22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings.
DOI: 10.1109/reldis.2003.1238051
|View full text |Cite
|
Sign up to set email alerts
|

NEEM: network-friendly epidemic multicast

Abstract: Epidemic, or probabilistic, multicast protocols have emerged as a viable mechanism to circumvent the scalability problems of reliable multicast protocols. However, most existing epidemic approaches use connectionless transport protocols to exchange messages and rely on the intrinsic robustness of the epidemic dissemination to mask network omissions. Unfortunately, such an approach is not networkfriendly, since the epidemic protocol makes no effort to reduce the load imposed on the network when the system is co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0
8

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(49 citation statements)
references
References 18 publications
(37 reference statements)
0
41
0
8
Order By: Relevance
“…Naturally, these strategies can be combined in different hybrid approaches. Protocols that combine push and pull approaches have been described in [1,19]. A protocol that combines eager push and lazy push is described in [3].…”
Section: Gossip Strategiesmentioning
confidence: 99%
“…Naturally, these strategies can be combined in different hybrid approaches. Protocols that combine push and pull approaches have been described in [1,19]. A protocol that combines eager push and lazy push is described in [3].…”
Section: Gossip Strategiesmentioning
confidence: 99%
“…the decision of when and how to send the message payload to the neighbors may follow several approaches [13], which we describe next. The most common gossiping strategy is eager push, in which peers relay a message as soon as received to a number of targets for a given number of rounds, and is used by several well known protocols [7,12,18]. The major drawback of this strategy is the amount of bandwidth required, as multiple message copies are received by nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Many works have investigated this problem from a probabilistic perspective (e.g., [2,4,9,10,11,12]). Probabilistic algorithms scale much better than deterministic ones and achieve high reliability.…”
Section: Introductionmentioning
confidence: 99%