Feedback suppression in reliable multicast protocol

Cheng Liang, Ng Chee Hock, Zhang Liren

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)


Feedback implosion is one of the crucial issues confronting the scalability of reliable multicast protocols. Generally, there are two ways of solving this feedback implosion problem - timer-based and structure-based approaches [1]. In the timer-based approach, when a receiver needs to send feedback, it multicasts the feedback to all receivers earlier than other receivers, hence suppresses others from returning feedback in responding to the same event. The structure-based approach depends on intermediate network elements to consolidate feedback arising from the same event. It hence significantly reduces the number of feedback arriving at the sender from a single event. In this paper we present an effective end-to-end NACKs suppression algorithm which could solve the problem caused by correlative packet loss and independent packet loss among receivers.

Original languageEnglish
Title of host publicationWCC 2000 - ICCT 2000
Subtitle of host publication2000 International Conference on Communication Technology, Proceedings - 16th World Computer Congress 2000
EditorsZhisheng Niu, Zhisheng Niu, Ke Gong, Ke Gong, Zhisheng Niu, Ke Gong
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages4
ISBN (Electronic)0780363949, 0780363949, 0780363949
Publication statusPublished - 2000
Externally publishedYes
EventInternational Conference on Communication Technology, ICCT 2000 - Beijing, China
Duration: Aug 21 2000Aug 25 2000

Publication series

NameInternational Conference on Communication Technology Proceedings, ICCT


OtherInternational Conference on Communication Technology, ICCT 2000

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Feedback suppression in reliable multicast protocol'. Together they form a unique fingerprint.

Cite this