Abstract

This paper proposes a tree-based acknowledge- ment mechanism designed for a reliable application layer multicast, called ATACK. The proposed mechanism divides the group members into a hierarchy of logical acknowledgement domains by a self-organized way, and further builds the acknowledgement tree in terms of hierarchical acknowledgement domains. The expected size of the acknowledgement domain is within some fixed range, which promises the efficient acknowledgement and avoids adjusting acknowledgement domains frequently. In each domain, only a part of group members send acknowledgement messages to the corresponding acknowledgement processor according to the error correlation of the ALM delivery tree. Therefore the proposed acknowledgement mechanism can effectively reduce the related load and improves the acknowledgement performance. DOI: http://dx.doi.org/10.5755/j01.eee.19.10.5909

Highlights

  • As an alternative of IP multicast, application layer multicast (ALM) implements multicast functionality at the application layer instead of the IP layer [1]–[7]

  • This paper proposes a tree-based ACK mechanism that can be used in most reliable application layer multicast solutions, to achieve good throughput with desirable scalability

  • ATACK is dependent of the underlying data recovery way and tree building approach

Read more

Summary

INTRODUCTION

As an alternative of IP multicast, application layer multicast (ALM) implements multicast functionality at the application layer instead of the IP layer [1]–[7]. In UDP-based reliable IP multicast, the tree-based acknowledgement (ACK) is an important mechanism that can achieve good throughput with desirable scalability. This paper proposes a tree-based ACK mechanism (called ATACK) that can be used in most reliable application layer multicast solutions, to achieve good throughput with desirable scalability. ATACK is dependent of the underlying data recovery way It can be used as a complement to existing UDP-based reliable ALM solutions that use the ALM tree to distribute the multicast data. Since most flow control approaches (e.g., RMTP-II and TMTP) are dependent of the underlying data delivery and loss recovery ways, these approaches can be used in ALM environment. 1-AD A is the parent domain of the 2-AD B

ATACK OVERVIEW
ATACK Acknowledgement Domains
ATACK Acknowledgement Tree
ATACK AD Formation
ATACK AD Maintenances
EXPERIMENTAL RESULTS
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.