Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.

Slides:



Advertisements
Similar presentations
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Advertisements

Interest Management Objectives – –Understand what is meant by the term interest management. –Realise how interest management schemes may be deployed. –Understand.
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Jacob Boston Josh Pfeifer. Definition of HyperText Transfer Protocol How HTTP works How Websites work GoDaddy.com OSI Model Networking.
Chapter 4 IP Multicast Professor Rick Han University of Colorado at Boulder
1 Pertemuan 7 Communication Protocols for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Protocols and the TCP/IP Suite
OSI Model.
Computer Network Architecture and Programming
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Wolfgang EffelsbergUniversity of Mannheim1 Multicast IP Wolfgang Effelsberg University of Mannheim September 2001.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
An Active Reliable Multicast Framework for the Grids M. Maimour & C. Pham ICCS 2002, Amsterdam Network Support and Services for Computational Grids Sunday,
Multicast Transport Protocols: A Survey and Taxonomy Author: Katia Obraczka University of Southern California Presenter: Venkatesh Prabhakar.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
Process-to-Process Delivery:
Group Management n Introduction n Internet Group Management Protocol (IGMP) n Multicast Listener Discovery (MLD) protocol.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Item 2005 L A Rønningen. Reservation Model Pessimistic or Optimistic Approach 1-N Senders and 1-M Receivers Sender-oriented or Receiver-oriented Immediate.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
CCNA 1 Module 10 Routing Fundamentals and Subnets.
 Protocols used by network systems are not effective to distributed system  Special requirements are needed here.  They are in cases of: Transparency.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Multicasting Part I© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Group Communication Group oriented activities are steadily increasing. There are many types of groups:  Open and Closed groups  Peer-to-peer and hierarchical.
IP Multicast COSC Addressing Class D address Ethernet broadcast address (all 1’s) IP multicast using –Link-layer (Ethernet) broadcast –Link-layer.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Video Multicast over the Internet Presented by: Liang-Yuh Wu Lung-Yuan Wu Hao-Hsiang Ku 12 / 6 / 2001 Bell Lab. And Georgia Institute of Technologies IEEE.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
EE689 Lecture 13 Review of Last Lecture Reliable Multicast.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Protocol Layering Chapter 11.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Improving the WWW: Caching or Multicast? Pablo RodriguezErnst W. BiersackKeith W. Ross Institut EURECOM 2229, route des Cretes. BP , Sophia Antipolis.
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Video Multicast over the Internet (IEEE Network, March/April 1999)
ECE 544 Project3 Team member.
Protocols and the TCP/IP Suite
Overlay Networking Overview.
Web Design & Development
TCP/IP Protocol Suite: Review
Protocols and the TCP/IP Suite
EE 122: Lecture 22 (Overlay Networks)
IP Multicast COSC /5/2019.
Computer Networks Protocols
Lecture 4a Mobile IP 1.
Computer Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

Push Technology Humie Leung Annabelle Huo

Introduction Push technology is a set of technologies used to send information to a client without the client requesting it Push versus Pull  Pull technology is based on the traditional request/reply model. It requires that users know a priori where and when to look for data. It suffers from transmission latency and duplicate data traffic.  Push technology allows users to get information as soon as it become available and users do not have any knowledge about virtual information servers. This transfer of control from users to providers is a potential problem. Focus is on Multicast-base push protocols Multicasting is a 1-to-n form of communication for transmitting packets from one host to a set of member hosts in the same group

Outline Continuous Multicast Push - CMP Issues on Push using IP multicasting Proposed Solutions  Reliable Multicast Protocols - RMTP  Content Based Multicast - CBM

Continuous Multicast Push 1 (1998) CMP Framework Requirements for CMP Problems with using CMP Proposed solutions 1. P. R. Rodriguez, E. W. Biersack, Continuous Multicast Push of Web Documents over the Internet

CMP: Framework CMP  Cyclically deliver a site’s most frequently changing and heavily requested documents on the same multicast address  Based on raw IP multicasting  Reliability is basically achieved through simply repetitive, cyclic transmissions. Web server  Monitor documents  Transmission Clients  Subscribe interested information how to join the multicast group CMP UDP/IP multicasting

CMP: Requirements Multicast Routers  The network connecting is multicast capable for multicast routing and maintaining state information for each active multicast group Session S ervers (session advertisement)  E.g. map the document’s name (URL) into a multicast address. Address Assignment Mechanism  Multicast addresses are not assigned to individual hosts, assignments can change dynamically, and addresses sometimes have semantics of their own. Request Monitoring  The source server needs to check if any client has joined the multicast group corresponding to some objects the server servers. Congestion Control  UDP/IP multicast only provide multicast connectivity

CMP: Problems and Solutions Server End  Problem: How to monitor the number of requests for a document at any moment  Solution: Polling the multicast channel periodically for the feedback Reliability  Forward Error Correction Code (FEC) Client End  Problem: repeatedly receive the same information or mixed new and old information on a same channel because of the cyclically delivery  Solution: Layered Multicasting

Issues on the Use of IP-Multicast for Push Advantages  Scalability  Reduce the load on the server Issues  Need routers to support multicasting  Address assignment mechanism  Reliability  Difficult to specify the recipients  Without concerning about the content or structure of the information being delivered - CBM RMTP

RMTP – Intro and Features A protocol that uses IP multicasting for the reliable delivery of data from a sender to a group of receivers Emphasis is on reliability and scalability Reliability – RMTP compensates for the reliability shortcomings of IP multicasting by monitoring ACKs and NACKs responses from clients Scalability – (1) independent state information (2) uses a receiver-driven approach (3) groups receivers into local regions Three main entities: (1) Sender, (2) Receiver and (3) Designated Receiver Designated Receiver (DR)  assists the sender in processing ACKs and in retransmitting data  Solves the problem of ACK implosion

RMTP – Protocol Description

RMTP - Performance

Content-Based Multicast (CBM) 2 Problem  IP multicast doesn’t concern with the content or structure of the information being delivered. Solutions  Multiple layers in the same multicast group  Multiple groups corresponding to different information sources  Content-Based Multicast - CBM Add filters on IP or Application-level Routers 2. R. Shah, R. Jain, F. Anjum, Efficient Dissemination of Personalized Information Using Content-Based Multicast

CBM System Model An established multicast tree Filters: A set of software modules A hierarchical information schema to describe the disseminated information Filter Criterion Subscription Algorithm Matching Algorithm Filter Placement Algorithm Framework

Filter Placement Algorithm Objective: Minimizing Total traffic for a given set of subscriptions with K filters, assuming required flow values are provided at each node. If v is a leaf then T(v,i,p)=0 for all p,i Otherwise 0<=j<i T (v, i, p)= min {f (l) + f( r)+min[T(l,,j,l)+T(r,i-j-1,r)], 2f(p)+min[T(l,j,p)+T(r,i-j,p)]} f (v): the information flow into vertex v T(v,i,p): the minimum total traffic in Tree (v) given that up to i filters can be placed in Tree (v) and the Lowest Tight Ancestor of v is p Lowest Ancestor of v : the lowest ancestor of v whose parent has a filter j filtersi-(j-1) filters f (l) f (r) Node v T (v, i, p) Lowest Tight Ancestor, P f (p) The node has a filter The node does not have a filter i filters, max