• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

A Case for End System Multicast (2000)

Cached

  • Download as a PDF

Download Links

  • [soy.dyndns.org]
  • [cs.baylor.edu]
  • [www.cs.ubc.ca]
  • [www.cs.ubc.ca]
  • [www.cs.toronto.edu]
  • [www.cs.toronto.edu]
  • [www.cs.ubc.ca]
  • [disi.unitn.it]
  • [people.cs.ubc.ca]
  • [www.cs.rutgers.edu]
  • [www.cs.huji.ac.il]
  • [esm.cs.cmu.edu]
  • [www-users.cselabs.umn.edu]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.ece.purdue.edu]
  • [www.cs.cmu.edu]
  • [www.cs.umd.edu]
  • [www-2.cs.cmu.edu]
  • [esm.cs.cmu.edu]
  • [www-2.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [cs.wisc.edu]
  • [cs.wisc.edu]
  • [cs.wisc.edu]
  • [www.ece.purdue.edu]
  • [www.cs.ucsb.edu]
  • [www.cs.cmu.edu]
  • [www.cs.wisc.edu]
  • [www.cs.wisc.edu]
  • [www.cs.wisc.edu]
  • [cs.wisc.edu]
  • [www.cs.washington.edu]
  • [www.cs.cmu.edu]
  • [courses.cs.washington.edu]
  • [www.utdallas.edu]
  • [www.eecs.berkeley.edu]
  • [pages.cs.wisc.edu]
  • [pages.cs.wisc.edu]
  • [cs-www.cs.yale.edu]
  • [pages.cs.wisc.edu]
  • [pages.cs.wisc.edu]
  • [www.utdallas.edu]
  • [www.cs.cmu.edu]
  • [www.eecs.berkeley.edu]
  • [www.utdallas.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Yang-hua Chu , Sanjay G. Rao , Srinivasan Seshan , Hui Zhang
Venue:in Proceedings of ACM Sigmetrics
Citations:1290 - 24 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

Citations

1665 On Power-law Relationships of the Internet Topology - Faloutsos, Faloutsos, et al. - 1999
1037 End-to-end arguments in system design - Saltzer, Reed, et al. (Show Context)

Citation Context

...service. In deciding whether to implement multicast services at the IP layer or at end systems, there are two con icting considerations that we need to reconcile. According to the end-toend arguments =-=[17]-=-, a functionality should be (a) pushed to higher layers if possible, (b) unless implementing it at the lower layer can achieve large performance bene t that outweighs the cost of additional complexity...

826 EquationBased Congestion Control for Unicast Applications - Floyd, Handley, et al. - 2000
802 How to model an internetwork. - Zegura, Calvert, et al. - 1996
731 Scalable Application Layer Multicast - Banerjee, Bhattacharjee, et al. - 2002
532 A Border Gateway - Rekhter, Li - 1995 (Show Context)

Citation Context

...plain how Narada builds data delivery tree. Narada runs a distance vector protocol on top of the mesh. In order to avoid the well-known count-to-in nity problems, it employs a strategy similar to BGP =-=[16]-=-. Each member not only maintains the routing cost to every other member, but also maintains the path that leads to such a cost. Further, routing updates between neighbors contains both the cost to the...

372 Application-Level Multicast Using Content-Addressable Networks, - Ratnasamy, Handley, et al. - 2001
335 ALMI: an application level multicast infrastructure,” - Pendarakis, Shi, et al. - 2001
331 Enabling conferencing applications on the Internet using an overlay multicast architecture,” in - Chu, Rao, et al. - 2001
314 Multicast Routing in Internetworks and Extended LANs. - Deering - 1988 (Show Context)

Citation Context

...r layers if possible, (b) unless implementing it at the lower layer can achieve large performance bene t that outweighs the cost of additional complexity atthelower layer. In his seminal work in 1989 =-=[4]-=-, Deering argues that this second consideration should prevail and multicast should be implemented at the IP layer. This view so far has been widely accepted. IP Multicast is the rst signi cant featur...

307 The End-to-End Effects of Internet Path Selection - SAVAGE, COLLINS, et al. - 1999
259 Yoid: Extending the internet multicast architecture,” - Francis - 2000 (Show Context)

Citation Context

...hods for construction of overlay spanning trees for data delivery. A rst approach is to construct the tree directly - that is, members explicitly select their parents from among the members they know =-=[8]-=-. Narada however constructs trees in a two-step process. First it constructs a richer connected graph that we termmesh. The mesh could in general be an arbitrary connected subgraph of the CVG (though ...

201 IP Multicast Channels: EXPRESS Support for Large-Scale Single-Source Applications - Holbrook, Cheriton - 1999 (Show Context)

Citation Context

...inally, IP Multicast calls for changes at the infrastructural level, and this slows down the pace of deployment. While there have been attempts to partially address some of the issues at the IP layer =-=[9, 15, 21]-=-, fundamental concerns pertaining to the \stateful" architecture of IP Multicast and support for higher layer functionality haveremained unresolved. In this paper, we revisit the issue of whether mult...

162 Amroute: Adhoc Multicast Routing Protocol, - Liu, Talpade, et al. - 1999 (Show Context)

Citation Context

... of links. Narada might dynamically add links to ensure connectivity of the virtual topology, and drop links it perceives as not useful. Self-con guration has been proposed in other contexts. AMRoute =-=[1]-=- allows for robust IP Multicast in mobile adhoc networks by exploiting user-multicast trees. Several reliable IP Multicast protocols [12, 13, 22] involve group members self-organizing into structures ...

160 Scattercast: An Architecture for Internet Broadcast Distribution as an Infrastructure Service - CHAWATHE - 2000
156 Byzantine generals in action: implementing fail-stop processors. - Schneider - 1984 (Show Context)

Citation Context

...also need to consider the di cult case of abrupt failure. In such a case, failure should be detected locally and propagated to the rest of the group. In this paper, we assume a failstop failure model =-=[19]-=-, which means that once a member dies, it remains in that state, and the fact that the member is dead is detectable by other members. We explain the actions taken on member death with respect to Figur...

124 Adaptive web caching: towards a new global caching architecture. - Michel, Nguyen, et al. - 1998 (Show Context)

Citation Context

... other contexts. First, Narada distinguishes itself from normal routing protocols in that it changes the very topology over which routing is performed. Second, most existing self-con guring protocols =-=[12, 13, 14, 22]-=- assume native IP Multicast support. Narada attempts selfcon guration in the absence of a lower level multicast service, and this is fundamentally more challenging. We explain the distributed algorith...

119 First IETF Internet Audiocast", - Casner, Deering - 1992 (Show Context)

Citation Context

...sumption signi cantly simpli es the partition recovery mechanisms in Gossamer, the members of the mesh could become partitioned from each other in event of failure of all rendezvous points. The MBone =-=[2]-=- and 6Bone [10] are popular existing examples of overlay networks. However, these are statically congured in a manual and adhoc fashion. Narada, on the other hand, strives for a self-con guring and e ...

110 REUNITE: A recursive unicast approach to multicast - STOICA, NG, et al. - 2000
82 An Architecture for Internet Content Distribution as an Infrastructure Service - Chawathe, McCanne, et al. - 2000
72 Resilient Multicast Support for Continuous-Media Applications - Xu, Myers, et al. - 1997 (Show Context)

Citation Context

... other contexts. First, Narada distinguishes itself from normal routing protocols in that it changes the very topology over which routing is performed. Second, most existing self-con guring protocols =-=[12, 13, 14, 22]-=- assume native IP Multicast support. Narada attempts selfcon guration in the absence of a lower level multicast service, and this is fundamentally more challenging. We explain the distributed algorith...

72 O’Toole Jr., “Overcast: Reliable multicasting with an overlay network - Jannotti, Gifford, et al. - 2000
64 Bandwidth-delay based routing algorithms - Wang, Crowcroft - 1995
54 Simple Multicast: A Design for Simple, Low-Overhead Multicast. Internet Draft - Perlman, Lee, et al. - 1999 (Show Context)

Citation Context

...inally, IP Multicast calls for changes at the infrastructural level, and this slows down the pace of deployment. While there have been attempts to partially address some of the issues at the IP layer =-=[9, 15, 21]-=-, fundamental concerns pertaining to the \stateful" architecture of IP Multicast and support for higher layer functionality haveremained unresolved. In this paper, we revisit the issue of whether mult...

41 End-host multicast communication using switch-trees protocols. - Helder, Jamin - 2002
30 Scalable Self Organizing Overlays - Jain
28 The Case for Concurrent Reliable Multicasting Using Shared Ack Trees - Levine, Lavo, et al. - 1996 (Show Context)

Citation Context

... other contexts. First, Narada distinguishes itself from normal routing protocols in that it changes the very topology over which routing is performed. Second, most existing self-con guring protocols =-=[12, 13, 14, 22]-=- assume native IP Multicast support. Narada attempts selfcon guration in the absence of a lower level multicast service, and this is fundamentally more challenging. We explain the distributed algorith...

23 Yoid: Your Own Internet Distribution, http://www.aciri.org/yoid - Francis - 2000
21 An Architecture for Scalable and Fault-tolerant Wide-Area Data Dissemination - Bayeux - 2001
20 A scalable control topology for multicast communications - Liebeherr, Sethi - 1998 (Show Context)

Citation Context

... other contexts. First, Narada distinguishes itself from normal routing protocols in that it changes the very topology over which routing is performed. Second, most existing self-con guring protocols =-=[12, 13, 14, 22]-=- assume native IP Multicast support. Narada attempts selfcon guration in the absence of a lower level multicast service, and this is fundamentally more challenging. We explain the distributed algorith...

18 The end-to-end e↵ects of Internet path selection. - Savage, Collins, et al. - 1999
14 Generating low-degree 2-spanners - Kortsarz, Peleg - 1998 (Show Context)

Citation Context

...riodically generate a refresh message with monotonically increasing sequence number, which is disseminated along the mesh. Each member i keeps track of 1 An ideal mesh is a \Degree-Bounded K-spanner" =-=[11]-=- of the Complete Virtual Graph. The problem of constructing Degree-Bounded K-spanners of a graph has been widely studied in centralized settings that assume complete information and is NP-complete eve...

8 A Third–Party Value–Added Network Service Approach to Reliable Multicast - Sripanidkulchai, Myers, et al. - 1999 (Show Context)

Citation Context

...medium. We also believe this is among the rst works that attempt to systematically evaluate the performance of a selforganizing overlay network protocol and the tradeo s in using overlay networks. In =-=[20]-=-, it was argued that the overlay approach is a fundamental technique to incrementally deploy services and evolve networks. We believe that the techniques and insights developed in this paper are gener...

5 multicast channels: EXPRESS support for large-scale single-source applications - IP - 1999
4 The end-to-end e ects of internet path selection - Savage, Collins, et al. - 1999 (Show Context)

Citation Context

...is was due to minor inaccuracies in delay measurements. However, in some cases, the reason was more fundamental and due to the policy based nature of Internet routing. This e ect has been reported in =-=[18]-=-. In the future we plan to conduct larger scale Internet experiments with emphasis on studying the dynamics of Narada, transient behavior and e ects of congestion and packet loss. 6. RELATED WORK The ...

2 Amroute: Adhoc multicast routing protocol. Internet draft, Internet Engineering Task Force - Casner, Deering - 1998
2 O’Toole Jr. Application-layer Multicast with Delaunay Triangulations - Jannotti, Gifford, et al. - 2001
2 Howto model an internetwork - Zegura, Calvert, et al. - 1996 (Show Context)

Citation Context

...ces an edge between two points with a probability of e ;d L , where, d is the distance between vertices , L is the length of the longest possible edge and and are parameters. We use the Georgia Tech. =-=[23]-=- random graph generators to generate topologies of this model. Mapnet: Backbone connectivity and delay are modeled after actual ISP backbones that could span multiple continents. Connectivity informat...

1 REUNITE: A recursive unicast approach tomulticast - Stoica, Ng, et al. - 2000 (Show Context)

Citation Context

...inally, IP Multicast calls for changes at the infrastructural level, and this slows down the pace of deployment. While there have been attempts to partially address some of the issues at the IP layer =-=[9, 15, 21]-=-, fundamental concerns pertaining to the \stateful" architecture of IP Multicast and support for higher layer functionality haveremained unresolved. In this paper, we revisit the issue of whether mult...

1 An architecture forinternet content distribution as an infrastructure service, February 2000. Unpublished work - Chawathe, McCanne, et al. (Show Context)

Citation Context

...congestion and packet loss. 6. RELATED WORK The works that come closest to the End System Multicast architecture we propose here and which share much ofour motivation are Yallcast [8] and Scattercast =-=[3]-=-. Both projects Cumulative Percentage of Pairs of Members 100 80 60 40 20 0 0.8 1 1.2 1.4 1.6 1.8 2 2.2 2.4 2.6 2.8 RDP Figure 17: Cumulative distribution of RDP challenge the appropriateness of using...

1 On power-law relationships oftheinternet topology - Faloutsos, Faloutsos, et al. - 1999 (Show Context)

Citation Context

...ectivity. This information is collected by a route server from BGP routing tables of multiple geographically distributed routers with BGP connections to the server [6]. This data has been analyzed in =-=[5]-=- and has been shown to satisfy certain power laws. Random link delays of 8 ; 12 ms was assigned to each physical link. In our simulations, we usedbackbone topology sizes consisting of up to 1070 membe...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University