Seminar Mobilkommunikation Reliable Multicast in Wireless Networks

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Advertisements

William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Gursharan Singh Tatla Transport Layer 16-May
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 Transport Layer Computer Networks. 2 Where are we?
CIS 725 Wireless networks. Low bandwidth High error rates.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Huda AL_Omairl - Network 71 Protocols and Network Software.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Types of Service. Types of service (1) A network architecture may have multiple protocols at the same layer in order to provide different types of service.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Internet Architecture. 2 INTRODUCTION INTERNET developed by a community of researchers centered around the Defense Advanced Research Projects Agency (DARPA)
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Computer Networks 1000-Transport layer, TCP Gergely Windisch v spring.
Process-to-Process Delivery:
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
1 Group Communications: Host Group and IGMP Dr. Rocky K. C. Chang 19 March, 2002.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 CMPT 471 Networking II Multicasting © Janice Regan,
The Transport Layer introduction fundamental problems in networking
The Transport Layer Implementation Services Functions Protocols
Chapter 9: Transport Layer
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
Instructor Materials Chapter 9: Transport Layer
Networking Devices.
Scaling the Network: The Internet Protocol
5. End-to-end protocols (part 1)
Process-to-Process Delivery, TCP and UDP protocols
Lec 2: Protocols.
PART 5 Transport Layer Computer Networks.
TCP/IP Transmission Control Protocol / Internet Protocol
Chapter 6: Transport Layer (Part I)
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Transport Layer Unit 5.
Sarah Diesburg Operating Systems COP 4610
CSE 4340/5349 Mobile Systems Engineering
Chapter 14 User Datagram Protocol (UDP)
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Stream Control Transmission Protocol (SCTP)
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Multimedia and Networks
Process-to-Process Delivery:
Dr. John P. Abraham Professor UTPA
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
NT1210 Introduction to Networking
Switching Techniques.
Dr. John P. Abraham Professor UTPA
Andy Wang Operating Systems COP 4610 / CGS 5765
CPEG514 Advanced Computer Networkst
CSE 313 Data Communication
CS4470 Computer Networking Protocols
Scaling the Network: The Internet Protocol
Computer Networks Topic :User datagram protocol Transmission Control Protocol -Hemashree S( )
Lecture 21 and 22 5/29/2019.
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Error Checking continued
Transport Layer 9/22/2019.
Presentation transcript:

Seminar Mobilkommunikation Reliable Multicast in Wireless Networks 1 . General points about reliable multicast 2 . A protocol designed for reliable multicast in wireless networks Christophe Le Roquais 16.07.2002

What is Multicast? One sender and a group of receivers Applications: Video-conferences Distribution of news Software updates Multi-players games et cetera... Typical problems: How to address group members? Reliability

Reliability in the Transport Layer The Transport Layer enables two end-system applications to communicate. For example, TCP is a protocol designed to offer a reliable packet transmission between two machines. Error recovery Transport layer treats lost, erroneous, duplicated packets. Waiting of an acknowledgement from the receiver (ACK) Flow control The receiver sends a „window“ (reception capacity) with each ACK Packet order Receiver can reorder packets due to the sequence number

Reliability classes Multicast cannot be the sum of unicast connections. Otherwise there will be a traffic congestion. Unreliable No check of the packet delivery Partial-reliable k-reliable K group members are expected to receive packets correctly statistically reliable A percentage of all group members is expected to receive packets correctly sufficiently reliable Unknown number of receivers who received packets correctly. At least 1 group member received the packet. Reliable Every group member receives packets without errors, no duplicated message and in the correct order

Delivery Orders Packet delivery order is a major aspect in reliable multicast. There are four delivery order classes : FIFO order or source order If a group member sends a message m2 after sending a message m1, then any group member that delivers both messages delivers first m1 and then m2 Causal order (includes FIFO order) If the transmission of a message m2 causally follows the transmission of a message m1, then any group member that delivers both messages delivers first m1 and then m2 Total order (includes FIFO and Causal orders) Any two group members that deliver a pair of messages m1 and m2, deliver them in the same order, e.g either they both deliver m1 before m2, or they both deliver m2 before m1 Global order (includes FIFO, Causal and Total orders) Every group member delivers messages in the same order as they were sent

Example: FIFO order

Example: Causal order

Example: Total order

Global order

Wireless Network Architecture A wired backbone Wired stations: Coordinators (C) Manage a few of MHs Coordinator Boss (CB) Manage the whole network Mobile Support Stations (MSS) Gateways between the wired backbone and mobile hosts Mobile Hosts (MH) User terminals (laptops, PDAs...)

A Protocol for Reliable Multicast G. Anastasi, A. Bartoli and F. Spadoni have designed a reliable protocol for reliable mobile multicast. Features: Multicast communication is reliable: All multicast messages are delivered and there are no duplicates The sender of multicast datagram may select among FIFO order, Causal order and Total order The set of senders and receivers may be dynamic: A mobile host may join and leave such group at will Each group member is associated to a Coordinator C Cell switchings of MHs do not trigger any message exchange in the network

Messages structure The protocol uses eight important messages. The Tag is the first field of each message. It indicates the nature of the message. Tag From To Use JOIN MH CB For joining the group NEW C For multicasting in the group NACK MSS Notify about missing multicast datagrams ACK Acknowledge that a message has arrived at MSS NORMAL C or CB Propagate a multicast or a membership change STABINFO Propagate stability information JOINSYNC Allocate data structures at coordinators JOINOK Communicate initial sequence number

Dynamic membership Actions at MH Actions at Coordinators MH sends a JOIN message to CB. This message includes a unique member identifier Mid composed of the MAC-address and of a unique number Actions at Coordinators CB receives a JOIN message from a new MH CB sends a JOINSYNC message to all coordinators. CB choose a coordinator C for the new MH and sends a NORMAL message to every MSSs C adds MH in its member list and responds to CB with a JOINOK message Actions at MSSs MSSs add the new MH in their member lists

Sending of a FIFO/Causal ordered message Mid sends a NEW message to the local MSS The MSS replies with an ACK The MSS forwards the message to the coordinator (C1) associated with MH1 C1 changes the TAG of the NEW message to NORMAL, appends a sequence number and multicasts it to all MSSs MSSs broadcast the NORMAL message to MHs A MH which receives a NORMAL message determines if it has to be buffered or delivered 6’. F-Cast : a MH delivers the NORMAL message if MH has already delivered the last message sent by C1 6’’. C-Cast : same condition as F-Cast and if MH has already delivered all messages sent by every Ci. NEW message includes delivered array.

Sending of a Total ordered message Mid sends a NEW message to the local MSS The MSS replies with an ACK The MSS forwards the message to the coordinator (C1) associated with MH1 C1 changes the TAG of the NEW message to NORMAL, appends a sequence number and sends it to CB CB appends a sequence number and multicasts the resulting message to MSSs and C1 A MH which receives a NORMAL message determines if it has to be buffered or delivered T-Cast : a MH delivers the NORMAL message if : MH has already delivered the last message sent by C1 MH has already delivered the last-1 message sent by CB MH has already delivered all messages sent by every Ci

A MH receives a NORMAL message (details)

Summary Reliable multicast is a powerful communication primitive for structuring distributing programs The protocol is a reliable multicast protocol for distributed mobile systems that supports dynamic membership The protocol accomodates three delivery ordering guarantees: FIFO, Causal and Total