Application-Layer Multicast -presented by William Wong.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Impact Analysis of Cheating in Application Level Multicast s 1090176 Masayuki Higuchi.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
Computer Science 1 ShapeShifter: Scalable, Adaptive End-System Multicast John Byers, Jeffrey Considine, Nicholas Eskelinen, Stanislav Rost, Dmitriy Zavin.
“Scalable and Topologically-aware Application-layer Multicast” Yusung Kim Korea Advanced Institute of Science and Technology.
1 A Case For End System Multicast Yang-hua Chu, Sanjay Rao and Hui Zhang Carnegie Mellon University Largely adopted from Jonathan Shapiro’s slides at umass.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Computer Science ROMA: Reliable Overlay Multicast with Loosely Coupled TCP Connections Gu-In Kwon and John Byers Computer Science Dept. Boston University.
Opportunities and Challenges of Peer-to-Peer Internet Video Broadcast J. Liu, S. G. Rao, B. Li and H. Zhang Proc. of The IEEE, 2008 Presented by: Yan Ding.
Overlay Multicast Mechanism Student : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2006/5/9.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
June, 2002INFOCOM 1 Host Multicast: A Framework for Delivering Multicast to End Users Beichuan Zhang (UCLA) Sugih Jamin (UMich) Lixia Zhang (UCLA)
Application Layer Multicast
CS 268: Overlay Networks: Introduction and Multicast Kevin Lai April 29, 2001.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
CS218 – Final Project A “Small-Scale” Application- Level Multicast Tree Protocol Jason Lee, Lih Chen & Prabash Nanayakkara Tutor: Li Lao.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
A Case for End System Multicast Author: Yang-hua Chu, Sanjay G. Rao, Srinivasan Seshan and Hui Zhang.
Multicast Transport Protocols: A Survey and Taxonomy Author: Katia Obraczka University of Southern California Presenter: Venkatesh Prabhakar.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
NUS.SOC.CS Roger Zimmermann (based in part on slides by Ooi Wei Tsang) Application-Level Multicast.
Communication (II) Chapter 4
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Prof. Younghee Lee 1 Computer networks u Lecture 12: Overlay network Prof. Younghee Lee u Some part of this teaching materials are prepared referencing.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
A Case for End System Multicast Yang-hua Chu, Sanjay G. Rao, Srinivasan Seshan and Hui Zhang Presentation by Warren Cheung Some Slides from
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
CS 268: Overlay Networks: Introduction and Multicast Ion Stoica April 15-17, 2003.
N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST Scalable Overlay Network for Peer-to-Peer File Sharing Park, Chanmo Networked Media Lab. Kwang-Ju.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Impact of Topology on Overlay Multicast Suat Mercan.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Multicast Routing, Error Control, and Congestion Control.
Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture Yang-hua Chu, Sanjay Rao, Srini Seshan and Hui Zhang Carnegie.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
APPLICATION LAYER MULTICASTING
Application-Level Multicast Routing Michael Siegenthaler CS 614 – Cornell University November 2, 2006 A few slides are borrowed from Swati Agarwal, CS.
NUS.SOC.CS5248 Ooi Wei Tsang Course Matters. NUS.SOC.CS5248 Ooi Wei Tsang Deadlines 11 Oct: Survey Paper Due 18 Oct: Paper Reviews Due.
NUS.SOC.CS5248 Ooi Wei Tsang Application-Level Multicast.
Forwarding Group Multicast Protocol (FGMP) for Multihop, Mobile Wireless Networks Speaker : Wilson Lai Date : Ching-Chuan Chiang, Mario Gerla.
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
Overlay Networks and Overlay Multicast May Definition  Network -defines addressing, routing, and service model for communication between hosts.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
CS5248 Student Presentation1 Scalable Resilient Media Streaming Suman Banerjee, Seungjoon Lee, Ryan Braud, Bobby Bhattacharjee, Aravind Srinivasan NOSSDAV.
Self-stabilizing energy-efficient multicast for MANETs.
A Case for End System Multicast 學號: 報告人:通訊所 吳瑞益 指導教授:楊峻權 日期: ACM SIGMETRICS.
1 A Case For End System Multicast Yang-hua Chu, Sanjay Rao and Hui Zhang Carnegie Mellon University.
NUS.SOC.CS Roger Zimmermann (based in part on slides by Ooi Wei Tsang) Application-Level Multicast.
Multicast Outline Multicast Introduction and Motivation DVRMP.
Application-Level Multicast
Chapter 5 The Network Layer.
Host Multicast: A Framework for Delivering Multicast to End Users
Overlay Networking Overview.
Network Architecture for Cyberspace
EE 122: Lecture 22 (Overlay Networks)
IP Multicast COSC /5/2019.
Implementing Multicast
Presentation transcript:

Application-Layer Multicast -presented by William Wong

Outline Introduction Multicast Tree Formation Performance Metrics Protocol Examples Conclusion

Outline Introduction  IP Multicast vs. Application-Layer Multicast  Limitations of IP Multicast  Advantages of application-Layer Multicast Multicast Tree Formation Performance Metrics Protocol Examples Conclusion

IP Multicast vs. Application-Layer Multicast End-host Router A B 4 Packet A B 4

Limitations of IP Multicast Difficult to support high level functionalities on upper layer  E.g. congestion control, reliability  Network and receiver heterogeneities Routers need maintain per-group state Limited multicast addresses ( class D only)

Advantages of Application-Layer Multicast Easy to support high level functionalities  Make use of end-host resource (e.g. memory, process power) to make a more sophisticated decision  Make use of the existing solutions for unicast congestion control and reliability Able to modify the content of data Does not need router support Unlimited multicast addresses

Outline Introduction Multicast Tree Formation  Tree-first approach  Mesh-first approach  Others Performance Metrics Protocol Examples Conclusion

Tree-first Approach Constructs a multicast tree directly. Members explicitly select their parents. Single multicast tree constructed.

Tree-first Approach Components Initial join  Learn other members’ locations Multicast tree formation  Loop avoidance and partition avoidance Multicast tree maintaince  Adaptive to network dynamics

Tree-first Approach Examples Overcast  Build a single source multicast tree that maximize the bandwidth from the source to the receivers Yoid  A tree is constructed for data delivery, while a mesh is constructed for control messages exchanging. Jungle Monkey  Build a single source multicast tree for file transferring ALMI  Build a single source multicast tree in single server and then distributes it.

Mesh-first Approach Members are connected to form a richer connected graph, termed a mesh Members exchange information on the mesh Construct shortest path spanning trees of the mesh with routing protocols e.g. DVMRP

Mesh-first Approach Components Initial join  Learns other members’ locations Mesh formation  Partition avoidance Mesh maintaince  Adaptive to network dynamics  Improve the mesh quality Multicast tree formation  Constructs per-source spanning tree with routing protocol

Other Mesh-first Examples Narada  Creates a mesh and then build multicast trees with DVMRP algorithm. Scattercast  Proxy servers are placed at strategic location. These proxy servers self-organize into multicast trees.

Other Approaches Completely ignores the network-layer infrastructure. Example:  Application-layer Multicast with Delaunay Triangulations Each nodes route multicast packet based on their geometric coordination only.

Outline Introduction Protocol Examples Performance Metrics  Application perspectives  Network perspectives  Adaptiveness to network dynamics  Failure Tolerance  Scalability Conclusion

Application Perspectives Directly affect the performance of application Examples:  Bandwidth and latency  Startup time  End-host resource usages

Bandwidth and Latency Measure the mean and the standard deviation versus rank Examples:  Experiment 1: 1200, 1200, 1000, 800.  Experiment 2: 1400, 1400, 600, 400.  Experiment 3: 1000, 800, 800, 600  Means: 1200, 1133, 800, 600

Startup Time Time required to stabilize the multicast tree Stabilized

End-host Resource Usages Memory Disk Storage Computation Power

Network perspectives Affect other network user indirectly Examples:  Resource usages  Stresses of physical links  Protocol overhead

Resource Usages Sum of the costs (e.g. delay) of the overlay links A B Resource Usages: = 31

Stresses of Physical Links Number of identical copies of a packet traverse a physical link Stress of physical link 1-A is 2 A 3 B 4 2 1

Protocol overhead Protocol overhead = Total non-data traffic / total data traffic Non-data traffic Control messages Network measurement messages

Adaptiveness to Network Dynamics When some of the nodes/links are failure, the time required to discover, react and repair that

Discover, React and Repair Time Discover  Duration from nodes/links failure to detection of link degradation. React  Duration from detection of link degradation to the first change of multicast tree Repair  Duration from the first change of multicast tree to the change which fully recover the multicast tree quality Discover TimeReact TimeRepair Time Link failure Detected First attemptLast attempt

Failure Tolerance Single point of failure  E.g. rendezvous point (RP) Impact of large number of nodes/links failure  The fraction of hosts that correctly receive the data packets sent from the source

Scalability Time and resources used to construct a large multicast tree Scalability maybe limited by  Routing algorithm  Control message size  Protocol overhead

Outline Introduction Multicast Tree Formation Protocols Performance Metrics Existing Protocols  Overcast  Narada Conclusion

Overcast [Jannotti 88] It is motivated by real-world problems faced by content providers. Characteristics of the target applications  Millions of users  Requires high bandwidth  Not latency sensitive

Overcast: Multicast Tree Formation Single Source, which located at root Always contact the root of multicast tree first Use bandwidth as link-cost metric only. Move the newly joined node as far way from the root as possible without sacrificing bandwidth to the root

Overcast: Nodes repositioning Periodically reevaluates its position in the tree. Measure the network condition actively E send 10KB data to D (sibling), B (parent) and R (grandparent) to find the best parent. B A C F E G D R

Overcast: Nodes repositioning Each node keep their ancestor list. These ancestors serve as backup parents. B A C FE G D R B A C FE G D R B A C FE G D R

Overcast: Loop avoidance Keeps an ancestor list to avoid loop formation Reject any connection request from nodes in the ancestor list {R,B,E} B A C FE G D R

Overcast: Performance Application prespectives:  High bandwidth, long latency Network prespectives:  High protocol overhead due to active measure. Not adaptive to network dynamic well  Node moves locally. Low failure tolerance  Single Point of failure High scalability  Only local information need

Narada [Yang-hua Chu 2000] It is motivated by real-world problems faced by conferencing applications Characteristics of the target applications  Small number of users  Require high bandwidth  Latency sensitive

Narada: Mesh Formation No rendezvous point  Contact anyone of group member to join Learn the location of our member by exchanging control messages Randomly select a few group members to be its neighbor.

Narada: Mesh Maintance Measure the network condition actively and passively The bandwidth and latency are measured passively by monitoring the data flow along them. The bandwidth and latency are measured actively. Sent data through the link to determine its bandwidth and latency

Narada: Mesh Maintaince A mesh is a richer connected graph, such that it includes all members with cycles. The quality of mesh keep improving by adding “useful” link and drop “not useful” link. F E D The link A-G would be added. It improve the delay from A/B/C to E/F/G The link E-G is not very useful, not much packets would route though it It will be dropped C G B A

Narada: Utility of a link The degree of improvement to tree latency Algorithm Utility = 0 For each member m (m not i) begin CL = current latency between i and m along mesh NL = new latency between I and m along mesh if edge i-j were added If (NL < CL) then begin utility += ( CL – NL) / CL End Return utility

Narada: Consensus Cost of a link Frequency of being used Formal definition Cost i-j = number of members for which i uses j as next hopt for forwarding packets. Cost j-i = number of members for which j uses i as next hop for forwarding packets. Cost = max(cost i-j, cost j-i)

Runs a distance vector protocol on top of the mesh Narada: Multicast Tree Formation

Runs a distance vector protocol on top of the mesh The per-source trees are constructed from the reverse shortest paths between each recipient and the source. Narada: Multicast Tree Formation

Narada: Link Cost Use bandwidth and latency as link-cost metric at the same time  Shortest widest path algorithm used Pick the widest paths to every other member Then choose the shortest path among all widest path This path is selected

Narada: Performance Application prespectives  High bandwidth, short latency Network prespectives  Low resource usage, low stress of physical link Adaptiveness to network dynamics  Depends on the probing frequency Low scalability  A global information is need for the routing algorithm High failure tolerance  No single-point of failure

Outline Introduction Multicast Tree Formation Protocols Performance Metrics Existing Protocols Conclusion

Two multicast tree formation approaches  Tree-first approach  Mesh-first approach Five performance metrics  Application perspectives  Network perspectives  Adaptiveness to network dynamics  Failure Tolerance  Scalability

Q&A