Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast Pavlin Radoslavov Christos Papadopoulos Ramesh Govindan.
Jaringan Komputer Lanjut Packet Switching Network.
Efficient Constraint Monitoring Using Adaptive Thresholds Srinivas Kashyap, IBM T. J. Watson Research Center Jeyashankar Ramamirtham, Netcore Solutions.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli University of Calif, Berkeley and Lawrence Berkeley National Laboratory SIGCOMM.
Reliable Group Communication Quanzeng You & Haoliang Wang.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Scalable Reliable Multicast in Wide Area Networks Sneha Kumar Kasera Department of Computer Science University of Massachusetts, Amherst.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Router Buffer Sizing and Reliability Challenges in Multicast Aditya Akella 02/28.
L-21 Multicast. L -15; © Srinivasan Seshan, Overview What/Why Multicast IP Multicast Service Basics Multicast Routing Basics DVMRP Overlay.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
A Reliable Multicast Framework For Light-Weight Sessions and Application Level Framing Sally Floyd, Van Jacobson, Ching-Gung Liu, Steven McCanne, Lixia.
Small-world Overlay P2P Network
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Volcano Routing Scheme Routing in a Highly Dynamic Environment Yashar Ganjali Stanford University Joint work with: Nick McKeown SECON 2005, Santa Clara,
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Multimedia Robert Grimm New York University. Before We Get Started…  Digest access authentication  What is the basic idea?  What is the encoding? 
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Multimedia Robert Grimm New York University. Content: Multimedia Overview  Multimedia = audio and video  Saroiu et al.—An Analysis of Internet Content.
Network Multicast Prakash Linga. Last Class COReL: Algorithm for totally-ordered multicast in an asynchronous environment, in face of network partitions.
Self Healing Wide Area Network Services Bhavjit S Walha Ganesh Venkatesh.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
1 K. Salah Module 6.1: TCP Flow and Congestion Control Connection establishment & Termination Flow Control Congestion Control QoS.
Power saving technique for multi-hop ad hoc wireless networks.
PCP: Efficient Endpoint Congestion Control To appear in NSDI, 2006 Thomas Anderson, Andrew Collins, Arvind Krishnamurthy and John Zahorjan University of.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Multicast Congestion Control in the Internet: Fairness and Scalability
Ming-Yu Jiang and Wanjiun Liao,IEEE ICC 2002 Family ACK Tree (FAT): A New Reliable Multicast Protocol for Mobile Ad Hoc Networks. Speaker : Wilson Lai.
A Randomized Error Recovery Algorithm for Reliable Multicast Zhen Xiao Ken Birman AT&T Labs – Research Cornell University.
THE DESIGN AND IMPLEMENTATION OF A LOG-STRUCTURED FILE SYSTEM M. Rosenblum and J. K. Ousterhout University of California, Berkeley.
Chapter 12 Transmission Control Protocol (TCP)
2007/1/15http:// Lightweight Probabilistic Broadcast M2 Tatsuya Shirai M1 Dai Saito.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Page 1 The department of Information & Communications Engineering Dong-uk, kim A Survey of Packet Loss Recovery Techniques for Streaming.
Video Multicast over the Internet Presented by: Liang-Yuh Wu Lung-Yuan Wu Hao-Hsiang Ku 12 / 6 / 2001 Bell Lab. And Georgia Institute of Technologies IEEE.
Flow and Congestion Control for Reliable Multicast Communication In Wide-Area Networks Supratik Bhattacharyya Department of Computer Science University.
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Principles of Congestion Control Some slides.
EE 122: Lecture 15 (Quality of Service) Ion Stoica October 25, 2001.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
PCP: Efficient Endpoint Congestion Control NSDI, 2006 Thomas Anderson, Andrew Collins, Arvind Krishnamurthy and John Zahorjan University of Washington.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Slingshot: Time-Critical Multicast for Clustered Applications Mahesh Balakrishnan Stefan Pleisch Ken Birman Cornell University.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
1 Advanced Transport Protocol Design Nguyen Multimedia Communications Laboratory March 23, 2005.
A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast Part 2 of the paper Pavlin Radoslavov, Christos Papadopoulos,
Fault Tolerance (2). Topics r Reliable Group Communication.
1 Highlight 1: AER/NCA. 2 Active Multicast Repair Services Receiver Sender Conventional Routers Repair latency is a complete round trip time Link causing.
Reliable Adaptive Lightweight Multicast Protocol Ken Tang, Scalable Network Technologies Katia Obraczka, UC Santa Cruz Sung-Ju Lee, Hewlett-Packard Laboratories.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Reliable Multicast Revisited Reliable Multicast –One-to-many and many-to-many communication –Dynamic group membership –Reliability in the transmission.
Ch 3. Transport Layer Myungchul Kim
Ch 3. Transport Layer Myungchul Kim
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
William Stallings Data and Computer Communications
CMPE 252A: Computer Networks
Topics discussed in this section:
Internet Networking recitation #12
SRP A Multimedia Protocol
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP flow control, congestion control, and error control in TCP.
Reliable Multicast Group
EE 122: Quality of Service and Resource Allocation
Strayer University at Arlington, VA
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Impact of transmission errors on TCP performance
Presentation transcript:

Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse

Why important? Many applications desire reliable or semi-reliable delivery. IP multicast is best-effort. Buffering is necessary for retransmission. Buffer space is limited! How to utilize the amount of buffer space most efficiently?

Previous Work RMTP: Buffer all messages on repair servers. –Impractical for long-lived sessions. SRM: Regenerate messages at the application. –Buffer management at the application level remains a challenge. Stability Detection: Buffer messages until they are stable (i.e. received by all members in the group). –It takes a long time to achieve stability in a large multicast group. Bimodal Multicast: Buffer messages for a fixed amount of time. –Optimization: buffer messages on a sub-group of members.

Talk Overview RRMP: Randomized Reliable Multicast Protocol Error recovery algorithm in RRMP: Infocom 2001 Buffering algorithms in RRMP: DSN 2002 –Feedback based short-term buffering –Randomized long-term buffering Simulation results Summary

RRMP: Randomized Reliable Multicast Protocol Key idea: combine previous work on randomized error recovery with the Bimodal Multicast protocol and hierarchical error recovery similar to that employed by tree-based protocols. Group receivers into a hierarchy. Do not use any repair server. parent region: the least upstream region of a receiver in the hierarchy. Each receiver maintains group membership information about receivers in its region and receivers in its parent region.

Two-phase Error Recovery Assume a receiver p detects a message loss. local loss: the loss affects a fraction of receivers in p’s region regional loss: the loss affects all receivers in p’s region Local recovery: a receiver tries to recover the loss from randomly selected neighbors. Remote recovery: some receivers in the region request retransmissions from the parent region.

s s routers receivers sender

s p q s routers receivers sender

s p q s routers receivers sender

Overview of Buffering Scheme Local recovery Remote recovery Error Recovery Long-term buffering Short-term buffering Buffering Short-term buffering: when a message is first introduced into the system. Long-term buffering: when almost all receivers in a region have received the message.

Not All Messages Are Created Equal!

idle message: no request for this message has been received for a time interval T. (T is the idle threshold.) Short-term buffering: buffer a received message until it becomes idle. Result: messages most needed in the system stay in the buffer longer. No extra traffic overhead! n: the size of a region p: the percentage of members in this region missing a message The probability that a member will not receive any request: As, this probability can be approximated by idea: a member uses the retransmission requests it received as feedback to estimate how many members in the region still miss the message. Feedback-based Short-term Buffering

Simulation Results Short-term buffering in a local region. –100 members in the region, fully connected. –RTT between any two members: 10ms. –idle threshold: 40ms. Outcome of IP multicast: select a random subset of members to hold a message initially. –Measure how long these members buffer the message.

96 %

Why Long-term Buffering ???

s s routers receivers sender

s s routers receivers sender idle Sorry, you are out of luck! p q

Randomized Long-term Buffering idea: provide long-term buffering for an idle message at a small subset of receivers in each region. Load balancing: spread the load of buffering across all receivers in a region. Randomized algorithm: each member independently tosses a coin to decide whether to become a long-term bufferer. C: the expected number of long-term bufferers. Saving in buffer space: n / C Network dynamics: message transfer

The probability that k members buffer an idle message for different values of C, the expected number of long-term bufferers.

The probability that no member buffers an idle message decreases exponentially with C

How to find a long-term bufferer ???

s p q s routers receivers sender

help! Do you have the msg? have the msg?

The search is over!

Search Overhead Evaluate penalty in recovery time due to search for a bufferer in a region with 100 members. –RTT between any two members: 10ms. –Assume a remote request arrives at a random member. –Simulation repeated 100 times with different random seeds. Question I: how does the search time change with the number of bufferers? Question II: how does the search time changes with the region size?

Search time as the number of bufferers increases.

Search time as the size of the region increases

Summary Efficient buffer management is essential for reliable multicast in a large group. Two phase buffering to address variances in delivery latency in a large group. Retransmission requests can be used as feedback to allocate buffer space adaptively. Spread the load of buffering among all members in a group through randomization.