Adaptive Hybrid Multicast with Partial Network Support

Size: px
Start display at page:

Download "Adaptive Hybrid Multicast with Partial Network Support"

Transcription

1 Adaptive Hybrid Multicast with Partial Network Support Huan Luo and Khaled Harfoush Department of Computer Science North Carolina State University Raleigh, NC,USA Abstract In this paper, we propose a new multicast scheme, PAM, which as opposed to native IP multicast, does not require all routers to be IP multicast-enabled, and as opposed to existing application-level multicast, does not exclude network support. Instead, PAM relies on partial network support, selects a small subset of routers as PAM-enabled multicast routers that are strategically located to serve group communication, and adapts its selection based on group dynamics. As a result, PAM (1) is suitable for both sparse and dense communication groups, (2) can reduce the network overhead inherent in native IP multicast, and (3) does not suffer the delay stretch and the high stress inherent in application-level multicast. Experimental results on both synthetic and realistic Internet topologies, for both sparse and dense groups, reveal that PAM can achieve efficient group communication with no delay stretch, an average stress of merely 1.25, while using less than 15% of the multicast routers that are needed in native IP multicast. Index Terms IP Multicast, Application Layer Multicast, stress, delay stretch. I. INTRODUCTION Group communication is required to support popular distributed applications such as IPTV and distributed gaming. Efficient group communication results in pleasant user experience by avoiding unnecessary stretch in communication delays, and a better use of the network by avoiding unnecessary stress on network resources. IP multicast was proposed to support efficient group communication. However, IP multicast is not widely deployed due to its overhead. Specifically, native IP multicast requires (1) all routers to be IP multicast enabled, and (2) each router to maintain a multicast routing table per communicating group. The multicast routing table is updated as group members join and leave, which consumes network resources especially when the number of co-existing groups is large. To counter the limitations of IP multicast, several group communication approaches have been proposed [5]. (1) Small Group Multicast (SGM) [2] tries to remove the burden of running multicast routing protocols and maintaining multicast state for small multicast groups from the network. In SGM the multicast state is carried in each data packet and is processed in real time along the forwarding path. Similarly, Reunite [11] employs recursive unicast to fulfill the multicast functionality. (2) Application-level multicast (ALM) does not assume network support [12], [1], [14], [4], [], [15], [16], [17]. Instead, it relies on self-organizing group members in an overlay and communication between nodes is through other overlay members using unicast packets. As a result, ALM communication incurs extra communication delay and induces stress on network resources. It has been shown that ALM with strategically located proxies may work better than pure ALM [8]. Both SGM and ALM do not scale to large groups. (3) Hybrid multicast schemes [18], [19], [9], [7] connect IP multicast islands through unicast tunnels in order to limit the IP multicast overhead in the network. For example, [13] relies on connecting branching routers in a multicast delivery tree through unicast tunnels. In this paper, we propose a new hybrid multicast scheme, PAM, which as opposed to native IP multicast, does not require all routers to be IP multicast-enabled, and as opposed to ALM, does not exclude network support. Instead, PAM relies on partial network support, selects a small subset of routers as PAM-enabled multicast routers that are strategically located to serve group communication, and adapts its selection based on group dynamics. As a result, PAM, as opposed to existing hybrid multicast schemes, is suitable for both sparse and dense communication groups. PAM also reduces the network overhead inherent in native IP multicast, and does not suffer the delay stretch and the high stress inherent in applicationlevel multicast. Experimental results on both synthetic and realistic Internet topologies, for both sparse and dense groups, reveal that PAM can achieve efficient group communication with no delay stretch, an average stress of merely 1.25, while using less than 15% of the multicast routers that are needed in native IP multicast. The rest of the paper is organized as follows. In Section II we overview the PAM architecture. In Section III, we provide the details of the PAM protocol. In Section IV we present and discuss the experimental results. We finally conclude in Section V. II. ARCHITECTURE OVERVIEW A node acting as the source of the PAM multicast transmission is expected to advertise the group ID defined as <source IP address, port number> through a well-known web page. The multicast group may also be assigned a class D multicast

2 Fig. 1. A content delivery tree. address and the mapping between the class D address and the group ID can be done through session directory services [21]. A content delivery tree rooted at the source node, with group members at its leaves, is constructed as group members join the system Refer to Section III for the tree construction details. As shown in Figure 1, the delivery tree may have some routers acting as PAM multicast routers, which we refer to as m-routers, and the other routers being unicast routers, which we refer to as u-routers. Each router, R, whether it is an m-router or a u-router, maintains IP address information about its closest m-router for this group along each downstream interface, and if no m-router exists along a downstream interface, then R also maintains information about all groups members that are reachable through this downstream interface over the delivery tree. We refer to the nodes for which a router, R, maintains IP address information as R s children, and refer to R as their parent. For example, in Figure 1, routers M 0, M 1 and M 2 are m-routers. Router M 0 s children are group members G 0, G 3 and m-routers M 1 and M 2. Router M 1 s children are group members G 1 and G 2. Router M 2 s children are group members G 4, G 5, G 6 and G 7. Routers U 0, U 1, U 2, U 3, U 4 and U 5 are u-routers. G 0 is a child for U 0 and for U 1. M 1 is a child for U 2 and U 3. G 4 and G 5 are the children for U 5. G 4, G 5, and G 6 are the children for U 4. Furthermore, each router maintains information about its parent in the tree, which is typically an m-router, and the number of hope towards the parent. Each m-router creates an IP tunnel with each of its children. Upon receiving content from the source, whether directly or through intermediate routers, an m-router creates and sends a copy to each of its children through the corresponding tunnel (IP-in-IP encapsulation). The arrows in Figure 1 show the tunnels used by each m-router. Note that if an m-router, M, has a directly connected child, which is also an m-router then M can simply send an IP multicast packet, using the group s class D address, to this child instead of doing IPin-IP encapsulation. For example, M 0 in Figure 1 can send IP multicast packets to M 2. On the other hand, children information at u-routers are not used to route/tunnel PAM multicast packets. Instead, they are used merely to decide whether they should switch to m-routers or not. Thus u-routers will forward tunneled packets from their upstream parents in the tree just like typical unicast routers do. That is, u-routers, as opposed to m-routers, forward one packet at a time without the overhead of replicating and sending content to multiple destinations. The question now is: How are m-routers selected? Or more specifically, what triggers a u-router s decision to convert to an m-router? To answer this question, notice that if all routers are m-routers, then there will be no extra stress at any link (the delivered content will traverse each link only once) but all routers will have to participate in the multicast content replication and routing. On the other hand, If all routers are u-routers, then the stress on many links will be high (content copies are likely to traverse the same links many times) but routers will merely forward packets with no multicast overhead. Notice that in either case, there is no extra delay stretch as is the case in ALM, and the tradeoff is between network stress and multicast overhead. PAM exploits this tradeoff. In other words, PAM will introduce m-routers only to reduce high stress. High stress will happen in the following two scenarios: A u-router, R, having a large number of children (high degree). The reason for the high stress in this case is that an upstream m-router, M, will have to duplicate packets for all R s children and these copies will all travel over the links connecting M to R, leading to the high stress over these links. The solution to the high stress in this case is to convert R into into an m-router. Figure 2(A) shows this case when R is a u-router compared to an m-router. A u-router, R, having (1) at least two children, and (2) having a large number of upstream u-router hops towards its parent (an m-router) in the tree. The reason for the high stress in this case is that R s parent will have to duplicate and send packets for all R s children over the large number of hops connecting R s parent to R. The solution to the high stress in this case is to convert R into into an m-router. Figure 2(B) shows this case when R is a u-router compared to an m-router. PAM resolves these high stress cases by converting problematic u-routers to m-routers through two thresholds: (1) A degree threshold, and (2) a hop threshold. If the number of children of a u-router exceeds the degree threshold, or if the number of upstream hops from a u-router to its m-

3 Fig. 2. Illustration of high stress due to (A) high degree and (B) high number of upstream u-router hops. router parent in the tree exceeds the hop threshold, then the router is converted into an m-router. Note that the information maintained at each router, the children and the number of hops towards the parent, is used to test whether the degree and hop thresholds are violated or not. The tree in Figure 1 is constructed with a degree threshold equal to four and a hop threshold equal to two. By varying these thresholds, PAM becomes varies in its aggressiveness in assigning multicast routers and managing the stress on the network resources, and adapts the locations of these multicast routers to the locations of the group members in the delivery tree. III. PROTOCOL DETAILS PAM mainly relies on the following messages: (1) join, (2) graft, and (3) prune. All these messages are sent upstream in the delivery tree. Routers, which are not willing to run the PAM protocol are not problematic to PAM routers as all messages are tunneled through them. PAM routers (u-routers and m-routers) maintain their children and parent information as soft state. Join messages are sent periodically to update the routers state. This information expires after some time period and is purged from routers if not updated. Leave, graft, and prune messages are triggered by a change of the state maintained at PAM routers as explained below. Join messages from nodes joining the system are unicasted towards the source node in order to construct/update the delivery tree. Join messages cary a protocol ID field in the IP header that is representative of the PAM protocol, and some additional PAM fields to identify the message type, the multicast address, etc. A Join message destined to the source of a multicast group G is eventually intercepted by an m- router for group G, a u-router, or the source itself, which also acts as either a u-router or an m-router. Upon receiving a join message, a u-router, U, adds the IP address information of the joining node to its own list of children. If the number of children of U does not exceed the degree threshold, D, and if the number of upstream u-routers from U to its parent does not exceed the hop threshold, H, then U forwards the join message upstream. Otherwise, if the degree threshold or the hop threshold is violated, then U converts into an m-router and sends a prune message upstream. The prune message contains U s list of children so that upstream routers remove U s children from their own list of children and append U itself to their list. Upon receiving a join message, an m-router, M, adds the IP address information of the joining node to its own list of children, but does not send the join message further upstream in the tree. When the degree threshold and/or the hop threshold at an m-router become non-violated then the router reverts back to a u-router and sends a graft message upstream to implant his children in the upstream routers. Upon receiving a prune message at a u-router, R, the router removes the list of nodes provided in the prune message from its own list of children and appends the IP address of the node originating the message to its list of children. The prune message is then forwarded to upstream routers. Upon receiving a prune message at an m-router, M, the router removes the list of nodes provided in the prune message from its own list of children and appends the IP address of the node originating the message to its list of children. The prune message is not forwarded any further. Upon receiving a graft message at a u-router, R, the router appends the list of nodes provided in the graft message to its own list of children and removes the IP address of the node originating the message from its list of children. The graft message is then forwarded to upstream routers only if R will not convert to m-router. Upon receiving a graft message at an m-router, M, the router appends the list of nodes provided in the graft message to its own list of children and removes the IP address of the node originating the message from its list of children. The graft message is not forwarded any further.

4 STAR Fraction of multicast routers avg. stress DVMRP 1 1 max. stress 1 max. fanout 1 Fig. 3. Performance of the multicast strategies on the GTITM topology as the increases. A. Simulation Setup IV. PERFORMANCE EVALUATION We test the performance of PAM on (1) a synthetic topology using the GTITM Internet topology generator [3] and (2) a real snapshot of the Internet topology collected on PlanetLab []. GTITM employs a transit-stub model to generate router-level topologies. In our experiment, the GTITM topology has one transit domain with 5 transit nodes, 5 stub domains per transit node, and nodes in each stub domain. The total number of nodes in the graph is 5. In our study of the GTITM topology, we generate 25 different instances, with different random seeds on 5 topologies, each with random group members. Each result is an average of the 25 runs. Group members only belong to stub domains. We vary the between and 0 to represent various group densities. The PlanetLab topology was obtained by collecting path information between 598 PlanetLab nodes using the traceroute tool. However, blocked ICMP messages and unresponsive routers have lead to incomplete traceoute path information and we were able to get complete path information between only 364 nodes. The traceroute probing between these 364 nodes revealed 8530 distinct IP addresses. We then performed alias resolution on these IP addresses, through reverse DNS queries, in order to reveal the IP addresses that belong to different interfaces of the same router. As a result, we only had 75 routers connecting the 364 PlanetLab nodes. In our simulations, we attach group members to these routers uniformly at random. In our study of the PlanetLab topology, as in the GTITM case, we generate 25 different instances, and each result is an average of 25 runs on these instances. In our experiments on the GTITM and PlanetLab topologies, we capture the following performance metrics: (1) the fraction of multicast routers, (2) the maximum fanout, (3) the maximum stress, (4) the average stress. The maximum fanout is the maximum node degree. The stress is defined as the maximum number of duplicate copies of the multicast content transmitted on any network link. Given a fraction of multicast routers, p, and an average stress, s, we estimate a protocol effectiveness as s.p. The smaller the value of s.p the better. For example, if the number of multicast routers is reduced to half (p = 0.5), and the average stress is doubled (s = 2), then the effectiveness becomes 1. PAM can obtain an average stress of s = 1.25 using only 6% of the existing routers as multicast routers (p = 0.06) leading to an effectiveness of We compare PAM with (1) DVMRP [22], (2) [13], and (3) STAR. DVMRP is network level multicast protocol in which all routers are multicast enabled. creates tunnels

5 Fraction of multicast routers avg. stress max. stress 30 max. fanout Fig. 4. Performance of PAM on the GTITM topology as we vary the threshold values, D and H. only between branching routers and thus only assumes that these branching routers are multicast capable. STAR represents the other end of the spectrum in which no routers are multicast enabled and the source sends content directly to all group members through unicast transmission. PAM, DVMRP,, and STAR all do not lead to delay distortion; DVMRP and both also do not lead to network stress; STAR results in more stress than the other three protocols; and PAM adaptively adapts the number and the location of multicast capable routers to attain minimal stress. B. Performance Results Recall that PAM relies on two thresholds: The degree threshold, D, and the hop threshold, H. We refer to PAM(D,H) as the PAM protocol using the D and H threshold values. PAM(,H) refers to the PAM protocol when D =, that is when the degree threshold is not considered in the clustering decision at PAM routers. Similarly, PAM(D, ) refers to the case when the hop threshold is not considered. In Figure 3 we compare the performance of the different multicast strategies as we vary the multicast on the GTITM topology. For each measured performance metric, we plot three curves for the PAM protocol to highlight the impact of the degree and path thresholds. Specifically we plot the results for,, and PAM (5, ). The curves in Figure 3 show that (1) Combining the degree and hop thresholds leads to better performance with relatively less multicast routers than using only one of the thresholds. (2) PAM is able to reduce the number of multicast routers dramatically with minimal impact on performance. For example, PAM uses less than 50% the multicast routers than, and only % to 15% of the multicast routers in DVMRP with roughly similar stress and fanout. The average stress for PAM was only 1.25 while STAR has a stress as high as 6. (3) As the increases, the benefits of using PAM become more prevalent. In Figure 4 we plot the performance of the PAM protocol on the GTITM topology as we vary the degree threshold, D, when the is 500 and the hop threshold, H is equal to 2 and to 4. The results clearly show PAM s ability to trade multicast state/routers for performance. Specifically, when the threshold values increase, the number of multicast routers decreases, while the stress and fanout values increase. We have also tested a skewed distribution of the multicast group members in the GTITM topology, following a Zipf distribution, instead of placing them uniformly at random. Our results follow our intuition that the performance is better than in the uniform distribution case. In Figure 5 we compare the performance of the different

6 STAR Fraction of multicast routers avg. stress DVMRP max. stress 50 max. fanout Fig. 5. Performance of the multicast strategies on the PlanetLab topology as the increases. multicast strategies as we vary the multicast on the PlanetLab topology. The results have similar trends as those observed in Figure 3. The number of PAM routers remains about half the multicast routers and is reduced to around 6% of the DVMRP multicast routers, with an average stress of 1.1. By comparing the results on the GTITM and PlanetLab, it is clear that the PAM edge is more pronounced on the PlanetLab topology. This is due to the difference between the GTITM and PlanetLab topology structures. GTITM generates a fat tree with a low diameter (around 9), while PlanetLab has a diameter above 30. So on PlanetLab there is more chance for clustering nodes by multicast routers. The results obtained by varying the PAM threshold values are similar to those obtained on the GTITM topology. V. CONCLUSION AND FUTURE WORK In this paper, we introduce PAM, a hybrid network multicast scheme which can adapt the configuration of the multicast delivery tree thus delivering a performance close to IP multicast with no delay stretch and minimal network stress, with only a small fraction of the multicast enabled routers required for native IP multicast. PAM excels in realistic Internet topologies. There are numerous possible extensions to PAM. Adapting the threshold values with the underlying topology and is one direction. Implementing and testing PAM in a realistic Internet setup is another. REFERENCES [1] Suman Banerjee, Bobby Bhattacharjee, Christopher Kommareddy Scalable Application Layer Multicast, Proceedings of ACM Sigcomm 02, Pittsburgh, Pennsylvania, August 02 [2] Rick Boivie,Nancy Feldman,Christopher Metz, Small Group Multicast: A New Solution for Multicasting on the Internet,IEEE Internet Computing, vol.04,no.3,pp.75-79,may,00. [3] K. Calvert, M. Doar and E. W. Zegura. Modeling Internet Topology, IEEE Communications Magazine, June [4] Y. Chu, S. Rao, and H. Zhang. A Case for End System Multicast, in ACM SIGMETRICS 00. Santa Clara, CA, USA,June 00. [5] A. EI-Sayed, V. Roca, A survey of proposals for an alternative group communication service, IEEE Network, 03, 17(1): [6] A. Garyfalos, K. Almeroth, and J. Finney,A Comparison of Network and Application Layer Multicast for Mobile IPv6 Networks, in Proceedings of the 6th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems(mswim 03),San Diego,CA,September,03. [7] Dongkyun Kim, Ki-Sung Yu, A Scalable Hybrid Overlay Multicast Adopting Host Group Model for Subnet-Dense Receivers International Journal of Computer Science and Network Security(IJCSNS 07). [8] Li Lao, Jun-Hong Cui, Mario Gerla and Dario Maggiorini, A Comparative Study of Multicast Protocols: Top, Bottom, or In the Middle?, in Proceedings of Eighth IEEE Global Internet Symposium (GI 05,in conjunction with INFOCOM 05), Miami, Florida, March, 05 [9] Shaofei Lu, Jianxin Wang, Guanzhong Yang, Chao Guo, SHM: Scalable and Backbone Topology-Aware Hybrid Multicast,ICCCN 07, Honolulu, Hawaii,USA, Aug. 07.

7 [] M. Castro, P. Druschel, A. Kermarrec, A. Nandi, A. Rowstron, A. Singh, SplitStream: high-bandwidth multicast in cooperative environments, Proceedings of the nineteenth ACM symposium on Operating systems principles, October 19-22, 03, Bolton Landing, NY, USA. [11] Ion Stoica, T. S. Eugene Ng, Hui Zhang, REUNITE: A Recursive Unicast Approach to Multicast,INFOCOM 00, Tel-Aviv, Israel, March 00. [12] Su-Wei Tan, Gill Waters, John Crawford, MeshTree: A Delay-optimised Overlay Multicast Tree Building Protocol,INFOCOM 05,Miami, Florida, March, 05. [13] Jining Tian, Gerald Neufeld, Forwarding State Reduction for Sparse Mode Multicast Communication,INFOCOM 1998,San Francisco, CA, USA, March,1998. [14] Duc A. Tran, Kien Hua, Tai Do, ZIGZAG: An Efficient Peer-to- Peer Scheme for Media Streaming,INFOCOM 03,San Francisco, CA, USA,April,03. [15] D. Kostic, A. Rodriguez, J. Albrecht, A. Vahdat, Bullet: high bandwidth data dissemination using an overlay mesh, Proceedings of the nineteenth ACM symposium on Operating systems principles, October 19-22, 03, Bolton Landing, NY, USA. [16] D. Pendarakis, S. Shi, D. Verma, M. Waldvogel, ALMI: an application level multicast infrastructure, Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems, p.5-5, March 26-28, 01, San Francisco, California. [17] Y. D. Chawathe, E. A. Brewer, Scattercast: an architecture for internet broadcast distribution as an infrastructure service, University of California, Berkeley, 00. [18] Beichuan Zhang, Sugih Jamin, Lixia Zhang, Universal IP Multicast Delivery, Computer Networks: The International Journal of Computer and Telecommunications Networking archive Volume 50, Issue 6 (April 06) [19] Beichuan Zhang, Sugih Jamin, Lixia Zhang, Host Multicast: A Framework for Delivering Multicast To End Users, INFOCOM 02,New York,NY,June,02. [] [21] M. Handley, Session directories and scalable Internet multicast address allocation, ACM Computer Communication Review 28 (4) (1998) [22]

Efficient Data Retrieving in Distributed Datastreaming

Efficient Data Retrieving in Distributed Datastreaming Efficient Data Retrieving in Distributed Datastreaming Environments Yunhao Liu, Jun Miao, Lionel M. Ni, and Jinsong Han Department of Computer Science Hong Kong University of Science and Technology Clear

More information

Source vs Data-driven Approach for Live P2P Streaming

Source vs Data-driven Approach for Live P2P Streaming Source vs Data-driven Approach for Live P2P Streaming Thomas Silverston and Olivier Fourmaux Université Pierre et Marie Curie-Paris6 Laboratoire d Informatique de Paris 6 8 rue du Capitaine Scott 7515

More information

Traceroute-Based Topology Inference without Network Coordinate Estimation

Traceroute-Based Topology Inference without Network Coordinate Estimation Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water

More information

MOVING P2P LIVE STREAMING TO MOBILE AND UBIQUITOUS ENVIRONMENT. Xiaofei Liao, Hai Jin, Wenbin Jiang

MOVING P2P LIVE STREAMING TO MOBILE AND UBIQUITOUS ENVIRONMENT. Xiaofei Liao, Hai Jin, Wenbin Jiang Computing and Informatics, Vol. 28, 2007, 823 835 MOVING P2P LIVE STREAMING TO MOBILE AND UBIQUITOUS ENVIRONMENT Xiaofei Liao, Hai Jin, Wenbin Jiang Cluster and Grid Computing Lab. Services Computing Technology

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

Design and Deployment of Locality-aware Overlay Multicast Protocol for Live Streaming Services

Design and Deployment of Locality-aware Overlay Multicast Protocol for Live Streaming Services Design and Deployment of Locality-aware Overlay Multicast Protocol for Live Streaming Services Xuping Tu, Hai Jin, Dafu Deng, Chao Zhang, and Quan Yuan Cluster and Grid Computing Lab Huazhong University

More information

Network Topology and Traceroutes

Network Topology and Traceroutes A Distributed Approach to End-to-End Network Topology Inference Xing Jin Qiuyan Xia S.-H. Gary Chan Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

David R. McIntyre CS Department, Cleveland State University Cleveland, Ohio 44101

David R. McIntyre CS Department, Cleveland State University Cleveland, Ohio 44101 Data Distribution in a Wireless Environment with Migrating Nodes David A. Johnston EECS Department, Case Western Reserve University Cleveland, Ohio 44106 David R. McIntyre CS Department, Cleveland State

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Fatemeh Rahimian fatemeh@sics.se. Amir Payberah amir@sics.se

Fatemeh Rahimian fatemeh@sics.se. Amir Payberah amir@sics.se P2P Live Streaming Fatemeh Rahimian fatemeh@sics.se Amir Payberah amir@sics.se 1 Outline Introduction P2P multicast algorithms Comparison Future work Summary 2 Outline Introduction Infrastructure-based

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

2.1 End-host Multicast Requirements

2.1 End-host Multicast Requirements Universal IP Multicast Delivery Beichuan Zhang Computer Science Department University of California Los Angeles, CA 90095 bzhang@cs.ucla.edu Sugih Jamin Department of EECS University of Michigan Ann Arbor,

More information

Locality-Aware Clustering Application Level Multicast for Live Streaming Services on the Internet

Locality-Aware Clustering Application Level Multicast for Live Streaming Services on the Internet JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 319-336 (2011) Locality-Aware Clustering Application Level Multicast for Live Streaming Services on the Internet Department of Computer Engineering Chulalongkorn

More information

DigiMetro An Application-Level Multicast System for Multi-party Video Conferencing

DigiMetro An Application-Level Multicast System for Multi-party Video Conferencing DigiMetro An Application-Level Multicast System for Multi-party Video Conferencing Chong Luo, Jiang Li, and Shipeng Li Microsoft Research Asia Abstract: The increasing demand for multi-party video conferencing

More information

Introduction to IP Multicast Routing

Introduction to IP Multicast Routing Introduction to IP Multicast Routing by Chuck Semeria and Tom Maufer Abstract The first part of this paper describes the benefits of multicasting, the Multicast Backbone (MBONE), Class D addressing, and

More information

Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research

Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt John Buford, Avaya Labs Research Topics SAM Charter Recap and Problem Statement AMT(Automatic Multicast Tunneling) Overview

More information

Multicast for Small Conferences

Multicast for Small Conferences Multicast for Small Conferences Torsten Braun IAM-00-008 July 2000 Multicast for Small Conferences Torsten Braun Institute of Computer Science and Applied Mathematics, University of Berne, Switzerland

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Parallel overlays for high data-rate multicast data transfer

Parallel overlays for high data-rate multicast data transfer Computer Networks 51 (27) 31 42 www.elsevier.com/locate/comnet Parallel overlays for high data-rate multicast data transfer K.K. To, Jack Y.B. Lee * Department of Information Engineering, The Chinese University

More information

Host Multicast: A Framework for Delivering Multicast To End Users

Host Multicast: A Framework for Delivering Multicast To End Users Host Multicast: A Framework for Delivering Multicast To End Users Beichuan Zhang Sugih Jamin Lixia Zhang Abstract While the advantages of multicast delivery over multiple unicast deliveries is undeniable,

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract

More information

PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS

PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University

More information

Argonne National Laboratory, Argonne, IL USA 60439

Argonne National Laboratory, Argonne, IL USA 60439 LEGS: A WSRF Service to Estimate Latency between Arbitrary Hosts on the Internet R Vijayprasanth 1, R Kavithaa 2,3, and Rajkumar Kettimuthu 2,3 1 Department of Information Technology Coimbatore Institute

More information

MON: On-demand Overlays for Distributed System Management

MON: On-demand Overlays for Distributed System Management MON: On-demand Overlays for Distributed System Management Jin Liang, Steven Y. Ko, Indranil Gupta and Klara Nahrstedt University of Illinois at Urbana-Champaign {jinliang, sko, indy, klara}@cs.uiuc.edu

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

The necessity of multicast for IPTV streaming

The necessity of multicast for IPTV streaming The necessity of multicast for IPTV streaming ARIANIT MARAJ, ADRIAN SHEHU Telecommunication Department Faculty of Information Technology, Polytechnic University of Tirana Tirana, Republic of Albania arianit.maraj@ptkonline.com,

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

CHAPTER 10 IP MULTICAST

CHAPTER 10 IP MULTICAST CHAPTER 10 IP MULTICAST This chapter is about IP multicast, the network layer mechanisms in the Internet to support applications where data is sent from a sender to multiple receivers. The first section

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

A Reliability Analysis of Datacenter Topologies

A Reliability Analysis of Datacenter Topologies A Reliability Analysis of Datacenter Topologies Rodrigo S. Couto, Miguel Elias M. Campista, and Luís Henrique M. K. Costa Universidade Federal do Rio de Janeiro - PEE/COPPE/GTA - DEL/POLI Email:{souza,miguel,luish}@gta.ufrj.br

More information

A Framework for Scalable Global IP-Anycast (GIA)

A Framework for Scalable Global IP-Anycast (GIA) A Framework for Scalable Global IP-Anycast (GIA) Dina Katabi, John Wroclawski MIT Laboratory for Computer Science 545 Technology Square Cambridge, MA 02139 {dina,jtw}@lcs.mit.edu ABSTRACT This paper proposes

More information

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video

More information

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University

More information

Locality Based Protocol for MultiWriter Replication systems

Locality Based Protocol for MultiWriter Replication systems Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin lgao@cs.utexas.edu One of the challenging problems in building replication

More information

Network Architecture and Topology

Network Architecture and Topology 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end

More information

How To Find A Failure In A Network

How To Find A Failure In A Network Practical Issues with Using Network Tomography for Fault Diagnosis Yiyi Huang Georgia Institute of Technology yiyih@cc.gatech.edu Nick Feamster Georgia Institute of Technology feamster@cc.gatech.edu Renata

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks

DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks : Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802

More information

Configuration Examples. D-Link Switches L3 Features and Examples IP Multicast Routing

Configuration Examples. D-Link Switches L3 Features and Examples IP Multicast Routing Configuration Examples D-Link Switches L3 Features and Examples IP Multicast Routing DVMRP + IGMP + IGMP Snooping PIM-DM + IGMP + IGMP Snooping RIP + Multicast routing Where is IGMP snooping located Multicast

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications

A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications Jianjun Zhang 1, Ling Liu 1, Lakshmish Ramaswamy 2, Gong Zhang 1, and Calton Pu 1 1 College of Computing, Georgia

More information

LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE

LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE Mandis Beigi, Raymond Jennings, and Dinesh Verma IBM Thomas J. Watson Research Center 30 Saw Mill River Road, Hawthorne, NY 10532 e-mail: {mandis,

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

A Scalable Architecture for SIP Infrastructure using Content Addressable Networks

A Scalable Architecture for SIP Infrastructure using Content Addressable Networks A Scalable Architecture for Infrastructure using Content Addressable Networks Ramrajprabu Balasubramanian Injong Rhee Jaewoo Kang Department of Computer Science North Carolina State University Raleigh,

More information

Supporting IP Multicast Streaming Using Overlay Networks

Supporting IP Multicast Streaming Using Overlay Networks Supporting IP Multicast Streaming Using Overlay Networks Marc Brogle, Dragan Milic, Torsten Braun University of Bern Institute of Computer Science and Applied Mathematics Neubrueckstrasse 10 CH-3012 Bern,

More information

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

Binary vs Analogue Path Monitoring in IP Networks

Binary vs Analogue Path Monitoring in IP Networks Binary vs Analogue Path Monitoring in IP Networks Hung X. Nguyen and Patrick Thiran School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland {hung.nguyen, patrick.thiran}@epfl.ch

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence

More information

Nearcast: A Locality-Aware P2P Live Streaming Approach for Distance Education

Nearcast: A Locality-Aware P2P Live Streaming Approach for Distance Education Nearcast: A Locality-Aware P2P Live Streaming Approach for Distance Education XUPING TU, HAI JIN, and XIAOFEI LIAO Huazhong University of Science and Technology and JIANNONG CAO Hong Kong Polytechnic University

More information

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

MOC 6435A Designing a Windows Server 2008 Network Infrastructure MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:

More information

Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming Abdullah Faruq Ibn Ibrahimy, Islam Md. Rafiqul, Farhat Anwar and Muhammad Ibn Ibrahimy Department of

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

IP Anycast: Point to (Any) Point Communications. Draft 0.3. Chris Metz, chmetz@cisco.com. Introduction

IP Anycast: Point to (Any) Point Communications. Draft 0.3. Chris Metz, chmetz@cisco.com. Introduction IP Anycast: Point to (Any) Point Communications Draft 0.3 Chris Metz, chmetz@cisco.com Introduction The Internet supports several different communication paradigms. Unicast is defined as a point-to-point

More information

Interconnecting IPv6 Domains Using Tunnels

Interconnecting IPv6 Domains Using Tunnels Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University

More information

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks*

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Lap Kong Law, Srikanth V. Krishnamurthy, and Michalis Faloutsos Department of Computer Science

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED ON TOPOLOGICAL DISTANCES

A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED ON TOPOLOGICAL DISTANCES A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED ON TOPOLOGICAL DISTANCES Sergej Alekseev 1 and Jörg Schäfer 2 1 Department of Computer Science and Engineering, Computer Networks

More information

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Scalable Application Layer Multicast

Scalable Application Layer Multicast Scalable Application Layer Multicast Suman Banerjee, Bobby Bhattacharjee, Christopher Kommareddy Department of Computer Science,University of Maryland, College Park, MD 2742, USA suman,bobby,kcr @cs.umd.edu

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723

Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723 Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723 Authors: Sonia Fahmy, Department of Computer Science, Purdue University Address: 305 N. University St., West Lafayette,

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

- Multicast - Types of packets

- Multicast - Types of packets 1 Types of packets - Multicast - Three types of packets can exist on an IPv4 network: Unicast A packet sent from one host to only one other host. A hub will forward a unicast out all ports. If a switch

More information

Overlay Networks and Tunneling Reading: 4.5, 9.4

Overlay Networks and Tunneling Reading: 4.5, 9.4 Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30 2:50 in COS 105) Mike Freedman Teaching Assistants: WyaN Lloyd and Jeff Terrace hnp://www.cs.princeton.edu/courses/archive/spring09/cos461/

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. CMU Paper ID: E-578473438 Number of

More information

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004. (MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring

Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring Praveen Yalagandula, Sung-Ju Lee, Puneet Sharma and Sujata Banerjee Hewlett-Packard Labs, Palo Alto, CA Abstract With

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

Dynamic Load Balancing for Cluster-based Publish/Subscribe System

Dynamic Load Balancing for Cluster-based Publish/Subscribe System Dynamic Load Balancing for Cluster-based Publish/Subscribe System Hojjat Jafarpour, Sharad Mehrotra and Nalini Venkatasubramanian Department of Computer Science University of California, Irvine {hjafarpo,

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 3 Due by 1:25 PM MT, Monday March 5 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 3 Due by 1:25 PM MT, Monday March 5 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 3 Due by 1:25 PM MT, Monday March 5 th 2012 Important: No cheating will be tolerated. No Late Submission will be allowed. Total points for 5480 = 37

More information

A New Approach to Construct Multicast Trees in MPLS Networks

A New Approach to Construct Multicast Trees in MPLS Networks A New Approach to Construct Multicast Trees in MPLS Networks Ali Boudani and Bernard Cousin IRISA/INRIA Rennes, Campus Universitaire de Beaulieu, Avenue du Général Leclerc 35042 Rennes, France Tel: +33

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

MPLS Implementation MPLS VPN

MPLS Implementation MPLS VPN MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay

More information

Peer-to-Peer Multimedia Streaming Using BitTorrent

Peer-to-Peer Multimedia Streaming Using BitTorrent Peer-to-Peer Multimedia Streaming Using BitTorrent Purvi Shah Jehan-François Pâris Department of Computer Science University of Houston, Houston, TX 77204-3010 {purvi, paris}@cs.uh.edu Abstract We propose

More information