SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 305
CCAG: GOSSIP BASED RELIABLE MULTICAST PROTOCOL
Smita Kapse1
, Amita Meshram2
, Supriya Thombre3
, Nilima Jichkar4
, Itrat Fatema5
1
Assistant Professor,2
Assistant Professor, 3
Assistant Professor, 4
Assistant Professor, Department of Computer Technology,
YCCE, Nagpur, Maharashtra, India
5
Assistant Professor, Department of Computer Technology, ACET, Nagpur, Maharashtra, India
Abstract
The essential requirement in MANET is now group communication or multicasting since it is used in applications such as network news
dissemination, collaborative computing, disaster relief operation, sensor network, military services. In this type of application reliability
plays an important role. Designing a reliable multicast protocol in MANET is challenging task due to the dynamic topology, limited
bandwidth, constraints of node capability, and frequent disconnections in MANET. In this paper, we propose a scheme called
Congestion Control Anonymous Gossip(CCAG) to improve the reliable packet delivery of multicast routing protocols and decrease the
variation in the number of packets received by the different nodes. It also consider the issues of reliability, low end to end delay, control
overhead and packet delivery in mobile ad-hoc networks. The propose scheme works in two phases. In the first phase any suitable
protocol is used to multicast the message to the group, while in second phase, the gossip protocol tries to recover lost messages.
Keywords: Ad-hoc Wireless network, Anonymous Gossip, MAODV, Packet delivery Reliability, Locality of gossip,
Congestion.
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
An adhoc network is a dynamically reconfigurable wireless
network without any fixed infrastructure. Such type of network
have several resource constraints like bandwidth, battery
power, and demands like latency and other types of QoS,
reliability and security etc. This type of network is specifically
useful in situations like military and disaster relief operation
etc. In such an application multicast is a natural requirement.
The transmission of packets to a group of zero or more hosts
identified by a single destination address is called multicasting
[16]. Large number of multicast protocols are available in
adhoc network like MAODV [5], ODMRP [14], MCEDAR [9]
etc. but this protocol does not provide reliability guarantees due
to
1 Mobility and congestion.
2 Transient partition.
3 Maintenance of multicast structure.
In a wired network the basic technique used for recovering the
lost messages are
1 Flooding
2 Gossip
In flooding any node that receives the packet retransmits to its
entire neighbor hence routing messages are propagated
unnecessary and hence congestion in the network increases.
Gossip [15][6] is a control form of flooding in this the messages
are slowly propagated without congesting the network.
Classical gossip technique used in wired network recovers lost
messages but it requires partial or full knowledge of other
group members.
Hence these methods are impractical in adhoc network due to
several constraints of adhoc network.
Hence we are implementing a protocol which makes use of
gossip technique called Congestion Control Anonymous
Gossip (CCAG) which provides
1 Reliability guarantees
2 Eliminates the variation in the number of packets
received by group member.
3 Less control overhead.
4 High packet delivery.
2. CONGESTION CONTROL ANONYMOUS
GOSSIP PROTOCOL
A gossip based reliable multicast protocol[4] involves two
phases as depicted in following figure
Fig-1: Use of Gossip with Existing Multicast protocol
In the first phase, any suitable unreliable protocol is used to
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 306
multicast the message m, to be sent to the group. In this
experiment we are using the multicast adhoc on demand
distance vector routing protocol to disseminate the message
unreliably. In the second phase, gossip protocol is used to
recover lost messages from other members of the group that
might have received it. This phase consists of periodically
repeated gossip rounds in the background as more and more
messages are multicast. A single gossip round can potentially
recover many lost messages. A single round of gossip consists
of the following steps:
 Node A randomly chooses another member of the
group, say B.
 A sends B the information about messages it has
received or not received.
 B checks to see if it has received any of the messages
listed by A.
 Then A and B could exchange messages which are not
a part of each other’s message history.
To implement the CCAG protocol we include the concept of
following:
 Anonymous Gossip.
 Locality of Gossip.
 Cached Gossip.
 Pull mode of message exchange.
2.1 Anonymous Gossip
AG does not require any member to know the other members of
the multicast group. A new type of message called gossip
message [1][2] is used. This message has the following five
fields:
 Group Address: Address of the multicast group
 Source Address: Address of the node sending the
gossip message
 Lost Buffer: An array of fixed size, which carries
sequence numbers of messages that the source node
believes it has lost
 Number Lost: The size of the Lost Array
 Expected Sequence Number: The sequence number
of the next message that the source expects
Following Steps are used to implement Anonymous Gossip
 If all the packets are not receive successfully then
 Generate the gossip message.
 Pick a node at random
 Send a digest of local contents to the peer.
 Propagate the message among multicast tree.
 If group member then
accept and unicast gossip reply
Else
propagate gossip message to next node.
2.2 Locality of Gossip
Locality of gossip[3] refers to the gossip locally i.e. with nearer
member with a very high probability and with distant nodes
occasionally. Which results in low control overhead?
Following Steps are used to implement Locality of Gossip
 Maintain an additional nearest_member field in MRT
table of MAODV protocol.
 If gossip message is received then next hop with
smallest nearest member value is hosen with higher
probability than with greatest nearest member value.
 Validity of nearest_member is maintain byWhen new
member join send MACT message When existing
member leaves send Prune message
 Each node send the modify message along the route
2.3 Cached Gossip
Cached Gossip [16][2] uses the unicast routes to gossip with
those nodes whose membership is already known. The
inclusion of the algorithm adversely affect the delay recorded in
locating/delivering packets: whenever a node leaves the group;
a new node joins the group; or there is a need for
reconfiguration leading to topological changes.
Following Steps are used to implement Cached Gossip
 Every group member maintain member_cache
 Table consists of (node_add, num_hopes,
last_gossip).
 If (member_cache table full )then If (member with
greatest no. of hopes) delete it Else delete member
with most recent last_gossip
 member_cache table is updated with each gossip
reply, data packet or maintenance packet.
2.4 Pull Mode of Message Exchange
Because of the importance of the direction of information
exchange. The proposed protocol implements a pull mode of
message exchange.
Following Steps are used to implement Pull mode of message
exchange.
 Each group node maintains Lost_table and History
_table.
 Lost_table( sender_add, seq_no) entry is made when
 sequence no greater than expected seq. no is received.
 History_table contains most recent messages received
 If (receive gossip message) then compare Lost_table
with History _table If (message found) then unicast
gossip reply to initiator Else propagate gossip message
to next node
The following figure depicts the complete CCAG protocol
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 307
Fig2: The Complete CCAG Protocol
3. SIMULATION
3.1 Implementation Environment
Operating System : Cent O.S.6.0 NS2 version :
ns-allinone-2.33 Gnu Plot : GNU4.2.5 Perl Script
3.2 Simulation Environment
The network N consists of |N| nodes with same transmission
and communication capabilities, communicating through
bidirectional wireless links between each other. A multicast
group G is a subset of N with nG nodes.
The following assumptions are made :
 Simulation area : 1800 * 900 meters
 Simulation duration: 100 sec.
 Physical/ MAC layer: IEEE 802.11 at 2 Mbps,
250m transmission range
 Mobility model : Random way point model with no
pause time.
 Every node has unique physical ID.
 The transmission radius for each node is fixed.
 Network consist of single multicast group.
 All the nodes join the group at the beginning of the
simulation and remains in it throughout the run period.
33 Performance Metrics
After executing the tcl script the trace file is generated this
contains a lot of information that may not be required to analyze
the performance of a protocol. We are interested in those
information that is sufficient to predict the efficiency of a
protocol. The following performance metrics are needed to be
consider to analyze and compare the performance of MAODV
and CCAG protocol.
 Packet delivery Ratio: It is the ratio of number of data
packets received by the destinations to the number of data
packets sent by the source
PDR% = (TRP / TSP) * 100
Where, PDR: Packet delivery Ratio TRP: Total Received
Packets TSP: Total Sent Packets
PDR is used to compare MAODV protocol with CCAG
protocol. As it describes the loss rate that is seen by the
protocol this in turn affects the maximum throughput that
the network can support. This metric characterizes both
completeness and correctness of the protocol.
 Congestion overhead: It gives the evaluation of the
efficiency of a routing protocol and so if this
parameter is low it means that less overhead is
introduced in the network and the result is network is
less congested and less collision and interference
occur.
It is the ratio of total number of routing signaling
packets transmitted during the simulation in terms of
total number of packets received.
CO = TRSP/ TXP
Where,
CO: Congestion overhead
TRSP: Total of Routing Signaling Packets TXP: Total
of transmitted Packets .
 Data packets received by each node: It is used to
calculate the variation in the number of packets
received by each node. In this we calculate the number
of data packets received by each node over a time
 End to end delay: End-to-end delay is considered as
the average time taken by a packet to reach an Node
from the time it leaves the sender. When a data packet
is first created by the source, it is tagged with a send
time. Subsequently, each node that receives the packet
calculates the end-to-end delay by subtracting the time
the packet was received with the initial send time.
3.4 Simulation Result and Analysis
Graphs are one of the ways to analyze and compare the result of
the trace file. To plot the graph in NS2.33 we are using the
software GNUPLOT which gives more appropriate scale. To
plot the graph we have to first extract the desired field from the
trace file. To do this we had written Perl script. The following
are the graphs showing the outputs of the two protocols
MAODV Vs CCAG. They show the performance metrics that
are discussed in the above section.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 308
Fig-3: Packet delivery Ratio
Fig- 4: Congestion overhead
Fig- 5: Data packets received by each node
Fig- 6: End to End Delay
CONCLUSIONS
Reliable Multicasting is an important requirement in the
MANET. Hence by considering this requirement we design and
implemented congestion control anonymous Gossip protocol
for Adhoc network which provides the reliability guarantees. It
uses MAODV protocol to dissipate the messages unreliably
and on top of that CCAG protocol is used. The performance
comparison between MAODV and CCAG using graph shows
that CCAG gives 22% improvement in the performance as
compare to MAODV protocol. The results show that CCAG
reduces congestion, increases Packet delivery ratio and also
reduces the variation in the number of packets received by
different group members.
REFERENCES
[1] Ms. Smita A Kawade, Mr. K. N. Hande. “Congestion
control anonymous Gossip: Probabilistic reliable
multicast in adhoc network”, International conference on
knowledge and networking in ICT ERA, Chennai, India,
January 2009.
[2] Onifade F.W. Olufade *, Longe O. Babatope, Akanmu
A. Samson. “Congestion Controlled Anonymous
Gossip: A Scalable Method For Providing
Probabilistic Guarantees To Multicast Reliability In
Mobile Ad-Hoc Networks.” International Journal of
Computing and ICT Research, Vol. 1, No. 2, December
2007
[3] Weijia Jia, Dingzhu Lu, Guojun Wang, Lizhuo Zhang,
“Local Retransmission based gossip protocol in mobile
adhoc networks” 2007 IEEE
[4] Yifen WEI, Gaogang XIE Zhongcheng LI, “ A
hierarchical Cross layer protocol for group
communication in MANET.2007 IEEE
[5] Beini Ouyang and Xiaoyan Hong, Yunjung Yi “A
Comparison of Reliable Multicast Protocols for
Mobile Ad Hoc Networks” 2005 IEEE
[6] Zülküf Genç, Öznur Özkasap “Peer-to-Peer Epidemic
Algorithms for Reliable Multicasting in Ad Hoc
Networks” Proceedings Of World Academy Of Science,
Engineering And Technology Volume 3 January 2005
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 309
Issn 1307-6884
[7] Chunqiang Tang, Rong N. Chang and Crostopher Ward,
“GoCast: Gossip Enhanced overlay multicastfor fast and
depenadable group communication” 2005 IEEE
[8] Ayalvadi J. Ganesh,Anne Marie Kermarrec, and Laurent
Massoulie, ”Peer to peer membership management for
gossip based protocol ” IEEE February 2003
[9] Vollset, E. and Ezhilchelvan, P. ”A Survey of Reliable
Broadcast Protocols for Mobile Ad-hoc Networks”,
Technological Report, School of Computing Science,
University of Newcastle, Jun 2003
[10] Jun Luo Patrick Th. Eugster Jean-Pierre Hubaux “Route
Driven Gossip: Probabilistic Reliable Multicast in Ad
Hoc Networks” IEEE INFOCOM 2003
[11] Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K.
Tripathi “A Framework for Reliable Routing in Mobile
Ad Hoc Networks” IEEE INFOCOM 2003
[12] Miguel Castro, Peter Druschel, Anne-Marie Kermarrec
and Antony Rowstron, ”SCRIBE:A large scale and
decentralized application level multicast infrastructure.
IEEE October 2002.
[13] K. Tang, K. Obraczka, S. -J. Lee, and M. Gerla.
“Congestion controlled adaptive lightweight multicast in
wireless mobile ad hoc networks”. In Proceedings of
ISCC, 2002.
[14] E. M. Royer and C. E. Perkins,” Multicast Ad Hoc
On-Demand Distance Vector (MAODV) Routing
Protocol”, IETF, July 2000.
[15] Kenneth P. Birman, Mark Hayden, Oznur Ozkasap,
Zhen Xiao, Mihai Badiuand Yaron Minsky. 1999.
“Bimodal Multicast” ACM Transactions on Computer
Systems, Vol. 17, Issue 2, pp 41 – 88.
[16] Vinod Kone, Atanu Roy Chowdhary, Sukumar Nandi
“A Caching Mechanism To Improve The Reliability Of
Multicasting In Multihop MANET”
[17] Sanjoy Paul, K. K. Sabnani, J. C. Lin, S.
Bhattacharya.“Reliable Multicast Transport Protocol
(RMTP)”. IEEE Journal on Selected Areas in
Communications, special Issue on Network Support for
Multipoint communication, April 97, Vol 15, No. 3
[18] Sally Floyd, Van Jacobson, Steve McCanne,
Ching-Gung Liu and Lixia Zhang. “A Reliable Multicast
Framework for Light Weight Sessions and application
Level Framing”. In Proceedings of the ’95 Symposium
On Communication Architectures and Protocols
(SIGCOMM). ACM. August1995, Cambridge MA.
[19] C. Siva Ram Murthy and B. S. Manoj “Ad-Hoc Wireless
Networks Architecture and protocols”

More Related Content

What's hot

Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network using
IAEME Publication
 

What's hot (18)

VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
Safe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANETSafe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANET
 
G0261041046
G0261041046G0261041046
G0261041046
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Ch1 v1
Ch1 v1Ch1 v1
Ch1 v1
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANET
 
Routing in delay tolerant network using
Routing in delay tolerant network usingRouting in delay tolerant network using
Routing in delay tolerant network using
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...
 

Viewers also liked (13)

Se slides
Se slidesSe slides
Se slides
 
Data Driven Desicion Making
Data Driven Desicion MakingData Driven Desicion Making
Data Driven Desicion Making
 
Decision support system concept 97 2
Decision support system concept 97 2Decision support system concept 97 2
Decision support system concept 97 2
 
Decision Making 2
Decision Making 2Decision Making 2
Decision Making 2
 
Desicion making package picker1
Desicion making   package picker1Desicion making   package picker1
Desicion making package picker1
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
Japanese Model
Japanese ModelJapanese Model
Japanese Model
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Introduction to MANETs
Introduction to MANETsIntroduction to MANETs
Introduction to MANETs
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 

Similar to Gossip based reliable multicast protocol

Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlan
eSAT Publishing House
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
eSAT Publishing House
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
eSAT Journals
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
 
A novel distributed intrusion detection framework for network analysis
A novel distributed intrusion detection framework for network analysisA novel distributed intrusion detection framework for network analysis
A novel distributed intrusion detection framework for network analysis
eSAT Journals
 

Similar to Gossip based reliable multicast protocol (20)

Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
 
Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlan
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
 
Performance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryPerformance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetry
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open network
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Scheduling schemes for carrier aggregation in lte advanced systems
Scheduling schemes for carrier aggregation in lte advanced systemsScheduling schemes for carrier aggregation in lte advanced systems
Scheduling schemes for carrier aggregation in lte advanced systems
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
A novel distributed intrusion detection framework for network analysis
A novel distributed intrusion detection framework for network analysisA novel distributed intrusion detection framework for network analysis
A novel distributed intrusion detection framework for network analysis
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 

More from eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
IJECEIAES
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 

Recently uploaded (20)

electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdf
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 

Gossip based reliable multicast protocol

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 305 CCAG: GOSSIP BASED RELIABLE MULTICAST PROTOCOL Smita Kapse1 , Amita Meshram2 , Supriya Thombre3 , Nilima Jichkar4 , Itrat Fatema5 1 Assistant Professor,2 Assistant Professor, 3 Assistant Professor, 4 Assistant Professor, Department of Computer Technology, YCCE, Nagpur, Maharashtra, India 5 Assistant Professor, Department of Computer Technology, ACET, Nagpur, Maharashtra, India Abstract The essential requirement in MANET is now group communication or multicasting since it is used in applications such as network news dissemination, collaborative computing, disaster relief operation, sensor network, military services. In this type of application reliability plays an important role. Designing a reliable multicast protocol in MANET is challenging task due to the dynamic topology, limited bandwidth, constraints of node capability, and frequent disconnections in MANET. In this paper, we propose a scheme called Congestion Control Anonymous Gossip(CCAG) to improve the reliable packet delivery of multicast routing protocols and decrease the variation in the number of packets received by the different nodes. It also consider the issues of reliability, low end to end delay, control overhead and packet delivery in mobile ad-hoc networks. The propose scheme works in two phases. In the first phase any suitable protocol is used to multicast the message to the group, while in second phase, the gossip protocol tries to recover lost messages. Keywords: Ad-hoc Wireless network, Anonymous Gossip, MAODV, Packet delivery Reliability, Locality of gossip, Congestion. ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION An adhoc network is a dynamically reconfigurable wireless network without any fixed infrastructure. Such type of network have several resource constraints like bandwidth, battery power, and demands like latency and other types of QoS, reliability and security etc. This type of network is specifically useful in situations like military and disaster relief operation etc. In such an application multicast is a natural requirement. The transmission of packets to a group of zero or more hosts identified by a single destination address is called multicasting [16]. Large number of multicast protocols are available in adhoc network like MAODV [5], ODMRP [14], MCEDAR [9] etc. but this protocol does not provide reliability guarantees due to 1 Mobility and congestion. 2 Transient partition. 3 Maintenance of multicast structure. In a wired network the basic technique used for recovering the lost messages are 1 Flooding 2 Gossip In flooding any node that receives the packet retransmits to its entire neighbor hence routing messages are propagated unnecessary and hence congestion in the network increases. Gossip [15][6] is a control form of flooding in this the messages are slowly propagated without congesting the network. Classical gossip technique used in wired network recovers lost messages but it requires partial or full knowledge of other group members. Hence these methods are impractical in adhoc network due to several constraints of adhoc network. Hence we are implementing a protocol which makes use of gossip technique called Congestion Control Anonymous Gossip (CCAG) which provides 1 Reliability guarantees 2 Eliminates the variation in the number of packets received by group member. 3 Less control overhead. 4 High packet delivery. 2. CONGESTION CONTROL ANONYMOUS GOSSIP PROTOCOL A gossip based reliable multicast protocol[4] involves two phases as depicted in following figure Fig-1: Use of Gossip with Existing Multicast protocol In the first phase, any suitable unreliable protocol is used to
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 306 multicast the message m, to be sent to the group. In this experiment we are using the multicast adhoc on demand distance vector routing protocol to disseminate the message unreliably. In the second phase, gossip protocol is used to recover lost messages from other members of the group that might have received it. This phase consists of periodically repeated gossip rounds in the background as more and more messages are multicast. A single gossip round can potentially recover many lost messages. A single round of gossip consists of the following steps:  Node A randomly chooses another member of the group, say B.  A sends B the information about messages it has received or not received.  B checks to see if it has received any of the messages listed by A.  Then A and B could exchange messages which are not a part of each other’s message history. To implement the CCAG protocol we include the concept of following:  Anonymous Gossip.  Locality of Gossip.  Cached Gossip.  Pull mode of message exchange. 2.1 Anonymous Gossip AG does not require any member to know the other members of the multicast group. A new type of message called gossip message [1][2] is used. This message has the following five fields:  Group Address: Address of the multicast group  Source Address: Address of the node sending the gossip message  Lost Buffer: An array of fixed size, which carries sequence numbers of messages that the source node believes it has lost  Number Lost: The size of the Lost Array  Expected Sequence Number: The sequence number of the next message that the source expects Following Steps are used to implement Anonymous Gossip  If all the packets are not receive successfully then  Generate the gossip message.  Pick a node at random  Send a digest of local contents to the peer.  Propagate the message among multicast tree.  If group member then accept and unicast gossip reply Else propagate gossip message to next node. 2.2 Locality of Gossip Locality of gossip[3] refers to the gossip locally i.e. with nearer member with a very high probability and with distant nodes occasionally. Which results in low control overhead? Following Steps are used to implement Locality of Gossip  Maintain an additional nearest_member field in MRT table of MAODV protocol.  If gossip message is received then next hop with smallest nearest member value is hosen with higher probability than with greatest nearest member value.  Validity of nearest_member is maintain byWhen new member join send MACT message When existing member leaves send Prune message  Each node send the modify message along the route 2.3 Cached Gossip Cached Gossip [16][2] uses the unicast routes to gossip with those nodes whose membership is already known. The inclusion of the algorithm adversely affect the delay recorded in locating/delivering packets: whenever a node leaves the group; a new node joins the group; or there is a need for reconfiguration leading to topological changes. Following Steps are used to implement Cached Gossip  Every group member maintain member_cache  Table consists of (node_add, num_hopes, last_gossip).  If (member_cache table full )then If (member with greatest no. of hopes) delete it Else delete member with most recent last_gossip  member_cache table is updated with each gossip reply, data packet or maintenance packet. 2.4 Pull Mode of Message Exchange Because of the importance of the direction of information exchange. The proposed protocol implements a pull mode of message exchange. Following Steps are used to implement Pull mode of message exchange.  Each group node maintains Lost_table and History _table.  Lost_table( sender_add, seq_no) entry is made when  sequence no greater than expected seq. no is received.  History_table contains most recent messages received  If (receive gossip message) then compare Lost_table with History _table If (message found) then unicast gossip reply to initiator Else propagate gossip message to next node The following figure depicts the complete CCAG protocol
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 307 Fig2: The Complete CCAG Protocol 3. SIMULATION 3.1 Implementation Environment Operating System : Cent O.S.6.0 NS2 version : ns-allinone-2.33 Gnu Plot : GNU4.2.5 Perl Script 3.2 Simulation Environment The network N consists of |N| nodes with same transmission and communication capabilities, communicating through bidirectional wireless links between each other. A multicast group G is a subset of N with nG nodes. The following assumptions are made :  Simulation area : 1800 * 900 meters  Simulation duration: 100 sec.  Physical/ MAC layer: IEEE 802.11 at 2 Mbps, 250m transmission range  Mobility model : Random way point model with no pause time.  Every node has unique physical ID.  The transmission radius for each node is fixed.  Network consist of single multicast group.  All the nodes join the group at the beginning of the simulation and remains in it throughout the run period. 33 Performance Metrics After executing the tcl script the trace file is generated this contains a lot of information that may not be required to analyze the performance of a protocol. We are interested in those information that is sufficient to predict the efficiency of a protocol. The following performance metrics are needed to be consider to analyze and compare the performance of MAODV and CCAG protocol.  Packet delivery Ratio: It is the ratio of number of data packets received by the destinations to the number of data packets sent by the source PDR% = (TRP / TSP) * 100 Where, PDR: Packet delivery Ratio TRP: Total Received Packets TSP: Total Sent Packets PDR is used to compare MAODV protocol with CCAG protocol. As it describes the loss rate that is seen by the protocol this in turn affects the maximum throughput that the network can support. This metric characterizes both completeness and correctness of the protocol.  Congestion overhead: It gives the evaluation of the efficiency of a routing protocol and so if this parameter is low it means that less overhead is introduced in the network and the result is network is less congested and less collision and interference occur. It is the ratio of total number of routing signaling packets transmitted during the simulation in terms of total number of packets received. CO = TRSP/ TXP Where, CO: Congestion overhead TRSP: Total of Routing Signaling Packets TXP: Total of transmitted Packets .  Data packets received by each node: It is used to calculate the variation in the number of packets received by each node. In this we calculate the number of data packets received by each node over a time  End to end delay: End-to-end delay is considered as the average time taken by a packet to reach an Node from the time it leaves the sender. When a data packet is first created by the source, it is tagged with a send time. Subsequently, each node that receives the packet calculates the end-to-end delay by subtracting the time the packet was received with the initial send time. 3.4 Simulation Result and Analysis Graphs are one of the ways to analyze and compare the result of the trace file. To plot the graph in NS2.33 we are using the software GNUPLOT which gives more appropriate scale. To plot the graph we have to first extract the desired field from the trace file. To do this we had written Perl script. The following are the graphs showing the outputs of the two protocols MAODV Vs CCAG. They show the performance metrics that are discussed in the above section.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 308 Fig-3: Packet delivery Ratio Fig- 4: Congestion overhead Fig- 5: Data packets received by each node Fig- 6: End to End Delay CONCLUSIONS Reliable Multicasting is an important requirement in the MANET. Hence by considering this requirement we design and implemented congestion control anonymous Gossip protocol for Adhoc network which provides the reliability guarantees. It uses MAODV protocol to dissipate the messages unreliably and on top of that CCAG protocol is used. The performance comparison between MAODV and CCAG using graph shows that CCAG gives 22% improvement in the performance as compare to MAODV protocol. The results show that CCAG reduces congestion, increases Packet delivery ratio and also reduces the variation in the number of packets received by different group members. REFERENCES [1] Ms. Smita A Kawade, Mr. K. N. Hande. “Congestion control anonymous Gossip: Probabilistic reliable multicast in adhoc network”, International conference on knowledge and networking in ICT ERA, Chennai, India, January 2009. [2] Onifade F.W. Olufade *, Longe O. Babatope, Akanmu A. Samson. “Congestion Controlled Anonymous Gossip: A Scalable Method For Providing Probabilistic Guarantees To Multicast Reliability In Mobile Ad-Hoc Networks.” International Journal of Computing and ICT Research, Vol. 1, No. 2, December 2007 [3] Weijia Jia, Dingzhu Lu, Guojun Wang, Lizhuo Zhang, “Local Retransmission based gossip protocol in mobile adhoc networks” 2007 IEEE [4] Yifen WEI, Gaogang XIE Zhongcheng LI, “ A hierarchical Cross layer protocol for group communication in MANET.2007 IEEE [5] Beini Ouyang and Xiaoyan Hong, Yunjung Yi “A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks” 2005 IEEE [6] Zülküf Genç, Öznur Özkasap “Peer-to-Peer Epidemic Algorithms for Reliable Multicasting in Ad Hoc Networks” Proceedings Of World Academy Of Science, Engineering And Technology Volume 3 January 2005
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 309 Issn 1307-6884 [7] Chunqiang Tang, Rong N. Chang and Crostopher Ward, “GoCast: Gossip Enhanced overlay multicastfor fast and depenadable group communication” 2005 IEEE [8] Ayalvadi J. Ganesh,Anne Marie Kermarrec, and Laurent Massoulie, ”Peer to peer membership management for gossip based protocol ” IEEE February 2003 [9] Vollset, E. and Ezhilchelvan, P. ”A Survey of Reliable Broadcast Protocols for Mobile Ad-hoc Networks”, Technological Report, School of Computing Science, University of Newcastle, Jun 2003 [10] Jun Luo Patrick Th. Eugster Jean-Pierre Hubaux “Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks” IEEE INFOCOM 2003 [11] Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K. Tripathi “A Framework for Reliable Routing in Mobile Ad Hoc Networks” IEEE INFOCOM 2003 [12] Miguel Castro, Peter Druschel, Anne-Marie Kermarrec and Antony Rowstron, ”SCRIBE:A large scale and decentralized application level multicast infrastructure. IEEE October 2002. [13] K. Tang, K. Obraczka, S. -J. Lee, and M. Gerla. “Congestion controlled adaptive lightweight multicast in wireless mobile ad hoc networks”. In Proceedings of ISCC, 2002. [14] E. M. Royer and C. E. Perkins,” Multicast Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol”, IETF, July 2000. [15] Kenneth P. Birman, Mark Hayden, Oznur Ozkasap, Zhen Xiao, Mihai Badiuand Yaron Minsky. 1999. “Bimodal Multicast” ACM Transactions on Computer Systems, Vol. 17, Issue 2, pp 41 – 88. [16] Vinod Kone, Atanu Roy Chowdhary, Sukumar Nandi “A Caching Mechanism To Improve The Reliability Of Multicasting In Multihop MANET” [17] Sanjoy Paul, K. K. Sabnani, J. C. Lin, S. Bhattacharya.“Reliable Multicast Transport Protocol (RMTP)”. IEEE Journal on Selected Areas in Communications, special Issue on Network Support for Multipoint communication, April 97, Vol 15, No. 3 [18] Sally Floyd, Van Jacobson, Steve McCanne, Ching-Gung Liu and Lixia Zhang. “A Reliable Multicast Framework for Light Weight Sessions and application Level Framing”. In Proceedings of the ’95 Symposium On Communication Architectures and Protocols (SIGCOMM). ACM. August1995, Cambridge MA. [19] C. Siva Ram Murthy and B. S. Manoj “Ad-Hoc Wireless Networks Architecture and protocols”