Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
An exact end-to-end blocking probability algorithm for multicast networks
Nyberg E., Virtamo J., Aalto S. Performance Evaluation54 (4):311-330,2003.Type:Article
Date Reviewed: Apr 21 2004

Currently, multicast-related studies can be classified into four specific classes: multicast forwarding state aggregability for network-layer multicast routing; content distribution network replica placement; application-level and router-assisted hierarchical reliable multicast schemes; and application-level multicast routing. In these fields, analytical work is needed to help understand theoretical upper bounds and performance.

In this paper, the authors present the calculation (from the analytical point of view) of blocking probabilities in multicast trees with dynamic membership. The paper is well organized. The outcome of the work is extremely clear, and in spite of the complexity of the topic, the authors provide a readable paper, thanks to the presence of clear notations and definitions, a precise evaluation of the context, a clear definition of the model and solution, and finally, a complete and detailed description of their algorithm. The authors make available a precise positioning in the existing literature, and also provide the reader with an exhaustive analysis of related works.

The paper is clear and well written, and represents a worthwhile read for those researchers interested in the analytical modeling of complex algorithms in the multicast network field. A simulation study would be useful in helping readers to better understand the applicability of the achieved results. Furthermore, in order to enlarge the number of user population models analyzed, a coupled analysis, based on analytical and simulative study, would help readers to envisage some of the dependencies between the achieved results and user models. Finally, some other remarks on real applications of the work (with respect to the four classes depicted above), as well as an investigation of the blocking analysis, in the case of unicast traffic patterns different from Poisson distributions (introducing self-similar processes, and the long range dependence of persistence phenomena), could also be added.

Reviewer:  Antonio Pescape' Review #: CR129482 (0410-1170)
Bookmark and Share
 
Network Communications (C.2.1 ... )
 
 
Access Schemes (C.2.5 ... )
 
 
Analysis Of Algorithms (I.1.2 ... )
 
 
Local and Wide-Area Networks (C.2.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Network Communications": Date
Practical network design techniques
Held G., John Wiley & Sons, Inc., New York, NY, 1991. Type: Book (9780471930075)
May 1 1992
Network computing system tutorial
Lyons T., Prentice-Hall, Inc., Upper Saddle River, NJ, 1991. Type: Book (9780136172420)
Oct 1 1992
Local distributed deadlock detection by cycle detection and clustering
Cidon I., Jaffe F., Sidi M. IEEE Transactions on Software Engineering 13(1): 3-14, 1987. Type: Article
Aug 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy