2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.

Slides:



Advertisements
Similar presentations
A Construction of Locality-Aware Overlay Network: mOverlay and Its Performance Found in: IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO.
Advertisements

Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
SplitStream: High- Bandwidth Multicast in Cooperative Environments Monica Tudora.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
AHOP Problem and QoS Route Pre-computation Adam Sachitano IAL.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
A New Approach for the Construction of ALM Trees using Layered Coding Yohei Okada, Masato Oguro, Jiro Katto Sakae Okubo International Conference on Autonomic.
Opportunities and Challenges of Peer-to-Peer Internet Video Broadcast J. Liu, S. G. Rao, B. Li and H. Zhang Proc. of The IEEE, 2008 Presented by: Yan Ding.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
MQ : An Integrated Mechanism for Multimedia Multicasting De-Nian Yang, Wanjiun Liao, Member, IEEE, and Yen-Ting Lin IEEE TRANSACTIONS ON MULTIMEDIA VOL.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Robust and Efficient Path Diversity in Application-Layer Multicast for Video Streaming Ruixiong Tian, Qian Zhang, Senior Member, IEEE, Zhe Xiang, Yongqiang.
1 A Distributed Delay-Constrained Dynamic Multicast Routing Algorithm Quan Sun and Horst Langendorfer Telecommunication Systems Journal, vol.11, p.47~58,
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
ZIGZAG: An Efficient Peer-to-Peer Scheme for Media Streaming Duc A. Tran, Kien A. Hua, Tai Do University of Central Florida INFOCOM Twenty-Second.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
CS218 – Final Project A “Small-Scale” Application- Level Multicast Tree Protocol Jason Lee, Lih Chen & Prabash Nanayakkara Tutor: Li Lao.
Supporting VCR-like Operations in Derivative Tree-Based P2P Streaming Systems Tianyin Xu, Jianzhong Chen, Wenzhong Li, Sanglu Lu Nanjing University Yang.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
A Case for End System Multicast Author: Yang-hua Chu, Sanjay G. Rao, Srinivasan Seshan and Hui Zhang.
Nearcast: A Locality-Aware P2P Live Streaming Approach for Distance Education XUPING TU, HAI JIN, and XIAOFEI LIAO Huazhong University of Science and Technology.
Multicast Transport Protocols: A Survey and Taxonomy Author: Katia Obraczka University of Southern California Presenter: Venkatesh Prabhakar.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
ON DESIGING END-USER MULTICAST FOR MULTIPLE VIDEO SOURCES Y.Nakamura, H.Yamaguchi, A.Hiromori, K.Yasumoto †, T.Higashino and K.Taniguchi Osaka University.
Network Aware Resource Allocation in Distributed Clouds.
Application-Layer Multicast -presented by William Wong.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
CS 5565 Network Architecture and Protocols Godmar Back Lecture 22.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Network-Coding Multicast Networks With QoS Guarantees Yuanzhe Xuan and Chin-Tau Lea, Senior Member, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19,
Source specific multicast routing and QoS issues Laurentiu Barza.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
DDR-based Multicast routing Protocol with Dynamic Core (DMPDC) Shiyi WU, Navid Nikaein, Christian BONNET Mobile Communications Department EURECOM Institute,
This paper appears in: Computer Communications and Networks, ICCCN Proceedings.15th International Conference on 指導教授 : 許子衡 報告者 : 黃群凱 1.
APPLICATION LAYER MULTICASTING
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
A Case for End System Multicast 學號: 報告人:通訊所 吳瑞益 指導教授:楊峻權 日期: ACM SIGMETRICS.
Communication Chapter 2.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
1 FairOM: Enforcing Proportional Contributions among Peers in Internet-Scale Distributed Systems Yijun Lu †, Hong Jiang †, and Dan Feng * † University.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Overlay Multicast Trees. Background Multicast IP multicast vs. Application layer multicast Overlay network Issues in application layer multicast Construct.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Host Multicast: A Framework for Delivering Multicast to End Users
Optional Read Slides: Network Multicast
Design and Implementation of OverLay Multicast Tree Protocol
Presentation transcript:

2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb Zongming Fei, Member, IEEE, and MengkunYang, StudentMember, IEEE Presented by Chih-Yuan Chan

2007/03/26OPLAB, NTUIM2 Abstract Overlay multicast constructs a multicast delivery tree among end hosts. Unlike traditional IP multicast, the non-leaf nodes in the tree are normal end hosts, which are potentially more susceptible to failures than routers and may leave the multicast group voluntarily. Thus, an important problem for making overlay multicast more dependable is how to recover from node departures in order to minimize the disruption of service to those affected nodes.

2007/03/26OPLAB, NTUIM3 In this paper, we propose a proactive tree recovery mechanism to make the overlay multicast resilient to these failures and unexpected events. Each non-leaf node precalculates a parent-to-be for each of its children. When this non-leaf node is gone, all its children can find their respective new parents immediately. The salient feature of the approach is that rescue plans for multiple non-leaf nodes can work together for their respective children when they fail or leave at the same time.

2007/03/26OPLAB, NTUIM4 1. Introduction Overlay multicast (also known as application-layer multicast) implements the multicast functionality at end hosts rather than routers. The study in this paper is resilience to failures and unexpected events. In overlay multicast, a node The key issue is how to reconstruct the overlay tree after these unexpected events. The time to resume the data flow after a node departure.

2007/03/26OPLAB, NTUIM5 When a non-leaf end host leaves the multicast session, all the nodes in the subtree rooted at it are affected. Previous work on tree recovery adopts a reactive approach in which the tree restoration process starts after node departures In this paper, we propose a proactive approach to the recovery of overlay multicast tree.

2007/03/26OPLAB, NTUIM6 First,we need to consider the degree constraints in overlay multicast. Second, we need to be able to deal with multiple departures that happen at the same time. Third, we need to be able to deal with the cases in which the rescue plan is not available at a child.

2007/03/26OPLAB, NTUIM7 2. The Problem Of Restoring Overlay Multicast Trees

2007/03/26OPLAB, NTUIM8 A. Construction of Overlay Multicast Trees The degree-constrained minimum spanning tree problem is an NP-complete problem. We can use heuristics to generate approximate solutions to these problems.

2007/03/26OPLAB, NTUIM9 B. The Problem Of Restoration The focus of this paper is on the problem of restoration of the overlay multicast tree after nodes leave or fail, especially those non-leaf nodes in the tree. Looking at some existing reactive methods which invoke the repair process after node fails. Grandfather Root Grandfather-All Root-All

2007/03/26OPLAB, NTUIM10 3. The Proactive Reconstruction Of Overlay Multicast Trees

2007/03/26OPLAB, NTUIM11 A. Proactive Approach The idea of the proactive approach is to find a rescue plan before the failure happens. For each non-leaf node, it must find parents- to-be for all of its children. Two decisions have been made during the formation of the problem. First, we want to make use of existing parent-child relationships as much as possible, to reduce the impact of the node failure. Second, we want to keep the impact on the grand parent low.

2007/03/26OPLAB, NTUIM12 B. Spanning Tree Problem In general, we can formulate the problem as follows. Suppose node in the multicast tree has n children, as shown in Fig. 2. The total degree, the used degree and the residual degree of node are represented by, and, respectively.

2007/03/26OPLAB, NTUIM13 We set node degree constraint to be For node C j (0 ≦ j ≦ n-1), the degree constraint is In general, in case of, we will find downstream nodes of, specially we will find nodes in the subtree rooted, so that

2007/03/26OPLAB, NTUIM14

2007/03/26OPLAB, NTUIM15 C. Precomputation Algorithm

2007/03/26OPLAB, NTUIM16

2007/03/26OPLAB, NTUIM17 E. Analysis The protocol still works even if the parent-to-be information is not available at a node. First, a node just joins a tree. Its parent has not been able to finish the computation and leaves the tree before informing it of its parent-to-be. Second, it is possible that the parent was too busy with the delivery task and scheduled this background proactive computation for a later time. An observation about the protocol is that it can deal with most multiple failures cases efficiently.

2007/03/26OPLAB, NTUIM18

2007/03/26OPLAB, NTUIM19 F. Discussion on the Applicability of the Proactive Approach The failure recovery problem is formulated for multimedia streaming applications, which impose strict degree constraint on nodes in the multicast tree. The proactive approach can still be used to improve the performance (e.g., the quality of the tree recovered by finding a good contact point for a node with out sacrificing the recovery time.

2007/03/26OPLAB, NTUIM20 4. Performance Evaluation A. Simulation Step B. Responsiveness C. Quality of the Restored Tree D. Recovery Overhead

2007/03/26OPLAB, NTUIM21 A. Simulation Setup The total number of end hosts varies from 80 to 400 in our experiments. application-level distance between two end hosts is the sum of Link latencies on the shortest path between them. The total degree of each node is uniformly distributed between 2 and 6 inclusive.

2007/03/26OPLAB, NTUIM22 B. Responsiveness Responsiveness indicates how fast each scheme can restore the delivery tree after a node fails or leaves the tree. The first metric used for measuring the responsiveness is the average recovery time, which is the average time for an affected node to find a new parent.

2007/03/26OPLAB, NTUIM23

2007/03/26OPLAB, NTUIM24

2007/03/26OPLAB, NTUIM25 The JOIN request sent by a node to its potential parent and/or the reply can be lost. In that case, the node has to retransmit the request, and this can increase the recovery time. Assume the link loss rate at the underlying topology is p link = 1%. The end-to-end path loss rate will be p=1-(1- p link ) l where l is the number of links between a pair of end-hosts. On average l=7.8 and thus the path loss rate p ≒ 8%.The requesting node will wait for some time before the retransmission.

2007/03/26OPLAB, NTUIM26

2007/03/26OPLAB, NTUIM27 C. Quality of the Restored Tree The quality of the restored tree can be measured in two aspects. One is the tree cost, which measures the resource usage of the tree. The other is the maximum delay of the nodes in the tree from the root.

2007/03/26OPLAB, NTUIM28

2007/03/26OPLAB, NTUIM29

2007/03/26OPLAB, NTUIM30

2007/03/26OPLAB, NTUIM31 D. Recovery Overhead For the reactive methods, the control overhead comes from the control messages exchanged for the affected nodes to find new parents. For the proactive scheme, the control messages consists of two parts. 1.Similar to reactive methods, control messages are exchanged for the children of failed nodes to findnew parents, though we may need fewer steps. 2.In addition, every non-leaf node ( except the root ) precalculates parents-to-be for its children.

2007/03/26OPLAB, NTUIM32

2007/03/26OPLAB, NTUIM33

2007/03/26OPLAB, NTUIM34

2007/03/26OPLAB, NTUIM35

2007/03/26OPLAB, NTUIM36 5. Related Work Degree constraints are considered in establishing multicast trees. The proactive approach has been used in recovering link or node failures in multicast tree in the context of the traditional network- layer multicast. Establishing multiple multicast trees is another approach to dealing with failures in overlay multicast. The multiple tree approach can deal with not only the °hard° failure (node failure or leaving), but the °soft° failure (congestion) as well.

2007/03/26OPLAB, NTUIM37 Conclusion Remarks Overlay multicast differs from traditional IP multicast in that the problem of degree constraints is more prominent and non-leaf nodes in the multicast tree are unstable. This paper proposed a proactive approach in which each non-leaf node precomputes the recovery plan for its children. We developed a protocol for nodes to communicate with each other and deal with various failure situations. The recovery process is much faster than the reactive approaches while the quality of the tree and the amortized cost is comparable to those methods.