Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.

Slides:



Advertisements
Similar presentations
4/12/2015© 2009 Raymond P. Jefferis IIILect Internet Protocol - Continued.
Advertisements

Computer Networking A Top-Down Approach Chapter 4.7.
Introduction 1 Lecture 22 Network Layer (Broadcast and Multicast) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
Multicast on the Internet CSE April 2015.
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
COS 420 Day 15. Agenda Assignment 3 Due Assignment 4 Posted Chap Due April 6 Individual Project Presentations Due IEPREP - Jeff MANETS - Donnie.
1 Internet Networking Spring 2004 Tutorial 7 Multicast Routing Protocols.
1 Internet Networking Spring 2006 Tutorial 7 DVMRP.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public BSCI Module 7 Lesson 3 1 IP Multicasting: Multicast Routing Protocols.
Network Layer4-1 Spanning trees r Suppose you have a connected undirected graph m Connected: every node is reachable from every other node m Undirected:
COS 420 Day 18. Agenda Group Project Discussion Program Requirements Rejected Resubmit by Friday Noon Protocol Definition Due April 12 Assignment 3 Due.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 23 Introduction to Computer Networks.
Chapter 4 IP Multicast Professor Rick Han University of Colorado at Boulder
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
CS 268: IP Multicast Routing Kevin Lai April 22, 2001.
Internet Networking Spring 2002
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
EE689 Lecture 12 Review of last lecture Multicast basics.
Wolfgang EffelsbergUniversity of Mannheim1 Multicast IP Wolfgang Effelsberg University of Mannheim September 2001.
1 CSE 401N:Computer Network LECTURE-14 MULTICAST ROUTING.
MULTICASTING Network Security.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
© J. Liebeherr, All rights reserved 1 IP Multicasting.
Computer Networks 2 Lecture 1 Multicast.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Network Layer4-1 R1 R2 R3R4 source duplication R1 R2 R3R4 in-network duplication duplicate creation/transmission duplicate Broadcast Routing r Deliver.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
CS 268: IP Multicast Routing Ion Stoica April 5, 2004.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
CS 5565 Network Architecture and Protocols Godmar Back Lecture 22.
Methods and Needs for Multicast Applications
Broadcast and Multicast. Overview Last time: routing protocols for the Internet  Hierarchical routing  RIP, OSPF, BGP This time: broadcast and multicast.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Chapter 15 Multicasting and Multicast Routing
Kurt Windisch -- University of OregonIETF GATED -- December 7, PIM Dense Mode GateD Implementation Kurt Windisch Dave Meyer Advanced Network Technology.
Computer Science 6390 – Advanced Computer Networks Dr. Jorge A. Cobb Deering, Estrin, Farinacci, Jacobson, Liu, Wei SIGCOMM 94 An Architecture for Wide-Area.
Multicast Routing Protocols. The Need for Multicast Routing n Routing based on member information –Whenever a multicast router receives a multicast packet.
Distance-vector Multicast Routing Protocol (DVMRP)
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Multicast Routing, Error Control, and Congestion Control.
IP Multicast COSC Addressing Class D address Ethernet broadcast address (all 1’s) IP multicast using –Link-layer (Ethernet) broadcast –Link-layer.
Broadcast and multicast routing. R1 R2 R3R4 source duplication R1 R2 R3R4 in-network duplication duplicate creation/transmission duplicate Broadcast Routing.
Introduction to Multicast Routing Protocols
1 © 2000, Cisco Systems, Inc _05_2000_c2 Server Router Unicast Server Router Multicast Unicast vs. Multicast.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #7 DVMRP.
Multicasting Ju Seong-ho Previous work behind main one.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 21: Multicast Routing Slides used with.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 14 Multicasting And Multicast Routing.
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Internet routing protocols m RIP m OSPF m IGRP m BGP r Router architectures r IPv6 Today: r IPv6.
Multicasting  A message can be unicast, multicast, or broadcast. Let us clarify these terms as they relate to the Internet.
Network Layer4-1 Chapter 4 roadmap 4.1 Introduction and Network Service Models 4.2 Routing Principles 4.3 Hierarchical Routing 4.4 The Internet (IP) Protocol.
Multicast Communications
Spring 2006CS 3321 Multicast Outline Link-state Multicast Distance-vector Multicast Protocol Independent Multicast.
1 Protocol Independent Multicast (PIM) To develop a scalable protocol independent of any particular unicast protocol –ANY unicast protocol to provide routing.
IP Multicast Lecture 4: PIM-SM Carl Harris Communications Network Services Virginia Tech.
1 Group Communications: Reverse Path Multicast Dr. Rocky K. C. Chang 19 March, 2002.
22.1 Network Layer Delivery, Forwarding, and Routing.
Multicasting protocols
Multicast Outline Multicast Introduction and Motivation DVRMP.
(How the routers’ tables are filled in)
THE NETWORK LAYER.
UNIT III ROUTING.
IP Multicast COSC /5/2019.
EE 122: Lecture 13 (IP Multicast Routing)
Implementing Multicast
Optional Read Slides: Network Multicast
Presentation transcript:

Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms n Steiner Tree (ST) algorithm n Shared tree algorithms

Multicast Routing

Construction of Distribution Tree in Case of Many Sources  For forwarding multicast packets across internet, we should use multicast protocols  Several algorithms may be used by the protocols  In case of many sources the multicast routing algorithms can handle the distribution of the packets in three ways: n Primitive methods –Flooding –Spanning Tree n Source Based Tree –Forward Shortest Path –(Reverse Path Forwarding (RPF) algorithms – not detailed) –Steiner Trees (ST) n Shared Tree –Center Based Trees (CBT)

Primitive Methods n These do not take into account: –the multicast traffic refers to different multicast groups –which group member is sender and which is receiver n Such are the Flooding and the Spanning Tree algorithms n These are regarded as basic procedures –They are used as building blocks of the more sophisticated algorithms regarding construction of distribution tree

Flooding n When the router receives a multicast packet first it checks whether it has already met with this n If this is the first occasion, the router forwards it to its all interfaces, except that from which the packet arrived n If it has already met with that packet, the router will drop it out n In such a way all router will get the packet once at least n Its disadvantages: –It generates high number multiplied packets –It wastes network bandwidth –Every router must maintain table of the lately arrived packets, which requires a huge memory

Flooding n When a router receives a packet, the router will determine whether it’s the first time it receives the packet. If so, the packet will be delivered to all interfaces except the one on which it arrived, otherwise the packet will be discarded. n No routing tables needed n Inefficient use of bandwidth

The Operation of the Flooding

Spanning Tree  Only one active path connects any two of routers  The multicast packets will not loop and reach all routers  May not provide the most efficient path between the source subnetwork and group members

Spanning Tree

The Operation of the Spanning Tree Algorithm

n Distribution trees – Source tree n Uses more memory O(N S x N G ) but you get optimal paths from source to all receivers, minimizes delay – Shared tree n Uses less memory O(N G ) but you may get suboptimal paths from source to all receivers, may introduce extra delay Multicast Routing Algorithms—Characteristics

Source Based Tree n Each source creates its own distribution tree n The advantages of such a kind of algorithms are –the higher end-to-end power »E.g., smaller delay –sharing the traffic load coming from each source on the network n Disadvantage is that each router must generate large routing table, since one routing item is needed for each source and each group

Forward Shortest Path n In case of link-state unicast routing algorithms every router know the whole network topology –Thus they can calculate the shortest path form the source to the receivers n This tree is different from the reverse shortest path (later) if the links are non- symmetrical

Reverse Path Forwarding n What is RPF? –A router forwards a multicast datagram if received on the interface used to send unicast datagrams to the source B C AF SourceReceiver Unicast Multicast DE

Reverse Path Forwarding n If the RPF check succeeds, the datagram is forwarded n If the RPF check fails, the datagram is typically silently discarded n When a datagram is forwarded, it is sent out each interface in the outgoing interface list n Packet is never forwarded back out the RPF interface!

Shortest Path or Source Distribution Tree Receiver 1 E BADF Source Notation: (S, G) S = Source G = Group C Receiver 2

The Reverse Path Forwarding (RPF) Algorithm-Family n These forward packet on their output interfaces if and only if the packet arrived on the interface, which is on the shortest path to the source n The “reverse path” naming is originated from the fact that after the multicast tree was built, the routers have to listen to the reverse path to the multicast source –If a packet arrive in an other interface, which is not in the shortest path to the source, the packet will be dropped out by the router

Finding the Shortest Path n If a packet comes and another packet has already arrived on a shorter way from the sender, then the new packet will be dropped out n But if the new packet arrived in the shorter path, from this point its path is the current shortest path n It is important, since the packet must carry the IP addresses of the routers along the path, and in case of longer path the size of the packet increases n This algorithm does not need any additional method to prevent against the packet multiplication, e.g., automatic hop count limiting mechanism, since the algorithm automatically limits the path of the packets to the shortest path

The RPF Tree Rooted in the Router A

The RPF Tree Rooted in the Router C

The Different Reverse Path Forwarding (RPF) Algorithms n Reverse Path Forwarding/Flooding/Broadcast (RPF) n (Sophisticated/Extended) Reverse Path Broadcast (RPB) n Truncated Reverse Path Broadcast (TRPB) n Reverse Path Multicast (RPM)

Reverse Path Forwarding/Flooding/Broadcast (RPF)

RPF A local router only accepts packets from the ‘nearest’ source (parent), otherwise the packets are discarded. Accepted packets will be forwarded to all interfaces except the source It does not take into account multicast group membership when building the distribution tree, so packets may be forwarded to non-membership subnetwork

(Sophisticated/Extended) Reversed Path Broadcast (RPB)

The RPB Tree

Truncated Reverse Path Broadcast (TRPB)

Truncated Reverse Path Broadcasting (TRPB) G1 G2 G3 Truncated Source, G1 It’s an enhancement of RPB With the help of IGMP, multicast routers determine the group membership on each leaf subnetwork, thus avoiding forwarding packets to non- members Eliminates unnecessary traffic on leaf subnetworks, but does not consider group memberships when building the branches of the distribution tree

TRPB Based Multicast Delivery

Reverse Path Multicasting (RPM)  RPM creates a delivery tree that spans only Subnetworks with group members, andSubnetworks with group members, and Routers along the shortest path to subnetworks with group membersRouters along the shortest path to subnetworks with group members  First packet will be sent to all interfaces except the source. If none of the subnetworks connected to the leaf router have group members, the leaf router may transmit a "prune" message on its parent link informing the upstream router not to forward packets in this group to the leaf  In RPM, ‘first packet’ still needs to be forwarded throughout the network.  Each router has to maintain state information for all groups. It will be impossible as the number of groups and sources increases.

Reversed Path Multicast (RPM)

Building The Distribution Tree using RPM

Steiner Trees (ST)

Shared Tree n The all sources sends the packet to the same tree n The same tree distributes the all packets n This algorithm concentrates the traffic to the small set of the network connections n This algorithm is not optimal if all sources are active in the same time –E.g., distributed interactive simulation application n This algorithm works well, when the source operates alternatively –E.g., audio-conference n Its advantage is that it needs one item per group, only n Such algorithm is e.g., Center Based Trees

Center Based Trees (CBT)  If a host wants to join one group, it has to send a unicast “join request” message to the core.  Compared to previous algorithms, CBT can use bandwidth and router resources more efficiently  CBT may result in traffic concentration and bottlenecks near core routers since traffic from all sources traverses the same set of links as it approaches the core  A single shared tree may create trees not as optimal as source-trees

Operation of the Center Based Trees (CBT) Algorithm

Shared Distribution Tree Receiver 1 B E A D (Shared Root) F Source 1Notation: (*, G) * = All Sources G = Group C Receiver 2 Source 2

Center Based Multicast Distribution Tree

Comparison of the properties related to the construction of the distribution tree

Comparison of the properties related to the traffic on the tree