Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Performance analysis of reliable multicast protocols
Download
index.pdf
Date
2004
Author
Çelik, Coşkun
Metadata
Show full item record
Item Usage Stats
199
views
110
downloads
Cite This
IP multicasting is a method for transmitting the same information to multiple receivers over IP networks. Reliability issue of multicasting contains the challenges for detection and recovery of packet losses and ordered delivery of the entire data. In this work, existing reliable multicast protocols are classified into three main groups, namely tree based, NACK-only and router assisted, and a representative protocol for each group is selected to demonstrate the advantages and disadvantages of the corresponding approaches. The selected protocols are SRM, PGM and RMTP. Performance characteristics of these protocols are empirically evaluated by using simulation results. Network Simulator-2 (ns2), a discrete event simulator is used for the implementation and simulation of the selected protocols. The contributions of the thesis are twofold, i.e. the extension of the ns library with an open source implementation of RMTP which did not exist earlier and the evaluation of the selected protocols by investigating performance metrics like distribution delay and recovery latency with respect to varying multicast group size, network diameter, link loss rate, etc.
Subject Keywords
Electronic computers.
,
Computer science.
URI
http://etd.lib.metu.edu.tr/upload/12605656/index.pdf
https://hdl.handle.net/11511/14637
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Design and implementation of a secure and searchable audit logging system
İncebacak, Davut; Çetin, Yasemin; Department of Information Systems (2007)
Logs are append-only time-stamped records to represent events in computers or network devices. Today, in many real-world networking applications, logging is a central service however it is a big challenge to satisfy the conflicting requirements when the security of log records is of concern. On one hand, being kept on mostly untrusted hosts, the logs should be preserved against unauthorized modifications and privacy breaches. On the other, serving as the primary evidence for digital crimes, logs are often n...
Analysis of target detection probability in randomly deployed sensor networks
Onur, Ertan; Delic, Hakan (Institute of Electrical and Electronics Engineers (IEEE), 2007-10-01)
The main functionality of a surveillance wireless sensor network is to detect unauthorized traversals in a field. In this paper, we develop a formulation to determine the probability of detecting a randomly positioned target by a set of binary sensors to serve as the deployment quality measure. This formulation leads to a recipe to determine the number of sensors required to deliver a certain deployment quality level. The sensing- and communication-neighbor degrees which can be used as design criteria in a ...
An image encryption algorithm robust to post-encryption bitrate conversion
Akdağ, Sadık Bahaettin; Candan, Çağatay; Department of Electrical and Electronics Engineering (2006)
In this study, a new method is proposed to protect JPEG still images through encryption by employing integer-to-integer transforms and frequency domain scrambling in DCT channels. Different from existing methods in the literature, the encrypted image can be further compressed, i.e. transcoded, after the encryption. The method provides selective encryption/security level with the adjustment of its parameters. The encryption method is tested with various images and compared with the methods in the literature ...
Cooperative Network Coded ARQ Strategy for Broadcast Networks
Tutgun, Rasit; AKTAŞ, EMRE (2015-06-12)
A novel cooperative automatic repeat request (ARQ) method with network coding is proposed for broadcast networks where single source node broadcasts multiple packets to multiple destinations. Upon a failed transmission, multiple relays cooperate with the source node at the retransmission phase, where network coding is used to combine multiple lost packets. A random access mechanism is employed where retransmission is done according to back-off counters. The proposed method employs the back-off mechanism to ...
State-space identification of switching linear discrete time-periodic systems with known scheduling signals
Uyanik, Ismail; Hamzacebi, Hasan; Ankaralı, Mustafa Mert (The Scientific and Technological Research Council of Turkey, 2019-01-01)
In this paper, we propose a novel frequency domain state-space identification method for switching linear discrete time-periodic (LDTP) systems with known scheduling signals. The state-space identification problem of linear time-invariant (LTI) systems has been widely studied both in the time and frequency domains. Indeed, there have been several studies that also concentrated on state-space identification of both continuous and discrete linear time-periodic (LTP) systems. The focus in this study is the fam...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
C. Çelik, “Performance analysis of reliable multicast protocols,” M.S. - Master of Science, Middle East Technical University, 2004.