A NAK Suppression Scheme for Group Communications Considering the Spatial Locality of Packet Losses

نویسندگان

  • Jinsuk Baek
  • Munene W Kanampiu
چکیده

Today's extensive use of multicast communication demands efficiency, scalability, and reliability. Numerous schemes have been proposed to improve these critical areas and some progress has been realized. Among the most recent and effective schemes that address this issue include the tree-based NAK suppression scheme that emphasizes on reducing NAK implosion at the repair node. The procedure employed would be an optimal solution, if in fact, for every multicast session transmission, at least one receiver node is guaranteed to receive the packet. However, the largest portion of packet loss in multicasting is due to buffer overflow and as a result there is significant spatial locality of packet losses among nodes of a local group. We propose a NAK suppression scheme that considers this property. Compared to the existing schemes, the proposed scheme will significantly reduce traffic congestion, NAK implosion at repair nodes, and the overall error recovery delay. While the issue of traffic congestion reduction is obvious when receiver nodes do not have to make unfruitful attempts to acquire retransmissions from other local group members that are already starved of the same packets, the much reduced NAK implosion at repair nodes and error recovery delay are clearly illustrated in our simulation results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet

One of the most important problems in reliable multicast communication is reducing generated redundant NAKs to avoid NAK implosion. A number of NAK suppression mechanisms which try to resolve this technical problem have been proposed thus far. In wireless multicast which includes mobile hosts with wireless access channel, packet losses occur because of not only low quality of wireless communica...

متن کامل

A Scalable Recovery Tree Construction Scheme Considering Spatial Locality of Packet Loss

Packet losses tend to occur during short error bursts separated by long periods of relatively error-free transmission. There is also a significant spatial correlation in loss among the receiver nodes in a multicast session. To recover packet transmission errors at the transport layer, tree-based protocols construct a logical tree for error recovery before data transmission is started. The curre...

متن کامل

NAK-based Flow Control Scheme for Reliable Multicast Communications

In reliable multicast communications, lost information due to packet loss should be re-multicasted. NAK-based retransmission scheme is said to be effective for scalable reliable multicast communications because it can avoid implosion of control packet. When the source sends packets faster than receiver’s capacity, packet loss due to buffer overflow occurs constantly at corresponding receivers. ...

متن کامل

Design and Practical Implementation of a New Markov Model Predictive Controller for Variable Communication Packet Loss in Network Control Systems

The current paper investigates the influence of packet losses in network control systems (NCS’s) using the model predictive control (MPC) strategy. The study focuses on two main network packet losses due to sensor to controller and controller to actuator along the communication paths. A new Markov-based method is employed to recursively estimate the probability of time delay in controller to ac...

متن کامل

Designing a Caching-Based Reliable Multicast Protocol

With the increasing use of the Internet, multi-party communication and collaboration applications are becoming mainstream. This trend calls for high-performance multicast services that scale to large groups and higher bandwidth requirements. Although packet loss characteristics have a large impact on the performance of multicast services, few protocols attempt to adapt and actively exploit such...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006