prof. younghee lee 1 computer networks u chap. 6 qos and multicast 전산학과 교수 이영희

58
1 Prof. Younghee Lee Computer Networks Chap. 6 QoS and Multicast 전전전전 전전 전전전

Upload: philip-norman-melton

Post on 14-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

1Prof. Younghee Lee

Computer Networks Chap. 6 QoS and Multicast

전산학과

교수 이영희

Page 2: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

2Prof. Younghee Lee

DistributedSimulation

DistanceLearning

VideoConferencing

Games

Why Is It Not Happening?

Network QoS model is too primitive.

– Large gap between network and application QOS

– Too low level; hard to use Applications have insufficien

t information about the network to make informed decisions.

– Am I using a modem or a gigabit Ethernet?

– Where can I get more bandwidth

Service providers have little control over how their traffic is handled.

– No customization

User User

Too ComplexNo

InformationNo Control

Page 3: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

3Prof. Younghee Lee

Internet Traffic: Inelastic Traffic Traffic which does not easily adapt to changes in delay and throughput across the Internet: real time traffic Requirements

– Throughput: A minimum throughput value– Delay: delay sensitive: ex) stock trading– Jitter: delay variation: teleconference require a reasonable upper bound on jitter– Packet loss: the amount of packet loss sustainable

New requirements – some means to give preferential treatment to applications with more demanding requirements.

» Application need to be able to state their requirements, either ahead of time or on the fly: stating ahead of time is preferable(negotiating) » elastic traffic must still be supported in times of congestion, inelastic traffic will continue to supply a high load, and elastic traffic will be crowded off the Internet

Page 4: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

4Prof. Younghee Lee

Admission Control Admission control deciding when the addition of new people would

result in reduction of utility– Basically avoids overload

Problem: It requires the concurrence of all the nodes situated along the path– need global information

» not practical: diverse requirement of MM application. Broadcasting information in real time:

hard Large latency at gigabit speed: obsolete, inconsistent

Node Admission Control(NAC): the process of deciding whether a node can admit a new connection

Issues in admission control– the parameter specified by the user may not be correct. Conservative? -> low

utilization– admit new traffic taking into consideration the statistical smoothing effects?– Traffic existing in the network can be calculated from the user specified

characteristics or be based on actual measurement?» Admission control based on measurement: achieve high utilization

observation interval: window -> window size? ;issue decision made based on the past behavior + measured data

Page 5: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

5Prof. Younghee Lee

How Things Fit Together

Admission Control

Data InData Out

Con

trol P

lan

eD

ata

Pla

ne

Scheduler

Routing Routing

MessagesRSVP

messages

Classifier

RSVP

Route Lookup

Forwarding Table Per Flow QoS Table

Page 6: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

6Prof. Younghee Lee

ISA Service level a number of general categories of service are provided

– Guaranteed: hard real-time (“real-time” applications)» For intolerant and rigid applications» Fixed guarantee, network meets commitment as long as clients send at match traffic agreement

– Control load: soft real-time (“tolerant and adaptive” applications)» network to client: similar performance as an unloaded best-effort network» client to network: the session does not send more than it specifies» Two components

If conditions do not change, commit to current service If conditions change, take steps to deliver consistent performance (help apps minimize playback delay) Implicit assumption – network does not change much over time

» video: adaptive by dropping a frame or delaying the output stream slightly» voice: adaptive by adjusting silent periods.

– Best effort: (“elastic” applications)

Page 7: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

7Prof. Younghee Lee

Packet Scheduling

Network meet promises by scheduling– Queuing at router– Token bucket filter to characterize traffic

Possible Uses1. Shaping

Delay packets from entering point

2. Policing May drop packets that arrive without token or Marking: Let all pkts pass through with marking

Page 8: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

8Prof. Younghee Lee

Token bucket Token bucket traffic scheme

– A token replenishment rate R: specifies the continually sustainable data rate– A bucket size B: specifies the amount by which the data rate can exceed R for short period of

time– During any time period T, the amount of data sent cannot exceed RT + B– Bucket: represent a counter that indicates the allowable number of octets

» Bucket fills with octet tokens at the rate of R

Page 9: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

9Prof. Younghee Lee

ISA Services Token bucket traffic scheme

– two counters: token counter, counter to implement the timer– major advantage: simplicity – P :peak rate, A :average rate, R :token rate– A peak rate limiting spacer is implicit: R– P > R > A: – Maximum burst size: b’

» b(t)= B + (R-P) x t : assuming token is full at the beginning» 0 = B + (R-P) x t -> t = B/(P-R) -> b’ = Pt = B/(1- R / P)

Page 10: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

10Prof. Younghee Lee

Scheduling: Queuing discipline Drawbacks to the FIFO queuing discipline

– No special treatment to packets from flow of higher priority such as delay sensitive traffic flow – larger average delay per packet than if the shorter packets were transmitted before the longer packet. Flows of larger packets get better service – A greedy TCP connection can crowd out altruistic connections. Ex) RTO backoff in congestion

Fair Queuing– A router maintains multiple queues at each output port– round robin, skip over empty queues. Load-balancing, protect greedy..

Page 11: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

11Prof. Younghee Lee

Processor sharing Drawbacks of fair queuing scheme

– Short packet are penalized » one packet per cycle

Processor sharing– transmit one bit from each queue on each round

» not practical to implement » : value of R(t) when packet i in queue alpha ends transmission

BRFQ– solve the problem in FQ: “short packet are penalized”

» BRFQ: uses packet length as well as flow identification– designed to emulate PS– rule: whenever a packet finishes transmission, the next packet sent is the one with the

smallest value of .– Good approximation to the performance of PS. Figure 11.10

iF

])(,max[

;

roundeach of rate;)](max[1,

1)()('

1

iii

iii

RFS

PSF

tNtR

dt

dtR

iF

Page 12: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

12Prof. Younghee Lee

Processor sharing

PS

BRFQ

Page 13: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

13Prof. Younghee Lee

Bit-round Fair Queuing(BRFQ)

Page 14: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

14Prof. Younghee Lee

Generalized Processor Sharing Motivation

– BRFQ can’t provide different amount of the capacity to different flows.– Differential allocation capacity;

» To support QoS transport GPS

– provides a means of responding to different service requests– each flow is assigned a weight that is the number of bits transmitted from the queue during each round.

sizeBucketBratetokenRdelayDwhereR

BD

rateserviceCg

RFS

PSF

iiiii

ii

jj

ii

iii

i

iii

,,max

;

])(,max[

;

1

Page 15: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

15Prof. Younghee Lee

Weighted Fair Queuing(WFQ) WFQ

– provide different amount of the capacity to different flows.– designed to emulate GPS– rule: whenever a packet finishes transmission, the next packet sent is the one with the smallest value of .

iflowofpaththeonnodesallthroughflowsallforlengthpacketL

mnodeatcapacitylinkoutgoingCsizepacketLnodeofnumberK

sizeBucketBratetokenRdelayDwhere

C

L

R

LK

R

BD

RFS

PSF

mii

iiii

K

m mi

ii

i

ii

iii

i

iii

i

_max

,_max,

,,max

)1(

])(,max[

;

max

1

max

1

iF

Page 16: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

16Prof. Younghee Lee

Summary

Isolation– Isolates well-behaved from misbehaving sources

Sharing– Mixing of different sources in a way beneficial to all

Mechanisms:– WFQ

» Great isolation but no sharing» fairness

– FIFO» Great sharing but no isolation» Efficiency

Page 17: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

17Prof. Younghee Lee

Resource Reservation (RSVP)

RSVP Characteristics(1)– Unicast and multicast: make reservation for both– simplex:– receiver-initiated reservation

» ATM, FR: the source requests a given set of resources reasonable in a unicast environment but inadequate for multicasting; diff

erent resource requirements(subflow) QoS requirements of different receivers may differ depend on the output

device, processing power, and link speed of the receiver.

» A sender provides the routers with the traffic characteristics. The receivers specify the desired QoS.

– maintaining soft state in the internet» hard-state approach: a connection-oriented scheme:, fixed route

» soft-state approach: RSVP reservation state

Page 18: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

18Prof. Younghee Lee

Resource Reservation (RSVP) The call setup process and per-element call behavior

Page 19: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

19Prof. Younghee Lee

Differentiated Services

Standardizing “Services” or Packet Forwarding “Behavior”? – To deploy a new service, you have to upgrade the world– A router can’t actually do many different things to a packet

=> standardizing forwarding behavior(“send this packet first” or “drop this packet last”)

=> Behaviors + Rules = Services => flexibilityflexibility

=> No per flow state, resource reservation => scalabilityscalability

=> Better-than-best-effort service to applicationsBetter-than-best-effort service to applications, without the need for host RSVP signaling(Few hosts in today’s Internet are able to generate RSVP signaling. Users may only want to specify a more qualitative notion of the service they require)

* Think in terms of IP Forwarding/Routing architectural separation

Page 20: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

20Prof. Younghee Lee

Differentiated Services Edge functions: packet classification and traffic conditioning

– packet marking, forwarding immediately/delayed/dropped– passes: VIP pass...

Core function: forwarding according to per-hop behavior– packet marking: the class of traffic(the behavior aggregate) – obviates the need to keep router state for individual source-

destination pairs

Page 21: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

21Prof. Younghee Lee

Differentiated Services Traffic Classification and conditioning

– DS field: IPv4 Type of Service field, IPv6 Traffic Class field– DSCP: per-hop behavior; class of traffic– simple packet classification and marking

– packet classification and traffic conditioning at the edge router

Page 22: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

22Prof. Younghee Lee

Differentiated Services Edge Router

– Traffic Conditioning Agreement(TCA): describes the rules and traffic profiles required for conditioning

– Classification: Identifying the flow the packet belongs to– Metering: Measuring the temporal properties of a flow– Shaping: Delaying and/or dropping packets so that a flow confirms to

it’s profile.– Marking: Setting the code point in the packets that have been shaped

– Edge router need to understand RSVP » interoperability with IntServ domains must be ensured» RSVP can be used as a signaling mechanism for provisioning and configuration.

– Service Level Agreement(SLA): an agreement between a customer and the DS domain. TCA is a subset of SLA

» other details: Routing constraint, encryption requirements etc.» Edge routers are responsible for interfacing with the customers by executing SLAs» Bandwidth Broker helps the Edge routers in the admission control of the SLAs.

Page 23: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

23Prof. Younghee Lee

Differentiated Services Per-Hop behavior

– a description of the externally observable forwarding behavior of a DS node applied to a particular DS behavior aggregate

» PHB defines differences in performance» does not mandate any particular mechanism for achieving these behavior» differences in performance must be observable, and measurable

– Expedited Forwarding: can be used to construct services with quantitative guarantees

» EF PHB specifies that the departure rate of an aggregate class of traffic from a router must equal or exceed a configured rate

» minimum guaranteed link bandwidth

– Assured Forwarding» four classes: each class is guaranteed to be provided with some minimum amount of

bandwidth and buffering» within each class, packets are further partitioned into one of three “drop preference”» Could be used as a building block to provide different levels of service to the end

systems: Olympic-like service; qualitative services like better than best effort

Page 24: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

24Prof. Younghee Lee

Differentiated Services

Core Router– DS Codepoint(DSCP): Edge routers classify and stamp the packets w

ith appropriate DSCP– DSCP is translated into a PHB

» can be many codepoint to one PHB

» may vary from one DS domain to another

– PHB: » Basic building block for service construction.

» Resources are allocated to PHB

Page 25: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

25Prof. Younghee Lee

Differentiated Services Bandwidth Broker

– Responsible for resource management in a DS-domain.– Repository for domain wide policies.– Serves as an authenticating agent for users.– Maintains the global state of the DS domain.– Make sure that the number of simultaneous uses of the PHBs fit within th

e resource allocation. Also helps the edge routers in admission control– controls provisioning and configuration of all nodes.– Actual implementation can be

» Centralized: easy to implement; but known problems in terms of performance, scalability, fault tolerance

» Distributed: hard to implement and get it right

– Can be thought as the brain or the control center for a DS domain.

Page 26: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

26Prof. Younghee Lee

Differentiated Services Service Creation

– DS architecture, lets you create a wide variety of services.

Service– The overall treatment of a customer’s traffic within a DS domain or from

end-to-end– can be

» Quantitative: virtual leased line» Qualitative: Olympic service(Gold, Silver, Bronze)» Neither: BW allocated to class A is always double that of class B

Scope of service: The topological extent of the service– From a given ingress point

» to a given egress point, to a given set of egress point, to any egress point.(Open-ended Scope)

– From a egress point» from a given ingress point, from a given set of ingress point, from any ingress point(open-

ended point)

Page 27: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

27Prof. Younghee Lee

Differentiated Services Research Issues

– BB: Centralized Vs. Distributed.» Efficient collection and maintenance of global state of the domain» coordination and consistency in case of distributed implementation» suitable algorithms for completely automated resource management and admissio

n control.(measurement based?)

– SLA and TCA» details that go into SLA/TCA and their format» protocols for automatic SLA negotiation» accommodating dynamically changing SLAs» SLA conflict resolution

– Implementation of PHBs(E.g.: EF)» choice of scheduler» buffer management strategies(how much to allocate?)

– multicast: dynamic multicast groups make provisioning difficult– security: Denial of service attacks are easy

Page 28: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

28Prof. Younghee Lee

Differentiated Services

RED with In or Out (RIO)– Has two classes, “In” and “Out” (of profile)

» “Out” class has lower Minthresh, packets are dropped from this class first Based on queue length of all packets

– As avg queue length increases, “in” packets are also dropped

» Based on queue length of only “in” packets

Page 29: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

29Prof. Younghee Lee

Approaches for QoS in the Internet IPv4 TOS: not widely implemented in the current systems

– service request is associated with individual packet rather than sequence of packets. So may not be meaningful always.

– Service offerings have been tied to the implementation Diffserv: Layer 3 only Label switching: MPLS: specifies ways that layer 3 traffic can be mapped to

CO layer 2 transports like ATM and FR– QoS state is set up on a Hop-by-Hop basis– also helps in speeding up of forwarding process– overhead of setting up and maintaining the labeled paths

Intserv/RSVP Cost: Compatibility:

• MPLS can be an intra-domain implementation technology

Page 30: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

30Prof. Younghee Lee

Multicast

Packets sent by a sender are received by more than one receiver.– Network replicates the packet

– Limits the communication overhead on the sender, making it possible to send to a large number of receivers

– Potentially reduces bandwidth consumption in the network Union” of point-to-point paths.

– combine message over shared links Many issues/challenges.

– How (receiver) multicast group membership managed?

– How do we route packets?

– How do routers forward multicast packets?

“Optimizations possible but difficult if the receivers are not known.– model used in internet

R

R

R

R

R

RR

RS

Page 31: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

31Prof. Younghee Lee

Requirements for Multicasting A convention for identifying a multicast address

– IPv4: class D addresses. 32-bit; 1110 + 28-bit group identifier– IPv6: 128-bit; 8-bit prefix(all 1s)+4-bit flags+4-bit scope+112-bit group id

» flags: permanently assigned or not» scope field: ranging from a single subnetwork to global

A router must translate between an IP multicast address and a subnetwork multicast address Individual host informs routers of its inclusion in and exclusion from the group for dynamic multicast address generation . Routers must exchange two sorts of information: => routing protocol

– Subnetworks include members of a given multicast group.– Information to calculate the shortest path

A routing algorithm to calculate shortest paths Each router must determine multicast routing paths on the basis of both source and destination addresses Anonymity Dynamic join/leave

Page 32: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

32Prof. Younghee Lee

Multicast Routing Source-Based Tree

– Shortest path tree for each sender: DVMRP, MOSPF, PIM-DM– Shortest path trees – low delay, better load distribution– More state at routers (per-source state)

– Efficient for in dense-area multicast Group-shared tree

– center-based approach: center node( rendezvous point or core)* How to select the center?

– Steiner Tree problem: finding a minimum cost tree: not popular * information needed: all links in the network, must rerun whenever link costs change, performance is but one of many concerns – Higher delay (bounded by factor of 2), traffic concentration– Choice of core affects efficiency– Per-group state at routers– Efficient for sparse-area multicast

Major concern might be: extra state in routers

Page 33: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

33Prof. Younghee Lee

Group Management

Management strategy depends on usage.– how quickly does membership change?– restrictions on membership– size of the group

Internet: focus on large groups that can change rapidly and with little control over membership.– distributed algorithm (scalability, again)– receiver-initiated management (scalability, again)

» Receiver initiated reliable multicast protocols(end-to-end); NACK implosion

– sender does not have list of receivers (scalability, again)

Page 34: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

34Prof. Younghee Lee

Group Management Internet Group Management Protocol (IGMP).

– Routers jointly keep track of membership– Relies on multicast (e.g. Ethernet) in leaf networks– Protocol defines how receivers contact routers to join a group– Operates locally between a host and an attached router– IGMPv2 Message types

» Membership query» Membership report» Leave group

– Feedback suppression» After receiving a membership_query message and before sending a

membership_report message, a host waits a random amount of time between 0 and the maximum response time value defined in IGMP message.

» Some other attached host reports -> suppress(discard) its own pending report(waiting)

– Soft state– Joining a multicast group: receiver driven

Page 35: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

35Prof. Younghee Lee

Routing Approaches Create a spanning tree to all routers and prune the tree for each specific

multicast group– Begin by flooding traffic to entire network– pruning critical to reduce traffic. (Grafting)– scaling is a concern

– Examples: DVMRP, PIM-DM– Unwanted state where there are no receivers

Link-state multicast protocols– Routers advertise groups for which they have receivers to entire network– Compute trees on demand– Example: MOSPF– Unwanted state where there are no senders

Core-based multicast routing– create tree for each multicast address with root in the center of the network– multicast messages are sent to the root, which forwards them down the tree– scales better, but potentially less efficient and less robust– CBT, PIM-SM

Page 36: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

36Prof. Younghee Lee

Routing Protocol

Routing protocols– IGMP: a protocol that enable hosts to join and leave multicast group– DVMRP: Distance Vector Multicast Routing Protocol. – MOSPF: extension to the OSPF for multicast routing within an AS.– PIM: Protocol Independent Multicast– BGMP: for interdomain multicast routing.

Page 37: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

37Prof. Younghee Lee

Routing: Group shared tree Single routing tree for the entire multicast session Steiner Tree problem: finding a minimum cost tree: not popular

* information is needed about all links in the network

* needs to be re-run whenever link costs change Center-based approach: center node(rendezvous point or core)

* process used to select the center- chosen so that the resulting tree is within a constant factor of optimum

* CBT, sparse-mode PIM, BGMP

A single, shared tree

two source-based tree

A minimum cost multicast tree

Constructing a center-based tree(E:center)

Page 38: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

38Prof. Younghee Lee

Core-Based Trees(CBT) CBT multicast routing protocol

– group-shared tree with single core» Unidirectional tree/ bi-directional tree, Core placement/selection, Multiple core, Dynamic core…

– Core forwards over multicast tree– Operation

» sends a JOIN_REQUEST message towards the tree core» The core(or the first router that receives the message) respond with JOIN_ACK» maintained by having a downstream router send keepalive messages(ECHO_REQUEST)» immediate upstream router responds with ECHO_REPLY message» FLUSH_TREE: if no ECHO_REPLY received

Page 39: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

39Prof. Younghee Lee

Routing: Source-based tree

Shortest path tree: DVMRP, Dijkstra’s algorithm– requires that each router know the state of each link in the network– compute the least cost path tree from the each source to all destina

tion– Good delay property, Per source and group overhead

Page 40: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

40Prof. Younghee Lee

Routing: Source-based tree RPF(reverse path forwarding)

– When a router receives a multicast packet with a given source address, it transmits the packet on all of its outgoing links(except the one on which it was received) only if the packet arrived on the link that is on its own shortest path back to the sender.

– Otherwise the router simply drops the incoming packet without forwarding it on any of its outgoing links. => avoid flooding loop

» Need to know unicast shortest path to the sender. Not the shortest path from the source to itself(assumption:symmetric). Asymmetric case?

Page 41: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

41Prof. Younghee Lee

Routing: Source-based tree RPF(reverse path forwarding)

– RPB: Reverse Path Broadcasting– TRPB: Truncated Reverse Path Broadcasting: router truncate its transmission to the local network if none of the hosts attached to the n

etwork belong to the multicast group. Leaf router only– RPM: Reverse Path Multicasting: with IGMP

» pruning: A multicast router that receives multicast packets and has no attached hosts joined to that group will send a prune message to its upstream router.

If there were 1000 routers downstream from D; (initial Mbone) Grafting message to its upstream router to cancel its earlier prune message

Page 42: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

42Prof. Younghee Lee

Internet Group Management Protocol (IGMP) IGMP: used by hosts and routers to exchange multicast group membership information over a LAN Message format: Figure 15.4

– version, type, checksum, group address(0 in a request message, valid group address in a report message) IGMP Operation

– to join a group: host sends an IGMP report message.» Group address field: destination address field of IP header» All member hosts will receive the message, and learn of the new member.

– to maintain a valid current list: multicast router periodically issues a IGMP query message, sent in an IP datagram with an all-hosts multicast address. Must respond with a report message to remain a member.

– Multicast router needs to know that there is at least one group member still active. Not need to know the identity of every host in group.» Any host hears: if some host reports -> cancels report. if no report within the timeout -> sends report.

– Group Membership with IPv6» IGMP:IPv4» ICMPv6: includes all of the functionality of ICMPv4 and IGMP.

* ICMP: Internet Control Message Protocol

Page 43: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

43Prof. Younghee Lee

Distance Vector Multicast Routing Protocol (DVMRP)

DVMRP:– source-based trees with reverse path forwarding, pruning, and grafting. Use distance vector algorithm to compute shortest

path back to source» Not from source to the members

– Data stream reaches all LANs (possibly multiple times). If a router is attached to a set of LANs that do not want to receive a particular multicast group, the router can send a "prune" message back up the distribution tree to stop subsequent packets from traveling where there are no members.

– Since new hosts may want to join the multicast group at any time, DVMRP must periodically re-flood. This creates a scaling problem, especially if pruning not effective or not implemented.

Page 44: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

44Prof. Younghee Lee

Distance Vector Multicast Routing Protocol (DVMRP)

DVMRP implements its own unicast routing protocol (similar to RIP) to determine which interface leads back to the source of the data stream. The path that the multicast traffic follows may not be the same as the path that the unicast traffic follows. (asymmetric case?)

DVMRP has been used to build the MBONE by building tunnels between DVMRP-capable machines. DVMRP: de-facto Interdomain multicast protocol DVMRP is state of the art today.?

Page 45: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

45Prof. Younghee Lee

Multicast Extensions to Open Shortest Path First (MOSPF)

MOSPF: enhancement to OSPF for the routing of IP multicast datagram within an AS. MOSPF works only in internetworks that are using OSPF.

– MOSPF is best suited for environments that have relatively few source/group pairs active at any given time. It will work less well in environments that have many active sources or environments that have unstable links.

Operation:– Each router floods information about local group membership to all other routers in its area.(Each router attached to a LAN uses IGMP to maintain a correct picture of

local group membership).» Using Dijkstra’s algorithm, each router constructs the shortest-path spanning tree from a source network to all network containing members of a multicast group.; done only on demand.

(When it receives a multicast datagram)– For any hop that is across a broadcast network such as LAN, an IP multicast datagram is transmitted inside a MAC-level multicast frame.

Equal-cost Multipath Ambiguity: tiebreaker rule

Page 46: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

46Prof. Younghee Lee

Multicast Extensions to Open Shortest Path First (MOSPF)

Interarea multicasting– OSPF: backbone, area, border router– Each router within a area only knows about the multicast groups that have members in its area.– Interarea multicast forwarder:

» subset of an area’s border routers» forward group membership information and multicast datagrams between areas

receives the multicast link status reports, knows all of the multicast group in the area backbone routers exchange the information on multicast group also wild-card multicast receiver. Receive all multicast datagrams generated in an area

Page 47: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

47Prof. Younghee Lee

Multicast Extensions to Open Shortest Path First (MOSPF)

Inter-AS multicasting– MOSPF has no responsibility for multicasting beyond its AS.– Responsible for providing multicast group information to outside entities and for accepting multicast

datagrams for groups contained within its AS.» Boundary router: inter-AS multicast forwarders.(+ MOSPF + OSPF)» It receive all multicast datagrams from within the AS; wild-card multicast receiver» reverse-path routing: to get the knowledge of the source of a datagram.

Assumes that source X (outside the AS) will enter the MOSPF AS use to send a unicast datagram to X

Page 48: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

48Prof. Younghee Lee

Protocol Independent Multicast (PIM) PIM

– to provide a more general solution to multicast routing.– Independent of any existing unicast routing protocol– designed to extract needed routing information from any unicast routing protocol and may work across multiple ASs with a number of different unicast routing protocol– supports two different types of multipoint traffic distribution patterns.

PIM strategy– many multicast members, many subnetworks within a configuration have the members of a given multicast group => frequent exchange of group membership information is justifi

ed => data-driven– widely scattered members => flooding of multicast group information is inefficient => receiver-driven => a center based approach– dense-mode protocol: for multicast routing within AS; potential alternative to MOSPF . uses flood-and-prune Reverse Path Forwarding and looks a lot like DVMRP. However, dens

e-mode PIM is that PIM works with whatever unicast protocol is being used – sparse-mode protocol: for inter-AS multicasting routing??

Page 49: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

49Prof. Younghee Lee

Protocol Independent Multicast (PIM) Sparse-Mode PIM

center-based approach1. For a multicast group, a router is designated as a rendezvous point (RP)2. A group destination router sends a Join message to the RP. Requesting router uses a unicast shortest-path route to send message. The reverse of path become part of

the distribution tree from RP to destinations.3. A group source router sends packets to RP using unicast shortest-path route.– From RP to the multicast receivers, shared tree is used minimizing the number of packets replicated.– PIM allows a destination router to replace the group-shared tree with a shortest-path tree to any source.(source-specific tree); Once it receives a packet from the source,

it send a Join message back to the source router => sends Prune message to RP – The selection of an RP is dynamic.– RP placement is not a critical issue.

Page 50: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

50Prof. Younghee Lee

Protocol Independent Multicast (PIM)

Page 51: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

51Prof. Younghee Lee

Inter-domain Multicast Routing(BGMP) The case that different AS’s choose to run different multicast routing protocols

– IETF idmr working group – DVMRP: defacto interdomain multicast routing protocol

» not well suited to the sparse set of routers participating in today’s Internet Mbone

– group-shared tree approach toward routing» problem: a center could conceivably be chosen in a domain that does not contain any hosts in the multicast group : third party dependency(No pr

oblems in the intradomain case) “unfairly” burden the domain which has no interest in the multicast group performance dependencies on domains outside of those participating in the group

Page 52: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

52Prof. Younghee Lee

Overlay Multicast: ALM Potential benefit over IP multicast

– Quick deployment– All multicast state in end systems– Computation at forwarding points simplifies support for higher level functionality

Concerns– closely matched to real network topology to be efficient?– Performance

» Increase in delay

– Bandwidth waste (packet duplication)

Page 53: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

53Prof. Younghee Lee

Mobile IP

Communicate with mobile hosts using their home IP address.– should be transparent to applications and higher level protocols– minimize changes to host and router software

Each area has a home agent and foreign agent that managing packet forwarding.– binding = (IP address, foreign agent address) – binding includes time stamp

Try to short circuit the home location by going directly to the foreign agent.– cache bindings in the appropriate places– protocol to update/invalidate caches– security considerations

Page 54: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

54Prof. Younghee Lee

Mobile IP in IPv4 Registration process

– mobile host registers with home and foreign agent

– cache bindings: address, care-of-address

Tunneling is used to forward packets between agents.

Supporting mobility– invalidating old caches explicitly or

in a lazy fashion Many variants and optimizations

possible.– Mobile host can be its own foreign

agent, e.g. can get local addresses– Source can redirect packet directly

to foreign agent

Source

HomeAgent

ForeignAgent 1

ForeignAgent 2

Page 55: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

55Prof. Younghee Lee

Mobile IP Goals

IP address encodes the host’s network.– Simplifies routing in the common case: look only at network

identifier, but not not at the host id– Makes special cases hard, e.g. what happens when the host

moves?

Communicate with mobile hosts using their “home” IP address.– should be transparent to applications and higher level protocols

Minimize changes to host and router software– No changes to communicating host

Security should not get worse.

Page 56: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

56Prof. Younghee Lee

Mobile IP (IPv4)

Home network has a home agent that is responsible for intercepting packets and forwarding them to the mobile host.– E.g. router– Forwarding is done using tunneling

Remote network has a foreign agent that manages communication with mobile host.– Point of contact for the mobile host

Binding ties IP address of mobile host to a “care of” address.– binding = (IP address, foreign agent address) – binding includes time stamp

Page 57: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

57Prof. Younghee Lee

Mobile IP Operation Agents advertise their presence.

– Using ICMP or mobile IP control messages

– Mobile host can solicit agent information– Mobile host can determine where it is

Registration process: mobile host registers with home and foreign agent.– Set up binding

Tunneling– forward packets to foreign agent– foreign agent forwards packets to

mobile host Supporting mobility

– invalidating old caches in a lazy fashion

Source

HomeAgent

ForeignAgent 1

ForeignAgent 2

Page 58: Prof. Younghee Lee 1 Computer Networks u Chap. 6 QoS and Multicast 전산학과 교수 이영희

58Prof. Younghee Lee

Optimizations

Mobile host can be its own the foreign agent.– mobile host acquires local IP address

– performs tasks of the mobile agent Short circuit the home location by going directly to

the foreign agent.– Routers in the network store cache bindings and

intercept and tunnel packets before they the mobile host’s home network

– Need a protocol to update/invalidate caches

– Raises many security questions and is not in the standard