A Method for Any-Source Capacity-Constrained Overlay Multicast
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [17]
  • |
  • Related [20]
  • |
  • Cited by [4]
  • | |
  • Comments
    Abstract:

    Many overlay multicast systems proposed in recent years focus on designing an optimized tree for a single data source. They cannot be extended to any-source multicasting because one tree per source is too costly. The existing P2P (peer-to-peer) systems that allow many data sources have high maintenance overhead and lack the flexibility in supporting host diversity. This paper proposes an any-source capacity-constrained overlay multicast service based on a non-DHT (distributed hash table) overlay network specifically suitable for the purpose of multicast. The nodes have different capacities in supporting different numbers of direct children during a multicast session. No explicit multicast trees are maintained on top of the overlay. This paper presents two distributed multicast algorithms that are able to deliver a multicast message from any source to all nodes in the expected O(logcn) hops, which is asymptotically optimal, where c is the average node capacity and n is the number of members in a multicast group.

    Reference
    [1]Kwon GI,Byers JW.ROMA:Reliable overlay multicast with loosely coupled TCP connections.In:Proc.of the INFOCOM 2004.2004.http//www.cs.bu.edu/techreports/pdf/2003-015-roma.pdf
    [2]Shavitt Y,Tankel T.On the curvature of the Internet and its usage for overlay construction and distance estimation.In:Proc.of the INFOCOM 2004.2004.http://www.ieee-infocom.org/2004/Papers/09_1.pdf
    [3]Baccelli F,Chaintreau A,Liu Z,RiabovA,Sahu S.Scalability of reliable group communication using overlays.In:Proc.of the INFOCOM 2004.2004.http://www.ieee-infocom.org/2004/Papers/09_5.pdf
    [4]Yue GX.A routing search algorithm on P2P networks based on Gnutella protocol:Light-Flooding.Computer Engineering,2005,31 (11):112-114 (in Chinese with English abstract).
    [5]Wu JG,Ye XG,Jiang AQ.A routing algorithm in heterogeneous overlay multicast networks.Journal of Software,2005,16(6):1112-1119 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/16/1112.htm
    [6]Li Z,Mohapatra P.Impact of topology on overlay routing service.In:Proc.of the INFOCOM 2004.2004.http://www.ieee-infocom.org/2004/Papers/09_4.pdf
    [7]Shi S,Turner J,Waldvogel M.Dimensioning server access bandwidth and multicast routing in overlay networks.In:Proc.of the NOSSDAV 2001.2001.http://www.inf.uni-konstanz.de/disy/publications/waldvogel/shi01dimensioning.pdf
    [8]Shi S,Turner J.Routing in overlay multicast networks.In:Proc.of the INFOCOM 2002.New York:IEEE,2002.
    [9]Dejan Kosti JA,Rodriguez A,Vahdat A.Bullet:High bandwidth data dissemination using an overlay mesh.In:Proc.of the SOSP 2003.2003.http://www.cs.rochester.edu/sosp2003/papers/p183-kostic.pdf
    [10]Banerjee S,Kommareddy C,Kar BBK,Khuller S.Construction of an efficient overlay multicast infrastructure for real-time applications.In:Proc.of the INFOCOM 2003.2003.http://www.ieee-infocom.org/2003/papers/37_03.pdf
    [11]Riabov A,Liu Z,Zhang L.Overlay multicast trees of minimal delay.In:Proc.of the ICDCS 2004.Tokyo:IEEE Computer Society,2004.654-661.
    [12]Yamaguchi H,Hiromori A,Higashino T,Taniguchi K.An autonomous and decentralized protocol for delay sensitive overlay multicast tree.In:Proc.of the ICDCS 2004.Tokyo:IEEE Computer Society,2004.662-669.
    [13]Zhuang S,Zhao B,Joseph A,Katz R,Kubiatowicz J.Bayeux:An architecture for scalable and fault-tolerant WideArea data dissemination.In:Proc.of the 11th Int'l Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 2001).New York:ACM,2001.11-20.
    [14]Zhang R,Hu YC.Borg:A hybrid protocol for scalable application-level multicast in peer-to-peer networks.In:Proc.of the NOSSDAV 2003.Monterey:ACM,2003.172-179.
    [15]El-Ansary S,Alima LO,Brand P,Haridi S.Efficient broadcast in structured P2P networks.In:Proc.of the IPTPS 2003.London:Springer-Verlag,2003.304-314.
    [4]乐光学.基于Gnutella协议的P2P网络路由搜索算法:Light-Flooding.计算机工程,2005,31(11):112-114.
    [5]吴家皋,叶晓国,姜爱全.一种异构环境下覆盖多播网络路由算法.软件学报,2005,16(6):1112-1119.http://www.jos.org.cn/1000-9825/16/1112.htm
    Comments
    Comments
    分享到微博
    Submit
Get Citation

陈世平,施伯乐.一种具有能力约束性能的任意源覆盖多播方法.软件学报,2006,17(10):2152-2162

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:September 12,2005
  • Revised:September 12,2005
You are the first2045243Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063