Bandwidth measurement & Multicast
|
|
- Shana Gray
- 6 years ago
- Views:
Transcription
1 Capacity vs. Available Bandwidth Capacity: Maximum throughput without cross-traffic Bandwidth measurement & Multicast Available bandwidth: Maximum throughput given crosstraffic A A A A 4 EECS 49 Computer Networks Z. Morley Mao Tuesday Nov, 004 Source Destination C C C C 4 Acknowledgement: Some slides taken from Kurose&Ross and Katz& Stoica Applications Existing Methods Efficiency of application Choose the best server Congestion control Multicast routing Etc Pathchar based (Jacobson) Packet pair based (Bolot) Nettimer (Lai and Baker) AMP (NLANR) OCXmon (NLANR) MRTG (Oetiker) Pathload (Dovrolis and Jain) 4 Current Techniques Pathchar pathchar Measures bandwidth of every link accurately Requires special software on only one host Slow Can consume significant amounts of network bandwidth Lots of UDP probes with different sizes and TTLs Estimates latency and bandwidth q q q 4 q n- n rtt from (n-)th to n-th *lat + ip_size / bw Dynamic behavior hard as queues neglected and various other assumptions Link-by -link measurement 5
2 Bandwidth Measurement Algorithms pathchar Packet-pair s = MTU Number of different packet sizes: h Total time: p s l i where h: number of i = hops, l i : round trip latency from sender to hop i, p: number of packets sent per size () 0-hop Ethernet network,0ms avglatency 44s s Avg bandwidth + to avg packet size probe a hop = roundtriplatency l i Total data transferred: s ( i) i = p h Send packets back-to-back and estimate the narrow link capacity from the packet dispersion C L/C Only measures end-to-end capacity while neglecting cross-traffic C L/C L/C C Packet Pair Bandwidth Measurement Algorithms Packet Pair Not statistically robust kernel density estimator Not scalable passive implementation Slow gradual packet pair implementation Not robust on all traffic Potential Bandwidth Filtering (PBF) Not flexible to bandwidth changes window Difficult to deploy Receiver Only Packet Pair Not studied under controlled conditions Simulation Two packets queued next to each other at bottleneck link exit the link t seconds apart: Assuming constant bottleneck separation: s t = s : size of second packet b bnl b bnl : bottleneck bandwidth If a packet queues in between: s = t b bnl s + s = t b bnl Bandwidth Measurement Algorithms Packet Pair Filtering (MBF) Bandwidth Measurement Algorithms Receiver and Sender Based PP How to filter noise caused by time compressed and extended packets? - Use mean or median of samples No! - Use histogram to find point of greatest density - Kernel density estimator algorithm: gives greater weight to samples closer to the point at which we want to estimate the density Simple and fast to compute Makes no assumption about distribution it operates on RBPP t is measured at the receiver: s = a a a i : arrival time of packet i SBPP uses round trip time: s b bnl = r i : arrival time of ACK of packet i r r Filtering techniques can be used to reject incorrect estimates RBPP is more accurate but harder to deploy ROPP sacrifices a little accuracy for ease of deployment b bnl
3 Bandwidth Measurement Algorithms Timeliness versus Accuracy Potential Bandwidth Filtering PP usually implemented to run over a fixed number of packets before providing estimate Solution: Calculate bandwidth gradually - Converges to correct bandwidth within packets - Problem: slow to detect bandwidth change - Solution: use packet window (size: w); BUT, may reduce stability Potential Bandwidth Problem: PP cannot measure a higher bandwidth than that at which the sender sends PBF correlate the potential bandwidth and measured bandwidth of a sample in deciding how to filter 4 Nettimer AMP by NLANR Packet pair technique can not measure more than the rate of transmission (potential bandwidth problem ) Solves the above problem using potential bandwidth filtering Active Measurement Project (AMP) monitors installed at critical points in the network. Measure RTT, Loss, Topology IPMP to remove problems due to ICMP Measured bandwidth Costly to install at each router Can become highly intrusive Potential bandwidth Only measures end-to-end capacity while neglecting cross-traffic Link-by -link measurement 5 OCXmon MRTG Passive network measurement tool by NLANR MRTG to monitor the traffic load on network links Deployed at strategic network locations Highly portable SNMP based tool A PC connected to a router via an optical splitter Specific hardware needs to be installed at the measurement points Available only for optical, DS, FDDI interfaces Provides only 5 min averages of link utilization Used by the network operators only as router SNMP community string information required Link-by -link measurement Link-by -link measurement
4 Pathload Motivation Sends Self-Loading Periodic Streams at increasing rates till the rate is larger than the tight link available bandwidth and the relative one way delays of packets show an increasing trend. This scheme is highly intrusive even though the scheme measures the available bandwidth of the tight link End-to-end available bandwidth measurement Combine active and passive approaches Most tools estimate narrow link capacity Accuracy Scalability Statistical robustness Not intrusive 9 0 Tight Link Identification Tight Link Identification (Contd.) Measurement packets Data record Version Type Length Checksum IP address Data Record (optional) Counter Data Record (optional) Timestamp 0 measurement packets sent in a second, to make the tool non-intrusive Speed Inserted/modified by the hops of the path Counter information from MIB-II in router Tight Link Identification (Contd.) Tight Link Identification (Contd.) 0 0 checksum S checksum B A... B... C... D checksum B D D 0 packets in one second Utilization of I-th interface at time t k U Ik c = t c t I ( k ) ( k ) Available bandwidth AIk = S I U Ik At least agree link of the estimates should concur about the tight link identity. Otherwise the next batch of 0 packets is sent. Ik k 4 4
5 Resource Route Available Bandwidth Estimation Method: ABEst ABEst (Contd.) More accurate, reliable estimate of the available bandwidth of the identified tight link Based on MRTG++ Reliably predicts the utilization of the link for a future interval, that varies in size k-p+ k k+h We use the past p samples to predict the utilization for the next h samples Utilize the covariance method for prediction Values of p and h varied according to the estimation error 5 Performance Evaluation Performance Evaluation (Contd.) Tight link identification ABEst Framework The Definition Bottleneck Traffic Engineering Automated Manager Management Plane Simulation Tool DiffServ/ MPLS Domain a_bw bottleneck LSP Routing Traffic Routing LSP Setup/ Dimensioning LSP Capacity Allocation LSP Preemption Traffic Engineering Tool (TET) Measurement/ Performance Evaluation Tool TEAM Network Planning 9 0 hop choke points 0 5
6 measurement packets Recursive Packet Train (RPT) 0 55 Load packets measurement packets 0 pkts, 0 B 0 pkts, 500 B 0 pkts, 0 B TTL S g R g R g R Transmission of RPT g g g Properties of Pathneck Issues of Pathneck Single end control - Relies on ICMP responses Low overhead - Load packets: 0 x 500B = 0KB - Measurement packets: x 0 x 0B =.KB - Instantaneous load (.4 TCP pkts) == TCP slow start Directly comparable - All the gap measurements are from the same packet train Firewall ICMP packet generation time Reverse path congestion Packet loss Route change Last hop 4 gap Choke Point choke points bottleneck point gap Confidence sv i- sv i 0 Choke point is a hop where is the gap value changes significantly hop 0 hop conf: The percentage of available bandwidth change - Assume node i is a choke point, it s confidence is Bottleneck point is the top ranked choke point We use dynamic algorithm to detect the choke points - Threshold is empirically selected as 0. 5
7 Ranking Patheneck: Algorithm Available bandwidth based ranking - The choke point that has the smallest available bandwidth is the bottleneck Hop position based ranking - The choke point that is closest to the destination is the bottleneck They are not equivalent - Because of the packet train squeezing. Probe the same dst N times (N=0). For each probing, label the choke points, and compute their conf values. If a hop appears in over N/ probings as a choke point candidate with conf > 0., it is a real choke point 4. The top ranked choke point is the bottleneck point Motivation Example: Internet Radio This approach does not scale (techno station) - Sends out Kb/s MP music streams - Peak usage ~9000 simultaneous streams only 5 unique streams (trance, hard trance, hard house, eurodance, classical) - Consumes ~.Gb/s bandwidth costs are large fraction of their expenditures (maybe 50%?) - If 000 people are getting their groove on in Berkeley, 000 unicast streams are sent from NYC to Berkeley Broadcast Center Backbone ISP 9 40 Instead build trees Multicast Routing Approaches Broadcast Center Copy data at routers At most one copy of a data packet per link Backbone ISP Kinds of Trees - Source Specific Trees - Shared Tree Tree Computation Methods - Link state - Distance vector Routers keep track of groups in real-time Routers compute trees and forward packets along them LANs implement link layer multicast by broadcasting 4 4
8 Source Specific Trees Source Specific Trees 4 5 Each source is the root of its own tree One tree per source Tree can consists of shortest paths to each receiver 4 5 Each source is the root of its own tree One tree per source Tree can consists of shortest paths to each receiver 0 0 Members of the multicast tree Sender 4 Very good performance but expensive to construct/maintain; routers need to manage a tree per source 44 Shared Tree Shared Tree Easier to construct/maintain but hard to pick good trees for everyone! 4 5 One tree used by all members in a group Ideally, find asteiner tree - the minimum-weighted tree connecting onlythe multicast members 5 0 The Steiner tree problem, succintly, is a minimum interconnection problem. The most basic version is in a graph: given a weighted graph in which a subset of vertices are identified as terminals, find a minimumweight connected subgraph that includes all the terminals. If the edge weights are all positive, then the resulting subgraph is obviously a tree. 4 Shared Tree Shared Tree Ideally, find a Steiner tree minimum-weighted tree connecting only the multicast members Finding Steiner Tree is NP hard Heuristics are known Alternatively, find a minimum-spanning tree minimum-weighted tree connecting all nodes in the network Finding a minimum spanning tree is much easier 0 4 4
9 Shared Tree Shared Tree Alternatively, find a minimum-spanning tree minimum-weighted tree connecting all nodes in the network Finding a minimum spanning tree is much easier. How? Alternatively, find a minimum-spanning tree minimum-weighted tree connecting all nodes in the network Finding a minimum spanning tree is easier. How? Prune back to get multicast tree Multicast Service Model Multicast Service Model (cont d) S [G, data] Net [G, data] R joins G [G, data] R 0 joins G [G, data] R n- joins G Receivers join a multicast group which is identified by a multic ast address (e.g. G) Sender(s) send data to address G Network routes data to each of the receivers R 0 R... R n- Membership access control - open group: anyone can join - closed group: restrictions on joining Sender access control - anyone can send to group - anyone in group can send to group - restrictions one which host can send to group Note: multicast vs. broadcast - Broadcast: packets are delivered to all end-hosts in the network - Multicast: packets are delivered only to end- hosts that are in (have joined) the multicast group 5 5 Multicast and Layering Multicast Implementation Issues Multicast can be implemented at different layers - data link layer e.g. Ethernet multicast - network layer e.g. IP multicast - application layer e.g. End system multicast Which layer is best? How are multicast packets addressed? How is join implemented? How is send implemented? How much state is kept and who keeps it?
10 Data Link Layer Multicast Problems with Data Link Layer Multicast Recall: end-hosts in the same local area network (LAN) can hear from each other at the data link layer (e.g., Ethernet) Reserve some data link layer addresses for multicast Join group at multicast address G - Network interface card (NIC) normally only listens for packets s ent to unicast address A and broadcast address B - To join group G, NIC also listens for packets sent to multicast address G (NIC limits number of groups joined) - Implemented in hardware, thus efficient Send to group G - Packet is flooded on all LAN segments, like broadcast - Can waste bandwidth, but LANs should not be very large Only host NICs keep state about who has joined scalable to large number of receivers, groups Single data link technology Single LAN - limited to small number of hosts - limited to low diameter latency - essentially all the limitations of LANs compared to internetworks 55 5 Network Layer (IP) Multicast IP Multicast Routing Overcomes limitations of data link layer multicast Performs inter-network multicast routing - relies on data link layer multicast for intra-network routing Portion of IP address space defined as multicast addresses - addresses for entire Internet through Open group membership Anyone can send to group - flexible, but leads to problems Intra-domain - Distance-vector multicast - Link-state multicast Inter-domain - Protocol Independent Multicast - Single Source Multicast 5 5 Distance Vector Multicast Routing Protocol (DVRMP) Reverse Path Flooding (RPF) An elegant extension to DV routing Use shortest path DV routes to determine if link is on the source-rooted spanning tree Three steps in developing DVRMP - Reverse Path Flooding - Reverse Path Broadcasting - Truncated Reverse Path Broadcasting Extension to DV unicast routing Packet forwarding - If incoming link is shortest path to source - Send on all links except incoming - Packets always take shortest path assuming delay is symmetric Issues - Some links (LANs) may receive multiple copies - Every link receives each multicast packet, even if no interested hosts s: s: s: s: s: s: s: s: s: s: s s r r
11 Example Reverse Path Broadcasting (RPB) Flooding can cause a given packet to be sent multiple times over the same link SS a b x z z y duplicate packet Chose parent of each link along reverse shortest path to source Only parent forward to a link (child link) Identify Child Links. Routing updates identify parent. Since distances are known, each router can easily figure out if it's the parent for a given link. In case of tie, lower address wins forward only to child link child link of x for S a b x SS 5 z z y Solution: Reverse Path Broadcasting Don t Really Want to Flood! Truncated Reverse Path Broadcasting (TRPB) This is still a broadcast algorithm the traffic goes everywhere Need to Prune the tree when there are subtrees with no group members Solution: Truncated Reverse Path Broadcasting Extend DV/RPB to eliminate unneeded forwarding Identify leaves - Routers announce that a link is their next link to source S - Parent router can determine that it is not a leaf Explicit group joining on LAN - Members periodically (with random offset) multicast report locally - Hear an report, then suppress own Packet forwarding - If not a leaf router or have members - Out all links except incoming r r NL L r r NL SS NL L 4 Pruning Details Pruning Details Prune (Source,Group) at leaf if no members - Send Non-Membership Report (NMR) up tree If all children of router R send NRM, prune (S,G) - Propagate prune for (S,G) to parent R On timeout: - Prune dropped - Flow is reinstated - Down stream routers re-prune Note: a soft-state approach How to pick prune timers? - Too long large join time - Too short highcontrol overhead What do you do when a member of a group (re)joins? - Issue prune-cancellation message (grafts) 5
12 Distance Vector Multicast Scaling Core Based Trees (CBT) State requirements: - O(Sources Groups) active state How to get better scaling? - Hierarchical Multicast - Core-based Trees Pick a rendevouz point for the group called the core. - Shared tree Unicast packet to core and bounce it back to multicast group Tree construction is receiver-based - Joins can be tunneled if required - Only nodes on One tree per group tree involved Reduce routing table state from O(S xg) to O(G) Core-Based Tree A tree rooted at the core is constructed for the group. State is maintained on a per-group basis. That is, each router keeps (G, list of interfaces to send). The notion of upstream/downstream interfaces is defined w.r.t. the core. Packets are forwarded by a router to its parent and children except the one on which the packets arrive. Core-Based Tree Core On tree relay router On tree router Sender Router with directly attached group member 9 0 Example Disadvantages Group members: M, M, M M sends data M root Sub-optimal delay Single point of failure - Core goes out and everything lost until error recovery elects a new core Small, local groups with non-local core - Need good core selection - Optimal choice (computing topological center) is NP hard M M control (join) messages data
13 Problems with Network Layer Multicast (NLM) NLM Reliability Scales poorly with number of groups - A router must maintain state for every group that traverses it - Many groups traverse core routers Supporting higher level functionality is difficult - NLM: best-effort multi-point deliveryservice - Reliability and congestion control for NLM complicated Deployment is difficult and slow - ISP s reluctant to turn on NLM Assume reliability through retransmission Sender can not keep state about each receiver - E.g., what receivers have received - Number of receivers unknown and possibly very large Sender can not retransmit every lost packet - Even if only one receiver misses packet, sender must retransmit, lowering throughput N(ACK) implosion - Described next 4 (N)ACK Implosion NACK Implosion (Positive) acknowledgements - Ack every n received packets - What happens for multicast? Negative acknowledgements - Only ack when data is lost - Assume packet is lost S R R R When a packet is lost all receivers in the sub-tree originated at the link where the packet is lost send NACKs S??? R R R 5 Barriers to Multicast Application Layer Multicast (ALM) Hard to change IP - Multicast means change to IP - Details of multicast were very hard to get right Not always consistent with ISP economic model - Charging done at edge, but single packet from edge can explode into millions of packets within network Let the hosts do all the special work - Only require unicast from infrastructure Basic idea: - Hosts do the copying of packets - Set up tree between hosts Troublesome security model - Anyone can send to a group - Denial-of-service attacks on known groups Example: Narada [Yang-hua et al, 000] - Small group sizes <= hundreds of nodes - Typical application: chat
14 Narada: End System Multicast Algorithmic Challenge Gatech Stanford Stan CMU Stan Berk Choosing replication/forwarding points among hosts - how do the hosts know about each other - and know which hosts should forward to other hosts Berkeley Berk Gatech Overlay Tree Stan Stan CMU Berk Berk 9 0 Advantages of ALM Performance Concerns No need for changes to IP or routers No need for ISP cooperation End hosts can prevent other hosts from sending Easy to implement reliability - use hop-by-hop retransmissions Stretch - ratio of latency in the overlay to latency in the underlying network Stress - number of duplicate packets sent over the same physical link Performance Concerns Single Sender Multicast Gatech Delay from CMU to Berk increases Stan Stan Many problems with IP multicast disappear if each group is associated with a single source Duplicate Packets: Bandwidth Wastage CMU CMU Gatech Berk Stanford Berkeley Berk Stan Stan Berk Berk Hosts joining multicast group can send join messages to source - this sets up delivery tree - no worry about root being in wrong place This solves several problems: - better security and charging model - simple algorithm 4 4
15 Example What s Wrong with SSM? Group members: M, M, M source Multiple sources? - Can set up group per source, or... - Source can serve as relay for other senders M Algorithm? - Trivial M M So, why isn t SSM the answer? - Multicast no longer serves as rendezvous - Ok for broadcast apps, not good for meeting apps control (join) messages data 5 What Do You Need to Know? DVRMP CBT SSM How they compare 5
Bandwidth measurement & Multicast
Bandwidth measurement & Multicast EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Nov 11, 004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica
More informationEE122: Multicast. Kevin Lai October 7, 2002
EE122: Multicast Kevin Lai October 7, 2002 Internet Radio www.digitallyimported.com (techno station) - sends out 128Kb/s MP3 music streams - peak usage ~9000 simultaneous streams only 5 unique streams
More informationEE122: Multicast. Internet Radio. Multicast Service Model 1. Motivation
Internet Radio EE122: Multicast Kevin Lai October 7, 2002 wwwdigitallyimportedcom (techno station) - sends out 128Kb/s MP music streams - peak usage ~9000 simultaneous streams only 5 unique streams (trance,
More informationAnnouncements. EECS 122: Introduction to Computer Networks Multicast and Overlay Networks. Motivational Example: Streaming Media
Announcements EEC : Introduction to Computer Networks Multicast and Overlay Networks Ion toica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee/
More informationMulticast EECS 122: Lecture 16
Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration
More informationCS 268: IP Multicast Routing
Motivation CS 268: IP Multicast Routing Ion Stoica April 8, 2003 Many applications requires one-to-many communication - E.g., video/audio conferencing, news dissemination, file updates, etc. Using unicast
More informationNetworking Acronym Smorgasbord: , DVMRP, CBT, WFQ
Networking Acronym Smorgasbord: 802.11, DVMRP, CBT, WFQ EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 19: Multicast Routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu
More informationContents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth
EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 12 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Limiters
More informationMulticast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector Link State. Shared tree.
CSE 123A Computer Networks Fall 2009 Lecture 10 Internet Routing: Multicast Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast Routing Distance Vector
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationMulticast Communications
Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication
More informationAvailable Bandwidth Estimation. Probing Packet Train in Pathneck. Transmission of RPT. Choke Point Detection. Packet train probing
Measuring the Path Network Measurement: Measuring the Path Available Bandwidth/Bottleneck BFind,Pathchar,Cartouche Pathneck Link Capacity: Pathchar CapProbe Loss/Delay/Re-ording Tulip Joy Zhang Pathneck
More informationWhy multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions
Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationMulticast Communications. Slide Set were original prepared by Dr. Tatsuya Susa
Multicast Communications Slide Set were original prepared by Dr. Tatsuya Susa Outline 1. Advantages of multicast 2. Multicast addressing 3. Multicast Routing Protocols 4. Multicast in the Internet 5. IGMP
More informationPage 1. This Week. CS 269: Lecture 11 Multicast A Tale of Two Failures. Multicast and QoS: the lost decade. Irony. History. Lectures.
This Week CS 269: Lecture 11 Multicast A Tale of Two Failures Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationBroadcast and Multicast Routing
Broadcast and Multicast Routing Daniel Zappala CS 460 Computer Networking Brigham Young University Group Communication 2/34 How can the Internet provide efficient group communication? send the same copy
More informationMulticast Communications. Tarik Čičić, 4. March. 2016
Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:
More informationGoals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.
Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley
More informationOverlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.
Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University
More informationList of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF
Multicast OSPF OSPF Open Shortest Path First Link State Protocol Use Dijkstra s algorithm (SPF) Calculate shortest path from the router to every possible destination Areas Limit the information volume
More informationIP Multicast. What is multicast?
IP Multicast 1 What is multicast? IP(v4) allows a host to send packets to a single host (unicast), or to all hosts (broadcast). Multicast allows a host to send packets to a subset of all host called a
More informationIP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001
IP Multicast Tarik Čičić University of Oslo December 00 Overview One-to-many communication, why and how Algorithmic approach (IP) multicast protocols: host-router intra-domain (router-router) inter-domain
More informationLecture 6: Multicast
Lecture 6: Multicast Challenge: how do we efficiently send messages to a group of machines? Need to revisit all aspects of networking Last time outing This time eliable delivery Ordered delivery Congestion
More informationReview. Some slides are in courtesy of J. Kurose and K. Ross
Review The Internet (IP) Protocol Datagram format IP fragmentation ICMP: Internet Control Message Protocol NAT: Network Address Translation Routing in the Internet Intra-AS routing: RIP and OSPF Inter-AS
More informationBroadcast Routing. Multicast. Flooding. In-network duplication. deliver packets from source to all other nodes source duplication is inefficient:
Broadcast Routing Multicast deliver packets from source to all other nodes source duplication is inefficient: duplicate duplicate creation/transmission duplicate source duplication in-network duplication
More informationIP Multicast. Falko Dressler Regionales Rechenzentrum Grundzüge der Datenkommunikation IP Multicast
Falko Dressler Regionales Rechenzentrum falko.dressler@rrze.uni-erlangen.de 1 Agenda Basics Principles of IP multicast, addressing, TTL Internet Group Management Protocol (IGMP) IGMPv1, v2, v3 Layer-2
More informationCS 356: Computer Network Architectures. Lecture 24: IP Multicast and QoS [PD] Chapter 4.2, 6.5. Xiaowei Yang
CS 356: Computer Network Architectures Lecture 24: IP Multicast and QoS [PD] Chapter 4.2, 6.5 Xiaowei Yang xwy@cs.duke.edu Overview Two historic important topics in networking Multicast QoS Limited Deployment
More informationAdvanced Networking. Multicast
Advanced Networking Multicast Renato Lo Cigno Renato.LoCigno@dit.unitn.it Homepage: disi.unitn.it/locigno/index.php/teaching-duties/advanced-networking Multicasting Addresses that refer to group of hosts
More informationASM. Engineering Workshops
1 ASM 2 ASM Allows SPTs and RPTs RP: Matches senders with receivers Provides network source discovery Typically uses RPT to bootstrap SPT RPs can be learned via: Static configuration recommended Anycast-RP
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationUDP, TCP, IP multicast
UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process
More informationLecture 19: Multicast. CSE 123: Computer Networks Stefan Savage
Lecture 19: Multicast CSE 123: Computer Networks Stefan Savage Today: Multicast routing Multicast service model Host interface Host-router interactions (IGMP) Multicast outing Limiters Distance Vector
More information! Naive n-way unicast does not scale. ! IP multicast to the rescue. ! Extends IP architecture for efficient multi-point delivery. !
Bayeux: An Architecture for Scalable and Fault-tolerant Wide-area Data Dissemination ACM NOSSDAV 001 Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John D. Kubiatowicz {shelleyz, ravenben,
More informationExercises to Communication Systems
Exercises to Communication Systems IP Multicast Additional Slides Dr.-Ing. Falko Dressler Department of Computer Science 7 University of Erlangen ÜKS, WS 05/06 1 IP Multicast Introduction Internet Group
More informationIntroduction to Communication Networks Spring Unit 13 Network extensions Bridges.
Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures
More informationMulticast Technology White Paper
Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission
More informationLecture 6: Multicast
Lecture 6: Multicast Challene: how do we efficiently send messaes to a roup of machines? Need to revisit all aspects of networkin Routin Autonomous systems and admin control Address allocation Conestion
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks
More informationNET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17
CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network
More informationWhat is the difference between unicast and multicast? (P# 114)
1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111
More informationEECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.
EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect
More informationTable of Contents 1 PIM Configuration 1-1
Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM
More informationITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon
More information21: IP Multicast. Classic example: British and Indian communities in the US want to watch cricket. Americans worldwide want to watch baseball.
21: IP Multicast Mark Handley TV on the net Suppose you want to broadcast an event live to a million people worldwide, but your audience is too distributed for mainstream TV to carry. How do you do it?
More informationOutline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting
Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer
More informationAdvanced Network Training Multicast
Division of Brocade Advanced Network Training Multicast Larry Mathews Systems Engineer lmathews@brocade.com Training Objectives Session will concentrate on Multicast with emphasis on Protocol Independent
More informationInternet is Based on Packet Switching. EECS 122: Introduction to Computer Networks Semester Wrap-Up. Design Principles. Recap: Course Goals
Internet is Based on Packet Switching CS 1: Introduction to Computer s Semester Wrap-Up Node in a packet switching network incoming links Node Memory outgoing links Computer Science Division Department
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationHybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks
Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate
More informationCongestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?
Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver
More informationExample questions for the Final Exam, part A
ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of
More informationEECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance
EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple
More informationLecture 6. TCP/IP Network Layer (4)
Lecture 6 TCP/IP Network Layer (4) Outline (Network Layer) Principles behind network layer services: Virtual circuit and datagram networks Routing algorithms Link State Distance Vector Hierarchical Routing
More informationHands-On IP Multicasting for Multimedia Distribution Networks
Hands-On for Multimedia Distribution Networks Course Description This Hands-On course provides an in-depth look how IP multicasting works, its advantages and limitations and how it can be deployed to provide
More informationPage 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11
Goals for Today" CS162 Operating Systems and Systems Programming Lecture 11 Reliability, Transport Protocols" Finish e2e argument & fate sharing Transport: TCP/UDP Reliability Flow control October 5, 2011
More informationIPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:
Overview Protocol Independent Multicast for IPv6 () provides IPv6 multicast forwarding by leveraging static routes or IPv6 unicast routing tables generated by any IPv6 unicast routing protocol, such as
More informationMulticast. Midterm. EECS 122: Lecture 16. University of California Berkeley. Exam was not meant to be easy
Multicast EECS : Lecture 6 Department of Electrical Engineering and Computer Sciences University of California Berkeley Midterm Exam was not meant to e easy Mean: 5 Median: 5 Std Dev: 8 Performance quite
More informationHow did IP Multicast get so complicated?
How did IP Multicast get so complicated? Mark Handley ACIRI mjh@aciri.org Overview IP Multicast Service Model Multicast Addresses DVMRP (1988-1993) Broadcast and Prune PIM-DM (~1993) DVMRP for "real" routers
More informationComputer Networks. Sándor Laki ELTE-Ericsson Communication Networks Laboratory
Computer Networks Sándor Laki ELTE-Ericsson Communication Networks Laboratory ELTE FI Department Of Information Systems lakis@elte.hu http://lakis.web.elte.hu Based on the slides of Laurent Vanbever. Further
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationDD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC
DD2490 p4 2010 IP Multicast routing Multicast routing Olof Hagsand KTH CSC 1 Literature RFC 4601 Section 3 (you may need some definitions from Section 2). See reading instructions on web. 2 Deployment
More information4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or
CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,
More informationThe Measurement Manager Modular End-to-End Measurement Services
The Measurement Manager Modular End-to-End Measurement Services Ph.D. Research Proposal Department of Electrical and Computer Engineering University of Maryland, College Park, MD Pavlos Papageorgiou pavlos@eng.umd.edu
More informationTCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)
TCP CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) 1 Sources Fall and Stevens, TCP/IP Illustrated Vol. 1, 2nd edition Congestion Avoidance
More informationInternet Multicast Routing
Internet Multicast Routing Distribute information from a source to multiple destinations (multicast group) seminar, meetings, distance learning, van multicast services. MBONE (Internet Multicast BackBone)
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationCS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.
CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.
More informationObjectives. Chapter 10. Upon completion you will be able to:
Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group
More informationRSVP and the Integrated Services Architecture for the Internet
RSVP and the Integrated Services Architecture for the Internet N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 20 Roadmap for Multimedia Networking 2 1. Introduction
More informationIP Multicast Technology Overview
IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationPrinciples behind data link layer services
Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationOn Network Dimensioning Approach for the Internet
On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/
More informationCS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007
CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question
More informationOverview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers
Overview 15-441 Computer Networking TCP & router queuing Lecture 10 TCP & Routers TCP details Workloads Lecture 10: 09-30-2002 2 TCP Performance TCP Performance Can TCP saturate a link? Congestion control
More informationTCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination
Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle
More informationIP Multicast Routing Protocols
IP Multicast Routing Protocols Term Paper By : Priyank Porwal (97255) Course : Advanced Computer Networks (CS625) Instructor : Dr. Dheeraj Sanghi Department of CSE, IIT Kanpur. April, 2000. Table of Contents
More informationNetworked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016
Networked Systems (SAMPLE QUESTIONS), COMPGZ01, May 2016 Answer TWO questions from Part ONE on the answer booklet containing lined writing paper, and answer ALL questions in Part TWO on the multiple-choice
More informationComputer Networks and Data Systems
Computer Networks and Data Systems Transport Layer TDC463 Winter 2011/12 John Kristoff - DePaul University 1 Why a transport layer? IP gives us end-to-end connectivity doesn't it? Why, or why not, more
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 22: Overlay networks Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu
More informationOutline. Internet. Router. Network Model. Internet Protocol (IP) Design Principles
Outline Internet model Design principles Internet Protocol (IP) Transmission Control Protocol (TCP) Tze Sing Eugene Ng Department of Computer Science Carnegie Mellon University Tze Sing Eugene Ng eugeneng@cs.cmu.edu
More informationEE 122: Transport Protocols. Kevin Lai October 16, 2002
EE 122: Transport Protocols Kevin Lai October 16, 2002 Motivation IP provides a weak, but efficient service model (best-effort) - packets can be delayed, dropped, reordered, duplicated - packets have limited
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.
More informationGoals for Today s Class. EE 122: Networks & Protocols. What Global (non-digital) Communication Network Do You Use Every Day?
Goals for Today s Class EE 122: & Protocols Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/fa09 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
More informationIPv6 PIM-DM configuration example 36 IPv6 PIM-SM non-scoped zone configuration example 39 IPv6 PIM-SM admin-scoped zone configuration example 42 IPv6
Contents Configuring IPv6 PIM 1 Overview 1 IPv6 PIM-DM overview 1 IPv6 PIM-SM overview 3 IPv6 BIDIR-PIM overview 8 IPv6 administrative scoping overview 11 IPv6 PIM-SSM overview 13 Relationship among IPv6
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationTCP so far Computer Networking Outline. How Was TCP Able to Evolve
TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments
More informationChapter 19 Network Layer: Logical Addressing
Chapter 19 Network Layer: Logical Addressing 19.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new
More information