGRP) || NETWORK PROTOCOL
Network fundamental
Final Presentation on the Network layer
Group Communication (Distributed computing)
Communicationsystems2
It 3-icmp-igmp
An approximation delay between consecutive requests for congestion control in...
networking concepts and its theory for engineering
Network protocols and vulnerabilities
5 sharing-app
Osi model
DS Unit-4-Communication .pdf
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP Route EIGRP Overview
4 transport-sharing
Routing Protocol in detail

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Welding lecture in detail for understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Project quality management in manufacturing
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT
Mechanical Engineering MATERIALS Selection
additive manufacturing of ss316l using mig welding
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Welding lecture in detail for understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Project quality management in manufacturing
Embodied AI: Ushering in the Next Era of Intelligent Systems
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Foundation to blockchain - A guide to Blockchain Tech
Internet of Things (IOT) - A guide to understanding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT 4 Total Quality Management .pptx
CH1 Production IntroductoryConcepts.pptx
bas. eng. economics group 4 presentation 1.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mechanical Engineering MATERIALS Selection

Ccag gossip based reliable multicast protocol

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 305 CCAG: GOSSIP BASED RELIABLE MULTICAST PROTOCOL Smita Kapse1 , Amita Meshram2 , Supriya Thombre3 , Nilima Jichkar4 , Itrat Fatema5 1 Assistant Professor, 2 Assistant Professor, 3 Assistant Professor, 4 Assistant Professor, Department of Computer Technology, YCCE, Nagpur, Maharashtra, India 5 Assistant Professor, Department of Computer Technology, ACET, Nagpur, Maharashtra, India Abstract The essential requirement in MANET is now group communication or multicasting since it is used in applications such as network news dissemination, collaborative computing, disaster relief operation, sensor network, military services. In this type of application reliability plays an important role. Designing a reliable multicast protocol in MANET is challenging task due to the dynamic topology, limited bandwidth, constraints of node capability, and frequent disconnections in MANET. In this paper, we propose a scheme called Congestion Control Anonymous Gossip(CCAG) to improve the reliable packet delivery of multicast routing protocols and decrease the variation in the number of packets received by the different nodes. It also consider the issues of reliability, low end to end delay, control overhead and packet delivery in mobile ad-hoc networks. The propose scheme works in two phases. In the first phase any suitable protocol is used to multicast the message to the group, while in second phase, the gossip protocol tries to recover lost messages. Keywords: Ad-hoc Wireless network, Anonymous Gossip, MAODV, Packet delivery Reliability, Locality of gossip, Congestion. ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION An adhoc network is a dynamically reconfigurable wireless network without any fixed infrastructure. Such type of network have several resource constraints like bandwidth, battery power, and demands like latency and other types of QoS, reliability and security etc. This type of network is specifically useful in situations like military and disaster relief operation etc. In such an application multicast is a natural requirement. The transmission of packets to a group of zero or more hosts identified by a single destination address is called multicasting [16]. Large number of multicast protocols are available in adhoc network like MAODV [5], ODMRP [14], MCEDAR [9] etc. but this protocol does not provide reliability guarantees due to 1 Mobility and congestion. 2 Transient partition. 3 Maintenance of multicast structure. In a wired network the basic technique used for recovering the lost messages are 1 Flooding 2 Gossip In flooding any node that receives the packet retransmits to its entire neighbor hence routing messages are propagated unnecessary and hence congestion in the network increases. Gossip [15][6] is a control form of flooding in this the messages are slowly propagated without congesting the network. Classical gossip technique used in wired network recovers lost messages but it requires partial or full knowledge of other group members. Hence these methods are impractical in adhoc network due to several constraints of adhoc network. Hence we are implementing a protocol which makes use of gossip technique called Congestion Control Anonymous Gossip (CCAG) which provides 1 Reliability guarantees 2 Eliminates the variation in the number of packets received by group member. 3 Less control overhead. 4 High packet delivery. 2. CONGESTION CONTROL ANONYMOUS GOSSIP PROTOCOL A gossip based reliable multicast protocol[4] involves two phases as depicted in following figure Fig-1: Use of Gossip with Existing Multicast protocol In the first phase, any suitable unreliable protocol is used to
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 306 multicast the message m, to be sent to the group. In this experiment we are using the multicast adhoc on demand distance vector routing protocol to disseminate the message unreliably. In the second phase, gossip protocol is used to recover lost messages from other members of the group that might have received it. This phase consists of periodically repeated gossip rounds in the background as more and more messages are multicast. A single gossip round can potentially recover many lost messages. A single round of gossip consists of the following steps: • Node A randomly chooses another member of the group, say B. • A sends B the information about messages it has received or not received. • B checks to see if it has received any of the messages listed by A. • Then A and B could exchange messages which are not a part of each other’s message history. To implement the CCAG protocol we include the concept of following: • Anonymous Gossip. • Locality of Gossip. • Cached Gossip. • Pull mode of message exchange. 2.1 Anonymous Gossip AG does not require any member to know the other members of the multicast group. A new type of message called gossip message [1][2] is used. This message has the following five fields: • Group Address: Address of the multicast group • Source Address: Address of the node sending the gossip message • Lost Buffer: An array of fixed size, which carries sequence numbers of messages that the source node believes it has lost • Number Lost: The size of the Lost Array • Expected Sequence Number: The sequence number of the next message that the source expects Following Steps are used to implement Anonymous Gossip • If all the packets are not receive successfully then • Generate the gossip message. • Pick a node at random • Send a digest of local contents to the peer. • Propagate the message among multicast tree. • If group member then accept and unicast gossip reply Else propagate gossip message to next node. 2.2 Locality of Gossip Locality of gossip[3] refers to the gossip locally i.e. with nearer member with a very high probability and with distant nodes occasionally. Which results in low control overhead? Following Steps are used to implement Locality of Gossip • Maintain an additional nearest_member field in MRT table of MAODV protocol. • If gossip message is received then next hop with smallest nearest member value is hosen with higher probability than with greatest nearest member value. • Validity of nearest_member is maintain byWhen new member join send MACT message When existing member leaves send Prune message • Each node send the modify message along the route 2.3 Cached Gossip Cached Gossip [16][2] uses the unicast routes to gossip with those nodes whose membership is already known. The inclusion of the algorithm adversely affect the delay recorded in locating/delivering packets: whenever a node leaves the group; a new node joins the group; or there is a need for reconfiguration leading to topological changes. Following Steps are used to implement Cached Gossip • Every group member maintain member_cache • Table consists of (node_add, num_hopes, last_gossip). • If (member_cache table full )then If (member with greatest no. of hopes) delete it Else delete member with most recent last_gossip • member_cache table is updated with each gossip reply, data packet or maintenance packet. 2.4 Pull Mode of Message Exchange Because of the importance of the direction of information exchange. The proposed protocol implements a pull mode of message exchange. Following Steps are used to implement Pull mode of message exchange. • Each group node maintains Lost_table and History _table. • Lost_table( sender_add, seq_no) entry is made when • sequence no greater than expected seq. no is received. • History_table contains most recent messages received • If (receive gossip message) then compare Lost_table with History _table If (message found) then unicast gossip reply to initiator Else propagate gossip message to next node The following figure depicts the complete CCAG protocol
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 307 Fig2: The Complete CCAG Protocol 3. SIMULATION 3.1 Implementation Environment Operating System : Cent O.S.6.0 NS2 version : ns-allinone-2.33 Gnu Plot : GNU4.2.5 Perl Script 3.2 Simulation Environment The network N consists of |N| nodes with same transmission and communication capabilities, communicating through bidirectional wireless links between each other. A multicast group G is a subset of N with nG nodes. The following assumptions are made : • Simulation area : 1800 * 900 meters • Simulation duration: 100 sec. • Physical/ MAC layer: IEEE 802.11 at 2 Mbps, 250m transmission range • Mobility model : Random way point model with no pause time. • Every node has unique physical ID. • The transmission radius for each node is fixed. • Network consist of single multicast group. • All the nodes join the group at the beginning of the simulation and remains in it throughout the run period. 33 Performance Metrics After executing the tcl script the trace file is generated this contains a lot of information that may not be required to analyze the performance of a protocol. We are interested in those information that is sufficient to predict the efficiency of a protocol. The following performance metrics are needed to be consider to analyze and compare the performance of MAODV and CCAG protocol. • Packet delivery Ratio: It is the ratio of number of data packets received by the destinations to the number of data packets sent by the source PDR% = (TRP / TSP) * 100 Where, PDR: Packet delivery Ratio TRP: Total Received Packets TSP: Total Sent Packets PDR is used to compare MAODV protocol with CCAG protocol. As it describes the loss rate that is seen by the protocol this in turn affects the maximum throughput that the network can support. This metric characterizes both completeness and correctness of the protocol. • Congestion overhead: It gives the evaluation of the efficiency of a routing protocol and so if this parameter is low it means that less overhead is introduced in the network and the result is network is less congested and less collision and interference occur. It is the ratio of total number of routing signaling packets transmitted during the simulation in terms of total number of packets received. CO = TRSP/ TXP Where, CO: Congestion overhead TRSP: Total of Routing Signaling Packets TXP: Total of transmitted Packets . • Data packets received by each node: It is used to calculate the variation in the number of packets received by each node. In this we calculate the number of data packets received by each node over a time • End to end delay: End-to-end delay is considered as the average time taken by a packet to reach an Node from the time it leaves the sender. When a data packet is first created by the source, it is tagged with a send time. Subsequently, each node that receives the packet calculates the end-to-end delay by subtracting the time the packet was received with the initial send time. 3.4 Simulation Result and Analysis Graphs are one of the ways to analyze and compare the result of the trace file. To plot the graph in NS2.33 we are using the software GNUPLOT which gives more appropriate scale. To plot the graph we have to first extract the desired field from the trace file. To do this we had written Perl script. The following are the graphs showing the outputs of the two protocols MAODV Vs CCAG. They show the performance metrics that are discussed in the above section.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 308 Fig-3: Packet delivery Ratio Fig- 4: Congestion overhead Fig- 5: Data packets received by each node Fig- 6: End to End Delay CONCLUSIONS Reliable Multicasting is an important requirement in the MANET. Hence by considering this requirement we design and implemented congestion control anonymous Gossip protocol for Adhoc network which provides the reliability guarantees. It uses MAODV protocol to dissipate the messages unreliably and on top of that CCAG protocol is used. The performance comparison between MAODV and CCAG using graph shows that CCAG gives 22% improvement in the performance as compare to MAODV protocol. The results show that CCAG reduces congestion, increases Packet delivery ratio and also reduces the variation in the number of packets received by different group members. REFERENCES [1] Ms. Smita A Kawade, Mr. K. N. Hande. “Congestion control anonymous Gossip: Probabilistic reliable multicast in adhoc network”, International conference on knowledge and networking in ICT ERA, Chennai, India, January 2009. [2] Onifade F.W. Olufade *, Longe O. Babatope, Akanmu A. Samson. “Congestion Controlled Anonymous Gossip: A Scalable Method For Providing Probabilistic Guarantees To Multicast Reliability In Mobile Ad-Hoc Networks.” International Journal of Computing and ICT Research, Vol. 1, No. 2, December 2007 [3] Weijia Jia, Dingzhu Lu, Guojun Wang, Lizhuo Zhang, “Local Retransmission based gossip protocol in mobile adhoc networks” 2007 IEEE [4] Yifen WEI, Gaogang XIE Zhongcheng LI, “ A hierarchical Cross layer protocol for group communication in MANET.2007 IEEE [5] Beini Ouyang and Xiaoyan Hong, Yunjung Yi “A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks” 2005 IEEE [6] Zülküf Genç, Öznur Özkasap “Peer-to-Peer Epidemic Algorithms for Reliable Multicasting in Ad Hoc Networks” Proceedings Of World Academy Of Science, Engineering And Technology Volume 3 January 2005
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 309 Issn 1307-6884 [7] Chunqiang Tang, Rong N. Chang and Crostopher Ward, “GoCast: Gossip Enhanced overlay multicastfor fast and depenadable group communication” 2005 IEEE [8] Ayalvadi J. Ganesh,Anne Marie Kermarrec, and Laurent Massoulie, ”Peer to peer membership management for gossip based protocol ” IEEE February 2003 [9] Vollset, E. and Ezhilchelvan, P. ”A Survey of Reliable Broadcast Protocols for Mobile Ad-hoc Networks”, Technological Report, School of Computing Science, University of Newcastle, Jun 2003 [10] Jun Luo Patrick Th. Eugster Jean-Pierre Hubaux “Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks” IEEE INFOCOM 2003 [11] Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K. Tripathi “A Framework for Reliable Routing in Mobile Ad Hoc Networks” IEEE INFOCOM 2003 [12] Miguel Castro, Peter Druschel, Anne-Marie Kermarrec and Antony Rowstron, ”SCRIBE:A large scale and decentralized application level multicast infrastructure. IEEE October 2002. [13] K. Tang, K. Obraczka, S. -J. Lee, and M. Gerla. “Congestion controlled adaptive lightweight multicast in wireless mobile ad hoc networks”. In Proceedings of ISCC, 2002. [14] E. M. Royer and C. E. Perkins,” Multicast Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol”, IETF, July 2000. [15] Kenneth P. Birman, Mark Hayden, Oznur Ozkasap, Zhen Xiao, Mihai Badiuand Yaron Minsky. 1999. “Bimodal Multicast” ACM Transactions on Computer Systems, Vol. 17, Issue 2, pp 41 – 88. [16] Vinod Kone, Atanu Roy Chowdhary, Sukumar Nandi “A Caching Mechanism To Improve The Reliability Of Multicasting In Multihop MANET” [17] Sanjoy Paul, K. K. Sabnani, J. C. Lin, S. Bhattacharya.“Reliable Multicast Transport Protocol (RMTP)”. IEEE Journal on Selected Areas in Communications, special Issue on Network Support for Multipoint communication, April 97, Vol 15, No. 3 [18] Sally Floyd, Van Jacobson, Steve McCanne, Ching-Gung Liu and Lixia Zhang. “A Reliable Multicast Framework for Light Weight Sessions and application Level Framing”. In Proceedings of the ’95 Symposium On Communication Architectures and Protocols (SIGCOMM). ACM. August1995, Cambridge MA. [19] C. Siva Ram Murthy and B. S. Manoj “Ad-Hoc Wireless Networks Architecture and protocols”