EE122: Multicast Kevin Lai October 7, 2002. Internet Radio  (techno station)

Slides:



Advertisements
Similar presentations
1April 16, 2002 Layer 3 Multicast Addressing IP group addresses – “Class D” addresses = high order bits of “1110” Special reserved.
Advertisements

Computer Networking A Top-Down Approach Chapter 4.7.
Multicast on the Internet CSE April 2015.
CS 356: Computer Network Architectures Lecture 14: Advanced Internetworking [PD] Chapter 4.1, 4.2 Xiaowei Yang
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
1 A Case For End System Multicast Yang-hua Chu, Sanjay Rao and Hui Zhang Carnegie Mellon University Largely adopted from Jonathan Shapiro’s slides at umass.
School of Information Technologies Internet Multicasting NETS3303/3603 Week 10.
COS 420 Day 18. Agenda Group Project Discussion Program Requirements Rejected Resubmit by Friday Noon Protocol Definition Due April 12 Assignment 3 Due.
COS 420 Day 14. Agenda Assignment 3 Posted Covers chapters Due March 23 Assignment 4 Posted Chap Due April 6 Individual Project Papers due.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 23 Introduction to Computer Networks.
Chapter 4 IP Multicast Professor Rick Han University of Colorado at Boulder
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
CS 268: IP Multicast Routing Kevin Lai April 22, 2001.
Application Layer Multicast
Computer Networking Lecture 24 – Multicast.
CS 268: Overlay Networks: Introduction and Multicast Kevin Lai April 29, 2001.
1 EE 122: Multicast Ion Stoica TAs: Junda Liu, DK Moon, David Zats (Materials with thanks to Vern Paxson, Jennifer.
CS 268: Computer Networking L-21 Multicast. 2 Multicast Routing Unicast: one source to one destination Multicast: one source to many destinations Two.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
TDC375 Autumn 03/04 John Kristoff - DePaul University 1 Network Protocols Multicast.
EE689 Lecture 12 Review of last lecture Multicast basics.
Katz, Stoica F04 EECS 122: Introduction to Computer Networks Multicast Computer Science Division Department of Electrical Engineering and Computer Sciences.
Wolfgang EffelsbergUniversity of Mannheim1 Multicast IP Wolfgang Effelsberg University of Mannheim September 2001.
CS 268: Multicast Transport Kevin Lai April 24, 2001.
MULTICASTING Network Security.
Multicast EECS 122: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
Group Management n Introduction n Internet Group Management Protocol (IGMP) n Multicast Listener Discovery (MLD) protocol.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Network Layer4-1 R1 R2 R3R4 source duplication R1 R2 R3R4 in-network duplication duplicate creation/transmission duplicate Broadcast Routing r Deliver.
Multicast Sources: Kurose and Ross cast/addresstranslation_01.html.
CS 268: IP Multicast Routing Ion Stoica April 5, 2004.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
CS 268: Overlay Networks: Introduction and Multicast Ion Stoica April 15-17, 2003.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Lecture 20 – Multicast University of Nevada – Reno Computer Science & Engineering Department Spring 2014 CPE 701 Internet Protocol Design.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Multicast Routing, Error Control, and Congestion Control.
CS 4396 Computer Networks Lab IP Multicast - Fundamentals.
Björn Landfeldt School of Information Technologies NETS 3303 Networked Systems Multicast.
APPLICATION LAYER MULTICASTING
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 21: Multicast Routing Slides used with.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 14 Multicasting And Multicast Routing.
Overlay Networks and Overlay Multicast May Definition  Network -defines addressing, routing, and service model for communication between hosts.
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Internet routing protocols m RIP m OSPF m IGRP m BGP r Router architectures r IPv6 Today: r IPv6.
Multicast Communications
Spring 2006CS 3321 Multicast Outline Link-state Multicast Distance-vector Multicast Protocol Independent Multicast.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
A Case for End System Multicast 學號: 報告人:通訊所 吳瑞益 指導教授:楊峻權 日期: ACM SIGMETRICS.
1 A Case For End System Multicast Yang-hua Chu, Sanjay Rao and Hui Zhang Carnegie Mellon University.
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
1 Group Communications: Reverse Path Multicast Dr. Rocky K. C. Chang 19 March, 2002.
Delivery Categories of Messaging. Messaging Categories Unicast: Messages are sent to a single, specific recipient Multicast: Messages are sent to a group.
1 CMPT 471 Networking II Multicasting © Janice Regan,
COMP/ELEC 429 Introduction to Computer Networks
Multicast Outline Multicast Introduction and Motivation DVRMP.
Overlay Networking Overview.
EE 122: Lecture 22 (Overlay Networks)
IP Multicast COSC /5/2019.
EE 122: Lecture 13 (IP Multicast Routing)
Implementing Multicast
Optional Read Slides: Network Multicast
Presentation transcript:

EE122: Multicast Kevin Lai October 7, 2002

Internet Radio  (techno station) -sends out 128Kb/s MP3 music streams -peak usage ~9000 simultaneous streams only 5 unique streams (trance, hard trance, hard house, eurodance, classical) -consumes ~1.1Gb/s bandwidth costs are large fraction of their expenditures (maybe 50%?) -if 1000 people are getting their groove on in Berkeley, 1000 unicast streams are sent from NYC to Berkeley

Multicast Service Model 1  receivers join a multicast group which is identified by a multicast address (e.g. G)  sender(s) send data to address G  network routes data to each of the receivers S R0R0 R1R R 0 joins G R 1 joins G R n-1 joins G [R 0, data] [R 1, data] [R n-1, data] [R 0, data] [R 1, data] [R n-1, data] Unicast R n-1 Net S R0R0 R1R [G, data] Multicast R n-1 Net

Motivation  Conserve bandwidth -use same bandwidth/link to send to n receivers as 1 receiver internet radio example: reduce bandwidth consumed by 9000/5=1800 -deals with flash crowds -e.g., video/audio conferencing, streaming, news dissemination, file updates  Separate identifier from address (logical addressing) -receiver can change location-dependent addresses without notifying sender -sender doesn’t need to know about receivers -e.g., service location, mobility, anonymity, naming

Multicast Service Model 2  Membership access control -open group: anyone can join -closed group: restrictions on joining  Sender access control -anyone can send to group -anyone in group can send to group -only one host can send to group  Packet delivery is best effort

Multicast and Layering  Multicast can be implemented at different layers -data link layer e.g. Ethernet multicast -network layer e.g. IP multicast -application layer e.g. as an overlay network like Kazaa  Which layer is best?

Multicast Implementation Issues  How are multicast packets addressed?  How is join implemented?  How is send implemented?  How much state is kept and who keeps it?

Ethernet Multicast  Reserve some Ethernet MAC addresses for multicast  join group G -network interface card (NIC) normally only listens for packets sent to unicast address A and broadcast address B -to join group G, NIC also listens for packets sent to multicast address G (NIC limits number of groups joined) -implemented in hardware, so efficient  send to group G -packet is flooded on all LAN segments, like broadcast -can waste bandwidth, but LANs should not be very large  only host NICs keep state about who has joined  scalable to large number of receivers, groups

Problems with Data Link Layer Multicast  single data link technology  single LAN -limited to small number of hosts -limited to low diameter latency -essentially all the limitations of LANs compared to internetworks  broadcast doesn’t cut it in larger networks

IP Multicast  Overcomes limitations of data link layer multicast  Performs inter-network multicast routing -relies on data link layer multicast for intra-network routing  Portion of IP address space defined as multicast addresses addresses for entire Internet  Open group membership  Anyone can send to group -flexible, but leads to problems

IP Multicast Routing  Intra-domain -Distance-vector multicast (DVM) -Link-state multicast (LSM)  Inter-domain -Protocol Independent Multicast (PIM) -Single Source Multicast (SSM)

Distance Vector Multicast  Extension to DV unicast routing  Routers compute shortest path to each host -necessary for unicast delivery  No join required -every link receives a copy, even if no interested hosts  Packet forwarding -iff incoming link is shortest path to source -out all links except incoming -Reverse Path Flooding (RPF) -packets always take shortest path assuming delay is symmetric -link may have duplicates s:2 s s s:1 s:3 s:2 s:3 r r

Reverse Path Broadcasting (RPB)  Extend DV to eliminate duplicate packets  Combine DV and spanning tree  Choose parent router for each link -router with shortest path to source -lowest address breaks ties -each router can compute independently from already known information -each router keeps a bitmap with one bit for each of its links  Only parent forwards onto link s:2 s s s:1 s:3 s:2 s:3 r r P C

Truncated Reverse Path Broadcasting (TRPB)  Extend DV/RPB to eliminate unneeded forwarding  Identify leaves -routers announce that a link is their next link to source S -parent router can determine that it is not a leaf  Explicit group joining -members periodically (with random offset) multicast report locally -hear an report, then suppress own  Packet forwarding -iff not a leaf router or have members -out all links except incoming r1 r2 S S NL LL

Problems with IP Multicast Model  Few groups have many senders -difficult to construct optimal tree for many senders  Hard to implement sender control  any node can send to the group -open group membership  Multicast address scarcity addresses may not be enough for entire Internet -how prevent collisions?

Internet Radio using IP Multicast Model  One sender -does not use multiple sender capability of model  Someone other than Digitally Imported can send to group -clog 9000 clients’ links with useless data (Denial-of- Service attack)  How can Digitally Imported get and keep a multicast address? -central organization to manage addresses adds overhead

Single Source Multicast (SSM)  Network layer multicast  SSM service model -only one sender can send to a group -any number of receivers  Addressing -SSM address = (S, G) S: IP address of source, G: 24- bit group address -each sender has its own G-space

SSM Join  receiver sends join to source  routers on the path read the join packet  they note a receiver on the incoming link r1 r2 S S

SSM Send  router checks that packet is coming from direction of S  if so, forward it down links that have receivers r1 r2 S S r3 S1

SSM v.s. IP Multicast  Restricted to one sender per group -for multiple senders, make multiple groups  Can prevent denial-of-service attacks on group  Senders can independently allocate multicast addresses  Much simpler than other network layer multicast routing schemes

Problems with Network Layer Multicast (NLM)  Scales poorly with number of groups -A router must maintain state for every group that traverses it -many groups traverse core routers  Supporting higher level functionality is difficult -NLM: best-effort multi-point delivery service -Reliability and congestion control for NLM complicated  Deployment is difficult and slow -ISP’s reluctant to turn on NLM  Massive reduction in bandwidth not necessary -Internet Radio is using 1.1Gb/s -network layer multicast would reduce to 5 x 128Kb/s

NLM Reliability  Assume reliability through retransmission  Sender can not keep state about each receiver -e.g., what receivers have received -number of receivers unknown and possibly very large  Sender can not retransmit every lost packet -even if only one receiver misses packet, sender must retransmit, lowering throughput  N(ACK) implosion -described next

(N)ACK Implosion  (Positive) acknowledgements -ack every n received packets -what happens for multicast?  Negative acknowledgements -only ack when data is lost -assume packet 2 is lost S S R1 R2 R3 123

NACK Implosion  When a packet is lost all receivers in the sub-tree originated at the link where the packet is lost send NACKs S S R1 R2 R ?

Application Layer Multicast  Provide multicast functionality above the IP layer  overlay/application layer/end system multicast  sender sends out multiple copies of packet  receivers forward them to other receivers  challenge -minimize delay -minimize bandwidth consumed  Narada [Yang-hua et al, 2000] -Small group sizes <= hundreds of nodes -Typical application: chat  Peercast

Narada: End System Multicast Stanford CMU Stan1 Stan2 Berk2 Overlay Tree Gatech Berk1 Berkeley Gatech Stan1 Stan2 CMU Berk1 Berk2

Performance Concerns  Stretch -ratio of latency in the overlay to latency in the underlying network  Stress -number of duplicate packets sent over the same physical link

Performance Concerns Duplicate Packets: Bandwidth Wastage CMU Stan1 Stan2 Berk2 Gatech Berk1 Delay from CMU to Berk1 increases Stanford Berkeley Gatech Stan1 Stan2 CMU Berk1 Berk2

Properties  easier to deploy than NLM -don’t have to modify every router on path  easier to implement reliability than NLM -use hop-by-hop retransmissions  can consume more bandwidth than NLM  can have higher latency than NLM  not clear which scales better -neither has been used for a group with 1M receivers or 1M groups  can use network layer multicast where available to optimize performance

Summary  Large amount of work on multicast routing  Major problems -preventing flooding -minimizing state in routers -denial-of-service attacks -deployment  Multicast can be implemented at different layers -lower layers optimize performance -higher layers provide more functionality  IP Multicast still not widely deployed -Ethernet multicast is deployed -application layer multicast systems just released