Feedback suppression in reliable multicast protocol

Cheng Liang, Ng Chee Hock, Zhang Liren

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)


    Feedback implosion is one of the crucial issues confronting the scalability of reliable multicast protocols. Generally, there are two ways of solving this feedback implosion problem - timer-based and structure-based approaches [1]. In the timer-based approach, when a receiver needs to send feedback, it multicasts the feedback to all receivers earlier than other receivers, hence suppresses others from returning feedback in responding to the same event. The structure-based approach depends on intermediate network elements to consolidate feedback arising from the same event. It hence significantly reduces the number of feedback arriving at the sender from a single event. In this paper we present an effective end-to-end NACKs suppression algorithm which could solve the problem caused by correlative packet loss and independent packet loss among receivers.

    Original languageEnglish
    Title of host publicationWCC 2000 - ICCT 2000
    Subtitle of host publication2000 International Conference on Communication Technology, Proceedings - 16th World Computer Congress 2000
    EditorsZhisheng Niu, Zhisheng Niu, Ke Gong, Ke Gong, Zhisheng Niu, Ke Gong
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Number of pages4
    ISBN (Electronic)0780363949, 0780363949, 0780363949
    Publication statusPublished - Jan 1 2000
    EventInternational Conference on Communication Technology, ICCT 2000 - Beijing, China
    Duration: Aug 21 2000Aug 25 2000

    Publication series

    NameInternational Conference on Communication Technology Proceedings, ICCT


    OtherInternational Conference on Communication Technology, ICCT 2000

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Electrical and Electronic Engineering


    Dive into the research topics of 'Feedback suppression in reliable multicast protocol'. Together they form a unique fingerprint.

    Cite this