ON DESIGING END-USER MULTICAST FOR MULTIPLE VIDEO SOURCES Y.Nakamura, H.Yamaguchi, A.Hiromori, K.Yasumoto †, T.Higashino and K.Taniguchi Osaka University.

Slides:



Advertisements
Similar presentations
Multicast congestion control on many-to- many videoconferencing Xuan Zhang Network Research Center Tsinghua University, China.
Advertisements

NUS.SOC.CS Roger Zimmermann (based in part on slides by Ooi Wei Tsang) Peer-to-Peer Streaming.
IP datagrams Service paradigm, IP datagrams, routing, encapsulation, fragmentation and reassembly.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Impact Analysis of Cheating in Application Level Multicast s 1090176 Masayuki Higuchi.
MMCN 19 Jan 2005 Ooi Wei Tsang Peer-to-Peer Streaming.
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
A New Approach for the Construction of ALM Trees using Layered Coding Yohei Okada, Masato Oguro, Jiro Katto Sakae Okubo International Conference on Autonomic.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Application layer (continued) Week 4 – Lecture 2.
June, 2002INFOCOM 1 Host Multicast: A Framework for Delivering Multicast to End Users Beichuan Zhang (UCLA) Sugih Jamin (UMich) Lixia Zhang (UCLA)
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Application Layer Multicast
Scalable Low Overhead Delay Estimation Yossi Cohen Advance IP seminar.
A Real-Time Video Multicast Architecture for Assured Forwarding Services Ashraf Matrawy, Ioannis Lambadaris IEEE TRANSACTIONS ON MULTIMEDIA, AUGUST 2005.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Multicast Communication
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Nearcast: A Locality-Aware P2P Live Streaming Approach for Distance Education XUPING TU, HAI JIN, and XIAOFEI LIAO Huazhong University of Science and Technology.
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
1 Study on Adaptation of CDN Request-Routing to Scalable Conference System Toshiyuki KAWASAKI* Koji OKAMURA** * Graduate School of Information Science.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Communication (II) Chapter 4
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-02.txt John Buford, Avaya Labs Research IETF 71.
Establishing Connections Networking Modes: When you are evaluating a network, you concentrate on circuit switching versus packet switching. But it's also.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Streaming over Subscription Overlay Networks Department of Computer Science Iowa State University.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Live Streaming over Subscription Overlay Networks CS587x Lecture Department of Computer Science Iowa State University.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Impact of Topology on Overlay Multicast Suat Mercan.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Fair Layered Coding Streaming Jaime García-Reinoso  Iván Vidal  Francisco Valera University Carlos III of Madrid Alex Bikfalvi IMDEA Networks.
Presentation slides prepared by Ramakrishnan.V LMS: A Router Assisted Scheme for Reliable Multicast Christos Papadopoulos, University of Southern California.
Björn Landfeldt School of Information Technologies NETS 3303 Networked Systems Multicast.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
This paper appears in: Computer Communications and Networks, ICCCN Proceedings.15th International Conference on 指導教授 : 許子衡 報告者 : 黃群凱 1.
APPLICATION LAYER MULTICASTING
CIS679: Multicast and Multimedia (more) r Review of Last Lecture r More about Multicast.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
RELIABLE APPLICATION LAYER MULTICAST OVER COMBINED WIRED AND WIRELESS NETWORKS AUTHORS - MASAHIRO KOBAYASHI, MEMBER, IEEE, HIDEHISA NAKAYAMA, MEMBER, IEEE,
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
Multimedia Communication Systems Techniques, Standards, and Networks Chapter 4 Distributed Multimedia Systems.
Cost-Effective Video Streaming Techniques Kien A. Hua School of EE & Computer Science University of Central Florida Orlando, FL U.S.A.
Optimising Streaming Systems with SDN/P4/NetFPGA
Zueyong Zhu† and J. William Atwood‡
Host Multicast: A Framework for Delivering Multicast to End Users
Computer Networks Protocols
Optional Read Slides: Network Multicast
Presentation transcript:

ON DESIGING END-USER MULTICAST FOR MULTIPLE VIDEO SOURCES Y.Nakamura, H.Yamaguchi, A.Hiromori, K.Yasumoto †, T.Higashino and K.Taniguchi Osaka University † Nara Institute of Science and Technology

ICME July/9/2003 Goal Realizing Multi-party video conferencing systems  Many-to-many multicast application which consists of hundreds of users  User hosts exchange multiple video streams in real-time Efficient use of bandwidth is required Internet

ICME July/9/2003 Application Layer Multicast (ALM) ALM is multicast on overlay networks  End users act as multicast routers  Does not require special hardware such as IP multicast enable routers  Application-specific routing protocols can be designed  More efficient than Unicast because a sender does not need to send data to all receivers Unicast A B C S D A B C S D ALM

ICME July/9/2003 Design Issues Each video uses some amount of bandwidth on overlay networks →In delivering multiple video streams, they compete for bandwidth on overlay links Users may have priority requirements to video streams e.g. users may prefer the speaker’s video than audience’s Internet

ICME July/9/2003 Internet Overlay Network End-user Multicast for Multi-party Application (Emma) New ALM protocol for multi-party communication systems  Users construct overlay networks  Each user host sends its own video continuously and receives some of other user hosts’ video streams on overlay networks  The sending and receiving video streams are controlled based on users’ priority requirement given to the video streams Red

ICME July/9/2003 Users’ Join When a new user wants to join a session, the user gets the current users’ addresses from a central server The user measures delay with these users and establish overlay links with the closest two or three users to construct mesh-like overlay networks Existing routing trees are expanded so that they do not overlap each other as long as they can ECA BD Routing tree can be expanded with small delay from each source less duplication Address Management Server A:133.1.xx.xx B:129.3.yy.yy C: …

ICME July/9/2003 Priority-based Video Delivery Each user specifies a priority requirement as a priority value to each video stream. A request message with a priority value is forwarded to the video source user But there is no enough bandwidth on the path CA B D B: 5 A: 8 C: 6 D:15

ICME July/9/2003 Priority-based Video Delivery In forwarding the message, the followings are calculated step by step  how to stop existing video streams  how to minimize the loss of priority values If the loss of priority value < the gain of priority value by accepting the request  The existing streams are stopped and the new stream is delivered CA B D B: 5 A: 8 C: 6 D:15 The sum of the satisfied priority values becomes larger than before

ICME July/9/2003 Users’ Leave and Failure Even if an user host leaves, trees can be recovered  When a user leaves, the simplest way to recover tree is to let child nodes connect with the parent of the leaving user  However, this may cause the concentration of overlay links to the parent user  To prevent this, each user periodically collects the information of # of overlay links of its descendant users  When a user leaves, its parent can immediately suggest the children of the leaving user where to connect again C A B G HFD E User E leaves D,F,GC,D Recovery can be done quickly without causing unbalanced trees

ICME July/9/2003 Performance Evaluation We have developed a simulator for evaluating performance of Emma  Written in an object oriented scripting language Ruby Network model  Hierarchical topology model based on tiers  146 nodes, 66 users  Users give priority values to video by Zipf’s law

ICME July/9/2003 Users’ Satisfaction The variation of average of satisfied priority value per user  Compared with First-Come-First-Serve (FCFS) method which accepts user requests in a greedy manner  Simulation Scenario Until 5 units of time, 66 users joined After 21 units of time, 1 user joins or leaves at one time

ICME July/9/2003 Users’ Satisfaction Emma achieves 1.5 times higher values than FCFS Under the presence of users’ leave and join, priority values are kept high

ICME July/9/2003 Routing Tree Duplication on Overlay Link # of routing trees on an overlay link  Less duplication is desirable Simple estimation of average duplication in the ideal case  # of users × (# of users -1) / # of total overlay links = about 20 →Measure the # of routing trees on each overlay link

ICME July/9/2003 Routing Tree Duplication on Overlay Link 80% of overlay links have at most 10 routing trees

ICME July/9/2003 Conclusion We have proposed new ALM protocol called Emma  Avoiding resource competition From the experimental results  Higher satisfaction of users than a simple method  Even though some users leave from or join to a session, users’ satisfaction is kept high We have designed and implemented Java middleware based on Emma ( )

ICME July/9/2003