Algorithm for an Oriented Multicast Routing Protocol
|
|
- Rosalind Patience Jenkins
- 5 years ago
- Views:
Transcription
1 Algorithm for an Oriented Multicast Routing Protocol Damien Magoni, Jean-Jacques Pansiot LSllT - Universiti: Louis Pasteur Boulevard Sebastien Brant, ILLKIRCH { magoni, pansiot Abstract - An increasing number of Internet applications and services will require the use of multicast in the near future. However, only a few techniques are currently used in networklayer multicast routing protocols, such as flooding, pruning or reverse path construction methods. We propose an algorithm to define a new way of multicasting. The base principle is to perform a limited multicast channeled around the unicast path joining the sender to a specific destination, hence the name oriented. This algorithm is close to reverse path multicast algorithms but the flooding is much more controlled. A protocol based on our algorithm could have many applications such as performing network node searches in a specific area. The algorithm is tailored as to be scalable to enable its use in an inter-domain environment. I. INTRODUCTION Although they have some difficulties to be deployed, multicast applications will surely be the next generation main applications running over the Internet. The slow start of the use of such applications may be due to the lack of efficient underlying multicast techniques and protocols. In this paper we propose a new algorithm destined to fill the gap between the two current main multicast techniques: flooding and pruning, and reverse path forwarding. In section I11 we give a specification of our algorithm. In short, it performs a limited multicast channeled around a unicast path. It has to be deployed at the network layer but need not constitute a self-contained protocol. In section IV we explain how the algorithm could be used by other protocols. Section V shows results for a typical use of our algorithm in a specific network node searching technique. 11. RELATED WORK Current multicast protocols usually implement one of the following multicast algorithms. A first rather simple algorithm, called flooding, is rather a broadcast operation than a multicast one. When a packet is received, the router checks if it has not been already received. If yes, it forwards the packet to all links except the reception link. This technique produces a lot of redundant packets and needs to maintain a lot of information states in routers. An improved version is called reverse path forwarding (RPF) [3]. When a packet arrives in a router, the latter checks if the packet comes from a shortest path to the source. If it is the packet is duplicated and sent to all the other interfaces, if it is the packet is discarded. RPF is an improvement over flooding and it is used in many network protocols. A variant of the RPF algorithm is called reverse path multicasting (RPM) [4]. It uses RPF as the base forwarding algorithm but upon data reception, a leaf router without member can send a prilning message to its father to mark off the link and so on. Periodically, packets are sent again to check if the router is still without members. However many pruning states must be kept in routers which make RPM not scalable ORIENTED MULTICAST ROUTING Our aim is to build an oriented multicast algorithm that uses the position of the other devices implied in the multicast communication as it is done in the RPM algorithm. But unlike the RPM algorithm, our algorithm does not need to maintain state information in routers. RPF is used in parts of our algorithm but in a very controlled way. A. Algorithm parameters Our multicast routing algorithm is parameterized. We define a variant as being a specific set of settings of all the algorithm parameters. By changing the values of the parameters we can currently obtain 5 variants. The next subsection will give the full specification of the algorithm and the parameters that have to be set to obtain a specific variant. The generic principle of the algorithm is to reach only the nodes located on or near the (or a) shortest path between the sender (S) and the destination (D). Every packet contains a special field, besides the TTL, called range. As long as the packet travels along a shortest path between S and D, it is multicasted on every link of the node except the arrival link and the range is never decreased. When it goes out of the shortest path SD, the policy depends on the parameter settings of the algorithm. It can be propagated by reverse path forwarding (RPF), by lateral multicasting (i.e. to nodes not 2593
2 leading by a shortest path to the source or the destination) or even by unicast towards its destination. In most cases the packet range is decreased for each hop and thus the maximum travelling distance for the packet is limited to at most the initial range value. Although we talk about shortest paths, and SD shortest path in particular, through this paper, it is indeed the path given by the underlying unicast routing system. The fact that it is not a true shortest path does not matter and our algorithm still works. Besides we rarely get a true shortest path in reality, particularly in inter-domain routing. From the packet current router position, we define E as being a neighbor router leading to D by a shortest path but not belonging to a SD shortest path. The parameters of the algorithm are fully detailed in table 1, including an explanation of their meaning. Name multicast ED-multicast ED-range-dec initial-range TABLE I ALGORITHM PARAMETERS Possible Values rpf, lateral rpf, destination - not ne N" Description Defines the multicast mode when the packets have left the shortest path from S to D and are not on a shortest path to D Defines the multicast when the packets have left the shortest path from S to D and are on a shortest ath to D Boolean indicating if the packet range has to be decremented when a packet is on a shortest path to D but on a shortest oath from S to D Defines the initial I range value of a packet Currently we assume the use of a specific network packet format for our algorithm modelling, but in reality the packet structure could be a subset of another network protocol packet format. In fact a packet used by our algorithm contains a number of fields typical of the IP protocol as well as others fields needed for our algorithm. Table I1 below gives the meaning of each algorithm specific field of a packet. Name SD ED range Possible Values ne N' B. Algorithm specijkation TABLE I1 PACKET FIELDS Description Boolean indicating if the packet comes from a link on a (S, D) shortest path Boolean indicating if the packet comes from a link on a shortest path to D (different from a (S, D) shortest path) Integer defining the nb of hops a packet can do when out of a (S, D) s.p. The algorithm is given below in pseudo-code. The following functions will mainly be running in routers as a core part of the protocol. The algorithm parameters are accessible through the algo-params structure. When a multicast emission is triggered at the application layer, the first packet is created and fields that are specific to the algorithm are initialized by the Initializationfunction. In it I a I i zat io apacket) packet.sd t true packet.ed t After packet initialization, Processing is called. This function is responsible for the forwarding or destruction of the packet. It can also contain any processing needed by other protocols. The Processing function will sometimes destroy the packet or call Switching which means the future multicasting of the packet. Note that in the following pseudo-code the symbol -I means: to be continued on the next line. Processing(packet) // do something to fulfill a specific service IF packet.ltl > 0 AND packet.range > 0 Switchindpacket) Destructior(packet) The aim of the Switching member function is to determine the position of the packet in order to select a suitable multicasting technique. 2594
3 Switch i ngpacket) IF packet.sd = true THEN Mu It icast i n gpacket, rpf) -IF packet. ED = true THEN Mu It icast i napacket, alg o-pa ra m s. ED-m u I ti cast) Mu It icast i napacket, a lg o-pa rams. mu It icast) The Multicasting function will spread the packet by various methods depending on the settings of the parameters of the algorithm and the fields of the packet. The router s interfaces are noted out-if for output interfaces and in-if for input interfaces. Multicasti ndpacket, mu/ticascmethod) IF mu/ticasc method = rpf TH EN IF out-if = packet.in-if THEN CONTINUE IF packet.sd = true THEN IF out-if leads to D by a shortest path THEN Emissior@acket, out-if,, ) Emissior@acket, out-if,,, true) IF out-if leads to D by a shortest path THEN Emissioeacket, out-if,, ) Emissior@acket, out-if,,, ) EN D-FOR-EACH -IF mu/ticascmethod = lateral THEN IF out-if!= packetin-if AND J out-if leads not to S OR D by a shortest path THEN Emissio@acket, out-if,,, ) -FOR-EACH -IF mu/ticascmethod = destination THEN IF out-if!= packet.in-if AND J out-if leads to D by a shortest path THEN Emissio!(packet, out-if,, ) -FOR-EACH The Emission function sets the initial range value, the current SD and ED booleans and calls the Reception function of the router at the other end of the sending interface. This call models the packet s travel between two routers. Emissiorr(packet, intedace, SO, ED, posifion) IF position = true THEN packet. ra nge t a lg o-pa ra ms. in itia I-ra nge packet.sd t SD packet.ed t ED interface. receivi ng-rou ter. Rece pt ion(packet) The last method of the whole process is the Reception function. It decreases the values of the TTL and the range, if needed, and transfers the packet to the Processingfunction. Rece pt io Npacket) IF RPF-check = OK THEN packet.ttl - - IF packet.sd = AND J (algo-params.ed-range-dec packet.ed = ) THEN packet.range - - Process i n dpacket) Destructior(packet) multicast ED-multicast ED-range-dec = true OR J Table 111 shows the parameter settings for creating the algorithm variants that have been tested. Results are shown further in section V. These values have to be set in the algo-params structure in order to model the variants. TABLE Ill ALGORITHM SETTINGS FOR VARIANTS lateral rpf rpf rpf rpf N/A rpf rpf dest. dest. N/A true true IV. APPLICATIONS A first very important use of our algorithm and corresponding protocol, would be its embedding in a network agent search protocol. In many protocols one or several network nodes with a specific functionality need to be selected to fulfill a given task. The classical multicast technique currently used by many protocols to carry out a network agent search is the expanding rings search (ERS) [2]. In an ERS, packets are sent by the source with an arbitrary fixed TTL value that defines a range for the packet. Initially an ERS packet is sent with a small TTL (say 1 or 2). If no agent is found, a new packet is sent with an increased TTL and so on until an agent is found or a threshold value for the TTL is reached. In an ERS, packets are forwarded by following the reverse path 2595
4 forwarding mechanism. Notice that an ERS does not take into account the position of the other actors of the communication and floods surrounding nodes in all directions. Examples of the use of a search protocol are: - find and select the nearest multicast retransmission node for a reliable multicast communication, - find and select a multicast tree node to graft a new member. Note that in theses examples, the search can be directed toward a specific node called the target. For the reliable communication, the target could be the data emitter. In reliable multicast protocols such as LGMP [5] and RMTP [7], receivers search for these retransmitting agents by multicasting requests according to the ERS scheme. For the multicast tree, the target could be the root of the multicast tree. In multicast tree creation and maintenance protocols such as YAM [2] and QoSMIC [I], when a receiver has succeeded in contacting the root of the multicast tree of the group, it usually uses an ERS to be able to graft itself to a node already belonging to the desired multicast tree (although ERS is sometimes coupled with other methods). In the above cases, our idea is to replace the ERS by a search protocol using our oriented multicast routing algorithm. It would be oriented towards the target (defined in each of the above examples) and it would be much more efficient than the ERS method. Moreover our algorithm is designed to find agents as close as possible to a shortest path from the initiator to the target which is of a great interest to the above protocols. Our algorithm could also be used in a network discovery protocol. Current discovery tools usually use hop-limited probes, but as they are not oriented, the probes cannot be sent with a high TTL value. Our algorithm would enable the discovery of the neighborhood of a unicast path towards an interesting specific destination. V. PERFORMANCES We have implemented our new algorithm in an agent search protocol skeleton to be able to compare it to an ERS. We do this to compare our oriented multicast routing algorithm to the RPF algorithm in a realistic use environment. This implementation was done in the simulation module of our network manipulator (nm) software tool. With this module, we can run static simulations to evaluate informations about algorithms such as the number of packets multicasted or the number of agent routers hit. We point out that a preliminary version of this work has been done within the scope of agent search in [6]. The nm simulation module is very efficient and fits perfectly for a first evaluation of our new algorithm before jumping to fine-tuned analysis stages. That would require the definition of additional parameters such as timers that do not exist at this point. It is also for this reason that we did not use LBNL s simulator ns. The latter will however be used in a second stage that will include every temporal parameter needed by the algorithm. A. Settings To feed the simulator we created graphs with the Georgia Tech - Internet Topology Model package developped by Zegura & al. [8]. We generated 100 graphs by the transit-stub method. Each graph has 1400 nodes, contains 2 % of agents and uses multiple routes routing. Each variant has been tested on 100 different source-destination pairs in each graph. So for a given SD distance, each variant has been tested times. The results of these simulations have been merged to give average results. We made these tests for SD distances of 5, 10, 15 and 20 hops. For the ERS, the TTL is incremented by 2 while no optimal agent is found, starting at 1 up to 9 (i.e. 1, 3, 5, etc.). For the variants, the range increment is 1 starting at 1 up to 5. B. Metria We have defined an important ratio called efficiency to be able to assess the variants. The efficiency is equal to the product of the number of optimal agents found and the number of routers hit divided by the product of the number of attempts needed to find an optimal agent and the number of packets emitted in the network. For an easier way to compare our variants to the expanding rings search, we have defined another ratio called the relative efficiency. It is equal to the efficiency of a specific variant divided by the efficiency of the ERS. C, Results On fig. 1 we show the average relative number of attempts needed to find at least one optimal agent (e.g. variant 1 needs 54% of the number of attempts an ERS needs to find an optimal agent). It is averaged on all the four tested distances. Notice that an ERS needs on average 3.8 attempts to find at least one optimal agent whatever the SD distance, which corresponds to a maximum TTL set to 7. The variant 3 has an average around 43% of an ERS which is equal to a average maximum range of 1.6, whatever the distance. 2596
5 Fig. 1. Average Relative Number of Attempts. Fig. 2 shows the cumulative relative efficiency of the variants. Their performances are good and increase when the SD distance increases. It is positive as they are designed for long distance searches. 3 clearly outperforms the other variants. Efficiency differences among variants are noticeable when the SD distance is 10 hops or higher. Fig. 3. Average Relative Efficiency. VI. CONCLUSION In the multicast routing research area, we have developped an original oriented multicast routing algorithm, that avoids the packet exploding phenomenon correlated to multicast methods such as flooding or reverse path forwarding. Its oriented feature is particularly suited for a dynamic search protocol of special-purpose network nodes lying on the way between two communicating partners. Several points will be studied later. In particular the steps to transform the algorithm into a protocol have not yet been undertaken. This would require to further define the algorithm messages and to introduce timers and finite state machine diagrams. We are also considering the use of a network simulator such as ns to demonstrate the feasibility of the temporal aspects of this algorithm. Finally a complete protocol implementation is also left for future work. Such a protocol could serve many other network or transport layer protocols and particularly multicast protocols. I Fig. 2. Cumulative Relative Efficiency. Finally, fig. 3 shows the relative efficiency of each variant averaged on all four tested distances. It is clear that variant 3 has the best result with an average efficiency 3.5 times better than the ERS average efficiency. These results clearly show that our oriented multicast algorithm could usefully replace the ERS algorithm in all the cases that we described in section IV. REFERENCES [I] A. Banerjea, M. Faloutsos, R. Pankaj, "QoSMIC : Quality of Service sensitive Multicast lntemet protocol", in Proc. ACM SIGCOMM'98, Vancouver, BC, September [2] K. Carlberg, J. Crowcroft, "Building Shared Trees Using a Oneto-Many Joining Mechanism", ACM Computer Cominunication Review, pp , January [3] Y. Dalal, R. Metcalfe, "Reverse path forwarding of broadcast packets", ACM Communications, vol. 21, no. 12, [4] S. Deering, "Multicast Routing in Datagram Intemetwork", Stanford University, California, U.S.A., December [5] M. Hofmann, M. Rohrmuller, "Enabling group communication in global networks", in Proc. Global Networking'97, June [6] D. Magoni, J.-J. Pansiot, "Agent Search by Oriented Multicast", in Proc. ACIS SNPD '00, Reims, France, May [7] S. Paul, K. K. Sabnani, J. C. Lin, S. Bhattacharyva, "Reliable Multicast Transport Protocol", IEEE Journal on Selected Areas in Communications, vol. 15, no. 3, April [8] E. W. Zegura, K. L. Calvert, M. J. Donahoo, "A quantitative comparison of graph-based models for intemetworks", IEEE/ACM Transactions on Networking, 5(6): , December
What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationQoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks
QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University
More informationA New Path Probing Strategy for Inter-domain Multicast Routing
A New Path Probing Strategy for Inter-domain Multicast Routing António Costa, Maria João Nicolau, Alexandre Santos and Vasco Freitas Departamento de Informática, Universidade do Minho, Campus de Gualtar,
More informationAnalysis and Comparison of Internet Topology Generators
Analysis and Comparison of Internet Topology Generators Damien Magoni and Jean-Jacques Pansiot Université Louis Pasteur LSIIT Pôle API, Boulevard Sébastien Brant, 67400 Illkirch, France {magoni, pansiot}@dpt-info.u-strasbg.fr
More informationList of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF
Multicast OSPF OSPF Open Shortest Path First Link State Protocol Use Dijkstra s algorithm (SPF) Calculate shortest path from the router to every possible destination Areas Limit the information volume
More informationITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able
More informationIPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:
Overview Protocol Independent Multicast for IPv6 () provides IPv6 multicast forwarding by leveraging static routes or IPv6 unicast routing tables generated by any IPv6 unicast routing protocol, such as
More informationCS 268: IP Multicast Routing
Motivation CS 268: IP Multicast Routing Ion Stoica April 8, 2003 Many applications requires one-to-many communication - E.g., video/audio conferencing, news dissemination, file updates, etc. Using unicast
More informationMulticast Technology White Paper
Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission
More informationMulticast Communications
Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication
More informationComputer Networks. Routing
Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding
More informationGMNF-DVMRP: AN ENHANCED VERSION OF DISTANCE VECTOR MULTICAST ROUTING PROTOCOL
GMNF-DVMRP: AN ENHANCED VERSION OF DISTANCE VECTOR MULTICAST ROUTING PROTOCOL YUAN-CHENG LAI YING-DAR LIN AND WEI-CHE YU Department of Computer and Information Science, National Chiao Tung University,
More informationDesign and Implementation of an Anycast Efficient QoS Routing on OSPFv3
Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationRouting Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001
Routing Algorithms Main issue is how the routers that constitute the network layer of a network cooperate to find the best routes between all pairs of stations. Routing algorithm at a router decides which
More informationTable of Contents 1 PIM Configuration 1-1
Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM
More informationMulticast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector Link State. Shared tree.
CSE 123A Computer Networks Fall 2009 Lecture 10 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 12 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Limiters
More informationEnhancement of the CBT Multicast Routing Protocol
Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationMULTICAST EXTENSIONS TO OSPF (MOSPF)
MULTICAST EXTENSIONS TO OSPF (MOSPF) Version 2 of the Open Shortest Path First (OSPF) routing protocol is defined in RFC-1583. It is an Interior Gateway Protocol (IGP) specifically designed to distribute
More informationWITH the deployment of native multicast in commercial
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 5, OCTOBER 2004 795 Tracetree: A Scalable Mechanism to Discover Multicast Tree Topologies in the Internet Kamil Sarac, Member, IEEE, and Kevin C. Almeroth,
More informationHow did IP Multicast get so complicated?
How did IP Multicast get so complicated? Mark Handley ACIRI mjh@aciri.org Overview IP Multicast Service Model Multicast Addresses DVMRP (1988-1993) Broadcast and Prune PIM-DM (~1993) DVMRP for "real" routers
More informationAn Evaluation of Shared Multicast Trees with Multiple Active Cores
Brigham Young University BYU ScholarsArchive All Faculty Publications 2001-07-01 An Evaluation of Shared Multicast Trees with Multiple Active Cores Daniel Zappala daniel_zappala@byu.edu Aaron Fabbri Follow
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks
More informationIP Multicast Technology Overview
IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationEvaluation of an Overlay for Source-Specific Multicast in Asymmetric Routing environments
Evaluation of an Overlay for Source-Specific Multicast in Asymmetric Routing environments Vasco Pereira, Edmundo Monteiro Department of Informatics Engineering University of Coimbra {vasco,edmundo}@dei.uc.pt
More informationWhy multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions
Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions
More informationHierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks
Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed
More informationAn analysis of retransmission strategies for reliable multicast protocols
An analysis of retransmission strategies for reliable multicast protocols M. Schuba, P. Reichl Informatik 4, Aachen University of Technology 52056 Aachen, Germany email: marko peter@i4.informatik.rwth-aachen.de
More informationMulticast Transport Protocol Analysis: Self-Similar Sources *
Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationExercises to Communication Systems
Exercises to Communication Systems IP Multicast Additional Slides Dr.-Ing. Falko Dressler Department of Computer Science 7 University of Erlangen ÜKS, WS 05/06 1 IP Multicast Introduction Internet Group
More informationTracetree: A Scalable Mechanism to Discover Multicast Tree Topologies in the Internet
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Tracetree: A Scalable Mechanism to Discover Multicast Tree Topologies in the Internet Kamil Sarac, Member, IEEE and Kevin C. Almeroth, Senior Member, IEEE Abstract
More informationMulticast overview. Introduction to multicast. Information transmission techniques. Unicast
Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models
More informationUNIT 2 ROUTING ALGORITHMS
UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity
More informationIP Multicast. Falko Dressler Regionales Rechenzentrum Grundzüge der Datenkommunikation IP Multicast
Falko Dressler Regionales Rechenzentrum falko.dressler@rrze.uni-erlangen.de 1 Agenda Basics Principles of IP multicast, addressing, TTL Internet Group Management Protocol (IGMP) IGMPv1, v2, v3 Layer-2
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More informationMulticast EECS 122: Lecture 16
Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration
More informationCommunication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1
Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a
More information3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)
3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationConfiguring IP Multicast Routing
34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive
More informationTable of Contents Chapter 1 IPv6 PIM Configuration
Table of Contents Table of Contents... 1-1 1.1 IPv6 PIM Overview... 1-1 1.1.1 Introduction to IPv6 PIM-DM... 1-2 1.1.2 How IPv6 PIM-DM Works... 1-2 1.1.3 Introduction to IPv6 PIM-SM... 1-5 1.1.4 How IPv6
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationVirtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing
Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,
More informationDD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC
DD2490 p4 2010 IP Multicast routing Multicast routing Olof Hagsand KTH CSC 1 Literature RFC 4601 Section 3 (you may need some definitions from Section 2). See reading instructions on web. 2 Deployment
More informationFinancial Services Design for High Availability
Financial Services Design for High Availability Version History Version Number Date Notes 1 March 28, 2003 This document was created. This document describes the best practice for building a multicast
More informationMulticast overview. Introduction to multicast. Information transmission techniques. Unicast
Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast benefits and applications 4 Multicast models
More informationAbstract In this paper we describe a new network service called Speccast. Speccast offers a generalized addressing and
Speccast Leonid Poutievski, Kenneth L. Calvert, and James N. Griffioen Laboratory for Advanced Networking University of Kentucky Lexington, KY 40506-0046 Abstract In this paper we describe a new network
More informationUsing MSDP to Interconnect Multiple PIM-SM Domains
Using MSDP to Interconnect Multiple PIM-SM Domains This module describes the tasks associated with using Multicast Source Discovery Protocol (MSDP) to interconnect multiple Protocol Independent Multicast
More informationMulticast Communications. Tarik Čičić, 4. March. 2016
Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast
More informationMulticast Protocol using Bounded Flooding (QMBF) technique.
QoS-Aware Multicast Protocol Using Bounded Flooding (QMBF) Technique Zhi Li and Prasant Mohapatra Department of Computer Science University of California at Davis Davis, CA, 95616 Abstract Many multicast
More informationIPv6 PIM-DM configuration example 36 IPv6 PIM-SM non-scoped zone configuration example 39 IPv6 PIM-SM admin-scoped zone configuration example 42 IPv6
Contents Configuring IPv6 PIM 1 Overview 1 IPv6 PIM-DM overview 1 IPv6 PIM-SM overview 3 IPv6 BIDIR-PIM overview 8 IPv6 administrative scoping overview 11 IPv6 PIM-SSM overview 13 Relationship among IPv6
More informationMulticast Communications. Slide Set were original prepared by Dr. Tatsuya Susa
Multicast Communications Slide Set were original prepared by Dr. Tatsuya Susa Outline 1. Advantages of multicast 2. Multicast addressing 3. Multicast Routing Protocols 4. Multicast in the Internet 5. IGMP
More informationASM. Engineering Workshops
1 ASM 2 ASM Allows SPTs and RPTs RP: Matches senders with receivers Provides network source discovery Typically uses RPT to bootstrap SPT RPs can be learned via: Static configuration recommended Anycast-RP
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationToday s Plan. Class IV Multicast. Class IV: Multicast in General. 1. Concepts in Multicast What is Multicast? Multicast vs.
Today s Plan Class IV Multicast Nagatsugu Yamanouchi Dept. Info. Science, Toho Unisity Chiba, Japan yamanouc@hypresearch.com Class IV - - - Multicast in genal What is multicast? What is IP multicast? What
More informationPIM Configuration. Page 1 of 9
PIM Configuration Page 1 of 9 Contents Contents...2 Chapter 1 PIM Configuration...3 1.1 PIM Description...3 1.1.1 Principles of PIM-DM...3 1.1.2 Principles of PIM-SM...4 1.1.3 Principles of PIM-SSM...5
More informationHierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice
Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!
More informationPolicy Aware QoS Inter-domain Multicast Routing
Policy Aware QoS Inter-domain Multicast outing António Costa, Maria João Nicolau, Alexandre Santos and Vasco Freitas Departamento de Informática, Universidade do Minho, Campus de Gualtar, 4710 raga, Portugal
More informationQoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks
QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks by Satyabrata Pradhan A thesis Submitted to the Faculty of Graduate Studies in Partial Fulfillment of the Requirements for the
More informationMulticasting through Hop-by-Hop Routing Protocol Using Modified Recursive Unicast
Multicasting through Hop-by-Hop Routing Protocol Using Modified Recursive Unicast U.Raghunath Reddy, K.Sekhar, P.Prabhavathi Dept of Information Technology, G.Pullaiah College of Engineering & Technology
More information6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)
103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA
More informationEnhancement of the CBT Multicast Routing Protocol
Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E- mail: sj ko h @ pcc.c t ri.rc.k Abstract In this paper, we propose a simple
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:
More informationThis chapter describes how to configure the Cisco ASA to use the multicast routing protocol.
This chapter describes how to configure the Cisco ASA to use the multicast routing protocol. About, page 1 Guidelines for, page 4 Enable, page 4 Customize, page 5 Monitoring for PIM, page 16 Example for,
More informationComputer Networks Prof. Ashok K. Agrawala
CMSC417 Computer Networks Prof. Ashok K. Agrawala 2017 Ashok Agrawala September 25, 2018 Fall 2018 CMSC417 1 Message, Segment, Packet, and Frame Fall 2018 CMSC417 2 Hierarchical Routing Hierarchical routing.
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationC13b: Routing Problem and Algorithms
CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationAcknowledgement Technique in Communication Network
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 2 (2011), pp. 177-188 International Research Publication House http://www.irphouse.com Acknowledgement
More informationImplementation of a Reliable Multicast Transport Protocol (RMTP)
Implementation of a Reliable Multicast Transport Protocol (RMTP) Greg Nilsen University of Pittsburgh Pittsburgh, PA nilsen@cs.pitt.edu April 22, 2003 Abstract While many network applications can be created
More informationA Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity
A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationContents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth
EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationA DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET
2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations
More informationBroadcast Routing. Multicast. Flooding. In-network duplication. deliver packets from source to all other nodes source duplication is inefficient:
Broadcast Routing Multicast deliver packets from source to all other nodes source duplication is inefficient: duplicate duplicate creation/transmission duplicate source duplication in-network duplication
More informationEnd User Level Classification of Multicast Reachability Problems
End User Level Classification of Multicast Reachability Problems Pavan Namburi and Kamil Sarac Department of Computer Science University of Texas at Dallas Richardson, Texas 75080 Email: pavan@student.utdallas.edu,
More informationIPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005
IPv6 and Multicast 188lecture5.ppt Pasi Lassila 1 Outline IPv6 Multicast 2 IPv6 overview Motivation Internet growth (address space depletion and routing information eplosion) CIDR has helped but eventually
More informationIP Multicast Routing Protocols
IP Multicast Routing Protocols Term Paper By : Priyank Porwal (97255) Course : Advanced Computer Networks (CS625) Instructor : Dr. Dheeraj Sanghi Department of CSE, IIT Kanpur. April, 2000. Table of Contents
More informationTable of Contents 1 MSDP Configuration 1-1
Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring Basic Functions of MSDP
More informationModule 7 Implementing Multicast
Module 7 Implementing Multicast Lesson 1 Explaining Multicast Why Multicast? Used when sending same data to multiple receivers Better bandwidth utilization Less host/router processing Used when addresses
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationA REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS
A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen
More informationConfiguring IP Multicast Routing
CHAPTER 46 This chapter describes how to configure IP multicast routing on the Catalyst 3750-E or 3560-E switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive
More informationConfiguring IP Multicast Routing
39 CHAPTER This chapter describes how to configure IP multicast routing on the Catalyst 3560 switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive
More informationEE122: Multicast. Kevin Lai October 7, 2002
EE122: Multicast Kevin Lai October 7, 2002 Internet Radio www.digitallyimported.com (techno station) - sends out 128Kb/s MP3 music streams - peak usage ~9000 simultaneous streams only 5 unique streams
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationHandover Management for Mobile Nodes in IPv6 Networks
TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationComparison of proposed path selection protocols for IEEE s WLAN mesh networks
Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba
More informationMulticast routing protocols
Multicast routing protocols IGMP IP Group Management Protocol PIM Protocol Independent Multicast MOSPF Multicast OSPF DVMRP DV Multicast Routing Protocol E7310-Multicast-2/Comnet 1 Multicast in local area
More informationECE 435 Network Engineering Lecture 11
ECE 435 Network Engineering Lecture 11 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 5 October 2017 Announcements Back from Memsys. Related things: fast memories for network
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationConsiderable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)
Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing
More information