Share Email Print
cover

Proceedings Paper

A survey of ring-building network protocols suitable for command and control group communications
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Multicasting is the enabling technology for group communication. However, network-layer multicasting (e.g., IP multicast) has not been widely adopted more than 10 years of its invention due to the concerns related to deployment, scalability and network management. Application-layer multicast (ALM) has been proposed as an alternative for IP multicast. In ALM, group communications take place on an overlay network in which each edge corresponds to a direct unicast path between two group members. ALM protocols differ in, among other aspects, the topology of the underlying overlay network (e.g., tree, mesh or ring). Ring-based ALM protocols have the advantages of providing a constant node degree, and enabling the implementation of reliable and totally-ordered message delivery through the use of a ring with a token that contains ordering and flow control information. In addition, a ring overlay network topology is inherently reliable to single node failures. In this paper, we provide a survey and a taxonomy of several ring-building group communication protocols. Investigating the major characteristics of ring-building network protocols is an important step towards understanding which of them are suitable for command and control group communications.

Paper Details

Date Published: 20 May 2005
PDF: 12 pages
Proc. SPIE 5778, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV, (20 May 2005); doi: 10.1117/12.604204
Show Author Affiliations
Ahmed Sobeih, Univ. of Illinois/Urbana-Champaign (United States)
National Ctr. for Supercomputing Applications (United States)
William Yurcik, National Ctr. for Supercomputing Applications (United States)


Published in SPIE Proceedings Vol. 5778:
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV
Edward M. Carapezza, Editor(s)

© SPIE. Terms of Use
Back to Top