Method and system for facilitating one-to-many data transmissions with reduced network overhead

ABSTRACT

A method and system for facilitating one-to-many data transmissions with reduced network overhead includes conducting a round of data transmissions from a source computing device to a plurality of sink computing devices. Each of the sink computing devices generates a bucket list of lost data blocks for the round of data transmissions and transmits the bucket list to the source computing device. The source computing device conducts a subsequent round of data transmissions based on the bucket lists. One or more additional subsequent rounds may be conducted until the bucket list of each sink computing device is empty.

BACKGROUND

Collaboration computing environments often rely on data transfer from a source computing device to multiple destination or sink computing devices. For example, in educational environments, “classroom collaboration” relies on the transfer of files, video, and other data from the teacher's computing device to each student's computing device. Additionally, management of the sink computing devices (e.g., the student's computing devices) may require updates, new applications, or other management software or services be transmitted to each destination or sink computing device. Typically, multicast, broadcast, or other one-to-many data transmissions are used to effect such data transfer to the multiple sink computing devices.

Typical one-to-many data transmission technologies, such as multicasts and broadcasts, rely on acknowledgement feedback from each of the destination or sink computing devices. Such acknowledgments are often embodied as unicast data transmissions sent from each sink computing device to the source computing device to inform the source computing device that a data packet or block has been received without errors. As such, in networks including a large number of destination or sink computing devices (e.g., classroom collaboration environments may include sixty or more students), a large number of acknowledgement transmissions may be generated. The large number of individual unicast acknowledgement transmissions can cause network “implosion” if the destination computing devices attempt to transmit the acknowledgements near-simultaneously. Although some networks may include a “back-off” mechanism to prevent or reduce network implosion, such mechanisms can add further communication delay in the network. Additionally, the unicast communication technology used by the destination to implement appropriate functionality without undue experimentation.

References in the specification to “one embodiment”, “an embodiment”, “an example embodiment”, etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.

Some embodiments of the disclosure may be implemented in hardware, firmware, software, or any combination thereof. Embodiments of the disclosure implemented in a computer system may include one or more bus-based interconnects between components and/or one or more point-to-point interconnects between components. Embodiments of the invention may also be implemented as instructions stored on a machine-readable, tangible medium, which may be read and executed by one or more processors. A machine-readable, tangible medium may include any tangible mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device). For example, a machine-readable, tangible medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; and other tangible mediums.

Referring now to FIG. 1, a system 100 for facilitating data transmissions to a plurality of computing devices having reduced network overhead includes a source or server computing device 102 and a receiving or client computing device group 104. The computing devices 102, 104 are communicatively coupled to each other over a network 106 via an access point 108. The source computing device 102 may be embodied as any computers (e.g., User Datagram Protocol (UDP) or Transmission Control Protocol (TCP)), may require a further link layer acknowledgement from the source computing device. Such back and forth acknowledgements and network delays can occur contemporaneously with each other in the network, which tends to increase the overhead of the network.

BRIEF DESCRIPTION OF THE DRAWINGS

The systems, devices, and methods described herein are illustrated by way of example and not by way of limitation in the accompanying figures. For simplicity and clarity of illustration, elements illustrated in the figures are not necessarily drawn to scale. For example, the dimensions of some elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference labels have been repeated among the figures to indicate corresponding or analogous elements.

FIG. 1 is a simplified block diagram of one embodiment of a system for facilitating data transmissions to a one or more of computing devices with reduced network overhead;

FIG. 2 is a simplified block diagram of one embodiment of a computing device of the system of FIG. 1;

FIG. 3 is a simplified flow diagram of one embodiment of a method for transmitting data to the plurality of computing devices executed by the source computing device of the system of FIG. 1;

FIG. 4 is a simplified flow diagram of one embodiment of a method for receiving data from the source computing device executed by the plurality of computing devices of the system of FIG. 1;

FIG. 5 is a simplified flow diagram of one embodiment of a method for transmitting a bucket list to the source computing device;

FIG. 6 is a simplified flow diagram of another embodiment of a method for transmitting a bucket list to the source computing device;

FIG. 7 is a simplified diagram illustrating a first round of data transmission to the plurality of computing devices during the method of FIG. 5;

FIG. 8 is a simplified diagram illustrating the bucket list of the plurality computing devices after the data transmission illustrated in FIG. 7; and

FIG. 9 is a simplified diagram illustrating a second round of data transmission to the plurality of computing devices during the method of FIG. 5.

DETAILED DESCRIPTION OF THE DRAWINGS

While the concepts of the present disclosure are susceptible to various modifications and alternative forms, specific exemplary embodiments thereof have been shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit the concepts of the present disclosure to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.

In the following description, numerous specific details such as logic implementations, opcodes, means to specify operands, resource partitioning/sharing/duplication implementations, types and interrelationships of system components, and logic partitioning/integration choices may be set forth in order to provide a more thorough understanding of the present disclosure. It will be appreciated, however, by one skilled in the art that embodiments of the disclosure may be practiced without such specific details. In other instances, control structures, gate level circuits and full software instruction sequences may have not been shown in detail in order not to obscure the disclosure. Those of ordinary skill in the art, with the included descriptions, will be able type of computing device capable of performing the functions described herein. For example, in some embodiments, the source computing device 102 may be embodied as a desktop computer, a laptop computer, a mobile internet device (MID), or other network-enabled computing device.

The computing device group 104 includes one or more destination or sink computing devices 110. Similar to the source computing device 102, each of the sink computing devices 110 may be embodied as any type of computing device capable of performing the functions described herein. For example, each of the sink computing devices 110 may be embodied as a desktop computer, a laptop computer, a mobile internet device (MID), or other network-enabled computing device.

The access point 108 facilitates communication between the computing devices 102, 110. The access point 108 may be embodied as any type of wired or wireless network communication routing devices such as a wired or wireless router, switch, hub, or other network communication device capable of communicatively coupling the computing devices 102, 110. In some embodiments, the access point 108 is also communicatively coupled to an external network 130 via a communication link 124. The network 130 may be embodied as any type of wired and/or wireless network such as a local area network, a wide area network, a publicly available global network (e.g., the Internet), or other network. Similarly, the communication link 124 may be embodied as any type of wired or wireless communication link capable of facilitating communication between the access point 108 and the external network 130 such as, for example, any number of wireless or physical connections, wires, cables, and/or other interconnecting links or paths. Additionally, the network 130 may include any number of additional devices, such as routers, switches, intervening computers, and the like, to facilitate communication between the computing devices 102, 110 and remote computing devices.

In some embodiments, the source computing device 102 and the computing device group 104 are located in a single room or are otherwise local to each other. For example, in one particular embodiment, the system 100 is incorporated in a classroom. In such embodiments, the source computing device 102 may be embodied as the teacher's or instructor's computing device and the sink computing devices 110 may be embodied as student computing devices. Of course, the system 100 may also be used in other environments or implementations in which one-to-many data transmissions are required.

In use, the source computing device 102 is configured to transmit data, such as files, video, images, text, and/or other data, to each of the sink computing devices 110 by conducting multiple rounds of data transmissions in which a plurality of data blocks is transmitted to the sink computing devices 110. During each round of data transmissions, the sink computing devices 110 record those data blocks that were not received or were received in a corrupted state as a bucket list of lost data blocks. After completion of each round of data transmissions, the sink computing devices 110 transmit their individual bucket list to the source computing device 102. In some embodiments, as discussed in more detail below, the sink computing devices 110 may transmit their bucket lists based on some criteria such as a delay period or the size of their respective bucket list (i.e., the number of data blocks in the bucket list). The source computing device 102 aggregates the bucket lists received from each sink computing device 110 and conducts a subsequent round of data transmissions in which the data blocks identified in the aggregated bucket list are retransmitted to the sink computing devices 110. One or more subsequent rounds may be conducted in this manner during which the sink computing devices 110 continue to report any lost data blocks to the source computing device 102 until the bucket list of each sink computing device 110 is empty.

In one particular embodiment, the sink computing devices 110 are configured not to send any acknowledgement transmission after receiving a data block from the source computing device 102. In such embodiments, the source computing device 102 is similarly configured not to wait for such acknowledgement transmissions from the computing devices 110 between transmissions of the data blocks. In this way, the amount of overall network traffic, and errors and delays resulting from such increased network traffic, may be reduced.

Referring now to FIG. 2, in one embodiment, each of the computing devices 102, 110 includes a processor 200, a chipset 204, and memory 202. The computing devices 102, 110 may be embodied as any type of computing devices capable of performing the respective functions described herein. For example, as discussed above, the computing devices 102, 110 may be embodied as desktop computers, laptop computers, mobile internet devices (MID), or other network-enabled computing devices.

The processor 200 is illustratively embodied as a single core processor having a processor core 206. However, in other embodiments, the processor 200 may be embodied as a multi-core processor having multiple processor cores 206. Additionally, the computing devices 102, 110 may include additional processors 200 having one or more processor cores 206. The processor 200 is communicatively coupled to the chipset 204 via a number of signal paths 208. The signal paths 208 may be embodied as any type of signal paths capable of facilitating communication between the processor 200 and the chipset 204. For example, the signal paths 208 may be embodied as any number of bus paths, printed circuit board traces, wires, vias, intervening devices, and/or other interconnects.

The memory 202 may be embodied as one or more memory devices or data storage locations including, for example, dynamic random access memory devices (DRAM), synchronous dynamic random access memory devices (SDRAM), double-data rate dynamic random access memory device (DDR SDRAM), and/or other volatile memory devices. Additionally, although only a single memory device 202 is illustrated in FIG. 2, in other embodiments, the computing devices 102, 110 may include additional memory devices.

The chipset 204 may include a memory controller hub (MCH) or northbridge, an input/output controller hub (ICH) or southbridge, and a firmware device. In such embodiments, the firmware device may be embodied as a memory storage device for storing Basic Input/Output System (BIOS) data and/or instructions and/or other information. The chipset 204 is communicatively coupled to the memory 202 via a number of signal paths 210. Similar to the signal paths 208, the signal paths 210 may be embodied as any type of signal paths capable of facilitating communication between the chipset 204 and the memory device 202 such as, for example, any number of bus paths, printed circuit board traces, wires, vias, intervening devices, and/or other interconnects.

In other embodiments, the chipset 204 may be embodied as a platform controller hub (PCH). In such embodiments, the memory controller hub (MCH) may be incorporated in or otherwise associated with the processor 200. Additionally, in such embodiments, the memory device 202 may be communicatively coupled to the processor 200, rather than the chipset 204 (i.e., the platform controller hub), via a number of signal paths 212. Similar to the signal paths 208, the signal paths 212 may be embodied as any type of signal paths capable of facilitating communication between the memory device 202 and the processor 200 such as, for example, any number of bus paths, printed circuit board traces, wires, vias, intervening devices, and/or other interconnects.

The computing devices 102, 110 also include communication circuitry 220 for communicating with each other over the network 106. The communication circuitry 220 may be embodied as any number of devices and circuitry for enabling communications between the computing devices 102, 110. For example, the communication circuitry 220 may be embodied as one or more wired or wireless network interface cards (NICs) or other network communication cards, modules, or circuits for communicating with other computing devices 102, 110 via the access point 108.

The computing devices 102, 110 may also include additional peripheral devices such as a data storage 222, a display device 224, and other peripheral devices 226. Each of the communication circuitry 220, the data storage 222, the display device 224, and other peripheral devices 226 is communicatively coupled to the chipset 204 via signal paths 230. Again, similar to the signal paths 208, the signal paths 230 may be embodied as any type of signal paths capable of facilitating communication between the chipset 204 and the communication circuitry 220, the data storage 222, the display device 224, and other peripheral devices 226 such as, for example, any number of bus paths, printed circuit board traces, wires, vias, intervening devices, and/or other interconnects.

The data storage device(s) 222 may be embodied as any type of device configured for the short-term or long-term storage data such as, for example, memory devices and circuits, memory cards, hard disk drives, solid-state drives, or other data storage devices. The display device 224 may be embodied as any type of display device for displaying data to a user of the computing devices 102, 110 such as, for example, a liquid crystal display (LCD), a cathode-ray tube (CRT) display, a light emitting diode (LCD) display, or other display devices. The peripheral devices 226 may include any number of additional peripheral devices including input devices, output devices, and other interface devices. For example, the peripheral devices 226 may include a keyboard and/or mouse for supplying an input to the computing device 102, 110. The particular number and type of devices included in the peripheral devices 226 may depend upon, for example, the intended use of the computing device 102, 110.

Referring now to FIG. 3, a method 300 for transmitting data to the plurality of computing devices 110 begins with block 302 in which the source computing device 102 initializes a session of data transmissions. During block 302, the source computing device 102 may perform any number of calibration and initialization procedures. Additionally, in some embodiments, the source computing device 102 handshakes with each of the sink computing devices 110 in block 304. Such handshaking may establish the communication protocols that will be used to transmit data to the sink computing devices 110 and/or other information or data to prepare the sink computing devices 110 to receive the data transmissions. For example, in one embodiment, the source computing device 102 informs the sink computing devices 110 about the data file that will be transmitted to the devices 110. Such information (e.g., the number of data blocks that the sink computing devices 110 should expect to receive) may be used by the sink computing devices 110 to determine lost data blocks (i.e., data blocks that were not received or were received in a corrupted state).

As discussed above, the source computing device 102 is configured to transfer the data file or other data to the sink computing devices 110 via use of one or more rounds of data transmissions. Those data transmission rounds subsequent to the first round are based on feedback from the sink computing devices 110. The source computing device 102 may conduct as many rounds of data transmissions as required to transfer successfully the data file or other data to the sink computing devices 110. Accordingly, in block 306, the source computing device initiates the next round of data transmissions. For example, during the first iteration of the method 300, the source computing device 102 initiates the first round (i.e., X=1) of data transmissions to the sink computing devices 110. In block 306, the source computing device 102 may transmit, for example, a notification to the sink computing devices 110 that the current round of data transmissions is beginning. In some embodiments, the source computing device 102 may also transmit data regarding the particular round of data transmissions, such as the number of data blocks to expect, to the sink computing devices 110 such that the devices 110 may determine whether any data blocks have been lost.

After the source computing device 102 has initiated the current round of data transmissions, the source computing device 102 transmits the data blocks for the current round of data transmission to the sink computing devices 110 in block 308. In the first round of data transmission, every data block comprising the data file or other data to be sent to the sink computing devices 110 is transmitted to the devices 110. However, as discussed in more detail below, only those data blocks identified as being lost by one or more sink computing devices are transmitted in subsequent rounds of data transmission. As such, any number of data blocks may be transmitted in block 308 depending on, for example, the size of the data file to be transmitted, previous rounds of data transmissions, feedback from the sink computing devices 110 as discussed below in more detail, and/or other criteria.

The source computing device 102 may use any suitable network communication technology to transfer the data blocks to the sink computing devices 110. For example, in some embodiments, the source computing device 102 may use multicast data transmissions or broadcast data transmissions to transfer the data blocks to the sink computing devices 110. Alternatively, in one particular embodiment, the source computing device 102 is configured to use the one-to-many data transmission described in U.S. patent application Ser. No. ______, entitled “METHOD AND SYSTEM FOR FACILITATING ONE-TO-MANY DATA TRANSMISSION TO A PLURALITY OF COMPUTING DEVICES” by Justin Lipman, which was filed on Dec. XX, 2009. In such embodiments, the source computing device 102 is configured to select one of the computing devices 110 as a “sink” computing device. The remaining computing devices 110 are configured in a promiscuous communication mode. The source computing device 102 transfers the data blocks to the selected sink computing device 110 by transmitting a unicast data transmission to the selected sink computing device 110. However, although the unicast data transmission is addressed to the selected sink computing device 110, the unicast data transmission is also received by each of the other non-selected computing devices 110. Because the non-selected computing devices 110 are configured in a promiscuous communication mode, the non-selected computing devices 110 also filter and process the unicast data transmission. In this way, a one-to-many data transmission is effected using a unicast data transmission.

After the source computing device 102 has transferred the data blocks for the current round of data transmissions, the source computing device 102 transmits a notification to each sink computing device 110 informing the devices 110 that the current round of data transmissions has completed (block 310). Subsequently, in block 312, the source computing device 102 receives any bucket lists transmitted by the sink computing devices 110. As discussed in more detail below, the bucket lists identify those data blocks from the current round that were lost by each reporting sink computing device 110.

Whether a particular sink computing device 110 transmits a bucket list to the source computing device 102 in block 312 is determined based on one or more criteria. For example, in one embodiment, every sink computing device 110 having at least one lost data block in its respective bucket lists transmits the bucket list to the source computing device in block 312 upon or after receiving the notification that the current round has ended. However, in other embodiments, the sink computing devices 110 may be configured to transmit their respective bucket lists based on a delay period after receiving the notification that the current round has ended. In such embodiments, the source computing device 102 is configured to transmit a default delay value to each sink computing devices 110 in block 314. The sink computing devices 110 determine their respective delay period after the end-of-round notification based on the default delay value as discussed in more detail below. Alternatively or additionally, in other embodiments, the sink computing devices 110 may be configured to transmit their bucket lists based on the size the respective bucket lists. In such embodiments, the source computing device 102 is configured to transmit a predetermined bucket list size threshold value to each sink computing device 110 in block 316. The sink computing devices 110 determine whether to transmit their bucket list based on the threshold value as discussed in more detail below.

After the source computing device 102 receives the bucket lists for the current round from the sink computing devices 110, the source computing device 102 aggregates the bucket lists to generate a master bucket list in block 318. The master bucket list includes indicia or identification of each data block that was reported by one or more sink computing devices 110 as being lost during that round of data transmission. If the master bucket list is determined to be empty in block 320 (i.e., no sink computing device 110 sent a bucket list having at least one data block), the source computing device 102 transmits a notification to each sink computing device 110 that the data transmission session has completed in block 322.

It should be appreciated, however, that in embodiments in which the source computing device 102 transmits a bucket list size threshold value to the sink computing devices 110 in block 316, the source computing device 102 may be configured to reduce the threshold value by a predetermined amount and retransmit the threshold value to the sink computing devices 110 if no bucket list is received from the sink computing devices 110. In this way, the source computing device 102 may continue reducing the threshold value each round until the threshold value is equal to zero.

Referring back to block 320, if the master bucket list is not empty, the method 300 loops back to block 306 in which the next round of data transmissions is initiated. In the next round, the data blocks identified in the master bucket list are retransmitted to the sink computing devices 110 as discussed above. In this way, the source computing device 102 conducts one or more rounds of data transmissions to transmit the data file or other data to the sink computing devices 110. Generally, each successive round of data transmission will include a smaller number of data blocks to be retransmitted by the source computing device 102.

Referring now to FIG. 4, a method for receiving data from the source computing device 102 begins with block 402 in which each sink computing device 110 handshakes with the source computing device 102. In block 402, the computing devices 102, 110 may establish the communication protocols that will be used to transmit data to the sink computing devices 110 and/or other information or data to prepare the sink computing devices 110 to receive the data transmissions as discussed above. For example, in some embodiments, the sink computing devices 110 may receive information about the data file that will be transmitted by the source computing device 102 such as, for example, the number of data blocks that should be received by each sink computing device 110.

In block 404, the sink computing device determines whether the current round of data transmissions has begun. As discussed above in regard to method 300, the source computing device 102 may transmit a notification and/or other data to the sink computers 110 indicating the beginning of a round of data transmissions and, in some embodiments, data regarding the current round of data transmissions such as, for example, the number of data blocks that will be transmitted in that round.

The plurality of sink computing devices 110 receive the data blocks transmitted by the source computing device 102 in block 406 and update their respective bucket lists of lost data blocks in block 408. Each sink computing device 110 is configured to generate and/or update a list of data blocks, or indicia thereof, that were transmitted by the source computing device 102 during the current round but were not received by the sink computing device 110 or were received in a corrupted state and, as such, must be retransmitted to the sink computing device 110. The sink computing devices 110 may store the bucket list in their respective memory 202 and/or data storage 222. The individual bucket lists may be diverse from each other and may contain no, one, or more data blocks based on the current round of data transmissions. The particular data stored in the data blocks to indicate those data blocks that were lost may vary depending on the particular embodiment and implementation. For example, in one embodiment, the sink computing devices 110 are configured to store the packet identification number of each data block determined to be lost for the current round.

In block 410, the sink computing devices 110 determine whether the round has completed. If not, the method 400 loops back to blocks 406 and 408 in which each sink computing device 110 continues to receive, or otherwise waits to receive, data blocks from the source computing device 102 and updates its bucket list of lost data blocks accordingly. However, if the sink computing devices 110 receive an end-of-round notification from the source computing device 102, the method 400 advances to block 412 in which each sink computing devices 110 determines whether its bucket list is empty (i.e., it has received every data block for the current data transmission session). If so, the particular sink computing device 110 waits for an end-of-session notification from the source computing device 102 in block 414. However, if a sink computing device 110 has at least one lost data block identified in its bucket list of lost data blocks, the method 400 advances to block 416 wherein the sink computing device 110 is configured to transmit its bucket list of lost data blocks to the source computing device based on particular criteria.

As discussed above, in some embodiments, the sink computing device 110 may be configured to transmit the bucket list upon, or after, receiving the end-of-round notification from the source computing device 102. However, in other embodiments, the sink computing device 110 may be configured to transmit the bucket list of lost data blocks based on a default delay value in block 418. To do so, the sink computing device 110 may execute a method 500 for transmitting the bucket list as illustrated in FIG. 5. The method 500 begins with block 502 in which the sink computing device 110 receives a default delay value from the source computing device 102. The default delay value defines a default time period after the completion of the current round (e.g., after receiving the end-of-round notification) after which the sink computing device 110 is to transmit its respective bucket list. The default delay value may be embodied as a number of microseconds, seconds, minutes, or other measurement of time. In block 504, the sink computing device 110 determines its particular delay period based on the size of its particular bucket list. For example, in one particular embodiment, the delay period for each sink computing device 110 is calculated by dividing the default delay value by the size of the respective bucket list (e.g., the number of data blocks identified in its bucket list). The sink computing device 110 subsequently transmits its respective bucket list at, or after, the expiration of the calculated delay period. In this way, sink computing devices having larger bucket lists transmit their bucket lists prior to those sink computing devices having smaller bucket lists. Additionally, by spreading out the transmission periods of the sink computing devices 110, the likelihood of network “implosion” and overall delay may be reduced.

Referring back to block 416 of the method 400, in other embodiments, the sink computing device may be configured to transmit its particular bucket list based on the size of the bucket list in block 420. To do so, the sink computing device 110 may execute a method 600 for transmitting the bucket list as illustrated in FIG. 6. The method 600 begins with block 602 in which the sink computing device 110 receives a predetermined bucket list size threshold value. As discussed above, the predetermined threshold value may define a minimum number of data blocks. In block 604, the sink computing device 110 determines whether its particular bucket list has a predetermined relationship to the threshold value. For example, in the illustrative embodiment of FIG. 6, the sink computing device 110 determines whether its particular bucket list is larger than the threshold value. However, in other embodiments, the sink computing device 110 may be configured to determine whether its particular bucket list is equal to the threshold value or is less than the threshold value in block 604. In the illustrative embodiment, if the bucket list size of the sink computing device 110 is greater than the threshold value, the sink computing device 110 transmits its bucket list to the source computing device 102 in block 606. However, if the bucket list of the sink computing device 110 is not greater than the threshold value, the sink computing device 110 does not transmit its bucket list for the current round. Rather, the sink computing device 110 retains the identified lost data blocks in its bucket list and updates it accordingly during the next round of data transmissions. In this way, only those sink computing device 110 having bucket lists larger than the threshold value transmit their respective bucket lists. Accordingly, the transmission of bucket lists by the sink computing devices 110 is spread out or otherwise reduced each round, which may reduce the likelihood of network “implosion” and overall delay.

Referring now to FIG. 7-9, an illustrative first and second round of data transmissions from the source computing device 102 to four sink computing devices 110 is shown. In FIG. 7, the source computing device 102 transmits a data file to the sink computing device 110 embodied as a plurality of data blocks, B1 to Bn. During the first round of data transmissions, the first sink computing device 110 received data blocks B1 and B2, but did not receive or received in a corrupted state data blocks B3. B4, and B5. These blocks are illustrated in FIG. 7 as data blocks X3, X4, and X5, respectively, to indicate that they are lost data blocks for the first sink computing device 110. The second sink computing device 110 received data blocks B1, B2, B4, and B5 but data block B3 was lost. The third sink computing device 110 received data blocks B2, B3, and B5 but data blocks B1 and B4 were lost. Additionally, the fourth sink computing device 110 received all of the data blocks for the first round of data transmissions.

The respective bucket lists for each of the sink computing devices 110 after the first round of data transmissions are illustrated in FIG. 8. The bucket list 801 of the first computing device 110 includes indicia or the identification of data blocks B3 (X3), B4 (X4), B5 (X5), and any additional data blocks, Xn, that the first computing device 110 determined were lost during the first round of data transmissions. Similarly, the bucket list 802 of the second computing device includes indicia or the identification of the data block B3 and any additional data blocks determined to be lost by the sink second computing device 110. The bucket list 803 of the third sink computing device 110 includes indicia or the identification of the data blocks B1 and B4 and any additional data blocks determined to be lost by the third computing device 110. The bucket list 804 of the fourth computing device 110 is empty. Each computing device 110 having a non-empty bucket list transmits its respective bucket list to the source computing device 102 based one or more criteria as discussed above (e.g., upon receiving the end-of-round notification, a default delay, value, the size of the bucket list, etc.).

Subsequently, as illustrated in FIG. 9, the source computing device 102 aggregates the bucket lists received from the computing devices 110 and initiates a second round of data transmissions. The second round of data transmissions is based on the aggregated bucket lists. For example, in the illustrative embodiment, the source computing device 102 retransmits data blocks B1, B3, B4, B5, and so on. As such, the source computing device 102 only retransmits those data blocks identified as being lost by one or more of the reporting sink computing devices 110. The retransmitted data blocks are received by the sink computing devices 110, which update their respective bucket lists based on receiving or not receiving particular data blocks. The source computing device 102 may conduct successive rounds of data transmission until each sink computing device 110 has a full set of valid data blocks indicating that the data file has been successfully transmitted to each of the sink computing devices 110.

while the disclosure has been illustrated and described in detail in the drawings and foregoing description, such an illustration and description is to be considered as illustrative and not restrictive in character, it being understood that only illustrative embodiments have been shown and described and that all changes and modifications that come within the spirit of the disclosure are desired to be protected. For example, it should be appreciated that although the system 100 has been generally described above for use with “one-to-many” data communications, the system, devices, and methods described above are equally applicable to “one-to-one data” communications. In such embodiments, the computing device group 104 may include a single sink computing device 110, which receives “one-to-one” data communications from the source computing device 102 using the methods and devices described herein. 

1. A method comprising: initiating a first round of data transmissions from a source computing device to a plurality of sink computing devices to transmit a plurality of data blocks to the sink computing devices; generating, on each sink computing device, a list of lost data blocks of the plurality of data blocks for the respective sink computing device; transmitting the list of lost data blocks, based on the number of data blocks identified in the list of data blocks of the respective sink computing device, from each sink computing device to the source computing device after completion of the first round of data transmissions; and initiating a second round of data transmissions from the source computing device to the plurality of sink computing devices to retransmit those data blocks identified by the lists of lost data blocks received from the sink computing devices.
 2. The method of claim 1, wherein generating the list of lost data blocks comprises generating a list including indicia of the identification of those data blocks of the plurality of data blocks that were not received by the respective sink computing device or were received in a corrupted state by the respective sink computing device.
 3. The method of claim 1, wherein transmitting the list of lost data blocks comprises transmitting the list of lost data blocks only if the list of lost data blocks is not empty.
 4. The method of claim 1, wherein transmitting the list of lost data blocks comprises transmitting the list of lost data blocks based on a delay period after competition of a round of data transmissions.
 5. The method of claim 4, further comprising transmitting a default delay value from the source computing device to each sink computing device.
 6. The method of claim 5, further comprising determining, on each sink computing device, the delay period for the respective sink computing device based on the default delay value.
 7. The method of claim 6, wherein the delay period is equal to the default delay value divided by the number of data blocks in the list of lost data blocks of the respective sink computing device.
 8. (canceled)
 9. The method of claim 1, further comprising transmitting a threshold value from the source computing device to each sink computing device, the threshold value defining a predetermined minimum list size.
 10. The method of claim 9, wherein transmitting the list of lost data blocks comprises transmitting the list of lost data blocks from each sink computing device only if the number of data blocks identified in the respective list is greater than the threshold value.
 11. The method of claim 1, further comprising transmitting an end-of-round notification from the source computing to each sink computing device at the competition of the first round of data transmissions.
 12. The method of claim 1, further comprising: receiving at least one data block of the plurality of data blocks with a first sink computing device of the plurality of sink computing devices, wherein generating the list of lost data blocks comprises updating, on the first sink computing device, the list of lost data blocks based on the at least one data block.
 13. The method of claim 1, further comprising generating, on the source computing device, an master list of lost data blocks by aggregating the lists of lost data blocks received from the sink computing devices.
 14. The method of claim 1 further comprising: repeating the following steps until the list of lost data blocks for each sink computing device is empty: generating, on the sink computing devices, a new list of lost data blocks of the plurality of data blocks for the respective sink computing device; transmitting each new list of lost data blocks from the sink computing devices if the respective new list is not empty; and initiating a new round of data transmissions from the source computing device to the plurality of sink computing device to retransmit those data blocks identified by the new lists of lost data blocks.
 15. A computing device comprising: a processor; and a memory device having stored therein a plurality of instructions that, when executed by the processor, cause the processor to: receive notification of a first round of data transmissions from a source computing device; generate a list of lost data blocks based on the first round of data transmissions, the list of lost data blocks identifying data blocks transmitted by the source computing device during the first round of data transmissions that were not received by the computing device or were received in a corrupted state; transmit the list of lost data blocks to the source computing device after expiration of a delay period initiated after receiving a notification that the first round of data transmissions has completed; and receive notification of a second round of data transmission from the source computing device, the second round of data transmissions being based on the list of lost data blocks.
 16. The computing device of claim 15, wherein the plurality of instructions further cause the processor to: receive a first data block transmitted during the first round of data transmissions; and receive a second data block transmitted during the first round of data transmissions without sending an acknowledgment transmission to the source computing device in response to receiving the first data block.
 17. (canceled)
 18. The computing device of claim 15, wherein the plurality of instructions further cause the processor to: receive a default delay value from the source computing device; and calculate the delay period by dividing the default delay value by the number of data blocks in the list of lost data blocks.
 19. The computing device of claim 15, wherein to transmit the list of lost data blocks comprises to transmit the list of lost data blocks based on the number of data blocks in the list of data blocks.
 20. The computing device of claim 19, wherein the plurality of instructions further cause the processor to: receive a threshold value from the source computing device, the threshold value defining a minimum number of data blocks; and wherein to transmit the list of lost data blocks comprises to transmit the list of lost data blocks only if the number of data blocks in the list of lost data blocks has a predetermined relationship with the threshold value.
 21. A machine readable, tangible medium comprising a plurality of instructions that, in response to being executed, result in a computing device: generating a list of lost data blocks based on a round of data transmissions from a source computing device without sending an acknowledgment transmission to the source computing device, the list of lost data blocks identifying data blocks transmitted by the source computing device during the round of data transmissions that were not received by the computing device or were received in a corrupted state; and transmitting the list of lost data blocks to the source computing device in response to the number of data blocks in the list of lost data blocks being greater than a predetermined minimum threshold value and after completion of the round of data transmission to cause the source computing device to retransmit those data blocks identified in the list of lost data blocks.
 22. The machine readable, tangible medium of claim 21, wherein transmitting the list of lost data blocks comprises transmitting the list of lost data blocks based on a calculated delay period after completion of the round of data transmission.
 23. (canceled)
 24. A method comprising: receiving, on a sink computing device, a first round of data transmissions from a source computing device, the first round of data transmissions including a plurality of data blocks; generating, on the sink computing device, a list of lost data blocks based on the plurality of data blocks; transmitting the list of lost data blocks to the source computing device after completion of the first round of data transmissions; and receiving, on the sink computing device, a second round of data transmissions from the source computing device, the second round of data transmissions being based, at least in part, on the list of lost data blocks.
 25. The method of claim 24, wherein transmitting the list of lost data blocks comprises transmitting the list of lost data blocks based on the number of data blocks identified in the list of data blocks. 