2008
DOI: 10.1145/1328671.1328674
|View full text |Cite
|
Sign up to set email alerts
|

High-bandwidth data dissemination for large-scale distributed systems

Abstract: IBMThis article focuses on the multireceiver data dissemination problem. Initially, IP multicast formed the basis for efficiently supporting such distribution. More recently, overlay networks have emerged to support point-to-multipoint communication. Both techniques focus on constructing trees rooted at the source to distribute content among all interested receivers. We argue, however, that trees have two fundamental limitations for data dissemination. First, since all data comes from a single parent, particip… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2008
2008
2017
2017

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 69 publications
0
15
0
1
Order By: Relevance
“…For example, Bullet, a multi-receiver data dissemination mesh that aims for the high-bandwidth data dissemination for large-scale distributed systems, has been presented by Kostić et al [9]. Voulgaris et al propose a self-organizing content-based publisher/subscriber system for dynamic largescale collaborative networks [10].…”
Section: Related Workmentioning
confidence: 99%
“…For example, Bullet, a multi-receiver data dissemination mesh that aims for the high-bandwidth data dissemination for large-scale distributed systems, has been presented by Kostić et al [9]. Voulgaris et al propose a self-organizing content-based publisher/subscriber system for dynamic largescale collaborative networks [10].…”
Section: Related Workmentioning
confidence: 99%
“…One important facet of the solution is that it uses information already present in the system, avoiding extra link stress. It should also be noted that many adaptive protocols utilize similar metrics for adaptation [4]- [7], [15], [19]- [21], allowing our solution to be readily applied.…”
Section: Attacks Against Adaptive Systemsmentioning
confidence: 99%
“…To show the general applicability of our defense technique as discussed in Section IV, we apply it to BulletPrime [15]. BulletPrime is a mesh-based P2P file sharing application similar to BitTorrent.…”
Section: G Defending Other Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is not the aim of this paper to propose a specific scheme to build such overlay. Many solutions exist to structure a P2P overlay network, such as those presented in [20,32,33,36,37,39]. For the sake of a simpler discussion of our scheme, we assume that the overlay is structured as a tree.…”
Section: System Architecturementioning
confidence: 99%