2014
DOI: 10.1109/tpds.2013.280
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Reliable Application Layer Multicast for Flash Dissemination

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…However, BitTorrent is designed to minimize the dissemination time of each peer egoistically. On the other hand, previous studies, including Slurpie [8], Bullet [9], M2M-ALM [10] and ReCREW [11], O-Torrent [12], [13] and [14], have proposed to construct and maintain an overlay network of multiple trees, rings, or a random mesh to deliver content from a single server. In the design of these P2P protocols, content are usually divided into m parts of equal size, each being called a block.…”
Section: Introductionmentioning
confidence: 99%
“…However, BitTorrent is designed to minimize the dissemination time of each peer egoistically. On the other hand, previous studies, including Slurpie [8], Bullet [9], M2M-ALM [10] and ReCREW [11], O-Torrent [12], [13] and [14], have proposed to construct and maintain an overlay network of multiple trees, rings, or a random mesh to deliver content from a single server. In the design of these P2P protocols, content are usually divided into m parts of equal size, each being called a block.…”
Section: Introductionmentioning
confidence: 99%
“…Local update strategy means when links with the following characteristics like heavy congestion [8][9], higher bandwidth [10], more stable parent nodes [11][12] and a closer network distance [13][14] are detected, we will start the local updating of the multicast tree, but the local update cannot guarantee a global optimal multicast. Global update means that the overall performance of the multicast tree is unable to meet the needs of business applications, for example the maximum delay exceeds the threshold [15] and the data retransmission rate is high [16] and so on. At this time, the entire multicast tree needs to be reconstructed.…”
Section: Introductionmentioning
confidence: 99%