A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast Part 2 of the paper Pavlin Radoslavov, Christos Papadopoulos,

Slides:



Advertisements
Similar presentations
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Advertisements

Directed Diffusion for Wireless Sensor Networking
A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast Pavlin Radoslavov Christos Papadopoulos Ramesh Govindan.
Evaluating Heuristics for the Fixed-Predecessor Subproblem of Pm | prec, p j = 1 | C max.
Fast Algorithms For Hierarchical Range Histogram Constructions
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.
McGraw-Hill Ryerson Copyright © 2011 McGraw-Hill Ryerson Limited. Adapted by Peter Au, George Brown College.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Before start… Earlier work single-path routing in sensor networks
Application Layer Multicast
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Evolutionary Computational Intelligence Lecture 9: Noisy Fitness Ferrante Neri University of Jyväskylä.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
CS218 – Final Project A “Small-Scale” Application- Level Multicast Tree Protocol Jason Lee, Lih Chen & Prabash Nanayakkara Tutor: Li Lao.
Toward Optimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed Network Analysis (DNA) Lab.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Nearcast: A Locality-Aware P2P Live Streaming Approach for Distance Education XUPING TU, HAI JIN, and XIAOFEI LIAO Huazhong University of Science and Technology.
Ji-Yong Shin * Bernard Wong +, and Emin Gün Sirer * * Cornell University + University of Waterloo 2 nd ACM Symposium on Cloud ComputingOct 27, 2011 Small-World.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Slide 1 Comparison of Inter-Area Rekeying Algorithms for Secure Mobile Group Communication C. Zhang*, B. DeCleene +, J. Kurose*, D. Towsley* * Dept. Computer.
A Node-Centric Load Balancing Algorithm for Wireless Sensor Networks Hui Dai, Richar Han Department of Computer Science University of Colorado at Boulder.
A Randomized Error Recovery Algorithm for Reliable Multicast Zhen Xiao Ken Birman AT&T Labs – Research Cornell University.
McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. Chapter 7 Sampling Distributions.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Sampling Distributions.
Network Aware Resource Allocation in Distributed Clouds.
Routing Protocol Evaluation David Holmer
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
An Efficient Approach to Clustering in Large Multimedia Databases with Noise Alexander Hinneburg and Daniel A. Keim.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
VI. Evaluate Model Fit Basic questions that modelers must address are: How well does the model fit the data? Do changes to a model, such as reparameterization,
Aditya Akella The Performance Benefits of Multihoming Aditya Akella CMU With Bruce Maggs, Srini Seshan, Anees Shaikh and Ramesh Sitaraman.
COMPUTING AGGREGATES FOR MONITORING WIRELESS SENSOR NETWORKS Jerry Zhao, Ramesh Govindan, Deborah Estrin Presented by Hiren Shah.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
1 Exploring Custom Instruction Synthesis for Application-Specific Instruction Set Processors with Multiple Design Objectives Lin, Hai Fei, Yunsi ACM/IEEE.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 7 Sampling Distributions.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
1 Chapter 10: Introduction to Inference. 2 Inference Inference is the statistical process by which we use information collected from a sample to infer.
Presentation slides prepared by Ramakrishnan.V LMS: A Router Assisted Scheme for Reliable Multicast Christos Papadopoulos, University of Southern California.
The Influence of Network Topology on the Efficiency of QoS Multicast Heuristic Algorithms Maciej Piechowiak Piotr Zwierzykowski Poznan University of Technology,
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Understanding Your Data Set Statistics are used to describe data sets Gives us a metric in place of a graph What are some types of statistics used to describe.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Slide #1 Performance Evaluation of Routing Protocol for Low Power and Lossy Networks (RPL) draft-tripathi-roll-rpl-simulation-04 IETF Virtual Interim WG.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
Peer-to-Peer Result Dissemination in High-Volume Data Filtering Shariq Rizvi and Paul Burstein CS 294-4: Peer-to-Peer Systems.
Fault Isolation in Multicast Trees Anoop Reddy, Ramesh Govindan, Deborah Estrin. USC/Information Sciences Institute Presented by: Srikrishna Gurugubelli.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Authors: Ing-Ray Chen and Ding-Chau Wang Presented by Chaitanya,Geetanjali and Bavani Modeling and Analysis of Regional Registration Based Mobile Service.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Descriptive Statistics Used in Biology. It is rarely practical for scientists to measure every event or individual in a population. Instead, they typically.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Presented by Alexei Semenov
(How the routers’ tables are filled in)
A Study of Group-Tree Matching in Large Scale Group Communications
Sampling Distributions
Scheduling Jobs Across Geo-distributed Datacenters
COSC160: Data Structures Linked Lists
Replica Placement Heuristics of Application-level Multicast
BIRCH: Balanced Iterative Reducing and Clustering Using Hierarchies
QoS routing Finding a path that can satisfy the QoS requirement of a connection. Achieving high resource utilization.
Presentation transcript:

A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast Part 2 of the paper Pavlin Radoslavov, Christos Papadopoulos, Ramesh Govindan, and Deborah Estrin CSE 770x Fall 2004 Qian Wan following Jing Lu’s Part 1 presentation Thursday, October 21, 2004

Application-level hierarchy vs. Router Assisted hierarchy  SIMULATION RESULTS A. Simulation Setup B. Simulation Results C. Simulation Results Sensitivity  RELATED WORK  CONCLUSION

A. Simulation Setup Diameter: average shortest path between two points in a network. Observation: Average Links/Nodes values are bigger than 2.

A. Simulation Setup details Assume a single-source multicast distribution tree with the source at the root of the tree. Receiver placement sensitivity: random, extreme affinity, extreme disaffinity, extreme clustering(extreme disaffinity for cluster centers, and affinity for receivers belonging to the same center). For ALH, the maximum number of children a parent may have at each level is based on hierarchy creation parameter. Two Application-Level Hierarchy creation approaches: one uses the inter- receiver distance heuristics as in Section II-A, and the other randomly select parents per level and each child chooses randomly its parent. Results averaged across all simulations with 95% confidence interval included. Data recovery latency, exposure, data overhead, and control overhead for a single link loss are measured.

B. RAH and ALH Simulation Results RAH latency decreases when the number of receivers increases, because probability increase that there is a topologically closer replier that has received the data. The ALH-heuristic has similar result as RAH because similar construction of the hierarchy. The ALH-random perform worse as the number of receivers increase because of the parent is further off the shortest path. (Observation)The near linear recovery latency of RAH and ALH-heuristic on Figure 11. match the tree hierarchy. Data recovery time doesn’t change, but the RTT increase linearly as the receivers fraction increase exponentially. RAH exposure is always zero for a single link loss, but not necessary true for multiple link losses. Because for latter case, more than one repliers can exist for the same data. ALH-random outperforms ALH-heuristic in Fig. 12 most of the time. Since in the simulation, only when at least 50% of the children did not receive the data, the parents will use multicast to send the data and generate exposure. ALH-heuristic has same-parent children closer to each other topologically. (Observation)The sacrifice of the exposure measure by its definition of ALH-heuristic comparing to ALH-random actually contributed to the Recovery latency measure.

B. RAH and ALH Simulation Results Results similar for RAH and ALH- heuristic. Data and the control overhead seemed to be almost identical. For RAH, control overhead is about 5% to 10% higher than data overhead because extra control traffic only over the path between a router-turning point and its replier. ALH-random’s overhead increase a lot faster than the other two hierarchies. (Observance) RAH overheads decrease as the receivers fraction increase, and the ALH-heuristic’s overhead actually increase slowly as the receivers fraction increases. Because more receivers for RAH, more closer the same-parent children, and the more efficient and effective use of multicast.

C. Simulation Results Sensitivity 1) ALH Hierarchy Organization Sensitivity Three different hierarchy creation parameter valued 0.02, 0.1 and 0.4 are used for comparison For latency, they are almost the same. For overheads( only data overhead figure is put here because the control overhead is similar), the higher the number of parents a child has to choose from, the smaller overhead. The exposure increases when the number of parents are bigger.

C. Simulation Results Sensitivity 2) Network Topology Sensitivity For the smaller topologies the smallest fraction was or For mesh topology, since the multicast distribution tree is composed of long, skinny branches. So ALH-heuristic parent selection will have a bigger impact in efficiency. (Observation) For mesh, even the recovery latency of RAH is not appearing as a straight line due to the variance of recovery time.

C. Simulation Results Sensitivity 3) Receiver Placement Sensitivity RAH random placement is compared with ALH’s three different receiver placements on average data overhead. Only in the case of extreme clustering placement, there were four times mor more order difference. 4) Link Loss Model Sensitivity Intenet core topology with lossy inter-AS links are simulated among the original three hierarchies. The loss link does not affect the metrics comparing to earlier same loss assumptions.

RELATED WORK Previous comparison Limited scope, topology and analysis Other ALH or RAH schemes ALH: SRM, RMTP, TMTP, LGMP, TRAM RAH:AIM, AER, OTERS, PGM

Conclusion Surprise –ALH scheme can perform reasonably well compared to RAH schemes presumed to be a lot better in terms of average latency in recovery of loss data. Explanation –One possible is the Congruence between a well- constructed application level hierarchy and a router- assisted hierarchy. Thanks goes to Jing, Shobana, Phillip and Dr. Crowley for the discussion.