{"id":"https://openalex.org/W6958865614","doi":"https://doi.org/10.7907/44qz-r465","title":"Why multicast protocols (don't) scale: an analysis of multipoint algorithms for scalable group communication","display_name":"Why multicast protocols (don't) scale: an analysis of multipoint algorithms for scalable group communication","publication_year":2001,"publication_date":"2001-09-06","ids":{"openalex":"https://openalex.org/W6958865614","doi":"https://doi.org/10.7907/44qz-r465"},"language":"en","primary_location":{"id":"pmh:oai:thesis.library.caltech.edu:3236","is_oa":true,"landing_page_url":null,"pdf_url":"https://thesis.library.caltech.edu/3236/3/02ch2.pdf","source":{"id":"https://openalex.org/S4306402402","display_name":"CaltechTHESIS (California Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I122411786","host_organization_name":"California Institute of Technology","host_organization_lineage":["https://openalex.org/I122411786"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Thesis"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://thesis.library.caltech.edu/3236/3/02ch2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Schooler, Eve Meryl","orcid":null},"institutions":[{"id":"https://openalex.org/I122411786","display_name":"California Institute of Technology","ror":"https://ror.org/05dxps055","country_code":"US","type":"education","lineage":["https://openalex.org/I122411786"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Schooler, Eve Meryl","raw_affiliation_strings":["California Institute of Technology"],"affiliations":[{"raw_affiliation_string":"California Institute of Technology","institution_ids":["https://openalex.org/I122411786"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I122411786"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.55264979,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.6291999816894531,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.6291999816894531,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.24269999563694,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.02329999953508377,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7340999841690063},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.7023000121116638},{"id":"https://openalex.org/keywords/reliable-multicast","display_name":"Reliable multicast","score":0.503000020980835},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4848000109195709},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47540000081062317},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.42669999599456787},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.40290001034736633},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.3833000063896179}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8495000004768372},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7340999841690063},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.7023000121116638},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5932999849319458},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5874000191688538},{"id":"https://openalex.org/C174174714","wikidata":"https://www.wikidata.org/wiki/Q7310997","display_name":"Reliable multicast","level":4,"score":0.503000020980835},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4848000109195709},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47540000081062317},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.42669999599456787},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.40290001034736633},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.3833000063896179},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.38019999861717224},{"id":"https://openalex.org/C11704745","wikidata":"https://www.wikidata.org/wiki/Q918337","display_name":"Unicast","level":3,"score":0.37880000472068787},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.376800000667572},{"id":"https://openalex.org/C150329594","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"IP multicast","level":3,"score":0.3425999879837036},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3138999938964844},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.31029999256134033},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.30640000104904175},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.289900004863739},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.28139999508857727},{"id":"https://openalex.org/C44892269","wikidata":"https://www.wikidata.org/wiki/Q782752","display_name":"Protocol Independent Multicast","level":3,"score":0.2768999934196472},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2752000093460083},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.2587999999523163}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:thesis.library.caltech.edu:3236","is_oa":true,"landing_page_url":null,"pdf_url":"https://thesis.library.caltech.edu/3236/3/02ch2.pdf","source":{"id":"https://openalex.org/S4306402402","display_name":"CaltechTHESIS (California Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I122411786","host_organization_name":"California Institute of Technology","host_organization_lineage":["https://openalex.org/I122411786"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Thesis"},{"id":"doi:10.7907/44qz-r465","is_oa":true,"landing_page_url":"https://doi.org/10.7907/44qz-r465","pdf_url":null,"source":{"id":"https://openalex.org/S7407050848","display_name":"Caltech Library","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"pmh:oai:thesis.library.caltech.edu:3236","is_oa":true,"landing_page_url":null,"pdf_url":"https://thesis.library.caltech.edu/3236/3/02ch2.pdf","source":{"id":"https://openalex.org/S4306402402","display_name":"CaltechTHESIS (California Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I122411786","host_organization_name":"California Institute of Technology","host_organization_lineage":["https://openalex.org/I122411786"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Thesis"},"sustainable_development_goals":[{"score":0.6457918882369995,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W6958865614.pdf","grobid_xml":"https://content.openalex.org/works/W6958865614.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,5,21,53,68,95,128,146,190,211,241,249,267,277,280],"exponential":[2],"growth":[3],"of":[4,27,55,57,70,72,97,118,133,145,149,151,161,192,200,213,237,251,262,269,279],"Internet,":[6],"there":[7],"is":[8,120],"a":[9,40,109,159,204,223,235,245,260],"critical":[10],"need":[11],"to":[12,19,31,46,60,167],"design":[13],"efficient,":[14],"scalable":[15],"and":[16,35,81,87,183,195,253],"robust":[17],"protocols":[18,28,37,215],"support":[20],"network":[22,177],"infrastructure.":[23],"A":[24],"new":[25],"class":[26],"has":[29],"emerged":[30],"address":[32],"these":[33,36,73,152,169,219,252,270],"challenges,":[34],"rely":[38,217,285],"on":[39,94,198],"few":[41],"key":[42],"techniques,":[43],"or":[44,131],"micro-algorithms,":[45,271],"achieve":[47],"scalability.":[48],"By":[49],"scalability,":[50],"we":[51,157,188,243,258,265,273],"mean":[52],"ability":[54],"groups":[56,117,199],"communicating":[58,201],"processes":[59,119,124],"grow":[61],"very":[62],"large":[63],"in":[64,78,102],"size.":[65],"We":[66,107,138,221],"study":[67,189],"behavior":[69,233,268],"several":[71],"fundamental":[74],"techniques":[75],"that":[76,164,216,284],"appear":[77],"many":[79],"deployed":[80],"emerging":[82],"Internet":[83],"standards:":[84],"Suppression,":[85],"Announce-Listen,":[86],"Leader":[88],"Election.":[89],"These":[90],"algorithms":[91,170,283],"are":[92],"based":[93],"principle":[96],"efficient":[98],"multipoint":[99],"communication,":[100],"often":[101],"combination":[103],"with":[104],"periodic":[105,129],"messaging.":[106],"assume":[108],"loosely-coupled":[110],"communication":[111],"model,":[112],"where":[113],"acknowledged":[114],"messaging":[115],"among":[116],"not":[121],"required.":[122],"Thus,":[123],"infer":[125],"information":[126],"from":[127,135],"receipt":[130],"loss":[132,197],"messages":[134],"other":[136,254],"processes.":[137,202],"present":[139],"an":[140],"analysis,":[141],"validated":[142],"by":[143],"simulation,":[144],"performance":[147,162,278],"tradeoffs":[148],"each":[150],"techniques.":[153,220,256],"Toward":[154],"this":[155,206],"end,":[156],"derive":[158],"series":[160],"metrics":[163],"help":[165],"us":[166],"evaluate":[168],"under":[171],"lossy":[172],"conditions:":[173],"expected":[174],"response":[175],"time,":[176],"usage,":[178],"memory":[179],"overhead,":[180],"consistency":[181],"attainable,":[182],"convergence":[184],"time.":[185],"In":[186,240],"addition,":[187],"impact":[191],"both":[193],"correlated":[194],"uncorrelated":[196],"As":[203],"result,":[205],"thesis":[207],"provides":[208],"insights":[209],"into":[210],"scalability":[212,255],"multicast":[214],"upon":[218,286],"provide":[222],"systematic":[224],"framework":[225],"for":[226,248],"calibrating":[227],"as":[228,230],"well":[229],"predicting":[231],"protocol":[232],"over":[234],"range":[236],"operating":[238],"conditions.":[239],"process,":[242],"establish":[244],"general":[246],"methodology":[247],"analysis":[250],"Finally,":[257],"explore":[259],"theory":[261],"composition;":[263],"if":[264],"understand":[266],"then":[272],"can":[274],"bound":[275],"analytically":[276],"more":[281],"complex":[282],"them.":[287]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
