Quantitative Analysis of the Fault-Tolerance of Pragmatic General Multicast (PGM) and Elastic Reliable Multicast (ERM) Protocols
Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 2
Abstract
Multicast communication protocols are not immune from failures as a result of packets being dropped due to a broken link or time out processes. Therefore, it is essential to understand how these failures can affect the overall performance of multicast protocols over the Internet. This paper compares the faulttolerance effect of two reliable multicast protocols: pragmatic general multicast (PGM) and elastic reliable multicast (ERM) in a situation where a multicast-aware node fails and the sub-nodes will have to request a repaired packet. A simulation model is developed in such a way that faults are randomly created on nodes and link for a specified period of time and the fault-tolerance effect on the two multicast protocols is analyzed. The model developed for this paper repeats the simulation for different network size, the results obtained show that the ERM protocol is better than the PGM as the size of the network increases. This finding is key while considering the improvement (or upgrade) of existing multicast protocols. The result is also significant at the early stage of designing new multicast protocols as it provides useful information in allocating scarce resource that can be appropriated to improve other infrastructure in the network.
Authors and Affiliations
Okonkwo O. Raphael Okonkwo, Akpojaro Jackson, Anthony Achuenu
Bandwidth Constrained Multipath Routing Protocol for QoS Provision in MANETs
Mobile Ad hoc NETworks (MANETs) are composed of mobile nodes with limited resources and unpredictable node movement. With the on-going evolution in MANETs, provision of Quality of Service (QoS) has become a challenging t...
Outlier Resistant Time Series Operations via Qualitative Robustness and Saddle‐Point Game Formalizations‐ A Review: Filtering and Smoothing
Time series operations are sought in numerous applications, while the observations used in such operations are generally contaminated by data outliers. The objective is thus to design outlier resistant or “robust” time s...
ZRSA Algorithm
Today, RSA algorithm is one of the encryption algorithm that is used widely. However, with the advances in computer power it is becoming susceptible to be cracked. It is become a necessity to develop a new algorithm that...
Exploiting Cryptocurrency Miners with OSINT Techniques
Collection of intelligence is one of the key elements to organize more sophisticated methods of attacks. Open Source Intelligence (OSINT) is a technique used by attackers for reconnaissance purposes to gather information...
Achieving Scalability with Data Owner Anonymity in Cloud Access Control
Cloud computing is a trending technology that enables subscribing organizations to outsource computations and storage, and eliminates the need of purchasing and maintaining the equipment by the organizations themselves....