Network Multicast Prakash Linga. Last Class COReL: Algorithm for totally-ordered multicast in an asynchronous environment, in face of network partitions.

Slides:



Advertisements
Similar presentations
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Advertisements

Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
A Reliable Multicast Framework For Light-Weight Sessions and Application Level Framing Sally Floyd, Van Jacobson, Ching-Gung Liu, Steven McCanne, Lixia.
School of Information Technologies Internet Multicasting NETS3303/3603 Week 10.
COS 420 Day 18. Agenda Group Project Discussion Program Requirements Rejected Resubmit by Friday Noon Protocol Definition Due April 12 Assignment 3 Due.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 23 Introduction to Computer Networks.
Chapter 25 Internet Routing Internetworking Technology How routing tables are built initially How routing software updates the tables as needed. Propagation.
Chapter 4 IP Multicast Professor Rick Han University of Colorado at Boulder
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Computer Networking Lecture 24 – Multicast.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
EE689 Lecture 12 Review of last lecture Multicast basics.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
On Multicast CS614 - March 7, 2000 Tibor Jánosi ?.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Multicast Networking 2 References Multicast Networking and Applications Miller, C. Kenneth Addison-Wesley, 1999 Computer Networking:
Multicast Transport Protocols: A Survey and Taxonomy Author: Katia Obraczka University of Southern California Presenter: Venkatesh Prabhakar.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
CMPT 471 Networking II Address Resolution IPv6 Neighbor Discovery 1© Janice Regan, 2012.
Multicast Congestion Control in the Internet: Fairness and Scalability
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
1 Transport Layer Computer Networks. 2 Where are we?
CIS 725 Wireless networks. Low bandwidth High error rates.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Dec 4, 2007 Reliable Multicast Group Neelofer T. CMSC 621.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
1 TCP: Reliable Transport Service. 2 Transmission Control Protocol (TCP) Major transport protocol used in Internet Heavily used Completely reliable transfer.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Presentation slides prepared by Ramakrishnan.V LMS: A Router Assisted Scheme for Reliable Multicast Christos Papadopoulos, University of Southern California.
CS 4396 Computer Networks Lab IP Multicast - Fundamentals.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Internet Multicasting Chapter 17. Hardware Broadcast Broadcast delivery –Network delivers a copy of a packet to each destination Bus technology - single.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Multicast Routing in Datagram Internetworks and Extended LANs Stephen E. Deering and David R. Cheriton ACM Trans. On Cpt. System, vol 8, no. 2.
ECE 4110 – Internetwork Programming
Multicast Communications
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
1 Group Communications: Reverse Path Multicast Dr. Rocky K. C. Chang 19 March, 2002.
1 Group Communications: Host Group and IGMP Dr. Rocky K. C. Chang 19 March, 2002.
CMPE 252A: Computer Networks
DMET 602: Networks and Media Lab
Advanced Computer Networks
CMPE 252A: Computer Networks
Magda El Zarki Professor, ICS UC, Irvine
THE NETWORK LAYER.
Viet Nguyen Jianqing Liu Yaqin Tang
A Routing Protocol for WLAN Mesh
IP Multicast COSC /5/2019.
EE 122: Lecture 13 (IP Multicast Routing)
Implementing Multicast
Presentation transcript:

Network Multicast Prakash Linga

Last Class COReL: Algorithm for totally-ordered multicast in an asynchronous environment, in face of network partitions and process failures.

Motivation Why Multicast? Reduce network and host overhead for multi- destination delivery Interesting applications Conferencing etc

Ideal Multicast Protocol Scalable Reliable Low join and data propagation latency Easy to join and leave groups Robust unknown destination delivery

Multicast Protocols for a LAN LANs like Ethernet support Efficient broadcast delivery Large space of multicast addresses Extended LANs pose interesting problems like Additional routing and traffic costs may limit Scalability Low delay, delivery with high probability etc difficult to achieve Extension to routing to support multi-destination delivery

Multicast routing Protocols for WANs Extending some unicast routing protocols ? Single spanning tree routing (of extended LAN bridges) Distance vector routing (used in internetworks) Link state routing (used in internetworks)

Single-Spanning-Tree multicast routing Bridges restrict all traffic to a spanning tree by forbidding loops in the physical topology Or running a distributed algorithm among the bridges to compute a spanning tree If groups members periodically issue membership packets then the bridges could learn the branches leading to the group members

SSTM(2) Bridges maintain a table. Table entry: (Address, (outgoing_branch, age), … )

SSTM (3) If a packet arrives with a Multicast source address(?): record the arrival branch and an associated age of zero in a table entry for that multicast address Multicast destination address: Forward a copy of the packet out every out-going branch (except the arrival branch) recorded in the corresponding table entry (if absent discard the packet).

SSTM(3) Periodically increment the age fields of all multicast table entries. If an age field reaches an expiry threshold T expire delete the associated outgoing-branch from the table entry. If no outgoing-branches remain, delete the entire entry.

Multicast Protocols for WANs IP multicast SRM (Scalable Reliable Multicast) RMTP (Reliable Multicast Transport Protocol) PGM (Pragmatic General Multicast) Bimodal multicast (Next class)

IP Multicast Transmission of IP datagram to a host group Best-effort delivery (neither the delivery nor the order is guaranteed) Membership of a host group is dynamic. Host group may be permanent or transient

IP Multicast(2) Multicast routers handle forwarding of IP multicast datagrams. Host transmits an IP multicast datagram as a local network multicast If TTL > 1 then multicast router(s) forward it to other networks that have members of the destination group. Attached multicast router completes delivery of the datagram as a local multicast.

SRM ALF (Application Level Framing) + LWS (Light-Weight Sessions) ALF: includes application semantics in the design of that application’s protocol. Assumptions made in wb’s reliable multicast design Data names unique and persistent Source-ID’s are persistent There is no distinction between senders and receivers IP multicast datagram delivery is available

SRM(2) No requirement for ordered delivery Most operators are idempotent except some like delete. A receiver uses timestamps on the drawing operations to determine the rendering order This captures temporal causality at a level appropriate for the application.

SRM(3) Each member sends periodic session messages. These are required to: Advertise sequence number of active page for active sources Determine current participants of the session Detect losses Estimate one-way distance between nodes

SRM(4) When Host A detects a loss it schedules a repair request at a random time in future. When request timer expires A sends a request for missing data and doubles the request timer to wait for the data When Host B receives a request, makes a randomized wait and multicasts the repair data unless it receives the repair during this period.

SRM(5) Wait periods are randomly chosen from a uniform distribution on an interval. Interval length is dependent on one-way delay and some parameters These parameters could be chosen based on topology and n/w conditions Partitioning and normal departure are indistinguishable. No ordering guaranteed.

SRM(6): Extreme Topologies Deterministic suppression: exactly one NACK; exactly one repair. Probabilistic suppression: at most g-1 requests as the length of the interval is increased expected no. of requests decreases but expected delay increases.

SRM(7) Performance much better if local recovery is possible (no need to multicast to everybody). Solutions: TTL-based scoping Separate multicast group for recovery Administrative scoping

RMTP Uses DRs to avoid ACK implosion. DR caches received data, processes and emits ACKs. DRs statically chosen for a given multicast session.

RMTP(2) After initial setup sender starts transmitting data. On receiving a data packet receiver starts emitting ACKs at T ack interval. Connection termination is timer based Retransmission is either unicast or multicast based on the number of errors Lagging receivers can catch up by sending immediate transmission requests

RMTP(3) Window-based flow control mechanism W s <= W r Senders window advance is determined by the slowest receiver To avoid redundant transmission ACKs should not be sent frequently. Solution: Measure RTT to AP dynamically.

RMTP(4) Receivers can join any time. Need to buffer entire file during the session. A two-level cache mechanism is used Experiencing congestion: Decreases congestion window size (to 1 in the worst case). Later increases it linearly. Receiver dynamically chooses a DR as its AP (least upstream in the multicast tree).

RMTP(5) Session Manager Detects network partitioning and node crashes and takes necessary actions Sets the maximum transmission rate Provides sender and receiver with the required connection parameters Chooses DRs

RMTP(6) Scalable because State information at each node is independent of number of nodes. Receiver driven approach. Uses DRs to distribute responsibilities of process ACKs and performing retransmissions. Reliable delivery not guaranteed when nodes voluntarily or involuntarily leave a multicast group.

PGM Workable solution for multicast applications with basic reliability requirements! Receiver either receives all data packets from transmissions and repairs, or is able to detect unrecoverable data packet loss. No notion of group membership. Members may join and leave anytime. Use NACKs for repair and reliability. But dispense with PACK and use alternate buffer management strategies (like timeouts).

PGM(2) Runs over a datagram multicast protocol like IP multicast Source multicasts sequenced data packets and receivers unicast selective NACKs (repeats until it receives a NCF). N/W elements forward NAKs hop-by-hop to the source and confirm each hop by multicasting a NCF. Repairs provided by the source or Designated Local Repairer in response to a NAK.

PGM(3) Source path messages (SPMs) are used by a source to establish source path state in n/w elements. This ensures that NAKs returns from a receiver to a source on the reverse of the distribution path. Only one NACK per (receiver, packet) is propagated upwards. Sender or DLR sends RDATA in response to a NACK. RDATA retraces the path of NACKs.

PGM(4) “Repeated Retransmission”

Next Class Probabilistic approach (Ex: Bimodal Multicast)