Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

4/12/2015© 2009 Raymond P. Jefferis IIILect Internet Protocol - Continued.
Computer Networking A Top-Down Approach Chapter 4.7.
Introduction 1 Lecture 22 Network Layer (Broadcast and Multicast) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
Multicast on the Internet CSE April 2015.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Fundamentals of Computer Networks ECE 478/578 Lecture #13: Packet Switching (2) Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Connecting LANs: Section Figure 15.1 Five categories of connecting devices.
Network Layer4-1 Spanning trees r Suppose you have a connected undirected graph m Connected: every node is reachable from every other node m Undirected:
Routing So how does the network layer do its business?
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Chapter 4 IP Multicast Professor Rick Han University of Colorado at Boulder
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
CS 268: IP Multicast Routing Kevin Lai April 22, 2001.
1 EE 122: Multicast Ion Stoica TAs: Junda Liu, DK Moon, David Zats (Materials with thanks to Vern Paxson, Jennifer.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
EE689 Lecture 12 Review of last lecture Multicast basics.
Wolfgang EffelsbergUniversity of Mannheim1 Multicast IP Wolfgang Effelsberg University of Mannheim September 2001.
MULTICASTING Network Security.
Multicast EECS 122: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
© J. Liebeherr, All rights reserved 1 IP Multicasting.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 8: Bridging Slides used with permissions.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Network Layer4-1 R1 R2 R3R4 source duplication R1 R2 R3R4 in-network duplication duplicate creation/transmission duplicate Broadcast Routing r Deliver.
Multicast Sources: Kurose and Ross cast/addresstranslation_01.html.
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
CS 268: IP Multicast Routing Ion Stoica April 5, 2004.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Broadcast and Multicast. Overview Last time: routing protocols for the Internet  Hierarchical routing  RIP, OSPF, BGP This time: broadcast and multicast.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Chapter 15 Multicasting and Multicast Routing
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Multicast Routing, Error Control, and Congestion Control.
IP Multicast COSC Addressing Class D address Ethernet broadcast address (all 1’s) IP multicast using –Link-layer (Ethernet) broadcast –Link-layer.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
CS 4396 Computer Networks Lab IP Multicast - Fundamentals.
Configuring Cisco Switches Chapter 13 powered by DJ 1.
Broadcast and multicast routing. R1 R2 R3R4 source duplication R1 R2 R3R4 in-network duplication duplicate creation/transmission duplicate Broadcast Routing.
© J. Liebeherr, All rights reserved 1 IP Multicasting.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 21: Multicast Routing Slides used with.
1 IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Internet routing protocols m RIP m OSPF m IGRP m BGP r Router architectures r IPv6 Today: r IPv6.
Network Layer4-1 Chapter 4 roadmap 4.1 Introduction and Network Service Models 4.2 Routing Principles 4.3 Hierarchical Routing 4.4 The Internet (IP) Protocol.
Multicast Communications
Spring 2006CS 3321 Multicast Outline Link-state Multicast Distance-vector Multicast Protocol Independent Multicast.
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
2/25/20161 Multicast on the Internet CSE 6590 Fall 2009.
Communication Networks Recitation 11. Multicast & QoS Routing.
1 Group Communications: Reverse Path Multicast Dr. Rocky K. C. Chang 19 March, 2002.
The Network Layer UNIT-4 snistforum.com. Network Layer Design Issues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation.
COMP/ELEC 429 Introduction to Computer Networks
Multicasting protocols
Multicast Outline Multicast Introduction and Motivation DVRMP.
(How the routers’ tables are filled in)
3. Internetworking (part 2: switched LANs)
Chapter 3 Part 1 Switching and Bridging
Chapter 5 The Network Layer.
LAN switching and Bridges
NT2640 Unit 9 Activity 1 Handout
LAN switching and Bridges
Dr. Rocky K. C. Chang 23 February 2004
IP Multicast COSC /5/2019.
EE 122: Lecture 13 (IP Multicast Routing)
Implementing Multicast
Optional Read Slides: Network Multicast
Presentation transcript:

Spanning Tree and Multicast

The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing is expensive, learning switches seem cheaper Flooding in a network with a cycle of switches is bad (why?)

Flooding With Cycles B B A A C C D D A wants to send a packet to D -A sends packet to 1 -1 Floods to 2 and 4 -2 Floods to B and 3 -4 Floods to D and 3 <- D receives packet -3 Floods packet from 2 to C and 4 -3 Floods packet from 4 to C and 2 -4 Floods packet from 3 to D and 1 -2 Floods packet from 3 to B and 1 -1 Floods packet from 2 to A and 4 -1 Floods packet from 4 to B and 2 -…. -When does this craziness stop?

Fixing with Cycles DEC (which is long dead) faced the same problem in the mid-1980s (connecting Catenets) Choices offered – Rely on network administrators to build loop-free topologies Turns out to be hard – Build a protocol Given a loopy graph, want no loops – Trees are nice, they don’t have loops – Need a tree that connects all the nodes somehow – Spanning Trees <- Trees spanning over all nodes

The High Level Protocol Pick a root – For the purposes of this class, root node is the one with the lowest MAC address. In reality also adds a user specified “priority” into the mix B B A A C C D D

The High Level Protocol For each node, determine shortest path to root – Break ties by choosing the lower of two MAC addresses – In the example 3 picks the path through 2 rather than B B A A C C D D

The High Level Protocol Disable all links not used by the previously picked paths B B A A C C D D

The High Level Protocol Recomputation for resilience: – If root goes down, select a new root, rerun algorithm – If another node goes down adjust links to recreate the tree B B A A C C D D

The Protocol in Real Life Uses messages of the form – (proposed root, distance to root, node sending message) – From example (1, 0, 1) <- “Node 1 proposes that 1 be the root, also it is distance 0 away from 1” Messages allow for election of root and determining distances Messages (when sent described next) are always flooded out all ports of a switch – This is not a problem even in the presence of loops. Why?

The Protocol in Real Life Initially all switches send a message proposing themselves as the root – Messages like (1, 0, 1), (2, 0, 2) etc Switches update their view of the root – On receiving a message (Y, d, Z) from Z, if id(Y) < id(root), root = Y Compute distance from the root If root or shortest distance has changed, flood an update message notifying neighbors of new root and distance Periodically everyone reannounces their distance and perceived root – Includes the root which sends (root, 0, root) – Used to detect failures and recompute tree when needed.

Multicast Promise of the 90s – All TV and live events broadcast over the internet More viewers, more revenue, all over the world. – Too expensive to run one stream per user.

The Problem Your favorite media conglomerate (The Producer) The Network You A A B B ZZZZ Everyone else in the world … The individual connections from the “producer” to the network all carry the exact same data. Similarly each individual stream uses network bandwidth, so there might be 15 copies of the same data needlessly using up bandwidth. IDEA: Why not just have the network deal with this, give it one copy of the data and have it determine where the packets go. Does this violate End-to-End? Multicast!!!!

Multicast Fundamentally things to do – Join a multicast group (set of end hosts listening to packets) – Send to group Different implementation at different layers – Link layer Easiest to implement, used in LANs – IP Harder to implement, but allows for greater efficiency (as implemented) – Application level We ignore this.

Link Layer Multicast Each multicast groups is denoted by an address G Join a group by telling NIC about G – NIC then listens for packets sent to address G Send by broadcasting packet with a destination address of G. Very efficient in terms of state (end-host stores everything) Inefficient in terms of bandwidth

IP Multicast We focus on intra-domain Portion of IP address space is reserved for Multicast Receivers join group using IGMP (anyone can join) Anyone can send (don’t need to be a part of the group) Receiver Sender Receiver

IP Multicast Take graph on right. Want Sender to be able to multicast to receivers Minimize number of packets sent to get one packet from sender to all receivers. A few ways to do this Receiver Sender Receiver

IP Multicast Must build a tree from source to all destinations We know how to flood along a tree Can build a tree based on a specific source – Distance Vector Multicast Routing Protocol Build one tree for all possible sources – Core Based Trees Receiver Sender Receiver

DVMRP An extension to distance vector routing. Consider distances to source (use source as root of spanning tree). Three steps, each getting us closer to the ideal. – Reverse Path Flooding – Reverse Path Broadcasting – Truncated Reverse Path Broadcasting Receiver Sender Receiver

DVMRP RPF – If incoming link is shortest path to source Send on all links except incoming – Otherwise drop Packets sent along the black links in the direction marked will be flooded. Sometimes two of the same packet are sent. – For instance Node X receives the same packet along both L0 and L1, forwards both of them along L2. X X Receiver Sender Receiver L0 L1 L2

DVMRP RPB – Pick a single parent for each link. – Send packets from parent along a link. In example to the right Y is picked as the parent for L2. Packet from Z is not forwarded by X, while packet from Y is, therefore only one packet goes through L2. Still suboptimal, X does not really need to receive the packet. Y Y X X Z Z Receiver Sender Receiver L0 L1 L2

DVMRP Pruning – Do not send packet to destinations not in the multicast group. Start by sending to everyone as in RPB Nodes send an explicit non- membership request if no one below them on the tree wants the data. In this example X might send a NMR. Do not send data to a pruned node. NMR eventually expires, at which point data is again transmitted. Y Y X X Z Z Receiver Sender Receiver L0 L1 L2

Core Based Trees Build a common tree For each group pick a “rendezvous point” (the Core) Build a spanning tree rooted at the rendezvous point Flood using spanning tree algorithm Receiver Sender Receiver