2006
DOI: 10.1016/j.cor.2004.07.018
|View full text |Cite
|
Sign up to set email alerts
|

Multicast tree rearrangement to recover node failures in overlay multicast networks

Abstract: Overlay multicast makes use of the Internet as a low level infrastructure to provide multicast service to end hosts. The strategy of overlay multicast slides over most of the basic deployment issues associated with IP multicast, such as end-to-end reliability, flow and congestion control, and assignment of an unique address for each multicasting group.Since each multicast member is responsible for forwarding multicast packets, overlay multicast protocols suffer from multicast node failures. To cope with node f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Cascading failures can occur in many physical systems, such as in the Internet, electrical power grids, etc. A number of important aspects of cascading failures in complex networks have been discussed in the literature, including disturbances in power transmission systems, the origin of rare events, the effect of network growth, cascading failures triggered by intentional attacks, avalanche size distributions, and congestion instabilities [9][10][11][12]. Holme and Kim provided an in-depth analysis on the vertex/edge overload cascading breakdowns based on evolving networks, and suggest a method to avoid such avalanches [13].…”
Section: Introductionmentioning
confidence: 99%
“…Cascading failures can occur in many physical systems, such as in the Internet, electrical power grids, etc. A number of important aspects of cascading failures in complex networks have been discussed in the literature, including disturbances in power transmission systems, the origin of rare events, the effect of network growth, cascading failures triggered by intentional attacks, avalanche size distributions, and congestion instabilities [9][10][11][12]. Holme and Kim provided an in-depth analysis on the vertex/edge overload cascading breakdowns based on evolving networks, and suggest a method to avoid such avalanches [13].…”
Section: Introductionmentioning
confidence: 99%