Conference PaperPDF Available

A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols

Authors:

Abstract and Figures

In this paper we investigate the performance of multicast routing protocols in wireless mobile ad hoc networks. An ad hoc network is composed of mobile nodes without the presence of a wired support infrastructure. In this environment, routing/multicasting protocols are faced with the challenge of producing multihop routes under host mobility and bandwidth constraints. In recent years, a number of new multicast protocols of different styles have been proposed for ad hoc networks. However, systematic performance evaluations and comparative analysis of these protocols in a common realistic environment has not yet been performed. In this study, we simulate a set of representative wireless ad hoc multicast protocols and evaluate them in various network scenarios. The relative strengths, weaknesses, and applicability of each multicast protocol to diverse situations are studied and discussed
Content may be subject to copyright.
1
A Performance Comparison Study of Ad Hoc
Wireless Multicast Protocols
Sung-Ju Lee, William Su, Julian Hsu, Mario Gerla, and Rajive Bagrodia
Wireless Adaptive Mobility Laboratory
Computer Science Department
University of California
Los Angeles, CA 90095-1596
http://www.cs.ucla.edu/NRL/wireless
Abstract—In this paper we investigate the performance of multicast rout-
ing protocols in wireless mobile ad hoc networks. An ad hoc network is
composed of mobile nodes without the presence of a wired support infras-
tructure. In this environment, routing/multicasting protocols are faced with
the challenge of producing multihop routes under host mobility and band-
width constraints. In recent years, a number of new multicast protocols of
different styles have been proposed for ad hoc networks. However, system-
atic performance evaluations and comparative analysis of these protocols in
a common realistic environment has not yet been performed. In this study,
we simulate a set of representative wireless ad hoc multicast protocols and
evaluate them in various network scenarios. The relative strengths, weak-
nesses, and applicability of each multicast protocol to diverse situations are
studied and discussed.
I. INTRODUCTION
N ad hoc network [13], [15] is a dynamically reconfigurable
wireless network with no fixed infrastructure or central ad-
ministration. Due to the limited radio propagation range of wire-
less devices, routes are often “multihop. Applications such as
disaster recovery, crowd control, search and rescue, and auto-
mated battlefields are typical examples of where ad hoc net-
works are deployed. Nodes in these networks move arbitrarily,
thus network topology changes frequently and unpredictably.
Moreover, bandwidth and battery power are limited. These
constraints, in combination with the dynamic network topology
make routing and multicasting in ad hoc networks extremely
challenging.
In a typical ad hoc environment, network hosts work in
groups to carry out a given task. Hence, multicast plays an im-
portant role in ad hoc networks. Multicast protocols used in
static networks (e.g., Distance Vector Multicast Routing Pro-
tocol (DVMRP) [7], Multicast Open Shorted Path First (MO-
SPF) [23], Core Based Trees (CBT) [2], and Protocol Indepen-
dent Multicast (PIM) [8]) do not perform well in ad hoc net-
works because multicast tree structures are fragile and must be
readjusted as connectivity changes. Furthermore, multicast trees
usually require a global routing substructure such as link state
or distance vector. The frequent exchange of routing vectors
or link state tables, triggered by continuous topology changes,
yields excessive channel and processing overhead.
Various multicast protocols have been newly proposed to per-
form multicasting in ad hoc networks. However, no perfor-
mance study between them has yet been performed. The com-
This work was funded in part by the Defense Advanced Research Projects
Agency (DARPA) under contract DAAB07-97-C-D321, as a part of the Global
Mobile Information Systems (GloMo) program.
parative analysis of ad hoc unicast routing protocols has been re-
ported in [4], [6], [14], [20], but this paper is the first to conduct
a performance comparison study of ad hoc wireless multicast
protocols in a realistic common simulation environment. By us-
ing a detailed simulator, we provide quantitative performance
analysis of five protocols with different characteristics: AM-
Route [3], ODMRP [17], [18], [19], AMRIS [29], CAMP [10],
[11], [21], [22], and flooding. In addition to multicast routing
protocols, we also implemented a detailed and realistic model of
physical and medium access control layer protocols.
The five multicast routing protocols were simulated in diverse
network scenarios. We studied the impact of mobility on perfor-
mance by varying the speed of network hosts. We varied the
number of data packet senders to emulate a variety of different
multicast applications. One source to many receivers can corre-
spond to battlefield data dissemination. Many sources to many
receivers can correspond to search and rescue team communi-
cation. Different multicast group member sizes were simulated
to investigate the impact on performance. Various traffic loads
were also applied to study how traffic patterns influence mul-
ticast protocol performance. We apply metrics that show the
“efficiency” in addition to the “effectiveness” of the protocols.
Understanding the protocol’s efficiency gives us the ability to
study and discuss relative strengths, weaknesses, and applica-
bility to various situations for each multicast routing protocol.
The rest of the paper is organized as follows. Section II
presents an overview of the multicast protocols we simulate.
The simulation environment and methodology are described in
Section III, followed by simulation results in Section IV. Merits
and shortcomings of each multicasting algorithm are discussed
in Section V and concluding remarks are made in Section VI.
II. MULTICAST PROTOCOLS REVIEW
In this section, we introduce the ad hoc wireless multicast
protocols we have selected. Basic operation procedures and im-
plementation choices are described.
A. Adhoc Multicast Routing (AMRoute)
AMRoute [3] is a tree based protocol. It creates a bidirec-
tional shared multicast tree using unicast tunnels to provide con-
nections between multicast group members. Each group has at
least one logical core that is responsible for member and tree
maintenance. Initially, each group member declares itself as
2
TABLE I
PARAMETER VA L U E S FOR AMROUTE
Periodic JOIN-REQ interval 60 sec
Periodic JOIN-REQ interval when no 5 sec
group members are connected to the core
Periodic TREE-CREATE interval 20 sec
TREE-CREATE timeout 40 sec
Core resolution algorithm Highest ID
a core for its own group of size one. Each core periodically
floods JOIN-REQS (using an expanding ring search) to discover
other disjoint mesh segments for the group. When a member
node receives a JOIN-REQ from a core of the same group but a
different mesh segment, it replies with a JOIN-ACK and marks
that node as a mesh neighbor. The node that receives a JOIN-
ACK also marks the sender of the packet as its mesh neighbor.
After the mesh creation, each core periodically transmits TREE-
CREATE packets to mesh neighbors in order to build a shared
tree. When a member node receives a non-duplicate TREE-
CREATE from one of its mesh links, it forwards the packet to
all other mesh links. If a duplicate TREE-CREATE is received, a
TREE-CREATE-NAK is sent back along the incoming link. The
node receiving a TREE-CREATE-NAK marks the link as mesh
link instead of tree link. The nodes wishing to leave the group
send the JOIN-NAK to the neighbors and do not forward any
data packets for the group.
The key characteristic of AMRoute is its usage of virtual
mesh links to establish the multicast tree. Therefore, as long
as routes between tree members exist via mesh links, the tree
need not be readjusted when network topology changes. Non-
members do not forward data packets and need not support any
multicast protocol. Thus, only the member nodes that form the
tree incurs processing and storage overhead. AMRoute relies on
an underlying unicast protocol to maintain connectivity among
member nodes and any unicast protocol can be used. The ma-
jor disadvantage of the protocol is that it suffers from temporary
loops and creates non-optimal trees when mobility is present.
Table I shows the AMRoute parameter values used in our ex-
periments. The implementation followed the specification in
[3].
B. On-Demand Multicast Routing Protocol (ODMRP)
ODMRP [17], [18], [19] creates a mesh of nodes (the “for-
warding group”) which forward multicast packets via flooding
(within the mesh), thus providing path redundancy. ODMRP
is an on-demand protocol, thus it does not maintain route in-
formation permanently. It uses a soft state approach in group
maintenance. Member nodes are refreshed as needed and do not
send explicit leave messages.
In ODMRP, group membership and multicast routes are es-
tablished and updated by the source on demand. Similar to
on-demand unicast routing protocols, a request phase and a re-
ply phase comprise the protocol. When multicast sources have
data to send, but do not have routing or membership informa-
tion, they flood a JOIN DATA packet. When a node receives a
non-duplicate JOIN DATA, it stores the upstream node ID (i.e.,
TABLE II
PARAMETER VA L U E S FOR ODMRP
JOIN DATA refresh interval 3 sec
Acknowledgment timeout for JOIN TABLE 25 msec
Maximum JOIN TABLE retransmission 3
backward learning) and rebroadcasts the packet. When the JOIN
DATA packet reaches a multicast receiver, the receiver creates a
JOIN TABLE and broadcasts to the neighbors. When a node re-
ceives a JOIN TABLE, it checks if the next node ID of one of
the entries matches its own ID. If it does, the node realizes that
it is on the path to the source and thus is part of the forward-
ing group. It then broadcasts its own JOIN TABLE built upon
matched entries. The JOIN TABLE is thus propagated by each
forwarding group member until it reaches the multicast source
via the shortest path. This process constructs (or updates) the
routes from sources to receivers and builds a mesh of nodes,
the forwarding group. Multicast senders refresh the member-
ship information and update the routes by sending JOIN DATA
periodically.
In networks where GPS (Global Positioning System) [16] is
available, ODMRP can be made adaptive to node movements
by utilizing mobility prediction [19]. By using location and mo-
bility information supported by GPS, route expiration time can
be estimated and receivers can select the path that will remain
valid for the longest time. With the mobility prediction method,
sources can reconstruct routes in anticipation of route breaks.
This way, the protocol becomes more resilient to mobility. The
price is, of course, the cost and additional weight of GPS. The
details of mobility prediction and the procedure are described in
[19].
The data transfer phase is identical for both versions. Nodes
forward the data if they are forwarding nodes and the packet
they receive is not a duplicate. Since all forwarding nodes re-
lay data, redundant paths (when they exist) can help deliver data
when the primary path becomes disconnected because of mo-
bility. Another unique property of ODMRP is its unicast capa-
bility. Not only can ODMRP coexist with any unicast routing
protocol, it can also operate very efficiently as unicast routing
protocol. Thus, a network equipped with ODMRP does not re-
quire a separate unicast protocol.
The specification in [19] was used in our implementation. For
consistency with comparison, we used the version without mo-
bility prediction. ODMRP parameter values used are shown in
Table II.
C. Ad hoc Multicast Routing protocol utilizing Increasing id-
numberS (AMRIS)
AMRIS [29] establishes a shared tree for multicast data for-
warding. Each node in the network is assigned a multicast ses-
sion ID number. The ranking order of ID numbers is used to
direct the flow of multicast data. Like ODMRP, AMRIS does
not require a separate unicast routing protocol.
Initially, a special node called Sid broadcasts a NEW-
SESSION packet. The NEW-SESSION includes the Sid’s msm-id
(multicast session member id). Neighbor nodes, upon receiving
3
TABLE III
PARAMETER VA L U E S F O R AMRIS
Periodic beacon interval 1 sec
Max allowed beacon losses 3
NEW SESSION lifetime 3 sec
Acknowledgment timeout for JOIN-REQ 2 sec
Random broadcast jitter time 50 msec
the packet, calculate their own msm-ids which are larger than the
one specified in the packet. The msm-ids thus increase as they
radiate from the Sid. The nodes rebroadcast the NEW-SESSION
message with the msm-id replaced by their own msm-ids. Each
node is required to broadcast beacons to its neighbors. The bea-
con message contains the node id, msm-id, membership status,
registered parent and child’s ids and their msm-ids, and partition
id. A node can join a multicast session by sending a JOIN-REQ.
This JOIN-REQ is unicasted to a potential parent node with a
smaller msm-id than the node’s msm-id. The node receiving the
JOIN-REQ sends back a JOIN-ACK if it already is a member of
the multicast session. Otherwise, it sends a JOIN-REQ.PASSIVE
to its potential parent. If a node fails to receive a JOIN-ACK
or receives a JOIN-NAK after sending a JOIN-REQ, it performs
“Branch Reconstruction (BR). The BR process is executed in
an expanding ring search until the node succeeds in joining the
multicast session.
AMRIS detects link disconnection by a beaconing mecha-
nism. If no beacons are heard for a predefined interval of time,
the node considers the neighbor to have moved out of radio
range. If the former neighbor is a parent, the node must rejoin
the tree by sending a JOIN-REQ to a new potential parent. If the
node fails to join the session or no qualified neighbors exist, it
performs the BR process.
Data forwarding in done by the nodes in the tree. Only the
packets from the registered parent or registered child are for-
warded. Hence, if the tree link breaks, the packets are lost until
the tree is reconfigured.
Our AMRIS implementation followed the specification in
[29]. The AMRIS parameter values are shown in Table III.
D. Core-Assisted Mesh Protocol (CAMP)
CAMP [10], [11], [21], [22] supports multicasting by creat-
ing a shared mesh structure. All nodes in the network maintain
a set of tables with membership and routing information. More-
over, all member nodes maintain a set of caches that contain
previously seen data packet information and unacknowledged
membership requests. CAMP classifies nodes in the network as
duplex or simplex members, or non-members. Duplex members
are full members of the multicast mesh, while simplex mem-
bers are used to create one-way connections between sender-
only nodes and the rest of the multicast mesh. “Cores” are used
to limit the flow of JOIN REQUEST packets.
CAMP consists of mesh creation and maintenance proce-
dures. A node wishing to join a multicast mesh first consults
a table to determine whether it has neighbors which are already
members of the mesh. If so, the node announces its membership
via a CAMP UPDATE. Otherwise, the node either propagates a
TABLE IV
PARAMETER VA L U E S F O R CAMP
Number of cores in the network 1
Periodic beacon interval 3 sec
Periodic update interval 3 sec
Age out anchor timeout 45 sec
Heartbeat interval 15 sec
Request retransmission interval 9 sec
Max number of JOIN REQUEST retransmission 3
JOIN REQUEST towards one of the multicast group “cores, or
attempts to reach a member router by an expanding ring search
of broadcast requests. Any duplex member of the node can re-
spond with a JOIN ACK, which is propagated back to the source
of the request.
Periodically, a receiver node reviews its packet cache in or-
der to determine whether it is receiving data packets from those
neighbors which are on the reverse shortest path to the source. If
not, the node sends either a HEARTBEAT or a PUSH JOIN mes-
sage towards the source along the reverse shortest path. This
process ensures that the mesh contains all such reverse shortest
paths from all receivers to all senders. The nodes also period-
ically choose and refresh their selected “anchors” to the multi-
cast mesh by broadcasting updates. These anchors are neighbor
nodes which are required to re-broadcast any non-duplicate data
packets they receive. A node is allowed to discontinue anchor-
ing neighbor nodes which are not refreshing their connections.
It can then leave the multicast mesh if it is not interested in the
multicast session and is not required as anchor for any neighbor-
ing node.
CAMP relies on an underlying unicast routing protocol which
guarantees correct distances to all destinations within finite
time. Routing protocols that are based on the Bellman-Ford al-
gorithm cannot be used with CAMP, and CAMP needs to be
extended in order to work with on-demand routing protocols.
Our implementation of CAMP followed the specification in
[10]. Table IV shows the CAMP parameter values used in our
simulation. Periodic beacon interval is 3 seconds, but the bea-
con is sent only when no packet has been transmitted during the
beacon interval.
E. Protocol Summary
Table V summarizes key characteristics and properties of the
protocols we simulated. Note that ODMRP requires periodic
TABLE V
SUMMARY O F PROTOCOLS
Protocols AMRoute ODMRP AMRIS CAMP Flood
Configuration Tree Mesh Tree Mesh Mesh
Loop-Free No Yes Yes Yes Yes
Dependency on Yes No No Yes No
Unicast Protocol
Periodic Messaging Yes Yes Yes Yes No
Control Packet Flood Yes Yes Yes No No
4
messaging (JOIN DATA) only when sources have data packets
to send.
III. SIMULATION MODEL AND METHODOLOGY
The simulator for evaluating multicasting protocols was im-
plemented within the GloMoSim library [28]. The GloMoSim
library is a scalable simulation environment for wireless net-
work systems using the parallel discrete-event simulation ca-
pability provided by PARSEC [1]. Our simulation modeled a
network of 50 mobile hosts placed randomly within a 1000
1000 area. Radio propagation range for each node was
250 meters and channel capacity was 2 Mbits/sec. There were
no network partitions throughout the simulation and the average
number of neighbors for each node was 6.82. Each simulation
executed for 600 seconds of simulation time. Multiple runs with
different seed numbers were conducted for each scenario and
collected data was averaged over those runs.
A. Channel and Radio Model
A free space propagation model [26] with a threshold cutoff
was used in our experiments. In the free space model, the
power of a signal attenuates as
where is the distance
between radios. In addition to the free space channel model, we
also implemented SIRCIM (Simulation of Indoor Radio Chan-
nel Impulse-response Models) [27] which considers multipath
fading, shadowing, barriers, foliages, etc. SIRCIM is more ac-
curate than the free space model, but we decided against using
SIRCIM in our study because: (a) the complexity of SIRCIM
increases simulation time by three orders of magnitude; (b) the
accuracy of the channel model does not affect the relative rank-
ing of the multicasting protocols evaluated in this study; and (c)
SIRCIM must be “tuned” to the characteristics of the physical
environment (e.g., furniture, partitions, etc.), thus requiring a
much more specific scenario than we are assuming in our exper-
iments.
In the radio model, we assumed the ability of a radio to lock
onto a sufficiently strong signal in the presence of interfering
signals, i.e., radio capture. If the capture ratio (the ratio of
an arriving packet’s signal strength over the sum of all collid-
ing packets) [26] was greater than a predefined threshold value,
the packet was received while all other interfering packets were
dropped.
B. Medium Access Control Protocol
The IEEE 802.11 MAC with Distributed Coordination Func-
tion (DCF) [12] was used as the MAC protocol. DCF is the
mode which allows mobiles to share the wireless channel in an
ad hoc configuration. The specific access scheme is Carrier
Sense Multiple Access/Collision Avoidance (CSMA/CA) with
acknowledgments. Optionally, the nodes can make use of Re-
quest To Send/Clear To Send (RTS/CTS) channel reservation
control frames for unicast, virtual carrier sense, and fragmenta-
tion of packets larger than a given threshold. By setting timers
based upon the reservations in RTS/CTS packets, the virtual car-
rier sense augments the physical carrier sense in determining
when mobile nodes perceive that the medium is busy. Fragmen-
tation is useful in the presence of high bit error and loss rates, as
it reduces the size of the data units that need to be retransmitted.
In our experiments, we employed RTS/CTS exclusively for
unicast control packets directed to specific neighbors (e.g.,
replies). All other transmissions use CSMA/CA. We chose this
configuration to minimize the frequency and deleterious effects
of collisions over the wireless medium. We did not employ frag-
mentation because our data packets were small enough that the
additional overhead would reduce overall network throughput.
C. Multicast Protocols
When implementing the multicast protocols, we followed the
specifications of each protocol as defined in the published liter-
ature. We directly queried the protocol designers about details
which were not specified in the publications (e.g., various timer
values, core selection algorithm, etc.). ODMRP and AMRIS do
not require underlying unicast protocol to operate, but AMRoute
and CAMP do. While AMRoute can work with any protocol,
the designers of CAMP specifically state that it can operate only
with certain unicast protocols [10]. We have implemented one
of those protocols, WRP [24], a distance-vector based unicast
routing protocol developed by the same group which developed
CAMP. For a fair comparison, WRP was used as the underlying
unicast protocol also for AMRoute. The source code of each
protocol was independently validated by two of the authors.
D. Traffic Pattern
A traffic generator was developed to simulate constant bit rate
sources. The size of data payload was 512 bytes. The senders
were chosen randomly among multicast members who in turn
were chosen with uniform probability among 50 network hosts.
The member nodes join the multicast session at the beginning
of the simulation and remain as members throughout the sim-
ulation. Hence, the simulation experiments do not test/account
for the overhead produced in the session leave process.
E. Metrics
We have used the following metrics in comparing protocol
performance. Some of these metrics were suggested by the IETF
MANET working group for routing/multicasting protocol eval-
uation [5].
Packet delivery ratio: The ratio of the number of data pack-
ets actually delivered to the destinations versus the number of
data packets supposed to be received. This number presents the
effectiveness of a protocol.
Number of data packets transmitted per data packet de-
livered: ‘Data packets transmitted’ is the count of every individ-
ual transmission of data by each node over the entire network.
This count includes transmissions of packets that are eventually
dropped and retransmitted by intermediate nodes. Note that in
unicast protocols, this measure is always equal or greater than
one. In multicast, since a single transmission can deliver data to
multiple destinations, the measure may be less than one.
Number of control bytes transmitted per data bytes de-
livered: Instead of using a measure of pure control overhead,
we chose to use the ratio of control bytes transmitted to data
bytes delivered to investigate how efficiently control packets are
utilized in delivering data. Note that not only bytes of control
packets (e.g., beacons, route updates, join requests, acknowledg-
ments, etc.), but also bytes of data packet headers are included
5
in the number of control bytes transmitted. Accordingly, only
the data payload bytes contribute to the data bytes delivered.
Number of control and data packets transmitted per data
packet delivered: This measure shows the efficiency in terms
of channel access and is very important in ad hoc networks since
link layer protocols are typically contention-based.
IV. SIMULATION RESULTS
A. Mobility Speed
A.1 Scenarios
Each node moved constantly with the predefined speed. Mov-
ing directions of each node were selected randomly, and when
nodes reached the simulation terrain boundary, they bounced
back and continued to move. The node movement speed was
varied from 0 km/hr to 72 km/hr. In the mobility experiment, 20
nodes are multicast members and 5 sources transmit packets at
the rate of 2 pkt/sec each.
A.2 Results and Analysis
Fig. 1 illustrates the packet delivery ratio of the protocols un-
der different speeds. ODMRP shows good performance even in
highly dynamic situations. ODMRP provides redundant routes
with a mesh topology and the chances of packet delivery to des-
tinations remain high even when the primary routes are unavail-
able. The path redundancy enables ODMRP to suffer only min-
imal data loss and be robust to mobility. In fact, ODMRP was
as effective as flooding in this experiment.
CAMP, which also uses a mesh topology, shows a better per-
formance than protocols which use trees. However, CAMP ex-
hibited poorer performance than we had expected, especially
under mobility. A major reason CAMP was not as effective as
ODMRP was that many packets headed to distant routers in the
mesh were not delivered. In CAMP, since the paths to distant
destinations have fewer redundant paths than those closer to the
center of the mesh, they are more prone to occasional link breaks
preventing a vital “anchoring” node from successfully receiving
packets. Most of the successful packet transmissions occur in
this mesh center, and require fewer data transmissions per de-
livery than transmissions to the mesh edges. In addition, in the
presence of mobility and link breaks, WRP (which is the unicast
protocol CAMP prefers to coexist with) can require a period of
network re-convergence in regards to a subset of destinations.
During this interval, this subset of destinations will be marked
as unreachable by the loop-detection facilities. If the group core
is a part of this subset of temporarily unreachable nodes, the
multicast routing updates regarding mesh maintenance will be
postponed, which also contributes to delays in mesh response to
mobility.
AMRIS shows a poor delivery ratio compared to protocols
that use mesh configuration. Since AMRIS builds a shared tree
for data dissemination, there is only one path between mem-
ber nodes. If a single tree link breaks because of node move-
ments, packet collision, or congestion, destinations can not re-
ceive packets. AMRIS detects node movements and tree breaks
by a beaconing mechanism. Nodes send beacons every second,
and neighbors are considered to have moved away if 3 consec-
utive beacons are not received. Thus, in the best case, it takes
0
0.2
0.4
0.6
0.8
1
0 10 20 30 40 50 60 70
Packet Delivery Ratio
Mobility Speed (km/h)
FLOODING
ODMRP
CAMP
AMRIS
AMROUTE
Fig. 1. Packet Delivery Ratio as a Function of Mobility Speed.
3 seconds after the link break for AMRIS to start tree readjust-
ment. A number of packets can be lost during that period. There
are possible solutions to this problem, but they all have respec-
tive drawbacks. If beacons are sent more often, that could in-
crease packet collisions. If the number of allowed beacon losses
is decremented, a node may attempt to find a new route when the
link is not broken but beacons are lost due to collisions. Find-
ing the optimal beacon interval and allowed number of beacon
losses for AMRIS is beyond the scope of the paper and we used
the values recommended by the AMRIS designers. The result
that surprised us was for zero mobility. While other protocols
showed data delivery ratio approaching unity, AMRIS delivered
only 60% of data packets. Since each node sends beacons ev-
ery second, there are a number of packets contending for the
channel. The beacon size of AMRIS is relatively large com-
pared to other protocols that send beacons (see [29]). Thus,
the beacon traffic combined with the data traffic causes a large
number of collisions leading to 40% drop. Under very light data
traffic, AMRIS shows improved performance as will be shown
in Fig. 8.
AMRoute was the least effective of the protocols with mo-
bility. Although its delivery ratio is near perfect in no mobil-
ity, it fails to deliver a significant number of packets even at
low mobility speeds. The delivery ratio steadily worsens as the
mobility speed is increased. One of the reasons AMRoute per-
forms so poorly is due to the formation of loops and the creation
of sub-optimal trees when mobility is present (at 72 km/hr, the
average hop count was nearly 8 while other protocols were be-
low 4). Loops occur during the tree reconstruction phase when
some nodes are forwarding data according to the stale tree and
others according to the newly built tree. The existence of loops
is critical in protocol performance because they cause serious
congestion. At some instants, nodes had up to 13.75 packets
dropped per second. The loss of packets due to buffer overflow
has two consequences. First, if a data packet is dropped in the
early stage of its multicast tree traversal, a large portion of tree
members will not receive it. Second, if control packets (TREE-
6
0.5
1
2
4
8
16
0 10 20 30 40 50 60 70
Number of Data Packets TXed / Data Packet Delivered
Mobility Speed (km/h)
AMROUTE
FLOODING
ODMRP
CAMP
AMRIS
Fig. 2. Number of Data Packets Transmitted per Data Packet Delivered as a
Function of Mobility Speed.
CREATE, JOIN-ACK, etc.) are dropped, the tree is not properly
built or becomes segmented and data will not be delivered. An-
other reason for AMRoute ineffectiveness is its dependency on
the underlying unicast protocol. AMRoute relies on the unicast
protocol to set up bidirectional tunnels between group members
for the multicast tree. However, as shown in [25], when mobil-
ity speed increases, the bidirectional link assumption in ad hoc
networks becomes weak (i.e., a node can reach a neighboring
node, but not necessarily vice versa). In our experiments, unidi-
rectional “critical” links existed in AMRoute trees. Critical links
are such that packets sent by the one end of the link are mostly
received by the other end but not vice versa. A great number
of packets are lost at these critical links. Since there are no al-
ternate routes in the AMRoute shared tree (although AMRoute
creates the mesh in order to build a tree, data is forwarded only
by tree nodes), data delivery ratio is very low.
Fig. 2 shows the number of data transmissions per data deliv-
ery to destinations. AMRoute has the highest number of trans-
missions because of loops. We can observe that protocols us-
ing meshes (i.e., ODMRP and CAMP) transmit more data pack-
ets than AMRIS, which uses a tree. In fact, ODMRP transmits
nearly as much data as flooding because it exploits multiple re-
dundant routes for data delivery.
The control byte overhead per data byte delivered is shown
in Fig 3. Remember that data packet header is included in con-
trol overhead. Flooding has no control packets. Hence, only
the data header contributes to control overhead and this over-
head does not increase with mobility. Other protocols generate
increasing overhead as speed increases. AMRIS shows a low
control overhead compared to other multicast schemes. The pri-
mary reason is that it transmitted less data packets (as seen in
Fig. 2). CAMP shows a larger control overhead under high mo-
bility than ODMRP because of its reliance on the unicast rout-
ing protocol WRP, which sends triggered updates. WRP suffers
from exponential growth in control traffic overhead under in-
creasing mobility. Moreover, CAMP piggybacks its own update
0.2
1
5
25
0 10 20 30 40 50 60 70
Number of Control Bytes TXed / Data Byte Delivered
Mobility Speed (km/h)
AMROUTE
CAMP
ODMRP
AMRIS
FLOODING
Fig. 3. Number of Control Bytes Transmitted per Data Byte Delivered as a
Function of Mobility Speed.
2
4
8
16
32
0 10 20 30 40 50 60 70
Number of All Packets TXed / Data Packet Delivered
Mobility Speed (km/h)
AMROUTE
ODMRP
FLOODING
CAMP
AMRIS
Fig. 4. Number of Total Packets Transmitted per Data Packet Delivered as a
Function of Mobility Speed.
messages onto WRP updates and those packets play a role in
overhead growth. In ODMRP, the control overhead remains rel-
atively constant because no updates are triggered by mobility.
JOIN DATA refresh interval was set constant to 3 seconds and
hence no additional overhead is required as mobility increases.
AMRoute has the highest ratio because of the data headers that
caught in the loops. The high ratio is also due to the formation
of inefficient trees. During the tree creation phase, an inefficient
tree can be formed when the TREE-CREATE packets from dis-
tant mesh neighbors arrives earlier than packets from nearby
nodes (e.g., due to network congestion, etc.). The non-optimal
tree results in having longer hops between member nodes and
increasing the number of data transmissions.
The number of all packets transmitted per data packet deliv-
ered is presented in Fig. 4. An interesting result is that CAMP
7
0
0.2
0.4
0.6
0.8
1
0 5 10 15 20
Packet Delivery Ratio
Number of Senders
ODMRP
FLOODING
CAMP
AMRIS
AMROUTE
Fig. 5. Packet Delivery Ratio as a Function of Number of Senders.
has a smaller number of transmissions than ODMRP. This re-
sult stems from two factors. First, ODMRP transmits more
data packets on redundant paths than CAMP. Second, although
CAMP has more control overhead bytes, the number of con-
trol packet transmissions is lower since CAMP updates are pig-
gybacked onto WRP updates. Again, AMRIS has the smallest
number of packet transmissions because it uses a tree and AM-
Route has the highest value because of loops.
B. Number of Senders
B.1 Scenarios
In this experiment, the multicast group size is set constant at
20, node mobility speed is slow (1 m/s), and network traffic load
is relatively light (10 pkt/sec). The number of multicast senders
range in the set 1, 2, 5, 10, 20 . A single sender represents
a class lecture scenario, while at the other extreme, 20 senders
model a video conference situation.
B.2 Results and Analysis
The packet delivery ratio as a function of the number of mul-
ticast senders is shown in Fig. 5. As the number of sources
increases, performance of flooding slightly degrades as more
packets are lost by collision, congestion, and channel con-
tention. ODMRP shows robustness to the number of sources.
In fact, performance even improves with number of senders be-
cause of increasing number of forwarding nodes and thus better
path redundancy. ODMRP limits the number of sources that
can send JOIN DATA at the same time. Whenever a source
needs to flood a JOIN DATA, it listens if any other source is
flooding the packet. It proceeds to send the JOIN DATA only if
no flooded packets are received within a certain period. Thus,
the number of collisions decreases and the the protocol remains
effective. Like ODMRP, CAMP shows improved performance
with a larger number of senders due to the increase in the num-
ber of anchors that each node requires. Each member node re-
quests every neighbor which is in the reverse shortest path to
0.2
1
5
0 5 10 15 20
Number of Control Bytes TXed / Data Byte Delivered
Number of Senders
AMROUTE
ODMRP
CAMP
AMRIS
FLOODING
Fig. 6. Number of Control Bytes Transmitted per Data Byte Delivered as a
Function of Number of Senders.
some source, to rebroadcast multicast update packets it receives
initially. Hence increasing the number of sources increases the
redundant paths in the mesh. AMRIS and AMRoute perfor-
mance was unaffected by the number of senders because they
use a shared tree for the multicast session.
Fig. 6 shows the control overhead per data byte delivered.
Every protocol except ODMRP shows a constant value. While
the other three multicast protocols form a shared mesh or tree,
ODMRP builds per-source meshes. If the number of senders
increases, more JOIN DATA packets are propagated and con-
trol overhead grows accordingly. We can speculate from this
result that ODMRP in its present form may not be as efficient
in networks where a large number of nodes (e.g., hundreds and
thousands) are multicast sources.
C. Multicast Group Size
C.1 Scenarios
We varied the number of multicast members to investigate the
scalability of the protocol. While fixing the number of senders at
5, mobility speed at 1 m/s, and network traffic rate at 10 pkt/sec,
the multicast group size was varied from 5 to 40 members.
C.2 Results and Analysis
The routing effectiveness of protocols as a function of mul-
ticast group size is illustrated in Fig. 7. Flooding and ODMRP
performance were not affected by the number of multicast mem-
bers. CAMP, on the other hand, performs markedly better as the
number of receivers increases. Since the mesh becomes mas-
sive with the growth of the members, more redundant routes
are formed and that improves the performance. If only a small
number of nodes join the multicast session, the mesh actually
appears closer to a tree for distant nodes, and the performance is
reflected in this graph. AMRIS also shows improvements with
the member size growth, but they are less dramatic than CAMP
because redundant routes are not established in AMRIS. AM-
Route shows the complete opposite behavior. As the group size
8
0.2
0.4
0.6
0.8
1
5 10 15 20 25 30 35 40
Packet Delivery Ratio
Multicast Group Size
FLOODING
ODMRP
CAMP
AMRIS
AMROUTE
Fig. 7. Packet Delivery Ratio as a Function of Multicast Group Size.
increases, the delivery ratio actually drops. This behavior is due
to the “critical” links that exist in the AMRoute multicast tree
(critical links were described in section IV-A). As the group size
increases, the number of tree links increases and the probability
of sources being isolated in the tree by critical links increases as
well.
D. Network Traffic Load
D.1 Scenarios
To study the impact of data traffic load on multicast protocols,
we varied the load on the network. There were 5 senders and the
multicast group size was 20. In this experiment, there was no
node mobility. Therefore, the packet drops are only caused by
buffer overflow, collision, and congestion. The network traffic
loads used were between 1 pkt/sec and 50 pkt/sec.
D.2 Results and Analysis
Packet delivery ratios for various traffic loads are shown in
Fig. 8. AMRIS was the most sensitive to traffic load. AMRIS
delivers a high percentage of data packets in extremely light load
(i.e., less than 5 pkt/sec). As the load increases however, the ra-
tio drops rapidly. As explained in section IV-A, the transmission
and the size of beacons resulted in numerous packet collisions.
AMRoute performance is nearly perfect when the packet rate is
relatively low, but it drops rather quickly when the traffic load
is increased. The degradation is caused by buffer overflow at
the members in the tree and at the mesh nodes that connect the
tree members. CAMP performance is also affected by traffic
load. As the load increases, the number of collisions and packet
losses increase. When important control packets are dropped,
anchor construction can be delayed and data packets can fail to
reach all the anchors. The degradation follows a pattern similar
to flooding and ODMRP, indicating a common behavior in mesh
based data delivery. Flooding shows worse delivery ratios than
ODMRP as load grows. Since every data packet is flooded, the
number of collisions and buffer overflows grows with the load.
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 10 20 30 40 50
Packet Delivery Ratio
Network Traffic Load (packets/sec)
FLOODING
ODMRP
CAMP
AMROUTE
AMRIS
Fig. 8. Packet Delivery Ratio as a Function of Network Traffic Load.
ODMRP is also affected by load, but the packet loss rate is less
severe than flooding because the number of data packet trans-
missions is less than flooding. Although ODMRP shows the
same patters of behaviors as CAMP, it gives a better delivery
rate because it has less control overhead and suffers less buffer
overflows than CAMP.
V. DISCUSSION
In previous sections, we have studied the effectiveness and
efficiency of several multicast protocols. In this section, we
summarize the merits and shortcomings of protocols and derive
suggestions for improvements. We also explain why our results
differ from previous works by other researchers for some of the
protocols. Finally, we share some of the lessons we have learned
while conducting the study.
A. Protocol Analysis
AMRoute showed some promise in its simplicity and scalabil-
ity in the number of senders. However, the presence of unidirec-
tional “critical” links prevented reliable data delivery. The prob-
lem became worse as mobility was increased. Other drawbacks
of AMRoute were the existence of loops and inefficient forma-
tion of trees. A possible improvement for AMRoute is to take
reachability information (i.e., packets sent to a neighbor/packets
received from that neighbor) into account when selecting tree
links. Using this method, the impact of unidirectional critical
links can be reduced. In addition, introducing adaptivity into the
protocol (e.g., periodic TREE-CREATE interval) can build more
optimal trees. Most importantly, a loop prevention mechanism
must be utilized for AMRoute to be efficient.
ODMRP performed well in most of our experiments. Pro-
viding redundant paths by the formation of mesh configuration
made the protocol robust to mobility. The protocol did not yield
excessive overhead in high mobility scenarios because no con-
trol packets are triggered by link breaks. However, when there
are a large number of multicast senders, the protocol may suffer
from excessive control overhead. Enhancements to make the
9
protocol more scalable to large member groups must be devel-
oped.
AMRIS performance was very sensitive to mobility and
traffic load. The main reasons for the poor performance were
the number of transmissions and the size of beacons. As shown
in section IV-D, beacons caused a number of packet collisions
even when nodes are stationary. In more dense networks, the
performance may become worse. We believe AMRIS can be
improved by using a beaconing mechanism similar to CAMP.
If the beacon is sent only when no packet has been transmit-
ted in given interval, the number of beacon transmissions can
be reduced while still delivering node information to neighbor-
ing nodes. In addition, the selection of Sid can affect the shape
of the tree and possibly its performance. The research into the
Sid selection algorithm along with beaconing methods will help
improve AMRIS.
CAMP has good control traffic scalability for increasing mul-
ticast group size. Since JOIN REQUESTS only propagate until
they reach a mesh member, CAMP does not incur exponential
growth of multicast updates as the number of nodes and group
members increase. However, it is dependent upon the unicast
routing protocol for behaviors regarding network convergence
and control traffic growth in the presence of mobility. WRP’s
response to link breaks is not immediate, and can incorrectly de-
duce a link break in the presence of high network load. CAMP
may perform better if it is modified so as to operate with an
on-demand routing protocol. As shown in [4], [6], [14], [20],
on-demand protocols performed favorably in terms of control
packet overhead and response to mobility. If CAMP were able
to leverage these advantages, it should dramatically improve its
packet delivery ratio and control overhead.
B. Related Works
As of October 1999, only CAMP and ODMRP designers have
performed simulation study of their protocols. AMRoute and
AMRIS performance evaluation have not been published. In
simulation works reported in [10], [21], [22], the results are
quite different from the results we have obtained in our exper-
iments. In [10], [21], [22], a simplified simulator was used.
A perfect channel was assumed and radio propagation was not
considered. FAMA [9] was used as the medium access control
protocol, which is different from IEEE 802.11 [12], the emerg-
ing standard MAC protocol for wireless LAN, that we used in
our simulation. Only a small portion of network hosts had mo-
bility (5 out of 30 or 15 out of 30) in their study. The critical
nodes for CAMP performance (e.g., core, senders), however, re-
mained stationary. All the nodes in [10], [21], [22] were multi-
cast session members, which is not realistic in typical multicast
applications. The network traffic load was extremely light (4
packets/sec). Information on data size, radio propagation range,
or simulation terrain range were not given. Thus, the results in
[10], [21], [22] are somewhat limited. In any way, they cannot
be directly compared to the results from this paper.
C. Lessons Learned
While implementing and evaluating multicast protocols, we
have learned a great deal and would like to share our experi-
ence with researchers who design and implement ad hoc wire-
less multicast protocols. In our study, the mesh protocols per-
formed significantly better than the tree protocols in mobile sce-
narios. In trees, when routes are invalidated due to node move-
ments, the packets must be buffered or dropped until the tree is
reconfigured. On the other hand, redundant routes in the mesh
provide alternate routes for data delivery in the face of mobil-
ity and link breaks. Data packets can still reach the destinations
while the primary route is being reconstructed.
Using detailed lower layer (i.e., link layer and physical
layer) implementations in the network simulator along with pro-
grammable mobility patterns highlighted differences in the pro-
tocol tolerance to various wireless network conditions. We
strongly recommend fellow researchers to use publicly available
simulators which are validated by frequent use and which permit
replication of the experiments.
VI. CONCLUSIONS
We have conducted a performance evaluation of five multi-
cast protocols that have been proposed for ad hoc networks. The
channel, radio, IEEE 802.11 MAC protocol, and multicast pro-
tocols (AMRoute, ODMRP, AMRIS, CAMP, and flooding) have
been carefully implemented. The detailed simulator has enabled
us to perform fair and accurate comparisons of the multicast pro-
tocols under a realistic wireless environment, for a broad range
of parameters including mobility, number of senders, multicast
group size, and traffic load.
A general conclusion is that, in a mobile scenario, mesh-
based protocols outperformed tree-based protocols. The avail-
ability of alternate routes provided robustness to mobility. AM-
Route performed well under no mobility, but it suffered from
loops and inefficient trees even for low mobility. AMRIS was
effective in a light traffic environment with no mobility, but
its performance was susceptible to traffic load and mobility.
CAMP showed better performance when compared to tree pro-
tocols, but with mobility, excessive control overhead caused
congestion and collisions that resulted in performance degrada-
tion. ODMRP was very effective and efficient in most of our
simulation scenarios. However, the protocol showed a trend of
rapidly increasing overhead as the number of senders increased.
We experimented with scenarios which we thought were the
most representation of ad hoc wireless network applications.
However, we did not cover every possible situation. While the
results of this paper can provide guidelines, the final selection
of a multicast protocol should take into account other consider-
ations which cannot be evaluated via simulation alone.
ACKNOWLEDGMENTS
We thank Rajesh Talpade of Bellcore, Chun Wei Wu of Uni-
versity of Singapore, and Ewerton Madruga of University of
California, Santa Cruz for answering our questions about pro-
tocols details of AMRoute, AMRIS, and CAMP. We also thank
Evan Tsang, Yung-Szu Tu, and Brent Murata of University of
California, Los Angeles for helping the simulation process. We
are also grateful of Ronn Ritke and James Stepanek of Univer-
sity of California, Los Angeles for helpful comments and sug-
gestions.
10
REFERENCES
[1] R. Bagrodia, R. Meyer, M. Takai, Y. Chen, X. Zeng, J. Martin, and H.Y.
Song, “PARSEC: A Parallel Simulation Environment for Complex Sys-
tems,IEEE Computer, vol. 31, no. 10, Oct. 1998, pp.77-85.
[2] T. Ballardie, P. Francis, and J. Crowcroft, “Core Based Trees (CBT) - An
Architecture for Scalable Inter-Domain Multicast Routing, In Proceed-
ings of ACM SIGCOMM’93, San Francisco, CA, Oct. 1993, pp. 85-95.
[3] E. Bommaiah, M. Liu, A. McAuley, and R. Talpade, AMRoute: Ad-
hoc Multicast Routing Protocol, Internet-Draft, draft-talpade-manet-
amroute-00.txt, Aug. 1998, Work in progress.
[4] J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, and J. Jetcheva, A Per-
formance Comparison of Multi-Hop Wireless Ad Hoc Network Routing
Protocols,” In Proceedings of ACM/IEEE MOBICOM’98, Dallas, TX, Oct.
1998, pp. 85-97.
[5] M.S. Corson and J. Macker, “Mobile Ad hoc Networking (MANET):
Routing Protocol Performance Issues and Evaluation Considerations, Re-
quest For Comments 2501, Internet Engineering Task Force, Jan. 1999.
[6] S.R. Das, R. Castaneda, J. Yan, and R. Sengupta, “Comparative Perfor-
mance Evaluation of Routing Protocols for Mobile, Ad hoc Networks,” In
Proceedings of IEEE IC3N’98, Lafayette, LA, Oct. 1998, pp. 153-161.
[7] S.E. Deering and D.R. Cheriton, “Multicast Routing in Datagram Inter-
networks and Extended LANs,ACM Transactions on Computer Systems,
vol. 8, no. 2, May 1990, pp. 85-110.
[8] S. Deering, D.L. Estrin, D. Farinacci, V. Jacobson, C.-G. Liu, and L. Wei,
“The PIM Architecture for Wide-Area Multicast Routing, IEEE/ACM
Transactions on Networking, vol. 4, no. 2, Apr. 1996, pp. 153-162.
[9] C.L. Fullmer and J.J. Garcia-Luna-Aceves, “Solutions to Hidden Terminal
Problems in Wireless Networks, In Proceedings of ACM SIGCOMM’97,
Cannes, France, Sep. 1997, pp. 39-49.
[10] J.J. Garcia-Luna-Aceves and E.L. Madruga, “The Core-Assisted Mesh
Protocol, IEEE Journal on Selected Areas in Communications, vol. 17,
no. 8, Aug. 1999, pp. 1380-1394.
[11] J.J. Garcia-Luna-Aceves and E.L. Madruga, A Multicast Routing Proto-
col for Ad-Hoc Networks, In Proceedings of IEEE INFOCOM’99, New
York, NY, Mar. 1999, pp. 784-792.
[12] IEEE Computer Society LAN MAN Standards Committee, Wireless LAN
Medium Access Protocol (MAC) and Physical Layer (PHY) Specification,
IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engi-
neers, New York, NY, 1997.
[13] Internet Engineering Task Force (IETF) Mobile Ad
Hoc Networks (MANET) Working Group Charter.
http://www.ietf.org/html.charters/manet-charter.html.
[14] P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, and M. Degermark,
“Scenario-Based Performance Analysis of Routing Protocols for Mobile
Ad-hoc Networks,” In Proceedings of ACM/IEEE MOBICOM’99, Seattle,
WA, Aug. 1999, pp. 195-206.
[15] J. Jubin and J.D. Tornow, “The DARPA Packet Radio Network Protocols,
Proceedings of the IEEE, vol. 75, no. 1, Jan. 1987, pp. 21-32.
[16] E.D. Kaplan (Editor), Understanding the GPS: Principles and Applica-
tions, Artech House, Boston, MA, Feb. 1996.
[17] S.-J. Lee, M. Gerla, and C.-C. Chiang, “On-Demand Multicast Routing
Protocol, In Proceedings of IEEE WCNC’99, New Orleans, LA, Sep.
1999, pp. 1298-1304.
[18] S.-J. Lee, W. Su, and M. Gerla, “Ad hoc Wireless Multicast with Mobility
Prediction, In Proceedings of IEEE ICCCN’99, Boston, MA, Oct. 1999,
pp. 4-9.
[19] S.-J. Lee, W. Su, and M. Gerla, “On-Demand Multicast Routing Protocol
(ODMRP) for Ad Hoc Networks,Internet-Draft, draft-ietf-manet-odmrp-
01.txt, Jun. 1999, Work in progress.
[20] S.-J. Lee, M. Gerla, and C.-K. Toh, “A Simulation Study of Table-Driven
and On-Demand Routing Protocols for Mobile Ad-Hoc Networks, IEEE
Network, vol. 13, no. 4, Jul. 1999, pp. 48-54.
[21] E.L. Madruga and J.J. Garcia-Luna-Aceves, “Multicasting Along Meshes
in Ad-Hoc Networks, In Proceedings of IEEE ICC’99, Vancouver,
Canada, Jun. 1999, pp. 314-318.
[22] E.L. Madruga and J.J. Garcia-Luna-Aceves, “Scalable Multicasting: The
Core Assisted Mesh Protocol, To appear in ACM/Baltzer Mobile Net-
works and Applications, Special Issue on Management of Mobility, 1999.
[23] J. Moy, “Multicast Routing Extensions for OSPF,Communications of the
ACM, vol. 37, no. 8, Aug. 1994, pp. 61-66, 114.
[24] S. Murthy and J.J. Garcia-Luna-Aceves, An Efficient Routing Protocol
for Wireless Networks, ACM/Baltzer Mobile Networks and Applications,
vol. 1, no. 2, Oct. 1996, pp. 183-197.
[25] R. Prakash, “Unidirectional Links Prove Costly in Wireless Ad-Hoc Net-
works, In ACM DIAL M’99 Workshop, Seattle, WA, Aug. 1999, pp. 15-
22.
[26] T.S. Rappaport, Wireless Communications: Principles and Practice, Pren-
tice Hall, Upper Saddle River, NJ, Oct. 1995.
[27] T.S. Rappaport, S.Y. Seidel, and K. Takamizawa, “Statistical Channel Im-
pulse Response Models for Factory and Open Plan Building Radio Com-
munication System Design,IEEE Transactions on Communications, vol.
COM-39, no. 5, May 1991, pp. 794-807.
[28] UCLA Computer Science Department Parallel Computing Laboratory
and Wireless Adaptive Mobility Laboratory, GloMoSim: A Scal-
able Simulation Environment for Wireless and Wired Network Systems.
http://pcl.cs.ucla.edu/projects/domains/glomosim.html
[29] C.W. Wu, Y.C. Tay, and C.-K. Toh, Ad hoc Multicast Routing proto-
col utilizing Increasing id-numberS (AMRIS) Functional Specification,
Internet-Draft, draft-ietf-manet-amris-spec-00.txt, Nov. 1998, Work in
progress.
... It relies on the unicast protocol for connectivity among the member nodes. The major drawback of this protocol is that it creates temporary loops and has nonoptimal trees whenever there is mobility [48]. ...
... Packet loss and delay in route recovery is the drawback of this protocol. Also, to show their presence nodes send beacon signals periodically, therefore, more bandwidth is required and a huge number of packets are lost while collisions among the beacons [48][49]. ...
... They sustain a mesh consisting of a connected component of the network containing all the receivers of a group. Examples of mesh-based multicast routing approaches are On-Demand Multicast Routing Protocol (ODMRP), Flooding, and Core-Assisted Mesh Protocol (CAMP) [4,7,10,26,40,43,[48][49]. ...
Article
Mobile ad-hoc network (MANET) has got tremendous success in the last decade due to its properties of self-maintenance and self-organization. It consists of a group of mobile nodes having the ability to communicate with each other without any fixed central base station. In MANET, mobile nodes communicate with each other using routing protocols. Wireless networks are supported by many multicast routing protocols. In recent years, significant research has been done in designing a multicast protocol for MANETs. It is still a difficult issue to design an efficient multicast routing protocol in Mobile Ad Hoc Networks (MANETs). Multicasting is a challenging task due to the management of group membership, data packets forwarding, and controlling the large network size.
... Various protocols have been introduced to solve all the above problems suitable for MANETs. Some well-known protocols have been studied, classified and compared in [21][22][23][24]. ...
Article
Full-text available
To solve problems with limited resources such as power, storage, bandwidth, and connectivity, efficient and effective data management solutions are needed. It is believed that the most successful algorithms for circumventing these constraints are those that self-organise and collaborate. To make the best use of available bandwidth, mobile ad hoc networks (MANETs) employ the strategy of multi-casting. The communication cost of any network can be significantly reduced by multi-casting, and the network can save resources by transmitting only one set of data to numerous receivers at a time. In this study, we implemented multi-casting in the virtual cord protocol (VCP), which uses virtual coordinates (VC) to improve effective routing and control wireless data transmission. We have improved the classic VCP protocol by making it so that intermediate nodes can also forward or re-transmit the dataset to interested nodes. This improves data transmission from the sender to multiple receivers. Simulation results proved efficacy of our proposed enhanced virtual cord protocol-based multi-casting strategy over traditional VCP protocol and helped in reduction of number of MAC transmissions, minimization of end-to-end delay, and maximization of packet delivery ratio.
... Lee et al., [10] compare the performance of ODMRP, CAMP, AMRoute and AMRIS. Their simulations are based on 50-node networks with a variable number of multicast senders and receivers in single multicast group. ...
Article
A MANET is a self-conFigureuring system of mobile hosts connected by wireless links. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. Routing is the process of exchanging information from one station to the other stations of the network. Multicasting is a popular mechanism for supporting group communication. In a multicast session, the sender transmits only one copy of each message that is replicated within the network and delivered to multiple recipients. This multicast routing is highly deal with self-organized network in recent days due to its broadcast characteristics. However, devising multicast protocols to provide group communications in mobile ad-hoc networks is significantly more complicated, because of the wireless medium, changing topology, battery power and available bandwidth as well. This paper, evaluates two prominent on-demand multicast routing protocols for group communication, namely, Multicast Ad hoc On-Demand Distance Vector (MAODV) and On-Demand Multicast Routing Protocol(ODMRP) as increasing number of multicast sources and receivers in both single-active multicast group and multi-active multicast group in the network.
... A zone ID will help locate a zone, and a packet destined to a zone will be forwarded toward its center. The center position (Xc,Yc) of a zone with zID (a,b) can be calculated as: [11,12,13,14] ...
Article
Full-text available
Recent days it became a challenge to design a scalable and robust multicasting routing protocol in a mobile Ad Hoc network (MANET). In this paper, we propose a novel Robust and Scalable Geographic Multicast Protocol (RSGM) and simulated the design with beautiful performance analysis with the existing protocols. Our results demonstrate that RSGM can scale a large network size, and can more efficient support multiple multicasting groups in the network. Compared to existing protocol ODMRP and SPBM, RSGM achieves a significantly higher delivery ratio under all circumstances.
... As a result, higher number of packets is able to reach from source to respective destinations enabling EEMS-WEEM to produce higher packet delivery ratio. Improvements produced by EEMS-WEEM [27], [28] are evident from Figure 1, Figure 2 and Figure 3. ...
... A number of multicast protocols have been proposed to provide multicasting in MANET like challenging environments [11,19]. A multicast packet is delivered to all the receivers belong to a group along a network structure such as tree or mesh, which is constructed once a multicast group is formed. ...
Article
Full-text available
An ad hoc network is composed of mobile nodes without the intervention of any fixed infrastructure or central administration. Multicasting is intended for group-oriented communication. A lot many applications depend on one-to-many or many-to-many dissemination of the information. However, in ad hoc environment, multicasting protocols are faced with the challenge of producing multihop routes under dynamic topology and bandwidth constraints. Due to the dynamic topology of MANETs it is very difficult to build optimal multicast trees and maintaining group membership, making even more challenging to implement scalable and robust multicast in Mobile Ad hoc Networks (MANET). A Scalable and Robust Location Aware Multicast Algorithm, called SRLAMA, for mobile ad hoc networks is presented in the paper that is based on creation of shared tree using the physical location of the nodes for the multicast sessions. It constructs a shared bi-directional multicast tree with an alternate root that avoids the network partitioning in case of primary root failurte, which results in better performance even than a shared tree. The algorithm uses the concept of small overlapped zones around each node for employing proactive routing with in the smaller zone. Protocol is based on the location information obtained employing relevant data structure, which effectively reduces the overheads for route searching and shared multicast tree maintenance. It employs a preventive route reconfiguration to avoid the latency in case of link breakages and to prevent the network from splitting.
Article
Full-text available
“Doing Business in India: International Perspectives (With Particular Reference to Business Process Outsourcing (BPO) Industry)”, Refereed Proceedings, International Conference on “ Resurging India : Myths & Realities”, March 17 – 18, 2012, Teerthanker Mahaveer University, Moradabad, India, Copyright © 2012 , pp. 3 – 11, ISBN 978-93-82062-04-2, Excel India Publishers, New Delhi. (With James Ondracek, Andy Bertsch, and Matthew Cohen) ABSTRACT: The country of India is one of the fastest growing economies in the world. With beneficial business incentives and a wealth of highly qualified, highly motivated potential employees, India is becoming a hub for economic growth and technological advancement. With so much expansion in India many industries, specifically the contact center and Business Process Outsourcing (BPO) industry, have entered into the global market with vigorous development. Currently India is ranked number one in the world in both the call center and BPO industries, has been able to grow the BPO and IT export sector to more than $47 billion USD, and has captured half of the entire world’s offshore service business. This study provides an overview of business climate, glimpses of socio- cultural, economic, and technological environments, with particular reference to insights pertaining to business process outsourcing industry. This article is recommended reading for those interested in doing business in India including students of international business.
Article
In this work, we provide a comprehensive analysis of stability properties and delay gains that wireless multicasting capabilities, as opposed to more traditional unicast transmissions, can provide for content distribution in mobile networks. In particular, we propose a model and characterize the average queue-length (and hence average delay) performance of unicasting and various multicasting strategies for serving a dynamic user population at the wireless edge. First, we show that optimized static randomized multicasting (we call it 'blind multicasting') leads to stable-everywhere operation irrespective of the network loading factor (given by the ratio of the demand rate to the service rate) and the content popularity distribution. In contrast, traditional unicasting suffers from unstable operation when the loading factor approaches one, although it outperforms blind multicasting at small loading factor levels. This motivates us to study 'work-conserving multicast' policies next that always outperform unicasting while still offering stable-everywhere operation. Then, in the worst-case of uniformly-distributed content popularity, we explicitly characterize the scaling of the average queue-length (and hence delay) under a first-come-first-serve multicast strategy as a function of the database size and the loading factor. Consequently, this work provides the fundamental limits, as well as the guidelines, for the design and performance analysis of efficient multicasting strategies for wireless content distribution.
Article
Full-text available
Wireless body area network (WBANs) is a recent and emerging technology for medical health monitoring wireless communication system. Its provides short range communication between the body surface and the wireless access point. Channel characteristics of WBAN is very peculiar one compare to others wireless channels, particularly when human body rotates and interferences of others human body shadowing and their own shadows. In this papers analysis the characteristics of recently proposed off-body WBAN channels can be achieved by modeling of channels and improved bit error performances when human body rotates as well as shadowing. In order to avoid the above demerits it is important to obtain the improved bit error performances, additionally another receive antenna is attached to the back side of human body. And also various diversity schemes where used to analyze the each performances of WBAN. Index Terms-wireless body areas networks (WBANs), off body channels, Rician K-factor, Diversity schemes.
Article
Full-text available
Most of the multicast routing protocols for ad hoc networks today are based on shared or source-based trees; however, keeping a routing tree connected for the purpose of data forwarding may lead to a substantial network overhead. A different approach to multicast routing consists of building a shared mesh for each multicast group. In multicast meshes, data packets can be accepted from any router, as opposed to trees where data packets are only accepted from routers with whom a tree branch has been established. The difference among multicast routing protocols based on meshes is in the method used to build these structures. Some mesh-based protocols require the flooding of sender or receiver announcements over the whole network. This paper presents the Core-Assisted Mesh Protocol, which uses meshes for data forwarding, and avoids flooding by generalizing the notion of core-based trees introduced for internet multicasting. Group members form the mesh of a group by sending join requests to a set of cores. Simulation experiments show that meshes can be used effectively as multicast routing structures without the need for flooding control packets.
Article
One of the central problems in one-to-many wide-area communications is forming the delivery tree - the collec- tion of nodes and links that a multicast packet traverses. Significant problems remain to be solved in the area of multicast tree formation, the problem of scaling being paramount among these. In this paper we show how the current 1P multicast arctiltecture scales poorly (by scale poorly, we mean con- sume too much memory, bandwidth, or too many pro- cessing resources), and subsequently present a multicaat protocol based on a new scalable architecture that is low-cost, relatively simple, and efficient. We also show how this architecture is decoupled from (though depen- dent on) unicast routing, and is therefore easy to install in an internet that comprises multiple heterogeneous unicast routing algorithms.
Article
Multicasting is used within local-area networks to make distributed applications more robust and more efficient. The growing need to distribute applications across multiple, interconnected networks, and the increasing availability of high-performance, high-capacity switching nodes and networks, lead us to consider providing LAN-style multicasting across an internetwork. In this paper, we propose extensions to two common internetwork routing algorithms—distance-vector routing and link-state routing—to support low-delay datagram multicasting. We also suggest modifications to the single-spanning-tree routing algorithm, commonly used by link-layer bridges, to reduce the costs of multicasting in large extended LANs. Finally, we show how different link-layer and network-layer multicast routing algorithms can be combined hierarchically to support multicasting across large, heterogeneous internetworks.
Conference Paper
One of the central problems in one-to-many wide-area communications is forming the delivery tree - the collection of nodes and links that a multicast packet traverses. Significant problems remain to be solved in the area of multicast tree formation, the problem of scaling being paramount among these.In this paper we show how the current IP multicast architecture scales poorly (by scale poorly, we mean consume too much memory, bandwidth, or too many processing resources), and subsequently present a multicast protocol based on a new scalable architecture that is low-cost, relatively simple, and efficient. We also show how this architecture is decoupled from (though dependent on) unicast routing, and is therefore easy to install in an internet that comprises multiple heterogeneous unicast routing algorithms.