Quantitative Analysis of the Fault-Tolerance of Pragmatic General Multicast (PGM) and Elastic Reliable Multicast (ERM) Protocols
Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 2
Abstract
Multicast communication protocols are not immune from failures as a result of packets being dropped due to a broken link or time out processes. Therefore, it is essential to understand how these failures can affect the overall performance of multicast protocols over the Internet. This paper compares the faulttolerance effect of two reliable multicast protocols: pragmatic general multicast (PGM) and elastic reliable multicast (ERM) in a situation where a multicast-aware node fails and the sub-nodes will have to request a repaired packet. A simulation model is developed in such a way that faults are randomly created on nodes and link for a specified period of time and the fault-tolerance effect on the two multicast protocols is analyzed. The model developed for this paper repeats the simulation for different network size, the results obtained show that the ERM protocol is better than the PGM as the size of the network increases. This finding is key while considering the improvement (or upgrade) of existing multicast protocols. The result is also significant at the early stage of designing new multicast protocols as it provides useful information in allocating scarce resource that can be appropriated to improve other infrastructure in the network.
Authors and Affiliations
Okonkwo O. Raphael Okonkwo, Akpojaro Jackson, Anthony Achuenu
Instilling QoS in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have been a desired choice for monitoring and automatic control of remote and unreachable objects and environments due to their low cost. However, such deployment requires quality-of servi...
Isolation of Water Inflow to Production Wells
N/A
Outlier Resistant Time Series Operations via Qualitative Robustness and Saddle‐Point Game Formalizations‐ A Review: Filtering and Smoothing
Time series operations are sought in numerous applications, while the observations used in such operations are generally contaminated by data outliers. The objective is thus to design outlier resistant or “robust” time s...
Exploiting Cryptocurrency Miners with OSINT Techniques
Collection of intelligence is one of the key elements to organize more sophisticated methods of attacks. Open Source Intelligence (OSINT) is a technique used by attackers for reconnaissance purposes to gather information...
Cryptography and Steganography: New Approach
Digital communication witnesses a noticeable and continuous development in many applications in the Internet. Hence, secure communication sessions must be provided. The security of data transmitted across a global networ...