Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published September 26, 2001 | Submitted
Report Open

Why Multicast Protocols (Don't) Scale: An Analysis of Multipoint Algorithms for Scalable Group Communication

Abstract

With the exponential growth of the Internet, there is a critical need to design efficient, scalable and robust protocols to support the network infrastructure. A new class of protocols has emerged to address these challenges, and these protocols rely on a few key techniques, or micro-algorithms, to achieve scalability. By scalability, we mean the ability of groups of communicating processes to grow very large in size. We study the behavior of several of these fundamental techniques that appear in many deployed and emerging Internet standards: Suppression, Announce-Listen, and Leader Election. These algorithms are based on the principle of efficient multipoint communication, often in combination with periodic messaging. We assume a loosely-coupled communication model, where acknowledged messaging among groups of processes is not required. Thus, processes infer information from the periodic receipt or loss of messages from other processes. We present an analysis, validated by simulation, of the performance tradeoffs of each of these techniques. Toward this end, we derive a series of performance metrics that help us to evaluate these algorithms under lossy conditions: expected response time, network usage, memory overhead, consistency attainable, and convergence time. In addition, we study the impact of both correlated and uncorrelated loss on groups of communicating processes. As a result, this thesis provides insights into the scalability of multicast protocols that rely upon these techniques. We provide a systematic framework for calibrating as well as predicting protocol behavior over a range of operating conditions. In the process, we establish a general methodology for the analysis of these and other scalability techniques. Finally, we explore a theory of composition; if we understand the behavior of these micro-algorithms, then we can bound analytically the performance of the more complex algorithms that rely upon them.

Additional Information

© 2000 California Institute of Technology (Defended September 19, 2000) Also published as Caltech Computer Science Technical Report. The research described in this thesis was funded in part by an Earl C. Anthony Graduate Fellowship, a Career Development Grant from the American Association of University Women, a Microsoft Graduate Fellowship, as well as the Air Force Office of Scientific Research and the National Science Foundation. I thank all of them for their generous support.

Attached Files

Submitted - 00ch0.pdf

Submitted - 01ch1.pdf

Submitted - 02ch2.pdf

Submitted - 03ch3.pdf

Submitted - 04ch4.pdf

Submitted - 05ch5.pdf

Submitted - 06ch6.pdf

Submitted - 07appendixA.pdf

Submitted - 08appendixB.pdf

Submitted - 09bibliography.pdf

Submitted - bibliography.tex

Submitted - thesis.pdf

Submitted - thesis.ps

Files

05ch5.pdf
Files (6.9 MB)
Name Size Download all
md5:7bd1424104aaca64d5b8f004f807783e
299.2 kB Preview Download
md5:64885b56d56a505edf7e91e339f515b0
38.7 kB Preview Download
md5:cd4bc3b0dd675dc96ee93c611dba9f60
102.1 kB Preview Download
md5:78892fc46d052411c9a338a876745ede
58.7 kB Preview Download
md5:5a4c65bc24f22422ed9dfe691126d425
277.8 kB Preview Download
md5:375f141a294c125fe1496477dc44a5d7
449.1 kB Preview Download
md5:c486737b903b3b899c6ea59e484dbf5d
144.1 kB Preview Download
md5:d9783b4271c6323c6bfd1d9205215f77
334.1 kB Preview Download
md5:1f136749d6225e0d249e308e9004bab2
60.3 kB Preview Download
md5:fbead5fe8425f7910c31ed3b3cf7e0c9
3.2 MB Download
md5:a92ea7d3071cece2641967f21d2c01c9
13.7 kB Download
md5:453a3083a915755ee288ddccbd5b787d
1.9 MB Preview Download
md5:ce686418ba210270f152e78cc19bec67
56.6 kB Preview Download

Additional details

Created:
August 19, 2023
Modified:
October 24, 2023