Performance Evaluation of Reliable Multicast Transport Protocol for Large-Scale Delivery
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Configuring PGM Host and Router Assist
Configuring PGM Host and Router Assist Note Support for the PGM Host feature has been removed. Use of this feature is not recommended. This module describes the PGM Host and Router Assist feature. PGM Host and Router Assist enables Cisco routers to support multicast applications that operate at the PGM transport layer and the PGM network layer, respectively. The PGM Reliable Transport Protocol itself is implemented on the hosts of the customer. For information on PGM Reliable Transport Protocol, refer to the Internet Engineering Task Force (IETF) protocol specification draft named PGM Reliable Transport Protocol Specification. For a complete description of the PGM Router Assist commands in this module, see the Cisco IOS IP Multicast Command Reference. To locate documentation of other commands that appear in this module, use the command reference master index, or search online. To identify the hardware platform or software image information associated with a feature, use the Feature Navigator on Cisco.com to search for information about the feature or refer to the software release notes for a specific release. PGM Overview Pragmatic General Multicast (PGM) is a reliable multicast transport protocol for multicast applications that require reliable, ordered, duplicate-free multicast data delivery from multiple sources to multiple receivers. PGM guarantees that a receiver in a multicast group either receives all data packets from transmissions and retransmissions, or can detect unrecoverable data packet loss. PGM is intended as a solution for multicast applications with basic reliability requirements. PGM has two main parts: a host element (also referred to as the transport layer of the PGM protocol) and a network element (also referred to as the network layer of the PGM protocol). -
WAN-LAN PIM Multicast Routing and LAN IGMP FEATURE OVERVIEW and CONFIGURATION GUIDE
Technical Guide WAN-LAN PIM Multicast Routing and LAN IGMP FEATURE OVERVIEW AND CONFIGURATION GUIDE Introduction This guide describes WAN-LAN PIM Multicast Routing and IGMP on the LAN and how to configure WAN-LAN PIM multicast routing and LAN IGMP snooping. The AlliedTelesis Next Generation Firewalls (NGFWs) can perform routing of IPv4 and IPv6 multicast, using PIM-SM and PIM-DM. Also, switching interfaces of the NGFWs are IGMP aware, and will only forward multicast steams to these switch ports that have received reports. IGMP snooping allows a device to only forward multicast streams to the links on which they have been requested. PIM Sparse mode requires specific designated routers to receive notification of all streams destined to specific ranges of multicast addresses. When a router needs to get hold of a given group, it sends a request to the designated Rendezvous Point for that group. If there is a source in the network that is transmitting a stream to this group, then the Rendezvous Point will be receiving it, and will forward it to the requesting router. C613-22042-00 REV A alliedtelesis.com x Products and software version that apply to this guide Contents Introduction.............................................................................................................................................................................1 Products and software version that apply to this guide .......................................................................2 Configuring WAN-LAN PIM Multicast Routing and LAN IGMP Snooping........................................3 -
Ip Multicast Admission Control for Iptv
IP MULTICAST ADMISSION CONTROL FOR IPTV A Thesis by Deepa Jayaraman Bachelor of Engineering, Anna University, India, 2008 Submitted to the Department of Electrical and Computer Science Engineering and the faculty of the Graduate school of Wichita State University in partial fulfillment of the requirements for the degree of Master of Science May 2012 i © Copyright 2012 by Deepa Jayaraman All Rights Reserved ii IP MULTICAST ADMISSION CONTROL FOR IPTV The following faculty members have examined the final copy of this Thesis for form and content and recommend that it be accepted in partial fulfillment of the requirements for the degree of Master of Science with a major in Electrical Engineering. __________________________________ Ravi Pendse, Committee Chair __________________________________ Linda Kliment, Committee Member __________________________________ Abu Asaduzzaman, Committee Member iii DEDICATION God, the Almighty My Parents Mrs. Lalitha Jayaraman & Mr. Jayaraman My Family Mrs. Indira Subramanian and Mr. Subramanian Mrs. Mythreyi Venkatesan and Mr. Venkatesan iv ACKNOWLEDGEMENT First I would like to thank God, the Almighty, for guiding me through every step in my life. I would like to extend my sincere thanks to Dr. Ravi Pendse, my advisor, for his constant encouragement, support and valuable advice. He has been there ever since I started my Masters in Wichita State University, guiding me and helping me in every step for the past three years. His classes and the conversations we had were very enlightening. Without him, I would never have known or found my true passion and interest. I am grateful to him for giving me an opportunity to work in the Cisco Technical Research Center which gave me a wonderful, first, work experience. -
Multicast Over TCP/IP HOWTO Multicast Over TCP/IP HOWTO
Multicast over TCP/IP HOWTO Multicast over TCP/IP HOWTO Table of Contents Multicast over TCP/IP HOWTO.......................................................................................................................1 Juan−Mariano de Goyeneche <[email protected]>............................................................................1 1.Introduction. .........................................................................................................................................1 2.Multicast Explained..............................................................................................................................1 3.Kernel requirements and configuration................................................................................................1 4.The MBone...........................................................................................................................................1 5.Multicast applications...........................................................................................................................1 6.Multicast programming.........................................................................................................................2 7.The internals..........................................................................................................................................2 8.Routing Policies and Forwarding Techniques......................................................................................2 9.Multicast Transport Protocols...............................................................................................................2 -
Bimodal Multicast1
Bimodal Multicast1 Kenneth P. Birman, Mark Hayden, Oznur Ozkasap, Zhen Xiao, Mihai Budiu, Yaron Minsky There are many methods for making a multicast protocol "reliable". At one end of the spectrum, a reliable multicast protocol might offer atomicity guarantees, such as all-or- nothing delivery, delivery ordering, and perhaps additional properties such as virtually synchronous addressing. At the other are protocols that use local repair to overcome transient packet loss in the network, offering “best effort” reliability. Yet none of this prior work has treated stability of multicast delivery as a basic reliability property, such as might be needed in an internet radio, TV, or conferencing application. This paper looks at reliability with a new goal: development of a multicast protocol which is reliable in a sense that can be rigorously quantified and includes throughput stability guarantees. We characterize this new protocol as a "bimodal multicast" in reference to its reliability model, which corresponds to a family of bimodal probability distributions. Here, we introduce the protocol, provide a theoretical analysis of its behavior, review experimental results, and discuss some candidate applications. These confirm that bimodal multicast is reliable, scalable, and that the protocol provides remarkably stable delivery throughput. Keywords: Bimodal Multicast, probabilistic multicast reliability, scalable group communications, isochronous protocols, internet media transmission. Encamped on the hilltops overlooking the enemy fortress, the commanding general prepared for the final battle of the campaign. Given the information he was gathering about enemy positions, his forces could prevail. Indeed, if most of his observations could be communicated to most of his forces the battle could be won even if some reports reached none or very few of his troupes. -
Introduction to IP Multicast Routing
Introduction to IP Multicast Routing by Chuck Semeria and Tom Maufer Abstract The first part of this paper describes the benefits of multicasting, the Multicast Backbone (MBONE), Class D addressing, and the operation of the Internet Group Management Protocol (IGMP). The second section explores a number of different algorithms that may potentially be employed by multicast routing protocols: - Flooding - Spanning Trees - Reverse Path Broadcasting (RPB) - Truncated Reverse Path Broadcasting (TRPB) - Reverse Path Multicasting (RPM) - Core-Based Trees The third part contains the main body of the paper. It describes how the previous algorithms are implemented in multicast routing protocols available today. - Distance Vector Multicast Routing Protocol (DVMRP) - Multicast OSPF (MOSPF) - Protocol-Independent Multicast (PIM) Introduction There are three fundamental types of IPv4 addresses: unicast, broadcast, and multicast. A unicast address is designed to transmit a packet to a single destination. A broadcast address is used to send a datagram to an entire subnetwork. A multicast address is designed to enable the delivery of datagrams to a set of hosts that have been configured as members of a multicast group in various scattered subnetworks. Multicasting is not connection oriented. A multicast datagram is delivered to destination group members with the same “best-effort” reliability as a standard unicast IP datagram. This means that a multicast datagram is not guaranteed to reach all members of the group, or arrive in the same order relative to the transmission of other packets. The only difference between a multicast IP packet and a unicast IP packet is the presence of a “group address” in the Destination Address field of the IP header. -
Scalability, Throughput Stability and Efficient Buffering in Reliable Multicast Protocols°
SCALABILITY, THROUGHPUT STABILITY AND EFFICIENT BUFFERING IN RELIABLE MULTICAST PROTOCOLS° A Dissertation Presented to the Faculty of the Graduate School of Ege University, Izmir, Turkey in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Oznur Ozkasap May 2000 ° This dissertation research has been conducted at Department of Computer Science, Cornell University; supervised by Professor Kenneth P. Birman, and was partially supported by a TUBITAK (Turkish Scientific and Technical Research Council)-NATO grant. ii Oznur Ozkasap 2000 All Rights Reserved iii ABSTRACT SCALABILITY, THROUGHPUT STABILITY AND EFFICIENT BUFFERING IN RELIABLE MULTICAST PROTOCOLS Oznur Ozkasap* This study investigates the issues of scalability, throughput stability and efficient buffering in reliable multicast protocols. The focus is on a new class of scalable reliable multicast protocol, Pbcast that is based on an epidemic loss recovery mechanism. The protocol offers scalability, throughput stability and a bimodal delivery guarantee as the key features. A theoretical analysis study for the protocol is already available. This thesis models Pbcast protocol, analyzes the protocol behavior and compares it with multicast protocols offering different reliability models, in both real and simulated network settings. Techniques proposed for efficient loss recovery and buffering are designed and implemented on the simulation platform as well. Extensive analysis studies are conducted for investigating protocol properties in practice and comparing it with other classes of reliable multicast protocols across various network characteristics and application scenarios. The underlying network for our experimental model is the IBM SP2 system of the Cornell Theory Center. In the simulation model, we used the ns-2 network simulator as the underlying structure. -
IP Multicast
Data Communication & Networks G22.2262-001 Session 10 - Main Theme IP Multicast Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences 1 Agenda Introduction to Multicast Multicast Addresses IP Multicast Reliable Multicast Pragmatic General Multicast (PGM) Reliable Multicast Protocol (RMP) Conclusion 2 Part I Introduction to Multicast 3 Cast Definitions Unicast - send to one destination (198.122.15.20) General Broadcast - send to EVERY local node (255.255.255.255) Directed Broadcast - send to subset of nodes on LAN (198.122.15.255) Multicast - send to every member of a Group of “interested” nodes (Class D address). RFC 1112 (an easy read!) 4 Why Multicast, Why Not Unicast? Unicast: Many applications require same message sent to many nodes (10, 100, 1000, n) Same message transits network n times. n messages requires n*(CPU time) as 1 message Need to deliver “timely” information. Message arrives at node n >> node 1 5 Why Multicast, Why Not Broadcast? Broadcast: Send a copy to every machine on the net Simple, but inefficient All nodes “must” process the packet even if they don’t care Wastes more CPU cycles of slower machines (“broadcast radiation”) General broadcast cannot be routed Directed broadcast is limited in scope (to machines on same sub-net or same domain) 6 Multicast Applications News/sports/stock/weather updates Software distribution Video-conferencing, shared whiteboards Distributed interactive gaming or simulations Email distribution lists Database replication 7 IP Multicast - Concepts Message sent to multicast “group” of receivers Senders need not be group members Each group has a “group address” Groups can have any size End-stations (receivers) can join/leave at will Data Packets are UDP (uh oh!) 8 IP Multicast Benefits Distribution tree for delivery/distribution of packets (i.e., scope extends beyond LAN) Tree is built by multicast routing protocols. -
IP Multicast Backgrounder
Stardust Technologies, Inc 1901 S. Bascom Ave, #333 Campbell, CA 95008 USA Tel: 408-879-8080 Fax: 408-879-8081 Web: www.ipmulticast.com IP Multicast Initiative (IPMI) IP Multicast Backgrounder An IP Multicast Initiative White Paper How IP Multicast alleviates network congestion and paves the way for next-generation network applications Inside… Scope Of This Document ....................................................................................... 2 Introduction to IP Multicast ..................................................................................... 2 Comparison of point-to-point unicast and multicast data flow ................................ 3 IP Multicast Benefits ............................................................................................... 4 IP Multicast in Use.................................................................................................. 4 IP Multicast Applications and Development ............................................................ 6 Evaluation and Implementation ............................................................................... 7 More information .................................................................................................... 8 Copyright ©1995-1997 Stardust Technologies, Inc. All Rights Reserved. Stardust® is a registered trademark of Stardust Technologies, Inc. All trademarks acknowledged. IPMI is a division of Stardust Labs. RESTRICTED RIGHTS LEGEND USE, DUPLICATION, OR DISCLOSURE BY THE GOVERNMENT IS SUBJECT TO RESTRICTIONS AS SET -
Multicast Services Configuration Guide, Cisco IOS XE Release 3S
IP Multicast: Multicast Services Configuration Guide, Cisco IOS XE Release 3S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -
Enterprise IPTV Validated Reference Design Guide Table of Contents
Enterprise IPTV Validated Reference Design Guide Table of Contents Introduction ................................................................................................................................3 About EZ TV................................................................................................................................3 Overview .....................................................................................................................................3 Design Guidelines .....................................................................................................................5 Understanding the IPTV Solution .................................................................................5 Bandwidth Requirements ................................................................................................5 Link Aggregation.................................................................................................................6 Virtual Chassis .....................................................................................................................7 Protocol-Independent Multicast (PIM) Variants ...........................................................7 Multicast Groups .......................................................................................................................8 Multicast Flows .........................................................................................................................9 Deployment Guidelines ..........................................................................................................9 -
PDF (Noblet-Thesis-Final.Pdf)
MojaveComm: A View-Oriented Group Communication Protocol with Support for Virtual Synchrony Thesis by David A. Noblet In Partial Fulfillment of the Requirements for the Degree of Master of Science California Institute of Technology Pasadena, California 2008 (Submitted June 4, 2008) ii © 2008 David A. Noblet All Rights Reserved iii To my supportive family and friends. iv Acknowledgements I would like to extend gratitude to my advisor, Professor Jason Hickey, and to all the members of the Mojave Lab, past and present, who took the time to participate in all those lively whiteboard discussions. In particular, I want to offer my special thanks to Cristian Ţăpuş, Nathaniel Gray, Mihai Florian, and Joshua Goldstein for all of their insightful input and contributions to this work. v Abstract In this thesis, we explore the feasibility of implementing a general communication protocol that addresses common classes of problems that one encounters in the development of distributed appli- cations, such as: multipoint-to-multipoint communication, message (re)ordering, mutual exclusion, and consensus. The paper details both the design and implementation of MojaveComm, a view- oriented total-order group communication protocol suitable for deployment on wide-area networks. Moreover, we provide a high-level overview of MojaveFS, a sequentially consistent distributed filesys- tem, and show how we can use the message-ordering guarantees of MojaveComm as the basis for the implementation of its sequential consistency guarantees. vi Contents Acknowledgements iv Abstract v 1 Introduction 1 1.1 Related Work ........................................ 3 1.2 Overview .......................................... 5 2 MojaveComm Protocol Specification 7 2.1 Groups & Views ...................................... 7 2.1.1 View Change Events ...............................