Files in this item

FilesDescriptionFormat

application/pdf

application/pdfVRing A Ring-ba ... yer Multicast Protocol.pdf (274kB)
(no description provided)PDF

Description

Title:VRing: A Ring-based Application-Layer Multicast Protocol
Author(s):Sobeih, Ahmed A.; Yurcik, William; Hou, Jennifer C.
Subject(s):Computer networking Multi-casting
Abstract:This paper presents the design, analysis and performance evaluation of VRing, a novel application-layer multicast (ALM) protocol that establishes a virtual ring as an overlay network among the multicast group members in a self-organizing and distributed manner. VRing takes advantage of the inherent desirable property of a ring; namely, the degree of each node on the ring is O(1) (i.e., independent of the number of the group members) and hence, the state maintained at each group member is also O(1). In order to reduce the routing delay of the ring overlay network, we propose to form a spare ring overlay structure that improves connectivity among group members. The design of the spare ring is justified by proposing, and analytically studying the performance of, a data delivery and duplicate suppression mechanism that makes use of both the original ring and the spare ring for forwarding data packets. We conduct simulations of both VRing and a hierarchical ALM protocol, NICE, using the J-Sim network simulator. Simulation results show that although VRing has a higher path stretch and a higher link stress than NICE, it provides less control overhead, consumes less bandwidth, and provides lower average node degree than NICE. Furthermore, VRing achieves a higher average data delivery ratio in the presence of failures than NICE. The performance improvement is especially pronounced for larger multicast groups.
Issue Date:2004-08
Genre:Technical Report
Type:Text
URI:http://hdl.handle.net/2142/10893
Other Identifier(s):UIUCDCS-R-2004-2468
Rights Information:You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS:2009-04-16


This item appears in the following Collection(s)

Item Statistics