Reliable Concurrent Multicast from Bursty Sources
نویسندگان
چکیده
This paper presents a protocol and design for concurrent and reliable group multicast (many-to-many) from bursty data sources in general networks. In a group multicast, any node can be a multicast source and multiple nodes may start to multicast simultaneously, i.e., an asynchronous access to the network. The reliable multicast protocol presented in this work is window based with a combined sender and receiver initiation of the recovery protocol. In reliable multicasting the necessary requirement is to ensure that data is received correctly by all the active members of the multicast group. The approach taken in this work is to combine the multicast operation with the internal flow control. As a result, it is possible to provide: 1) congestion-free multicast routing with a single and immediate acknowledgment message to the sender. Furthermore, in every multicast, 2) a node can access all the capacity allocated to its group with no delay, however, if several nodes are active in the same group, then the capacity will be shared fairly. In addition, 3) each sender in the multicast group uses a single timer, and 4) a node can become active or inactive in a transparent fashion, i.e., there is no need to explicitly notify the members of the group. A multiple criteria optimization study of the bandwidth allocation to each multicast group is presented. The optimization problem has two Min–Max objective functions: 1) for delay, which is caused by the number of links needed to connect the group, and 2) for congestion, which is caused by sharing a link among multiple multicast groups. The bandwidth allocation among multicast groups sharing the same link are further optimized using the Max–Min fairness criterion.
منابع مشابه
Adaptable Error Control for Efficient Provision of Re- liable Services in ATM Networks
Distributed computing, distributed multimedia applications as well as advanced applications for computersupported cooperative work depend on high performance networks providing point-to-point and point-tomultipoint communication services. ATM networks promise to provide adequate support for these applications. However, the traffic originating from these applications is highly bursty and unpredi...
متن کاملEfficient Key Management for Secure Group Communications with Bursty Behavior
Secure group communication (SGC) is becoming more popular in the Internet. Burstiness is an important behavior in SGC. Performing bursty operation in one aggregate operation is important for efficiency and scalability. In this paper, we extend the well-known key-tree key management protocol for SGC to situations with bursty user arrival and departure patterns. By using a binary representation t...
متن کاملDesigning a Caching-Based Reliable Multicast Protocol
With the increasing use of the Internet, multi-party communication and collaboration applications are becoming mainstream. This trend calls for high-performance multicast services that scale to large groups and higher bandwidth requirements. Although packet loss characteristics have a large impact on the performance of multicast services, few protocols attempt to adapt and actively exploit such...
متن کاملImpact of device unavailability on the reliability of multicast transport in IEEE 802.11 networks
Multicast transport is an efficient solution to deliver the same content simultaneously to many receivers. This transport mode is mainly used these days to deliver real-time video streams. However, multicast transmissions support over IEEE 802.11 networks does not provide any feedback policies, which implies a definite loss of missing packets. This impacts the reliability of the multicast trans...
متن کاملMulticast Transport Protocol Analysis: Self-Similar Sources
We study the traffic that scalable multicast protocols generate in terms of message delays over the network as well as traffic counts at the link level in the case of self-similar sources. In particular, we study Bimodal Multicast and Scalable Reliable Multicast protocols proposed for scalable reliable multicasting. These protocols are based on different mechanisms for recovering from message l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Journal on Selected Areas in Communications
دوره 15 شماره
صفحات -
تاریخ انتشار 1996