Mobile IP: Multicast Service Reference: Multicast routing protocol in mobile networks; Hee- Sook Shin; Young-Joo Suh;, Proc. IEEE International Conference.

Slides:



Advertisements
Similar presentations
Network Layer Delivery Forwarding and Routing
Advertisements

AP STUDY SESSION 2.
1
Feichter_DPG-SYKL03_Bild-01. Feichter_DPG-SYKL03_Bild-02.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
OSPF 1.
UNITED NATIONS Shipment Details Report – January 2006.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
1 Hyades Command Routing Message flow and data translation.
Scalable Routing In Delay Tolerant Networks
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Multiplying binomials You will have 20 seconds to answer each of the following multiplication problems. If you get hung up, go to the next problem when.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
Multipath Routing for Video Delivery over Bandwidth-Limited Networks S.-H. Gary Chan Jiancong Chen Department of Computer Science Hong Kong University.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
PP Test Review Sections 6-1 to 6-6
EU market situation for eggs and poultry Management Committee 20 October 2011.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
MMOM: Efficient Mobile Multicast Support Based on the Mobility of Mobile Hosts YUNGOO HUH and CHEEHA KIM Presented by Kiran Kumar Bankupally.
2 |SharePoint Saturday New York City
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
VOORBLAD.
Chapter 20 Network Layer: Internet Protocol
Name Convolutional codes Tomashevich Victor. Name- 2 - Introduction Convolutional codes map information to code bits sequentially by convolving a sequence.
1 public class Newton { public static double sqrt(double c) { double epsilon = 1E-15; if (c < 0) return Double.NaN; double t = c; while (Math.abs(t - c/t)
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
1 Wireless and Mobile Networks Part 2 November 25, 2008 Department of Electrical and Computer Engineering University of Western Ontario ECE 436a Networking:
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 10 Routing Fundamentals and Subnets.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 2 Networking Fundamentals.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Chapter 9: Subnetting IP Networks
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Januar MDMDFSSMDMDFSSS
Analyzing Genes and Genomes
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Connecting LANs, Backbone Networks, and Virtual LANs
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
Energy Generation in Mitochondria and Chlorplasts
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
PRESENTED BY A. B. C. 1 User Oriented Regional Registration- Based Mobile Multicast Service Management in Mobile IP Networks Ing-Ray Chen and Ding-Chau.
1 Chonbuk University, DCLAB, ghcho APCC : Wireless Internet Nov. 2, 2000 Mobile IP Multicasting with Host Mobility Locality Gihwan Cho
1 An Enhancement of Mobile IP by Home Agent Handover Advisor : Chun-Chuan Yang Speaker : Li-Sheng Yu June 23, 2005 Reference: “An Enhancement of Mobile.
Authors: Ing-Ray Chen and Ding-Chau Wang Presented by Chaitanya,Geetanjali and Bavani Modeling and Analysis of Regional Registration Based Mobile Service.
Presentation transcript:

Mobile IP: Multicast Service Reference: Multicast routing protocol in mobile networks; Hee- Sook Shin; Young-Joo Suh;, Proc. IEEE International Conference on Communications (ICC), 2000; pp (MobileIPMulticast-1.pdf) Reference: Multicast routing by mobility prediction for mobile hosts; Young-Joo Suh; Dong-Hee Kwon, and Woo-Jae Kim, Proc. IEEE ICC, 2003; pp (MobileIPMulticast-7.pdf)

2 Related Work Foreign agent-based multicast –Remote subscription A mobile host has to subscribe to multicast groups whenever it moves to a foreign net. Simple, not required any encapsulations Offering an optimal routing path Non-existence of duplicated packets Mobility expensive multicast service Extra delay incurred from rebuilding a multicast tree can create the possibility of a disruption in multicast data delivery

3 Related Work (cont) Home agent-based multicast –Bi-directional tunneling Data delivery is achieved by unicast Mobile IP tunnleing via the home agent When the HA receives a multicast packet destined for a mobile host, it encapsulates the packet twice (with 1. the mobile host address and 2. the care-of- address of the mobile host) and then transmits the packet to the mobile host as a unicast packet If multiple mobile hosts that belong to the same home network visit the same foreign network, duplicate copies of multicast packets will arrive at the foreign network (see the figure on next slide)

4 Multicast data duplication problem in HA-based multicast

5 Related Work (cont) MoM (Mobile Multicast)- Ref.8 ACM MOBICOM97 –Improve home agent-based multicast protocol –A HA forwards only one copy of the multicast packet to each foreign network that contains its mobile hosts –Upon receiving the multicast packet, a FA delivers it to mobile hosts using link-level multicasting –Tunnel convergence problem

6 Tunnel convergence problem

7 Solution –The FA appoints one HA as the DMSP (Designated Multicast Service Provider) for the given multicast group –The DMSP forwards only one packet into the tunnel, while other HAs that are not the DMSP do not forward the packet –Drawback: multicast packets from both the DMSP and a multicast router can cause a duplication since it is possible that local static hosts in the foreign network are members of the same group as the visiting mobile hosts (see the figure on next slide)

8 Duplication problem for DMSP scheme

9 Non-optimal delivery route for DMSP scheme

10 Proposed Protocol MMA (Multicast by Multicast Agent) –Multicast Agent (MA), Multicast Forwarder (MF) –MAs provide multicast service to mobile hosts –Each MA has one MF per multicast group and the MF of an MA is the MA that forwards multicast packets to it –The MF of an MA may be the MA itself when its local network is included in the multicast tree –Or the MF can be an MA in another network that belongs to the multicast group

11 Proposed Protocol (cont) Example –A mobile host moves from N1 to N2 –1. The mobile host send its MF information to the MA in N2 during registration, which is used by the MA for selecting the new MF –2. If N2 belongs to the multicast delivery tree, the MA itself becomes the MF –3. If the MA in N2 does not belong to the multicast delivery tree, the MF value that the mobile host had in N1 is used as the MF in N2 –4. Optionally, the MA in N2 selects one that is closer to it, between the MF information that the MA had and the MF that the mobile host had in N1

12 Proposed Protocol (cont)

13 Proposed Protocol: data structure

14 Algorithm: when a MH arrives

15 Algorithm: when a multicast datagram arrives

16 Algorithm: when a MH (member) leaves the current network

17 Algorithm: a control packet from another MA arrives

18 Discussion The proposed MMA protocol offers better (sub-optimal) delivery route than HA-based protocols since the MF is generally located in an adjacent network that is included in the multicast delivery tree The MMA protocol reduces the number of duplicated packets and total amount of tunneling since multicast packets can be forwarded directly from the multicast router in the current network

19 Performance Evaluation Compare: MMA, MoM, HA-based protocol Criteria –Amount of multicast data traffic Traffic on the multicast tree + traffic occurred by tunneling from MF to the mobile host –Average delivery path length –Scalability with multicast group size –Comparison of DMSP handoff with MF handoff

20 Simulation Parameters

21 Discussion- Tunneling The number of tunneling is proportional to –1. The number of mobile hosts in the HA-based multicast protocol –2. The number of foreign networks which has mobile hosts having multicast membership in the MoM protocol –3. The number of MAs which receive data forwarded by an MF (for MMA protocol) –See the figure on next slide

22 Simulation result- Fig. 8 T = 50, MR=3 # of tunneling

23 Simulation result- Fig. 9 MMA shows an improved performance and the difference becomes larger for large tree sizes MoM sparse MMA sparse Optimal

24 Simulation result- Fig. 10 +

25 Discussion- Fig. 10 MoM shows shorter tree path length than MMA, but MoM shows much more tunnel path length than MMA As a result, MMA shows less total path length than MoM

26 Simulation result- Handoff

27 Discussion- Fig. 11 MF handoff frequency in MMA is much less than DMSP handoff frequency Problem of frequent DMSP handoff –Cause much traffic in network –Increase network overhead –Cause performance degradation due to the out-of service period during handoff

28 Extended work (ICC2003) Remote-subscription vs. MA-based Tunneling Allow necessary join operations –Reduce packet delivery length –Minimize the number of unnecessary join Necessary join –Only when the mobile host is expected to remain in the network relatively long period of time –Staying time at the previous network(s) –Threshold value for join

29 Extended work (example)

30 Host Mobility Prediction Speed: GPS (not always available) Expected staying time

31 Simulation: Network Model

32 Simulation: Parameters

33 Simulation result: Fig. 3 # of tunneling MMA with join option

34 Simulation result: Fig. 4

35 Simulation result: Fig. 5

36 Simulation result: Fig. 6a # of MAs that currently have no visiting MHs subscribing multicast groups that MAs join for the MHs