Withdraw
Loading…
VRing: A Ring-based Application-Layer Multicast Protocol
Sobeih, Ahmed A.; Yurcik, William; Hou, Jennifer C.
Loading…
Permalink
https://hdl.handle.net/2142/10893
Description
- Title
- VRing: A Ring-based Application-Layer Multicast Protocol
- Author(s)
- Sobeih, Ahmed A.
- Yurcik, William
- Hou, Jennifer C.
- Issue Date
- 2004-08
- Keyword(s)
- Computer networking Multi-casting
- Abstract
- This paper presents the design, analysis and performance evaluation of VRing, a novel application-layer multicast (ALM) protocol that establishes a virtual ring as an overlay network among the multicast group members in a self-organizing and distributed manner. VRing takes advantage of the inherent desirable property of a ring; namely, the degree of each node on the ring is O(1) (i.e., independent of the number of the group members) and hence, the state maintained at each group member is also O(1). In order to reduce the routing delay of the ring overlay network, we propose to form a spare ring overlay structure that improves connectivity among group members. The design of the spare ring is justified by proposing, and analytically studying the performance of, a data delivery and duplicate suppression mechanism that makes use of both the original ring and the spare ring for forwarding data packets. We conduct simulations of both VRing and a hierarchical ALM protocol, NICE, using the J-Sim network simulator. Simulation results show that although VRing has a higher path stretch and a higher link stress than NICE, it provides less control overhead, consumes less bandwidth, and provides lower average node degree than NICE. Furthermore, VRing achieves a higher average data delivery ratio in the presence of failures than NICE. The performance improvement is especially pronounced for larger multicast groups.
- Type of Resource
- text
- Permalink
- http://hdl.handle.net/2142/10893
- Copyright and License Information
- You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Owning Collections
Manage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…