Multicast Communication Presenter: Jyoti Islam Advisor: Dr. Yanqing Zhang.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Jaringan Komputer Lanjut Packet Switching Network.
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
UNCW UNCW SIGGRAPH 2002 Topic #3: Continuous Media in Wired and Wireless Environments Ronald J. Vetter Department of Computer Science University of North.
TCP/IP Protocol Suite 1 Chapter 15 Upon completion you will be able to: Multicasting and Multicast Routing Protocols Differentiate between a unicast, multicast,
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Group Communication Phuong Hoai Ha & Yi Zhang Introduction to Lab. assignments March 24 th, 2004.
Chapter 4 IP Multicast Professor Rick Han University of Colorado at Boulder
June, 2002INFOCOM 1 Host Multicast: A Framework for Delivering Multicast to End Users Beichuan Zhang (UCLA) Sugih Jamin (UMich) Lixia Zhang (UCLA)
Scalable Adaptive Data Dissemination Under Heterogeneous Environment Yan Chen, John Kubiatowicz and Ben Zhao UC Berkeley.
Application Layer Multicast
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
Multicast Routing in ATM Networks with Multiple Classes of QoS Ren-Hung Hwang, Min-Xiou Chen, and Youn-Chen Sun Department of Computer Science & Information.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Adaptive Web Caching Lixia Zhang, Sally Floyd, and Van Jacob-son. In the 2nd Web Caching Workshop, Boulder, Colorado, April 25, System Laboratory,
MULTICASTING Network Security.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
Network Topologies.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Communication (II) Chapter 4
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Connecting LANs, Backbone Networks, and Virtual LANs
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
ON DESIGING END-USER MULTICAST FOR MULTIPLE VIDEO SOURCES Y.Nakamura, H.Yamaguchi, A.Hiromori, K.Yasumoto †, T.Higashino and K.Taniguchi Osaka University.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Multicasting. References r Note: Some slides come from the slides associated with this book: “Mastering Computer Networks: An Internet Lab Manual”, J.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Locating Mobile Agents in Distributed Computing Environment.
Multicasting Part I© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
 Communication Distributed Systems IT332. Outline  Fundamentals  Layered network communication protocols  Types of communication  Remote Procedure.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 14 Multicasting And Multicast Routing.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CH. 8: SWITCHING & DATAGRAM NETWORKS 7.1.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Buffer Analysis of Live P2P Media Streaming Approaches Atif Nazir BSc ’07, LUMS.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
TCP/IP Protocol Suite 1 Multicasting and Multicast Routing Protocols Differentiate between a unicast and a multicast message Understand multicast link.
22.1 Network Layer Delivery, Forwarding, and Routing.
LAN Topologies Part 1. What is topology? Topology is the physical or logical interconnection of communicating devices Physical Topology: LANtopology,
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
4.5 Multicast Communication
Presentation transcript:

Multicast Communication Presenter: Jyoti Islam Advisor: Dr. Yanqing Zhang

Outline What is multicast communication? Application-level multicasting Gossip-based data dissemination Techniques and applications Current Research Works Future Research Direction 2

Unicast, Broadcast versus Multicast Unicast One-to-one Destination – unique receiver host address Broadcast One-to-all Destination – address of network Multicast One-to-many Multicast group must be identified Destination – address of group Key: Unicast transfer Broadcast transfer Multicast transfer 3

Application-Level Multicasting 4

Nodes organize into an overlay network to disseminate data. Network routers are not involved in group membership. Figure: Overlay Network 5

Overlay Network Tree based design A unique path for every node pair. Mesh network Multiple neighbors of each node. Multiple path between every node pair. 6

Tree based Overlay Network 7

ALM Issues A – root of the multicast tree. A multicasts a message to other nodes: Message traverse,,, twice. How to improve it??? 8

ALM Issues In stead of overlay link B to D; we need to form it from A to C. Double traversal of, would be saved. 9

ALM Quality Measurement 10

ALM Quality Measurement Tree Cost: Minimizing the total link costs. Finding a minimum spanning tree with minimal total time for disseminating information to all node. 11

Research Problem When a new node want to join the multicast group, how to decide it’s parent node? Goal: Select the best member that can operate as new node’s parent. 12

Multicast Group with Single Source Best node is always the source. Stretch = 1 Star topology with source in middle. Source may be easily overloaded. 13

Switch-Trees Helder and Jamin, Idea: A node P can switch parent. Drop the link to current parent. Establish link to new parent. New parent should not have too many immediate children. To limit the load of forwarding messages by any single node. Loop Prevention: New parent can never be a member of the subtree rooted at P. 14

Switch-Trees Also used to optimize the route to source. Minimize delay of message multicasting. If another node is better parent [in terms of delay], initiate switch. To optimize the tree cost- minimize total link cost. 15

Node Failure If parent fails, simply attach to the root. Proceed optimization protocol. 16

Gossip-based Data Dissemination Epidemic Behavior 17

Epidemic Protocols Rapidly propagate information. Large number of nodes. Only local information used. No central component to coordinate information dissemination. 18

Basic Idea 19 INFECT ALL NODES WITH NEW INFORMATION AS FAST AS POSSIBLE.

Some Terms Infected: Node holding data and willing to spread it to other nodes. Susceptible: Node that has not seen data yet. Removed: Updated node not wiling or able to spread data. 20

Two Forms of Epidemics 21

Anti-entropy 22

Gossiping 23

Gossiping Issues Can not guarantee that all nodes will actually be updated. Nodes may refrain themselves to spread the information. Spreading data deletion information is hard. 24

Deleting Values 25

Application of Epidemic Protocols 26

Multicast application examples Financial services Delivery of news, stock quotes, financial indices, etc Remote conferencing/e-learning Streaming audio and video to many participants (clients, students) Interactive communication between participants Data distribution e.g., distribute experimental data from Large Hadron Collider (LHC) at CERN lab to interested physicists around the world 27

Current Research Work 28

Multi Server Approach Variable number of server to meet user demand. Dynamic spilt and merge of server to handle large multicast group. Sukumar, R. "Some studies and analysis of secure multicast communication in wireless environment a multi server approach." (2015). 29

Multimedia communication networks Each of the destination nodes should receive message within a bounded delay. Genetic algorithm for solving the delay-bounded multicast problem. Fast and superior quality solutions to the delay-bounded multicast problem. Ravikumar, C P; Bajpai, Rajneesh, “Source-based delay-bounded multicasting in multimedia”,

Key Management Secure Multicast. Cloud Computing to manage large volume of data in multicast communication. Secure-multicast group key management protocol. Al Beladi, Shoroq Odah, and Firdous Kausar. "Key Management for Secure Multicast Communication in Sensor Cloud." Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp),

Device-to-device (D2D) Multicast Communication Particle swarm optimization (PSO) algorithm based power allocation schemes. Gong, Wenrong, and Xiaoxiang Wang. "Particle Swarm Optimization Based Power Allocation Schemes of Device-to-Device Multicast Communication." Wireless Personal Communications (2015):

Energy-Efficient Cooperative Multicast Communication Base station broadcasts the same information to a group of users in the first phase. Some successful users act as relay to help the failed users in the second phase. Shi, Wuyu, Guodong Zhao, and Zhi Chen. "Relay Selection and Power Control for Energy- Efficient Cooperative Multicast Communication." Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st. IEEE,

Future Research Direction 34

Some Predictions Use of Cloud Computing for data storage and processing. Incorporate in Internet of Things. Multi Server Approach. Device to device communication. Energy Efficiency for Green Computing. 35

Q&A 36

References Distributed Systems: Principles and Paradigms. Andrew S. Tanenbaum Maarten van Steen. Sukumar, R. "Some studies and analysis of secure multicast communication in wireless environment a multi server approach." (2015). McCanne, Steven. "Performing multicast communication in computer networks by using overlay routing." U.S. Patent No. 8,667, Mar Zakaria, Omar, Aisha-Hassan A. Hashim, and Wan H. Hassan. "An Efficient Scalable Batch-Rekeying Scheme For Secure Multicast Communication Using Multiple Logical Key Trees." International Journal of Computer Science and Network Security (IJCSNS) (2014): 35. Vijayakumar, Pandi, Sayan Bose, and Ajaykumar Kannan. "Chinese remainder Theorem based centralised group key management for secure multicast communication." Information Security, IET 8.3 (2014): Ravikumar, C P; Bajpai, Rajneesh, “Source-based delay-bounded multicasting in multimedia”, Gong, Wenrong, and Xiaoxiang Wang. "Particle Swarm Optimization Based Power Allocation Schemes of Device-to-Device Multicast Communication." Wireless Personal Communications (2015): Shi, Wuyu, Guodong Zhao, and Zhi Chen. "Relay Selection and Power Control for Energy-Efficient Cooperative Multicast Communication." Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st. IEEE,