Você está na página 1de 9

Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks∗

Ranveer Chandra Venugopalan Ramasubramanian Kenneth P. Birman


Department of Computer Science
Cornell University, Ithaca, NY 14853, USA
{ranveer, ramasv, ken}@cs.cornell.edu

Abstract restrictions make the existing multicast routing protocols


such as MAODV very unreliable even in moderately sized
In recent years, a number of applications of ad-hoc net- networks. This paper discusses our protocol, Anonymous
works have been proposed. Many of them are based on the Gossip, a scalable method for providing probabilistic guar-
availability of a robust and reliable multicast protocol. In antees to multicast reliability in mobile ad-hoc networks.
this paper, we address the issue of reliability and propose
a scalable method to improve packet delivery of multicast 2. Multicast Reliability in Ad-Hoc Networks
routing protocols and decrease the variation in the number Several protocols have been designed in recent years
of packets received by different nodes. The proposed pro- to address the issues of multicast routing in ad-hoc net-
tocol works in two phases. In the first phase, any suitable works. Approaches range from simple ideas such as se-
protocol is used to multicast a message to the group, while lective flooding[13] to more complex protocols that main-
in the second concurrent phase, the gossip protocol tries tain knowledge of the network connectivity or dynamically
to recover lost messages. Our proposed gossip protocol is gather route information. Many multicast protocols ap-
called Anonymous Gossip(AG) since nodes need not know proach the problem of multicast in ad-hoc networks by
the other group members for gossip to be successful. This building and maintaining multicast trees or meshes to estab-
is extremely desirable for mobile nodes, that have limited lish connectivity among group members. MAODV[2] and
resources, and where the knowledge of group membership AMRIS[8] are protocols that maintain multicast trees while
is difficult to obtain. As a first step, anonymous gossip is ODMRP[10] and MCEDAR[6] are mesh-based. The mesh-
implemented over MAODV without much overhead and its based protocol, ODMRP[10] provides better packet deliv-
performance is studied. Simulations show that the packet ery than tree-based protocols but pays an extra cost for mesh
delivery of MAODV is significantly improved and the varia- maintenance. However, these protocols do not attempt to
tion in number of packets delivered is decreased. ensure packet delivery and packet loss is a problem during
mesh/tree reconfiguration, a frequent repair activity. Fur-
ther, the number of packets received by different members
1. Introduction of a group is highly variable, with some members receiving
Ad-hoc networks are mobile networks that operate in the very few packets while others receive almost all the packets
absence of any fixed infrastructure, employing peer-to-peer even though the network may not be partitioned at that time.
communication to establish network connectivity. These Multicast reliability in wired networks has received a lot
networks have a wide range of applications such as disaster of attention in the past years. Protocols such as SRM[3],
relief and field operations, war front activities, and commu- RMTP[4] and PGM[5] focus on best effort reliability but
nication between automobiles on highways. Group com- are very scalable and easy to implement. These protocols,
munication or multicast is a natural requirement for many which are NACK-based (meaning that the receiver has the
of these applications and the reliability of the multicast pro- onus for initiating recovery) depend on the multicast rout-
tocol could affect their performance significantly. Ad-hoc ing tree constructed by the Internet group multicast proto-
networks function under severe constraints such as mobility col, IGMP. In ad-hoc networks, routes changes very rapidly
of nodes, insufficient power and memory on mobile devices, and the methods used by these protocols are consequently
and bandwidth restriction of the wireless medium. These not available to us. Bimodal Multicast[1] is another scal-
∗ The
able system, which uses gossip to provide probabilistic re-
authors were supported in part by DARPA/AFRL-IFGA grant
F30602-99-1-0532 and in part by NSF-CISE grant 9703470, with addi-
liability in wired networks. Our premise is that gossip is
tional support from the AFRL-IFGA Information Assurance Institute, from well matched to the needs of ad-hoc networks because it is
Microsoft Research and from the Intel Corporation. a controlled form of flooding - messages are slowly prop-
agated through the network without congesting the wire- hop entry has an enabled flag to indicate a potential but not
less medium - and is independent of topology. This paper yet activated entry. The next hop that is closer to the group
proposes a new method of gossip called anonymous gos- leader is called the upstream node.
sip(AG), which does not require a group member to have A node S that is not a part of the multicast tree can join
any knowledge of the other group members. the multicast group by broadcasting a RREQ message with
A multicast protocol based on anonymous gossip would the join flag set. Any node in the multicast tree can respond
proceed in two phases. In the first phase, packets are mul- to a Join RREQ by unicasting an RREP back to S. These
ticast to the group using any unreliable multicast protocol. RREQs and RREPs are processed similar to unicast routing.
In the second phase, periodic anonymous gossip takes place In addition, nodes receiving Join RREQs also add entries
in the background and ensures that most of the reachable with enabled flag false in their MRT. The node S selects
members receive the packets. This method can be imple- a suitable route from the RREPs and sends an activation
mented on top of any of the tree-based and mesh-based pro- message called MACT along this route. All nodes receiving
tocols with little or no overhead, and without affecting the the MACT message change the enabled flag to true in their
scalability of the underlying protocol. In this paper, we dis- entries.
cuss our implementation of AG using MAODV as the un- Any group member, which is a leaf node in the multi-
derlying protocol. Simulation results show that using gos- cast tree can leave the group by sending a MACT message
sip over MAODV significantly increases the packet deliv- to its upstream node with the prune flag set. A node re-
ery, while the variation in the number of packets received ceiving a Prune MACT deletes the sender from its next hop
by different nodes decreases. table. If it is a non-group member that has now become a
leaf node, it leaves the group by sending a Prune MACT
3. Overview of AODV Multicast to its upstream node. Non-leaf nodes can leave a multicast
MAODV is a reactive protocol that dynamically creates group but must continue to function as routers in the multi-
and maintains a multicast tree for each group. It is an adap- cast tree. When a link breakage occurs between two nodes
tation of AODV, a unicast routing protocol. Due to con- U and D of a multicast tree, only the downstream node D
straints of space, we present in this section a brief overview attempts to repair this link. This restriction is necessary to
of only those aspects of MAODV relevant to our implemen- prevent formation of loops. D sends an RREQ with an ex-
tation. A detailed description of MAODV can be found in tension containing the hop count to the group leader. Any
[2][11]. multicast tree member closer to the group leader than D can
Each node running MAODV maintains two routing ta- reply to this RREQ. In case D receives no replies within a
bles: Route Table(RT) and Multicast Route Table(MRT). certain time even after a few rebroadcast of the RREQ, the
The Route Table is used for recording the next hop for network is assumed to be partitioned and a new group leader
routes to other nodes in the network. Each entry in RT con- is selected in the downstream sub-tree. The details of how
tains a destination IP address, a destination sequence num- the new group leader is selected and how two partitioned
ber, hop count to the destination, IP address of next hop, and trees can rejoin are described in [2][11].
the lifetime of this entry. The destination sequence number
tracks the freshness of the route to that destination. A source 4. Anonymous Gossip Protocol
node S trying to send a message to a node B, first looks for Gossip as a general technique has been used to solve
a route to B in its RT. If a valid route is not found, S broad- a number of problems such as network news dissemina-
casts a route request message called RREQ. A node receiv- tion(NNTP), replicated data management [14] and failure
ing this RREQ message can unicast a route reply RREP to detection [15]. Bimodal multicast [1] uses gossip as a
S if it is the destination node or if it has a fresh enough technique to achieve probabilistic reliability of multicast in
route to B. Otherwise the node broadcasts the RREQ to its wired networks. This protocol achieves a bimodal guaran-
neighbors. The source node S selects the shortest among tee i.e., all or no delivery with very high probability and
the freshest routes from the received RREPs and adds the partial delivery with very low probability, without sacrific-
entry in the Route Table. Nodes relaying the RREQs and ing scalability and stable throughput(low jitter). We also use
the RREPS add the reverse and forward route entries into gossip to address the problem of reliable multicast in mobile
their Route Table respectively. ad-hoc networks and provide all or no delivery with very
The Multicast Route Table contains entries for multicast high probability and partial delivery with very low prob-
groups of which the node is a router (i.e., a node in the mul- ability. However, we use a different method of gossip to
ticast tree). Each entry in this table contains the multicast provide the same guarantees.
group IP address, the group leader IP address, the group A gossip based reliable multicast protocol involves two
sequence number, hop count to the group leader, the next phases. In the first phase, any suitable unreliable protocol is
hops, and the lifetime. The next hops are the nodes in the used to multicast the message m, to be sent to the group.
multicast tree to which this node is connected. Each next In the second phase, gossip is used to recover lost mes-
sages from other members of the group that might have re- J 1 I
1 2 1
ceived it. This phase consists of periodically repeated gos- G
sip rounds in the background as more and more messages 3
1
are multicast. A single gossip round can potentially recover F 2 2
many lost messages. A single round of gossip consists of 2 H
the following steps, 3
E
1
1. Node A randomly chooses another member of the
group, say B. 4
D Member / Router
1 A
2. A sends B the information about messages it has re- 2 2
1
ceived or not received. 1 1 Multicast Router
C B
3. B checks to see if it has received any of the messages
listed by A.
Figure 1. Local Anonymous Gossip in MAODV
4. Then A and B could exchange messages which are not
a part of each other’s message history.
Posing such a broad algorithm in the form of a proto- • Group Address: the address of the multicast group
col has to be done with meticulous care. The constraints
• Source Address: the address of the node sending the
of the environment have to be taken into account. As we
gossip message
have mentioned earlier, one of our primary goals is to pro-
vide reliability without increasing the message overhead of • Lost Buffer: an array of fixed size, that carries se-
the already congested mobile wireless environment. The quence numbers of messages that the source node be-
following issues have to be answered keeping in mind the lieves it has lost
above constraints.
• Number Lost: the size of the Lost Array.
1. How does node A know who the other members of the
group are? • Expected Sequence Number: the sequence number of
the next message that the source expects.
2. How does A select which member to gossip with?
Each node randomly selects one of its neighbors and sends a
3. What should be the direction of information exchange? gossip message to it. Any node receiving a gossip message
randomly selects one of its neighbors (excluding the neigh-
4. How is the message history maintained?
bor which sent the message) and propagates the message to
The following subsections describe these design issues in it. If the receiving node is itself a member of the multicast
detail. group then it randomly decides to either accept the gossip
4.1. Anonymous Gossip or propagate it. The accepting node then unicasts a gossip
In our opinion, the first of the above questions is the most reply to the initiator of this gossip request. The reply is de-
crucial issue. Bimodal multicast requires each participating scribed in section 4.4. In a general multicast protocol of an
node to have partial or total knowledge of group member- ad-hoc network, the nodes themselves participate as routers.
ship. This usually involves each node sending periodic heart Also, only a subset of these nodes/routers would participate
beat messages to other nodes to keep the membership infor- in routing any messages meant for a given multicast group.
mation current. In wired networks, where the nodes are in In such cases, only participating routers are to be consid-
a domain sub-domain hierarchy, group membership can be ered while propagating the gossip message. For example,
maintained with limited overhead. However, in the wire- in the implementation of this protocol on MAODV, only the
less environment maintaining even partial group member- routers in the multicast tree participate in propagating the
ship is extremely expensive and would significantly reduce gossip. As have seen in section 3, each router maintains a
the throughput of the network. We propose a method called multicast route table which constitutes the nexthops for this
anonymous gossip(AG) to overcome this problem. AG does router. While propagating the gossip message, one of these
not require any member to know the other members of the nexthops is randomly selected. Propagation along the mul-
multicast group. The node attempting to send a gossip mes- ticast tree prevents gossip messages from reaching the same
sage does not even know the identity of the node with which node twice.
it will gossip until the other node sends back a gossip reply. 4.2. Locality of Gossip
We add a new type of message called gossip message. Periodic propagation of gossip messages generates con-
This message has the following five fields: tinuous traffic on the network. Choosing nearer members
to gossip with will reduce the network traffic, however table. It then sends a modify message to its nexthops in
gossiping with a distant node is extremely important be- the same way as described above. Since we are propagat-
cause sometimes message loss could affect an entire local- ing the minimum of a set of values, any change in topology
ity. Hence we need a scheme that would gossip locally with or group membership will only affect the routers in its lo-
a very high probability and with distant nodes occasion- cality. These modify messages will not propagate far and
ally. Our AG protocol is augmented to achieve this opti- hence will not increase congestion significantly.
mization. Here, we assume some familiarity with MAODV, 4.3. Cached Gossip
because the constraint of brevity prevents us from explain-
AG is done only using the routers participating in the
ing MAODV in detail, and yet our algorithm builds upon
multicast tree. If these routers are not well distributed in the
it. We require each node participating as a router in the
topology of the network, there is a possibility that a gos-
multicast tree to maintain one additional field called near-
sip message reaches a node along a route longer than the
est member. In the implementation over MAODV, the mul-
shortest existing route between these two nodes. For ex-
ticast route table is augmented to have this extra field asso-
ample, when using AG over MAODV, the gossip message
ciated with each nexthop entry. The nearest member field
propagates only along the multicast tree, although other,
associated with a nexthop contains the distance to the near-
potentially shorter, routes may exist between the gossiping
est group member from this node by taking the link through
members (note that the return path is unaffected by this phe-
this nexthop node. This adds very little overhead to the ex-
nomenon, because gossip replies are unicast). It is efficient
isting multicast route table. Whenever a gossip message is
to use the unicast routes to gossip with those nodes whose
received, a nexthop node is chosen so that a nexthop with a
membership is already known. Further, these unicast routes
smaller nearest member value is chosen with higher prob-
may be available for gossip even when the multicast tree is
ability than a nexthop with a larger nearest member value.
being repaired.
Thus with higher probability the gossip message is propa-
We incorporate this by introducing a member cache in
gated to a closer node than to a distant node. Figure 1 illus-
all the member nodes of each multicast group. The mem-
trates an AODV Multicast Tree, where {A, C, D, H, I, J}
ber cache is a bounded buffer containing entries which
are the group members and {B, E, F, G} are the other par-
are 3-tuples (node addr, numhops, last gossip). The
ticipating routers. The numbers shown on their edges give
node addr field contains the address of a group member,
the values of the nearest member field. As an example, for
the numhops field contains the shortest distance between
the router E, the nearest group member through D is at a
the nodes and the last gossip contains the time at which last
distance 1 and through F is at a distance 3.
gossip occured between these two nodes. This information
Maintaining the validity of the nearest member field in itself is collected at no extra cost. The member cache table
each router can be done with limited overhead. This value is updated each time a message is received from a group
needs to be modified when one of the following events oc- member. This message could be a data packet meant for
curs - a new member joins the group, an existing mem- this group, a gossip reply, or any other maintenance packet.
ber leaves the group, or the mobility of nodes creates a For example, in MAODV, each route request(RREQ) for a
topology change. Whenever a new member joins the group group join generates replies from a number of nodes, many
or an existing member leaves the group, the routers near- of which are members of the group(see [11][2] for details).
est to this node realize the event first. For example in Whenever such a message is received, we add the member
MAODV a member sends a MACT message to establish information to the member cache. If this table is full and
itself while joining (see section 3 for details). A mem- a new member has to be added, a member with a greater
ber leaving the group sends a prune message to its nearest numhops is deleted from this table. If there are no members
routers. The nearest router adds this new nexthop to its mul- with greater numhops then the member with most recent
ticast route table with value of nearest member field set to last gossip is replaced with the new entry. This is done to
one or deletes this entry from its list of nexthops. Then for avoid frequent gossips with the same members.
each of the nexthops present in its table, it recomputes the In each gossip round, the node chooses to do anonymous
value of nearest member and sends this modified value to gossip with probability p anon . If AG is chosen, then a gos-
that nexthop. For example, if {B, C, E} are the next hop sip message is constructed with the address of this node as
entries for node D, and {b, c, e} are the associated near- the initiator and this message is propagated as described in
est member values for these nexthop entries, then D sends section 4.1 and 4.2. If cached gossip is chosen, then a mem-
1 + min(c, e) to B, 1 + min(b, e) to C and 1 + min(b, c) ber is selected randomly from the member cache and a gos-
to E. This value needs to be sent only if it is different from sip message is unicast to this member. When a gossip reply
its previous value. Also, this value can be piggy backed is received from a member, the member information is up-
on any other messages bound for the same router. When dated in the member cache. If this member already exists
a router receives this new value, it updates this entry in its in this table, then the numhops and last gossip fields are
updated. Otherwise, the member is added to the table as was selected as the source of data packets. The source node
described above. generated packets of length 64 bytes at regular intervals of
4.4. Push vs Pull 200ms with the destination as the multicast group. In the
The importance of direction of information exchange is 600second simulation time, the source node continued to
explained in [14]. Our protocol implements a pull mode of send packets starting at 120 seconds and ending at 560 sec-
message exchange that may be described as follows. Each onds. The initial delay of 120sec was allowed for MAODV
node maintains a table called lost table, for every multicast to build the initial multicast tree. The source node generated
group that it belongs to. This contains the sequence num- 2201 data packets during the period of interest.
bers of all the messages this node believes itself to be lack- Every group member sends one gossip message per sec-
ing. An entry in this table will be made whenever a mes- ond. Each gossip message could request for at most 10 lost
sage is received with a sequence number greater than the ex- messages. The size of the membership cache was also set
pected sequence number. Note that the sequence number is to 10. Each member could keep track of at most 200 lost
a 2 tuple including the sender address and a sequence num- messages, in the lost table, and remember the most recent
ber, because different senders send messages to the mul- 100 messages received in the history table. For MAODV,
ticast group. Each node also maintains a bounded FIFO the hello interval was set to 600ms, the allowed hello loss
buffer, called history table containing the most recent mes- to 4, and the group hello interval to 5sec.
sages received. The most recent entries of the lost table are We studied the performance of our protocol while vary-
placed in a lost buffer. Whenever a node prepares a gos- ing three parameters: the transmission range, the maximum
sip message, the lost buffer and a list of expected sequence speed and the number of nodes. The transmission range is
numbers is added to the gossip message. When a node re- the distance from a node within which another node can re-
ceives a gossip message, it compares the lost buffer and the ceive packets from it. All the nodes are assumed to have
expected sequence number list to see if its history table has the same transmission range. The minimum speed was set
a copy of any message sought by the gossip initiator. It then to 0 for all the runs. We varied each parameter over a wide
unicasts any message found back to the gossip initiator as range, for different fixed values of the other two parame-
the gossip reply. ters. For each set of parameters, we measured the number
of packets received by each node in the multicast group.
5. Simulation and Performance Each simulation was carried out 10 times with different val-
We simulated our protocol on GloMoSim[17], which ues for the random-seed.
uses a parallel, event-driven simulation language called The performance graphs measure the number of packets
PARSEC[18]. MAODV was implemented as described in received by the group members during each run. Each data
version 5 of the IETF draft[11] and was adapted to imple- point in the graph corresponds to the average of the number
ment our gossip protocol. We understand that more recent of packets received by each group member. The range of
drafts of MAODV are available, but we believe that the ex- measured data values obtained for the full set of receivers
tensions would not impact performance for the scenarios is shown in the form of error bars, while a line connects
investigated. the average across receivers. Notice that reception rates can
5.1. Simulation Environment vary widely for different receivers because of differences
in network connectivity. Perfect reception rates would be
A fixed area of 200m×200m was used in the simulation,
graphed as 2201: the number of packets multicast by the
and all the nodes were initially placed randomly within this
source.
area. The simulations were performed using the Random-
Waypoint scheme to model the mobility of the nodes in the 5.2. Packet Delivery vs. Transmission Range
network. In this model, each node has a predefined mini- The transmission range was varied from 45m to 85m in
mum and maximum speed. It then travels towards a ran- steps of 5m, keeping the total number of nodes constant at
dom spot at a speed chosen randomly from this interval. 40. This experiment was carried out for 6 values of the
After reaching the destination, it rests for a period chosen maximum speed. Fig. 2 and Fig. 3 show the variation of
from a uniform distribution between 0 and 80 seconds, be- packet delivery for maximum speeds 0.2m/sec and 2m/sec
fore continuing this mobility pattern. Each simulation was respectively for both MAODV and our gossip protocol.
set to run for 10 minutes. The MAC layer protocol used was It is interesting to note that the gossip protocol consis-
IEEE 802.11 and the bandwidth of the wireless medium was tently performs better than the underlying multicast pro-
assumed to be 2Mbps. tocol. Not only is the average packet delivery higher but
The network consisted of a single multicast group with the variation in the number of packets received by different
one-third of the nodes being group members. All the nodes group members is also significantly lower. As the transmis-
joined the group at the beginning of the simulation and re- sion range increases, the connectivity of the network im-
mained in it throughout the run period. One of the members proves leading to fewer link failures. Further, the length
Nodes 40 Speed 0.2 Nodes 40 Power 75
2200 2200

2000 2000

1800 1800

1600 1600

1400 1400
# pkts recvd

# pkts recvd
1200 1200

1000 1000

800 800

600 Gossip 600


Maodv
400 400

200 200 Gossip


Maodv
0 0
40 45 50 55 60 65 70 75 80 85 90 0 0.2 0.4 0.6 0.8 1
transmission range(m) max speed(m/s)

Figure 2. Packet Delivery vs Transmission Figure 4. Packet Delivery vs Maximum Speed


Range when the max speed = 0.2m/sec when the transmission range is 75m

Nodes 40 Speed 2 Nodes 40 Power 75


2200 2200

2000 2000

1800 1800

1600 1600

1400 1400
# pkts recvd

# pkts recvd
1200 1200

1000 1000

800 800

600 600

400 400

200 Gossip 200 Gossip


Maodv Maodv
0 0
40 45 50 55 60 65 70 75 80 85 90 1 2 3 4 5 6 7 8 9 10
transmission range(m) max speed(m/s)

Figure 3. Packet Delivery vs Transmission Figure 5. Packet Delivery vs Maximum Speed


Range when the max speed = 2m/sec when the transmission range is 75m

of the network routes becomes shorter, decreasing the route varies from 90% to 80%. We can see a gradual decrease in
discovery and setup time. The effect of this is reflected by data delivery as the maximum speed increases in this range.
the steady improvement in packet delivery of both gossip Increase in the maximum speed causes the nodes to move
and MAODV with increase in the transmission range. How- faster and more frequently in the random waypoint model.
ever, this runs a risk of increasing the congestion in the net- This causes an increase in the frequency of link breakages,
work, which could affect the performance of the protocols. affecting the overall performance of the system.
5.3. Packet Delivery vs. Maximum Speed 5.4. Packet Delivery vs. Number of Nodes
The maximum speed of the nodes was varied in two The number of nodes was varied from 40 to 100. In one
phases, from 0.1m/sec to 1 m/sec in steps of 0.1m/sec and experiment, the transmission range was adjusted in such a
from 1m/sec to 10m/sec in steps of 1m/sec. The transmis- way that the average number of neighbors of a node re-
sion range was set constant at 75m and the number of nodes mained approximately the same. As the number of nodes
was fixed at 40. Fig. 4 and Fig. 5 show variation of packet in the network increases, the routing distance between the
delivery with speed for both the phases. These graphs con- nodes goes up, and hence the frequency of link failures in
tinue to illustrate that our protocol achieves better packet the network also increases. Fig. 6 shows the variation of
delivery with a decreased variation in the number of pack- packet delivery with the increase in the number of nodes.
ets received by the group members. At very low values As the number of nodes increases, the packet delivery rate
of maximum speed, upto 0.3m/sec, our protocol gives near tends to decrease gradually because of the above mentioned
100% packet delivery. At higher speeds, the data delivery reasons. In another experiment, the transmission range was
Speed = 0.2 Speed = 0.2 Power = 55
2200 2200

2000 2000

1800 1800

1600 1600

1400 1400
# pkts recvd

# pkts recvd
1200 1200

1000 1000

800 800

600 600

400 400

200 Gossip 200 Gossip


Maodv Maodv
0 0
30 40 50 60 70 80 90 100 110 30 40 50 60 70 80 90 100 110
# nodes in network # nodes in network

Figure 6. Packet Delivery vs Number of Nodes Figure 7. Packet Delivery vs Number of Nodes
keeping the average number of neighbors for when the transmission range is constant at
a node approximately constant 55m and maximum speed is 0.2m/sec

kept constant at 55m and the number of nodes was varied tree. The effectiveness of anonymous gossip depends on
from 40 to 100. Fig. 7 shows the results of this experiment. the values chosen for the size of the history table and the
As the number of nodes is increased, the connectivity of lost table, besides the gossip interval. We are currently
the network increases improving packet delivery. However, doing more experiments to study the performance of AG
the traffic in the network also increases and beyond a point under different parameters. Implementing anonymous gos-
this leads to congestion decreasing the number of packets sip with other multicast protocols, such as ODMRP[10] and
delivered. AMRIS[8], could also be done in a similar manner without
adding extra complexity. We believe that AG would be able
5.5. Performance Analysis
to improve the reliability of these protocols as well.
The simulation results show that AG can improve the re-
liability of multicast routing protocols without the use of ac- 6. Related Work
knowledgements, and without adding significant overhead Despite the importance of reliable multicast in mobile
to them. The overhead analysis of gossip is presented in Fig. ad-hoc applications, not much work has been done on it. In
8. Goodput is defined as the percentage of non-duplicate [9], Pagani et al propose a protocol that guarantees validity,
messages received through gossip replies to the total num- agreement, integrity and termination for multicast in such
ber of messages received through gossip replies. In other environments. The protocol is characterized in two phases:
words goodput gives a measure of the redundant traffic - the scattering phase, in which a message is diffused from
more the goodput, more the number of useful messages car- the source to all its destinations, and the gathering phase,
ried by gossip replies and lesser is the redundancy. In our in which the source collects all the acknowledgements mes-
simulations goodput is measured at different group mem- sages from the destinations. Most of the communication
bers for two values each of transmission range and maxi- is done on a forwarding tree, that is an on demand source-
mum speed. Fig. 8 shows that the goodput is close to 100 centered routing tree, with the lifetime of at most the time
percent for most of the cases under which the experiments needed to scatter and gather a single message. In case, the
were run. It implies that nearly all the gossip replies were tree links break, no effort is made to repair it, and flood-
useful and very few duplicates were received. This can be ing is used for further communication. For reliability, a
attributed to the parameters that were chosen for gossip. For message is buffered at each of the clusterheads along the
a different messaging rate these parameters would have to tree, as long as its ack from the downstream nodes is not re-
be adjusted to give a comparable goodput. In general the ceived. Using this mechanism, the protocol provides strong
gossip rate should be tuned so that the network does not get guarantees for message delivery as long as the conditions
congested and the goodput is nearly 100 percent. of eventual subsidence, liveness and clusterhead stability is
AG works even when the multicast tree is broken, re- satisfied. While this protocol provides these guarantees in a
covering packets dropped during the maintenance of the slow moving network where the failures are rare, the per-
Goodput
100 could be satisfied with an unreliable multicast as long as
most of the messages reach the destination. While [9] de-
99.5
scribes a protocol for the first case, we do not address that
problem here. At the same time we would like to emphasize
99
that stronger reliability guarantees can be obtained by devel-
goodput(%)

98.5
oping protocols that function over the underlying multicast
and our gossip protocol. Work is being done on the Sp-
98 inglass project[16] in Cornell University, where protocols
45m, 0.2m/s
for leader election, consensus and other advanced proper-
97.5 75m, 0.2m/s
45m, 2m/s
ties are being developed over bimodal multicast. As a fu-
75m, 2m/s ture work, we would like to develop efficient algorithms to
97
5 10 15 20
node
25 30 35 40
do the same over probabilistic multicast protocols in mobile
ad-hoc networks.
Figure 8. Goodput at different group members In this work, we have not tried to improve upon the effi-
for 2 values each of transmission range and ciency and scalability of MAODV itself. Our protocol could
maximum speed be used with any existing multicast protocol, without signif-
icantly changing the existing protocol. AG inherits limita-
tions from the underlying protocol; for example, in the work
described here, AG would not work if the links were unidi-
formance decreases dramatically with the increasing size rectional. On the other hand AG introduces little overhead
of the network. There is also degradation in performance beyond that associated with the underlying mechanisms. In
with increase in mobility. The reasons for the poor perfor- the future, with much better and efficient multicast proto-
mance can be attributed to two main aspects of the protocol. cols coming up, we would like to improve upon their relia-
Firstly, since buffer size, in practice, is bounded, a situation bility by using the gossip protocol. Our work with MAODV
could arise when old messages are still stored in most of is the first effort in improving reliability of the existing mul-
the node buffers. This gives rise to a situation where newer ticast protocols. It is possible to get improvements by using
messages cannot be accommodated since older messages anonymous gossip on the other protocols proposed in [6],
have to be stored to provide the strong guarantees. The sec- [10], [8] and [7].
ond reason for decrease in performance is the use of ack Acknowledgements
messages. This proves to be very expensive in wireless net- We are extremely grateful to Indranil Gupta and Robert
works where the physical layer is bandwidth constrained. Van Renesse for the useful discussions and Chaitanya
Another approach to achieve reliability in ad-hoc net- Swamy and Sheela Tiwary for reviewing the paper.
works is proposed in [13]. This protocol guarantees best
effort delivery using an adaptive flooding scheme called References
hyper-flooding. The nodes do not keep any state regarding [1] Kenneth P. Birman, Mark Hayden, Oznur Ozkasap,
the multicast routes. Whenever a sender has to multicast Zhen Xiao, Mihai Budiu and Yaron Minsky. “Bimodal
a message, it broadcasts the message to all its neighbors Multicast”. ACM Transactions on Computer Systems,
who in turn re-broadcast the packet. Some optimizations Vol. 17, Issue 2, May 1999, 41-88.
are made to prevent packets from looping forever in the [2] Elizabeth M. Royer and Charles E. Perkins. “Multicast
network. The advantage of this protocol is the reliability Operation of the Ad-hoc On-Demand Distance Vec-
it provides for high-speed networks. On the other hand this tor Routing Protocol”. Proceedings of the fifth annual
protocol is extremely expensive since it generates a large ACM/IEEE international conference on Mobile com-
number of messages, and may easily congest the network. puting and Networking(MOBICOM). Aug. 1999, 207-
Especially when the multicast group is sparsely distributed 218.
in a dense network or when all the nodes are not moving at
high speeds, the protocol decreases the throughput consid- [3] Sally Floyd, Van Jacobson, Steve McCanne, Ching-
erably. Gung Liu and Lixia Zhang. “A Reliable Multicast
Framework for Light Weight Sessions and Application
7. Concluding Remarks and Future Work Level Framing”. In Proceedings of the ’95 Symposium
Many of the exciting applications for wireless ad-hoc on Communication Architectures and Protocols (SIG-
networks will require reliable multicast although the degree COMM). ACM. August 1995, Cambridge MA.
of reliability demanded by them may vary. Few applica-
tions might demand special properties from the protocol, [4] Sanjoy Paul, K. K. Sabnani, J. C. Lin, S. Bhattacharya.
many may be satisfied with best effort delivery and others “Reliable Multicast Transport Protocol(RMTP)”. IEEE
Journal on Selected Areas in Communications, special [16] Cornell University. “Spinglass: Adaptive Probabilistic
issue on Network Support for Multipoint Communica- Tools for Advanced Networks.”
tion, April 97, Vol 15, No. 3.
[17] Xiang Zeng, Rajive Bagrodia, and Mario Gerla. “Glo-
[5] T. Speakman and D. Farinacci and S. Lin and A. MoSim: A Library for Parallel Simulation of Large-
Tweedly. “Pretty Good Multicast”. Internet draft, scale Wireless Networks”. Proceedings of the 12th
ftp://ds.internic.net/internet-drafts/draft-speakman- workshop on Parallel and distributed simulation, May
pgm-spec-00.txt 26 - 29, 1998, Banff Canada, 154-161.

[6] Prasun Sinha, Raghupathy Sivakumar, Vaduvur Bhar- [18] R. Bagrodia, R. Meyer, M. Takai, Y. Chen, X. Zeng,
gavan. “MCEDAR: Multicast Core-Extraction Dis- J. Martin, B. Park, and H. Song. “Parsec: A Parallel
tributed Ad-Hoc Routing”. Proceedings of IEEE Wire- Simulation Environment for Complex Systems”. IEEE
less Communications and Networking Conference, Computer, Vol. 31(10), October 1998, pp. 77-85
September 1999.

[7] L. Ji and M. S. Corson. “A Lightweight Adaptive Mul-


ticast Algorithm”. Proceedings of IEEE GLOCECOM,
Sydney, Australia, December 1998, 1036-1042.

[8] Chun-Wei Wu, Y.C. Tay. “AMRIS: A Multicast Pro-


tocol for Ad-Hoc Wireless Networks”. Proceedings of
MILCOMM ’99, Nov. 1999.

[9] Elena Pagani and Gian PaoloRossi. “Reliable broadcast


in mobile multihop packet networks”. Proceedings of
the third annual ACM/IEEE international conference
on Mobile computing and networking(MOBICOM),
September 26 - 30, 1997, 34-42.

[10] S.-J. Lee, M. Gerla, and C.-C. Chiang. “On-Demand


Multicast Routing Protocol(ODMRP)” Proceedings of
IEEE WCNC’99, Sep. 1999.

[11] C. Perkins, E. Royer, S. Das “Ad-Hoc On De-


mand Distance Vector(AODV) Routing”. IETF Internet
Draft, draft-ietf-manet-aodv-05.txt, March 14, 2000.

[12] Elizabeth M. Royer and Charles E. Perkins. “Ad-hoc


On-Demand Distance Vector Routing”. Proceedings of
the 2nd IEEE Workshop on Mobile Computing Systems
and Applications, Feb. 1999, 90-100.

[13] Christopher Ho, Katia Obraczka, Gene Tsudik and


Kumar Viswanath. “Flooding for Reliable Multicast in
Multi-Hop Ad-Hoc Networks”. MobiCom Workshop on
Discrete Algorithms and Methods for Mobility, Aug
1999.

[14] Alan Demers, Dan Greene, Carl Hauser, Wes Irish


and John Larson. “Epidemic algorithms for replicated
database maintenance”. Proceedings of the Sixth An-
nual ACM Symposium on Principles of distributed com-
puting, 1987, 1-12.

[15] Robbert van Renesse, Yaron Minsky, and Mark Hay-


den. “A Gossip-Based Failure Detection Service”. Proc.
of Middleware, 1998.

Você também pode gostar