4. Data Transmitting Agent based strategy for

Size: px
Start display at page:

Download "4. Data Transmitting Agent based strategy for"

Transcription

1 120 Chapter 4 4. Data Transmitting Agent based strategy for Effective Cache Consistency 4.1 Architecture of Multicast-Data Dissemination Model Using Data Transmitting Agent The architecture of a mobile wireless communication network is illustrated in Fig. 4.1 and it is the motivation for the real model of the proposed system. It consists of a system with a wired network and is populated by various other components such as a number of mobile devices (Mobile Units-MUs or Mobile Hosts-MHs), multiple Original Servers and Base Stations (BS) also called Mobile Support Stations (MSS). A scenario consisting of two cells is depicted in the figure. Each cell is considered to be hexagonal shaped. The Base Stations in the corresponding cell are connected via a wired link to Mobile Switch Centre (MSC). Any BS is connected through the wired link to the Server on the communication network and serves multiple MHs through wireless channels. It maintains a Server Cache (SC) to store the data items. But storing the contents in the BS cache is not possible because many mobile devices are under the control of BS and the size of cache is small. Therefore, only data-identifiers corresponding to the most recent copy of the data-items are kept. Within this scenario, we consider read-only

2 121 communication, that is, all updates are performed at the server and the MHs are not allowed to alter the data-items individually. Even the MHs maintain a Mobile Host Cache (MHC) individually to keep some of the data-items that are retrieved from the server. A BS is usually responsible for maintaining cache consistency between the MHs and the servers, but this work introduces a novel method. In this method, one of the MH among several MHs is designated as DTA. DTA is completely delegated the responsibility of distributing the data-items pertaining to a specific group having similar interest using the multicast data dissemination strategy and thus helps to maintain cache consistency in wireless mobile communication environment. Hence, there are issues of cache consistency to be maintained at two levels i.e. SC- DTAC and DTAC- MHCs where DTAC represents the DTA Cache. This strategy assumes that there is cache consistency between SC and original servers present on the wired network. This strategy provides weak cache consistency for MHC with a remarkable cache hit probability is increased by the cache replacement algorithm discussed in chapter 6. The MHs requiring strong cache consistency can cross check the cached data item with the data entry present in the BS for each data access. In the existing strategies, the MH was probable to get a stale copy for two reasons: (1) It misses the IR of data item (2) the update time of a data item is smaller than expiration of TTL [27].

3 122 These cases can be improved by the use of the proposed scheme, where the client sends the very first request only to the server and the server redirects the query of the client to the DTA. From this point onwards, the DTA is responsible for offering data items to the client and thus the cache consistency between DTAC-MHC has to be considered. Even if the client sleeps, it can get the updated value of the data item it needs from the DTA, because the DTA always holds the latest copy of the data item. This is possible due to the fact that whenever the server broadcasts the information about the updates, the DTA checks the IR to see if there are items corresponding to all those MHs who are registered within the multicast group. The clients within the group have common data interests as that of DTA. Hence, even if the client sleeps and unexpectedly misses the broadcast, the DTA shares that copy with all such MHs. The DTA may have to store huge amount of data in the process of maintaining cache consistency. Therefore, a decision has to be made regarding which data should remain in the cache. The specific amount of time for which DTA stores the data is decided by the Cache Replacement Policy (CRP) discussed in section 6.3. The DTA multicasts the latest updates of data to all the MHs in its group periodically or on receiving a query from any of the MHs. If the data update is missed by any MH, then (i) It can send a request to DTA (ii) It can use its cached copy by checking the timestamp and Predicted-Deviation-in-Update- Interval(PDUI) that has been received in the previous multicast. The

4 123 success of the proposed model lies in selection of DTA. A DTA is selected from among the clients depending on the factors like lifetime of mobile client, energy and distance from base station. This set-up can conveniently provide cache consistency for dynamic data such as traffic information, sports, news, stock updates, online transaction information, etc. By incorporating sufficient security in the system, DTA can authenticate nodes on the network before providing the information to all the nodes registered under it. The IRs corresponding to dynamic data such as news, traffic information and sports are broadcast without acknowledgement whereas stock exchange information and online transaction information needs to be acknowledged.

5 DTA - based Multicast Data Dissemination for Effective Cache Consistency The proposed system is based on a simulation model depicted below: In this model, each client is a process and is divided into two subprocesses called Query Generator and internal Multicast-based Pull Manager. The client acts as a Data Transmitting Agent whenever the Multicast-based Pull Manager is active. The query generator loops continuously and requests for a page at random. To answer the query, it first checks the cache within the client, and an immediate reply follows, if a valid copy of the desired data item exists. Otherwise, it sends a request to the DTA and it multicasts the request suitable number of times. The clients are assumed to have a fixed size cache and make use of replacement Policy based on Semantic-Neural-Network Cache Replacement Policy (SNN-CRP). The DTA stores the data on behalf of the client s similar interests and multicasts to the clients on the wireless network. Since DTA downloads the complete data for the clients who are all registered with it, an enhanced version of CRP is required to manage the data on the client side. This CRP minimizes the access time further. Data in Cache can be accessed faster than that in Main memory of the client but at the same time the size of any cache is at least times smaller than the main memory and therefore the data has to be swapped

6 125 and mapped against the required data which is most frequently referred by the clients of common interests. Server Database Broadcast Messager Broadcast Channel Broadcast Program g b d a c e Push Pull Mux a c a f b a Message Manager Access Pattern Server Queue Page Reciever Client 1 DTA Client N No Bit Vector Yes Double No Dropped Query Generator Query Generator Query Generator O Full Yes Blocked Cache Thresh Filter Cache Thresh Filter Cache Thresh Filter Pull Manager Pull Manager MC-DTA Pull Manager Pull Request MC-DTA Pull Request Pull Request Uplink Channel Fig 4.2 Internal Architecture of Data Distribution in MWCN

7 Invalidation Report Generation and Query Request Invalidation Report (IR) generation strategy is one of the popular technique to achieve consistency in wireless communication environment. In this method MH is informed about the status of data whether (valid or invalid). The existing IR schemes are broadly classified into two categories: stateless and stateful server approach. The server does not keep track of contents of its mobile hosts in a stateless server approach instead the MH checks the data item for its validity prior to answering the request. The server keeps track of the contents of its MH in a stateful server approach and informs the MH whenever a data item is updated. A simple database management is required in stateless strategy which results in a huge traffic on the wireless communication network due to the query from MH to the Server. The performance of this strategy degrades with the addition of MHs (high scale factor) and the MH has to listen the channel to find the status of its cache. Thus losing energy and wasting power of the device. On the other hand the stateful method is scalable but there is server management overhead and the mobility of MH since the information of movement to a different cell should be notified to the server. In the proposed model if the data is updated at the server, BS is informed about the validity of data with the help of wired network. BS can now identify the invalid data item by using

8 127 the concept of flags. It clears the flag of DTA by placing a zero and then the IR is broadcasted to all the users and the users those receive the IR will invalidate data correspondingly. The main focus of the proposed technique is to maintain consistency of data at the DTA since it is the central point for all the disconnected and sleeping MHs. The DTA can request the updated version of the data items from the BS. In this way the DTA receives the correct copy of data. After receiving the broadcast DTA sends acknowledgement and immediately the BS resets the flag for corresponding data entry. In the next step the DTA can multicast the correct copy of the data to the MH that could not get the information due to reasons like sleep mode, network traffic congestion and switch off mode. Hence these clients need not uplink individually to get the latest updates of the data that they share with others even if they missed the broadcast before. 4.4 Cache Management at Base Station, DTA and Mobile Hosts Data Caching Each data item namely dk is identified by a unique identifier k. The Base Station Cache (SC) contains ( k, dk, tk, DTA-flag, Valid-flag, PDUI(AVI), Roam-flag, SDTA-flag ). An MHC contains (k, dk, tk, Valid-Flag, PDUI(AVI) and DTA-flag). If DTA-flag is set the corresponding MH is a DTA. On the other hand if DTA-flag = 0 then the corresponding MH is not a DTA. SDTA is necessary to select a successor DTA.

9 128 Mobile Host Cache Management MHC Management deals with maintenance of cache consistency through the Least Recently Used (LRU) Cache Replacement Policy (CRP) [24, 37, 38] or an enhanced CRP due to the fact that the MH designated as DTA has lot of data that is to be accessed by its peers. Chapter 6 discusses a new CRP namely SNN-CRP that further improves the performance of this strategy. 4.5 DTA - Roaming DTA notifies the BS about new location whenever it moves to a new cell. This situation can be resolved in two ways in (i) The BS can move the data under the DTA s charge to the corresponding successor(nominate a new MH as DTA) The BS will maintain details of the current DTA as well as the successor DTA if at all the DTA leaves the cell. (ii) BS can alternatively forward the requests from MHs to the new location where the DTA has moved. The latter method circumvents various issues and therefore the proposed strategy is based on the first technique. During the movement of the MH from one cell to another it may switch between sleep mode to awake-mode and vice-versa. An MH has to invalidate its cache while it is in the sleep state but if it is awake while roaming then the data in its cache is assumed to be valid. Also it

10 129 will be able to provide the new BS with its data and make it accessible whenever needed. 4.6 Query Description 1. The Mobile clients are PDA s, Laptops etc. The Base station (called server from here after) will identify one of the existing clients in the cell as the leader or DTA. 2. The factors for DTA selection are Energy level, Distance from server, Access rate. 3. The Clients send average of the values of the three factors to the server. 4. Server compares all three values sent by the clients and selects the highest among them and then broadcasts to the clients the port number of the client having the highest average value as the DTA. 5. Once the DTA is identified, that particular client requests the server for the latest updates. 6. After getting the latest updates from the server, the DTA creates a multicast group and multicasts the data. 7. Other clients join the multicast group and receive the multicast data 8. For further queries, clients uplink only to the DTA. 9. DTA gets updates from the server which it multicasts and clients get the updates from DTA.

11 Flowchart 1. The Clients send average of three factors (Distance from BS, Access rate, Energy) 2. BS selects DTA and announces it among the clients 3. Query comes in at client for data Check if data is available in cache? Yes 4. valid? ( check its AVI ) Yes 5. Return to User Stop Send request to BS/ DTA BS 6. Redirect request to DTA if registered user otherwise register 7. DTA multicasts updates to clients who are Group members and read data from group address and caches it Fig 4.3 Flowchart depicting sequence of activities to answer a query

12 Base Station Algorithm Begin Steps 1,2,3 & 4 are initial and are used to select the DTA 1. All the MH s sends average of the three parameters namely energy, distance, and lifetime to the BS. 2. BS receives average of the values of the three parameters from interested MH s. 3. BS Compares all three values sent by the MH s and designates the one having the highest average value among them as the DTA. Repeat the steps 4,5,6 & 7 for each time DTA gets nominated. 4. BS Broadcasts the information of the DTA to all MH s within the cell. 5. BS Broadcasts IR containing information of all those data items that are updated to all MH s. 6. If MH missed Broadcast(DTAnom,timex) If (BS gets query(x) from MH) then BS redirects the MH to DTA. 7. BS receives the query(x) from DTA for latest updates If (dx is available in BS cache ) Send Valid_data(x,dx,PDUI x, tx ) to DTA Else Send query(x) to server. 8. If (BS gets Update(x, d x,time x ) from the server) Update the database entry with ID x: as: dx = d x and tx = time x

13 132 end Client Algorithm Begin 1. If (MH receives query(x) message) If (dx is present in MH s cache and has valid AVI) Answer the query. 2. If dx is not present in MH s cache with a valid PDUI Send query(x) to BS 3. MHs register with DTA after the nomination of DTA to get specific service or updates from the DTA. 4. If dx is not present in MH s cache with a valid PDUI Send query(x) to DTA. 5. If (dx is valid in cache of DTA) Receive Multicast of dx periodically from DTA else DTA Sends query(x) to BS. end DTA Algorithm

14 133 Begin 1. If (DTA gets query(x) from MH) If (dx is valid in cache of DTA) Multicast dx to all clients in the multicast group else Send query(x) to BS i.e. uplink to BS on behalf of MH 2. The MHs interested in the same information need not send query(x) message to the BS later. They obtain updates from DTA only. end. The main idea in the proposed system is to maintain cache consistency between the DTA and the nodes in the group.

FLEXIBLE DATA DISSEMINATION STRATEGY FOR EFFECTIVE CACHE CONSISTENCY IN MOBILE WIRELESS COMMUNICATION NETWORKS

FLEXIBLE DATA DISSEMINATION STRATEGY FOR EFFECTIVE CACHE CONSISTENCY IN MOBILE WIRELESS COMMUNICATION NETWORKS FLEXIBLE DATA DISSEMINATION STRATEGY FOR EFFECTIVE CACHE CONSISTENCY IN MOBILE WIRELESS COMMUNICATION NETWORKS Kahkashan Tabassum 1 Asia Sultana 2 and Dr. A. Damodaram 3 1 Department of CS & IT, Maulana

More information

Dynamic Cache Consistency Schemes for Wireless Cellular Networks

Dynamic Cache Consistency Schemes for Wireless Cellular Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., FEBRUARY 00 Dynamic Cache Consistency Schemes for Wireless Cellular Networks Zhijun Wang, Mohan Kumar, Sajal K Das, and Huaping Shen Abstract

More information

A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment

A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment Anurag Kahol, Sumit Khurana, Sandeep K. S. Gupta, and Pradip K. Srimani Shumei Chen Hoang Nguyen Jeff Wilson Team Members

More information

On Improving the Performance of Cache Invalidation in Mobile Environments

On Improving the Performance of Cache Invalidation in Mobile Environments Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment

Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment Journal of Computer Science 7 (3): 374-378, 2011 ISSN 1549-3636 2011 Science Publications Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment 1 J.C. Miraclin Joyce Pamila

More information

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University

More information

Cluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network

Cluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network American Journal of Applied Sciences 9 (8): 1307-1315, 2012 ISSN 1546-9239 2012 Science Publications Cluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network 1 Kuppusamy,

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

Maintaining Mutual Consistency for Cached Web Objects

Maintaining Mutual Consistency for Cached Web Objects Maintaining Mutual Consistency for Cached Web Objects Bhuvan Urgaonkar, Anoop George Ninan, Mohammad Salimullah Raunak Prashant Shenoy and Krithi Ramamritham Department of Computer Science, University

More information

CERIAS Tech Report Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien

CERIAS Tech Report Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien CERIAS Tech Report 2003-56 Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien Center for Education and Research Information Assurance

More information

THE falling cost of both communication and mobile

THE falling cost of both communication and mobile IEEE TANSACTIONS ON KNOWLEDGE AND DATA ENGINEEING, VOL. 15, NO. 5, SEPTEMBE/OCTOBE 2003 1251 A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments Guohong Cao, Member, IEEE Abstract

More information

IEEE C /08

IEEE C /08 2003-01-10 IEEE C802.20-03/08 Project Title IEEE 802.20 Working Group on Mobile Broadband Wireless Access A Vision of an IP-based Cellular Network Date Submitted

More information

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 8, May 2010 21 Proactive Approach for Cooperative Caching in Mobile Adhoc Networks Prashant Kumar 1, Naveen Chauhan 2, LK Awasthi

More information

Chapter 3 A New Framework for Multicast Mobility in WiFi Networks

Chapter 3 A New Framework for Multicast Mobility in WiFi Networks Chapter 3 A New Framework for Multicast Mobility in WiFi Networks 3.1 Introduction This chapter presents the designed framework that was produced during this research. The chapter describes about network

More information

BRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT

BRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT - 1 Mobile Data Management: Mobile Transactions - Reporting and Co Transactions Kangaroo Transaction Model - Clustering Model Isolation only transaction 2 Tier Transaction Model Semantic based nomadic

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

DCIM: Distributed Cache Invalidation Method for maintaining cache consistency in wireless mobile networks

DCIM: Distributed Cache Invalidation Method for maintaining cache consistency in wireless mobile networks DCIM: Distributed Cache Invalidation Method for maintaining cache consistency in wireless mobile networks Kassem Fawaz, and Hassan Artail, Senior Member, IEEE Abstract This paper proposes a client-based

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Today: World Wide Web! Traditional Web-Based Systems!

Today: World Wide Web! Traditional Web-Based Systems! Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS

A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS 1 LILLY SHEEBA S, 2 YOGESH P 1 Assistant Professor, Department of Information Technology, Anna University, Jerusalem College of Engineering,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Service Management in PCN Systems

Service Management in PCN Systems Lecture 2: Service and Data Management Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Fall 2005 Courtesy of G.G. Richard III for providing some of the slides for this chapter 1 Service Management

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

Last Class: Consistency Models. Today: Implementation Issues

Last Class: Consistency Models. Today: Implementation Issues Last Class: Consistency Models Need for replication Data-centric consistency Strict, linearizable, sequential, causal, FIFO Lecture 15, page 1 Today: Implementation Issues Replica placement Use web caching

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location

More information

Modelling and Analysis of Push Caching

Modelling and Analysis of Push Caching Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,

More information

Efficient Cache Consistency in Server-Based MANET with Cache Replication

Efficient Cache Consistency in Server-Based MANET with Cache Replication Efficient Cache Consistency in Server-Based MANET with Cache Replication J. Bibiana Jenifer 1, M. Manikandan 2 Student, Computer Science and Engineering, Adhiyamaan College of Engineering, Hosur, India

More information

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日 Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

Information Technology Mobile Computing Module: GSM Handovers

Information Technology Mobile Computing Module: GSM Handovers Information Technology Mobile Computing Module: GSM Handovers Learning Objectives What is handover? Why handover are required? Types of handovers(hard and Soft) Types of Handovers in GSM(Intra cell, Inter

More information

Replication in Distributed Systems

Replication in Distributed Systems Replication in Distributed Systems Replication Basics Multiple copies of data kept in different nodes A set of replicas holding copies of a data Nodes can be physically very close or distributed all over

More information

Replication. Consistency models. Replica placement Distribution protocols

Replication. Consistency models. Replica placement Distribution protocols Replication Motivation Consistency models Data/Client-centric consistency models Replica placement Distribution protocols Invalidate versus updates Push versus Pull Cooperation between replicas Client-centric

More information

ISSN 2319-8885 Vol.03,Issue.35 November-2014, Pages:6974-6978 www.ijsetr.com A Caching Scheme in Location Based Application SANDI WINN AYE 1, ZAR ZAR WINT 2 1 Dept of Information and Communication Technology,

More information

Arvind Krishnamurthy Fall 2003

Arvind Krishnamurthy Fall 2003 Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

P A R T T W O MOBILE IPv6

P A R T T W O MOBILE IPv6 P A R T T W O MOBILE IPv6 Mobile IPv6 T H R E E Consider a scenario where you had to change your place of residence on a semipermanent basis, for instance, due to relocation of your company. One problem

More information

Table of Contents 1 NTP Configuration 1-1

Table of Contents 1 NTP Configuration 1-1 Table of Contents 1 NTP Configuration 1-1 NTP Overview 1-1 Applications of NTP 1-1 Advantages of NTP 1-2 How NTP Works 1-2 NTP Message Format 1-3 Operation Modes of NTP 1-5 NTP Configuration Task List

More information

Data Dissemination in Mobile Computing Environments (2)

Data Dissemination in Mobile Computing Environments (2) Data Dissemination in Mobile Computing Environments (2) Sungwon Jung Dept. of Computer Science and Engineering Sogang University Seoul, Korea Email : jungsung@sogang.ac.kr Indexing Techniques for Broadcast

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN 7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of

More information

Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments

Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments Oxford University Press 2007. All rights reserved. 1 Access Latency in mobile environment A device needs a data-record

More information

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/20/>

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/20/> 2003-03-09 IEEE C802.20-03/26 Project Title Date Submitted IEEE 802.20 Working Group on Mobile Broadband Wireless Access Architectural Attributes of an IP-based

More information

Mobility Support in IPv6

Mobility Support in IPv6 Mobility Support in IPv6 Charles E. Perkins David B. Johnson T. J. Watson Research Center Computer Science Department IBM Corporation Carnegie Mellon University Hawthorne, NY 10532 Pittsburgh, PA 15213

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

Mobile IP. Mobile Computing. Mobility versus Portability

Mobile IP. Mobile Computing. Mobility versus Portability Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar

More information

Hybrid Cooperative Caching in a Mobile Environment

Hybrid Cooperative Caching in a Mobile Environment Hybrid Cooperative Caching in a Mobile Environment Hong Va Leong 1, Chi-yin Chow 2 1 Department of Computing, The Hong Kong Polytechnic University Hong Kong cshleong@comp.polyu.edu.hk 2 Department of Computing

More information

Protocol Specification of the MOMBASA Software Environment

Protocol Specification of the MOMBASA Software Environment Technical University Berlin Telecommunication Networks Group Protocol Specification of the MOMBASA Software Environment A. Festag, L. Westerhoff {festag westerhoff}@ee.tu-berlin.de Berlin, October 2001

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Computer Communications

Computer Communications Computer Communications 35 (12) 38 391 Contents lists available at SciVerse ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom Cache invalidation strategies for Internet-based

More information

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET 2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

Avoidance of Bottleneck in PCS Network

Avoidance of Bottleneck in PCS Network Avoidance of Bottleneck in PCS Network Sidhi Pandey 1, Alka 2, Pratima Singh 3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) Abstract: This paper contains the concept

More information

Transaction Processing in Mobile Database Systems

Transaction Processing in Mobile Database Systems Ashish Jain* 1 http://dx.doi.org/10.18090/samriddhi.v7i2.8631 ABSTRACT In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore,

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

THE Global System for Mobile Communications (GSM)

THE Global System for Mobile Communications (GSM) IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 6, NO. 6, DECEMBER 1998 851 Database and Location Management Schemes for Mobile Communications Anna Hać, Senior Member, IEEE, and Bo Liu Abstract Signaling traffic

More information

Registration, Broadcast, Cache, Transaction Reversal and Security

Registration, Broadcast, Cache, Transaction Reversal and Security Registration, Broadcast, Cache, Transaction Reversal and Security Telecommunications and Networks Group IIT Madras Deepti Kumar deepti@lantana.tenet.res.in TeNeT Group IIT-M 2 nd December Outline Registration

More information

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not

More information

A Strategy to Manage Cache Consistency in a Distributed Mobile Wireless Environment

A Strategy to Manage Cache Consistency in a Distributed Mobile Wireless Environment A Strategy to Manage Cache Consistency in a Distributed Mobile Wireless Environment Anurag Kahol, Sumit Khurana, Sandeep K. S. Gupta, and Pradip K. Srimani Department of Computer Science Colorado State

More information

M Commerce: Mobile Applications. Sridhar Iyer K R School of Information Technology IIT Bombay

M Commerce: Mobile Applications. Sridhar Iyer K R School of Information Technology IIT Bombay M Commerce: Mobile Applications Sridhar Iyer K R School of Information Technology IIT Bombay sri@it.iitb.ernet.in http://www.it.iitb.ernet.in/~sri Outline Mobile applications Wireless networking Routing

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Distributed Fault-Tolerant Channel Allocation for Cellular Networks

Distributed Fault-Tolerant Channel Allocation for Cellular Networks 1326 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 7, JULY 2000 Distributed Fault-Tolerant Channel Allocation for Cellular Networks Guohong Cao, Associate Member, IEEE, and Mukesh Singhal,

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Question 1 of 50. Traffic going to a public IP address is being translated by your Palo Alto Networks firewall to your

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Operation Manual NTP. Table of Contents

Operation Manual NTP. Table of Contents Table of Contents Table of Contents... 1-1 1.1 NTP Overview... 1-1 1.1.1 Applications of NTP... 1-1 1.1.2 How NTP Works... 1-2 1.1.3 NTP Message Format... 1-4 1.1.4 Operation Modes of NTP... 1-5 1.1.5

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Design Guide- Mobility

Design Guide- Mobility Proxim Wireless. All rights reserved. 1 Purpose This document serves as a reference guide for the mobility network designers to plan and design a mobility network that suits their requirement. Mobility

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Daedalus/GloMop Architectural Walkthrough

Daedalus/GloMop Architectural Walkthrough Daedalus/ Architectural Walkthrough Daedalus Retreat, Lake Tahoe June 18-20th, 1996 Steve Gribble and Todd Hodes {gribble,hodes}@cs.berkeley.edu Outline Motivation and overview Core architecture components

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Consistency and Replication. Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary

Consistency and Replication. Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary Consistency and Replication Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary Reasons for Replication Reliability/Availability : Mask failures Mask corrupted data Performance: Scalability

More information

Using Swarm Intelligence to Optimize Caching Techniques for Ad Hoc Network

Using Swarm Intelligence to Optimize Caching Techniques for Ad Hoc Network International Journal of Computer Science and Telecommunications [Volume 2, Issue 6, September 2011] 15 ISSN 2047-3338 Using Swarm Intelligence to Optimize Caching Techniques for Ad Hoc Network Appavoo

More information

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks Proceedings of 2009 12 th International Conference on Computer and Information Technology (ICCIT 2009) 21-23 December, 2009, Dhaka, Bangladesh A New Hashing and Caching Approach for Reducing Call Delivery

More information

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1 Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

Consistency and Replication 1/65

Consistency and Replication 1/65 Consistency and Replication 1/65 Replicas and Consistency??? Tatiana Maslany in the show Orphan Black: The story of a group of clones that discover each other and the secret organization Dyad, which was

More information

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,

More information

Collaborative Caching Architecture for Continuous Query in Mobile Database

Collaborative Caching Architecture for Continuous Query in Mobile Database American Journal of Economics and Business Administration 3 (1): 33-39, 2011 ISSN 1945-5488 2010 Science Publications Collaborative Caching Architecture for Continuous Query in Mobile Database Mohamed

More information

Agenda. What are we looking at? Introduction. Aim of the project. IP Routing

Agenda. What are we looking at? Introduction. Aim of the project. IP Routing Agenda Handoffs in Cellular Wireless Networks: The Daedalus Implementation & Experience by Shrinivasan Seshan, Hari Balakrishnan Randy H. Katz A short presentation by Aishvarya Sharma Dept of Computer

More information

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Spring'15 1 Announcements Project proposals. Feedback. Class schedule updated. Exam:

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Simulating a General Purpose Mobile Computing Environment

Simulating a General Purpose Mobile Computing Environment Computer Science Technical Report Simulating a General Purpose Mobile Computing Environment Anurag Kahol, Sumit Khurana, Sandeep Gupta and Pradip Srimani Department of Computer Science Colorado State University

More information

Table of Contents 1 IGMP Snooping Configuration 1-1

Table of Contents 1 IGMP Snooping Configuration 1-1 Table of Contents 1 IGMP Snooping Configuration 1-1 IGMP Snooping Overview 1-1 Principle of IGMP Snooping 1-1 Basic Concepts in IGMP Snooping 1-2 How IGMP Snooping Works 1-3 Processing of Multicast Protocol

More information