Explain whether the algorithm for reliable multicast over IP multicast works for open as well as closed groups. Given any algorithm for closed groups, how, simply, can we derive an algorithm for open groups?

What will be an ideal response?


In the case of an open group, senders are not necessarily members of the group. In the limiting case, no member sends messages to the group. In that case, there are no opportunities to piggyback information on top of the individual sequence number that any sender keeps for the group. However, a member will be able to
detect a missing IP multicast message when it receives another message from the same sender. The protocol will still operate correctly but with reduced efficiency compared to the case of a closed group: it may take longer to detect a missing message.
In general, an open group algorithm can be obtained by considering the group to be closed and arranging for senders outside that group to pick a member of the group and unicast its message to it. The group member then multicasts it on the sender’s behalf.

Computer Science & Information Technology

You might also like to view...

Pattern matching is a characteristic of which type of IDS?

A. Anomaly-based B. Rule-based C. Signature-based D. Heuristic-based

Computer Science & Information Technology

A _____ _____ occurs when uncontrolled electricity flows from the hot line to the neutral line or from the hot line to ground.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Discuss the considerations you should keep in mind as you plan your duplications.

What will be an ideal response?

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 5-2Max is preparing for a test and he is confused by a section related to the use of background images for list items. Leon has already passed this test with an A+ and Max asks Leon for some help.Max asks Leon what list features dictate the position of the list marker image and the padding. What is his answer?

A. font size B. font style C. the size of the image used D. both a and c

Computer Science & Information Technology