Asymptotic Analysis for Reliable Data Dissemination in Shared loss Multicast Trees
نویسندگان
چکیده
The completion time for the dissemination (or alternatively, aggregation) of information from all nodes in a network plays a critical role in the design and analysis of communication systems, especially in real time applications for which delay is critical. In this work, we analyse the completion time of data dissemination in a shared loss (i.e., unreliable links) multicast tree, at the limit of large number of nodes. Specifically, analytic expressions for upper and lower bounds on the expected completion time are provided, and, in particular, it is shown that both these bounds scale as α logn. For example, on a full binary tree with n end users, and packet loss probability of 0.1, we bound the expected completion time for disseminating one packet from below by 1.41 log2 n+ o (logn) and from above by 1.78 log2 n+ o (logn). Clearly, the completion time is determined by the last end user who receives the message, that is, a maximum over all arrival times. Hence, Extreme Value Theory (EVT) is an appropriate tool to explore this problem. However, since arrival times are correlated, non-stationary, and furthermore, time slots are discrete, a thorough study of EVT for Non-Stationary Integer Valued (NSIV) sequences is required. To the best of our knowledge, such processes were not studied before in the framework of EVT. Consequently, we derive the asymptotic distribution of the maxima of NSIV sequences satisfying certain conditions, and give EVT results which are applicable also beyond the scope of this work. These result are then used to derive tight bounds on the completion time. Finally, the results are validated by extensive simulations and numerical analysis.
منابع مشابه
An Analysis of Packet Loss Correlation in FEC-Enhanced Multicast Trees
We study group loss probabilities of Forward Error Correction (FEC) codes in shared loss multicast communication. We present a new analysis model with explicit state equations using recursive formulae. Our method looks at an FEC group as a whole, rather than analyze the number of transmissions of a particular packet. Our work applies to C(n; k) erasure codes, where any k out of n packets may de...
متن کاملTunable Reliable Multicast for Periodic Information Dissemination
Existing reliable transport protocols for periodic information dissemination ignore application semantics while attempting to be 100% reliable. \Application Level Framing" (ALF) suggests that taking application semantics into account when designing transport protocols can result in performance that is highly optimized for the network. We apply this principle in designing a policy-based TUNAble ...
متن کاملPerformance Analysis of Loss Recovery Latency in Reliable Multicast Protocols using Active Parity Encoded Services
Providing an efficient and reliable multicast for data dissemination applications on a large scale is a challenge, especially when the applications require a very short delivery delay and high throughput. The combination of a local recovery approach based on active services with those using FEC/ARQ gives rise to a new class of reliable multicast protocols called APES "Active Parity Encoding Ser...
متن کاملFaReCast: Fast, Reliable Application Layer Multicast for Flash Dissemination
To disseminate messages from a single source to a large number of targeted receivers, a natural approach is the tree-based application layer multicast (ALM). However, in time-constrained flash dissemination scenarios, e.g. earthquake early warning, where time is of the essence, the tree-based ALM has a single point of failure; its reliable extensions using ack-based failure recovery protocols c...
متن کاملCored-Based Tree with Forwarding Regions (CBT-FR); A Protocol for Reliable Multicasting in Mobile Ad Hoc Networks
In this paper we propose a new protocol for reliable multicast in a multihop mobile radio network. The protocol is reliable, i.e., it guarantees message delivery to all multicast nodes even when the topology of the network changes during multicasting. The proposed protocol uses a core-based shared tree. The multicast tree may get fragmented due to node movements. The notion of a forwarding regi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1506.05819 شماره
صفحات -
تاریخ انتشار 2015