Feedback suppression in reliable multicast protocol

Cheng Liang, Ng Chee Hock, Zhang Liren

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Feedback implosion is one of the crucial issues confronting the scalability of reliable multicast protocols. Generally, there are two ways of solving this feedback implosion problem - timer-based and structure-based approaches [1]. In the timer-based approach, when a receiver needs to send feedback, it multicasts the feedback to all receivers earlier than other receivers, hence suppresses others from returning feedback in responding to the same event. The structure-based approach depends on intermediate network elements to consolidate feedback arising from the same event. It hence significantly reduces the number of feedback arriving at the sender from a single event. In this paper we present an effective end-to-end NACKs suppression algorithm which could solve the problem caused by correlative packet loss and independent packet loss among receivers.

Original languageEnglish
Title of host publicationWCC 2000 - ICCT 2000
Subtitle of host publication2000 International Conference on Communication Technology, Proceedings - 16th World Computer Congress 2000
EditorsZhisheng Niu, Zhisheng Niu, Ke Gong, Ke Gong, Zhisheng Niu, Ke Gong
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1436-1439
Number of pages4
ISBN (Electronic)0780363949, 0780363949, 0780363949
DOIs
Publication statusPublished - 2000
Externally publishedYes
EventInternational Conference on Communication Technology, ICCT 2000 - Beijing, China
Duration: Aug 21 2000Aug 25 2000

Publication series

NameInternational Conference on Communication Technology Proceedings, ICCT
Volume2

Other

OtherInternational Conference on Communication Technology, ICCT 2000
Country/TerritoryChina
CityBeijing
Period8/21/008/25/00

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Feedback suppression in reliable multicast protocol'. Together they form a unique fingerprint.

Cite this