QR link for Negative-Acknowledgment (Nack)-Oriented Reliable Multicast (Norm) Building Blocks
Add to Book Shelf
Flag as Inappropriate
Email this Book

Negative-Acknowledgment (Nack)-Oriented Reliable Multicast (Norm) Building Blocks

By Adamson, B.

Click here to view

Book Id: WPLBN0000693933
Format Type: PDF eBook
File Size: 88.29 KB.
Reproduction Date: 2005
Full Text

Title: Negative-Acknowledgment (Nack)-Oriented Reliable Multicast (Norm) Building Blocks  
Author: Adamson, B.
Volume:
Language: English
Subject: Technology, Fine Arts, Language
Collections: Technical eBooks Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Adamson, B. (n.d.). Negative-Acknowledgment (Nack)-Oriented Reliable Multicast (Norm) Building Blocks. Retrieved from http://cn.ebooklibrary.org/


Description
Technical Reference Publication

Excerpt
Introduction: Reliable multicast transport is a desirable technology for the efficient and reliable distribution of data to a group on the Internet. The complexities of group communication paradigms necessitate different protocol types and instantiations to meet the range of performance and scalability requirements of different potential reliable multicast applications and users [3]. This document addresses the creation of negative-acknowledgment (NACK)- oriented reliable multicast (NORM) protocols. While different protocol instantiations may be required to meet specific application and network architecture demands [4], there are a number of fundamental components that may be common to these different instantiations. This document describes the framework and common building block components relevant to multicast protocols based primarily on NACK operation for reliable transport. While this document discusses a large set of reliable multicast components and issues relevant to NORM protocol design, it specifically addresses in detail the following building blocks which are not addressed in other IETF documents...

Table of Contents
Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Rationale. . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1. Delivery Service Model . . . . . . . . . . . . . . . . . 4 2.2. Group Membership Dynamics . . . . . . . . . . . . . . . . 5 2.3. Sender/Receiver Relationships . . . . . . . . . . . . . . 5 2.4. Group Size Scalability. . . . . . . . . . . . . . . . . . 6 2.5. Data Delivery Performance . . . . . . . . . . . . . . . . 6 2.6. Network Environments. . . . . . . . . . . . . . . . . . . 6 2.7. Router/Intermediate System Assistance . . . . . . . . . . 7 3. Functionality. . . . . . . . . . . . . . . . . . . . . . . . . 7 3.1. NORM Sender Transmission. . . . . . . . . . . . . . . . . 10 3.2. NORM Repair Process . . . . . . . . . . . . . . . . . . . 11 3.2.1. Receiver NACK Process Initiation . . . . . . . . . 11 3.2.2. NACK Suppression . . . . . . . . . . . . . . . . . 13 3.2.3. NACK Content . . . . . . . . . . . . . . . . . . . 17 3.2.3.1. NACK and FEC Repair Strategies. . . . . . 17 3.2.3.2. NACK Content Format . . . . . . . . . . . 20 3.2.4. Sender Repair Response . . . . . . . . . . . . . . 21 3.3. NORM Receiver Join Policies and Procedures. . . . . . . . 23 3.4. Reliable Multicast Member Identification. . . . . . . . . 24 3.5. Data Content Identification . . . . . . . . . . . . . . . 24 3.6. Forward Error Correction (FEC). . . . . . . . . . . . . . 26 3.7. Round-trip Timing Collection. . . . . . . . . . . . . . . 27 3.7.1. One-to-Many Sender GRTT Measurement. . . . . . . . 27 3.7.2. One-to-Many Receiver RTT Measurement . . . . . . . 29 3.7.3. Many-to-Many RTT Measurement . . . . . . . . . . . 29 3.7.4. Sender GRTT Advertisement. . . . . . . . . . . . . 30 3.8. Group Size Determination/Estimation . . . . . . . . . . . 31 3.9. Congestion Control Operation. . . . . . . . . . . . . . . 31 3.10 Router/Intermediate System Assistance . . . . . . . . . . 31 3.11 NORM Applicability. . . . . . . . . . . . . . . . . . . . 31 4. Security Considerations. . . . . . . . . . . . . . . . . . . . 32 5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 33 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 33 6.1. Normative References. . . . . . . . . . . . . . . . . . . 33 6.2. Informative References. . . . . . . . . . . . . . . . . . 33 7. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 35 Full Copyright Statement . . . . . . . . . . . . . . . . . . . 36

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.