A Third-Party Value-Added Network Service Approach to Reliable Multicast

Kunwadee Sripanidkulchai Andy Myers Hui Zhang Carnegie Mellon University Sigmetrics '99

[email protected]

1

Outline • Previous work in Reliable multicast • Our approach: Waypoint recovery service – Third-party value-added network services – Example implementation using STORM

• Performance evaluation • Conclusions • Future work

Sigmetrics '99

[email protected]

2

IP Multicast

X

X

X IP Multicast is best-effort. Sigmetrics '99

[email protected]

3

Source-Based Reliable Multicast

X

X

X

Implosion at the source Sigmetrics '99

[email protected]

4

End Host-Based Reliable Multicast

X

X

X • Limited by end hosts in the group • SRM, TMTP, RMP, LORAX, STORM Sigmetrics '99

[email protected]

5

End Host-Based With Router Support

X

X

X • Scalability and deployment issues • [Levine97], PGM, LMS, OTERS, [Lehman98] Sigmetrics '99

[email protected]

6

Server-Based Reliable Multicast

X

X

X • Static binding of servers to multicast group members • RMTP, LBRM, [Kasera98] Sigmetrics '99

[email protected]

7

Our Approach



• •

• •

Sigmetrics '99

No prior knowledge of locations of senders and receivers in multicast group Receivers invoke service Some waypoints will join the group and participate in error recovery Waypoints form a separate recovery structure Waypoints are additional recovery resources

[email protected]

8

Third-Party Value-Added Network Services •





Architecture – Third-party value-added service provider places servers around the network – Incremental service deployment – Change not required at the router level Service Definition – Dynamic service invocation – Dynamic binding of server and service – Distributed control Waypoint Recovery Service – Minimal change to existing reliable multicast protocols – Support multiple multicast groups and multiple reliable multicast protocols

Sigmetrics '99

[email protected]

9

STORM: Structure-Oriented Resilient Multicast [Xu, Myers, Zhang, Yavatkar 1997]

• Resilient multicast – continuous media applications – receivers do not need all packets – packets must arrive by playback time

• Application level recovery structure

Sigmetrics '99

[email protected]

10

Waypoint Recovery Service for STORM

Without waypoints

• • • •

With waypoints

Additional recovery resources Participate in error recovery Form a separate recovery structure To receivers, waypoints appear to be the same as normal receivers

Sigmetrics '99

[email protected]

11

Waypoint Protocol • • • •

Waypoint invocation algorithm Join algorithm Leave algorithm Considerations – Limit join implosion – Minimize useless joins – Minimize oscillations

Sigmetrics '99

[email protected]

12

Waypoint Invocation Heuristic When a receiver’s loss rate is high, it does an expanding ring search to locate waypoints

Sigmetrics '99

[email protected]

13

Waypoint Join and Leave Algorithms Heuristics • Join algorithm – If the waypoint has joined the group before, it will join again only if it has been useful. – If the waypoint has never joined the group before, it will always join.

• Leave algorithm – If the waypoint does not improve loss rates, it will leave the group.

Sigmetrics '99

[email protected]

14

Outline • Previous work: Reliable multicast • Our approach: Waypoint recovery service – Third-party value-added network services – Example implementation using STORM

• Performance evaluation • Conclusions • Future work

Sigmetrics '99

[email protected]

15

Simulation Environment • Packet-level event-based simulator • All packets traversing the same link are subjected to the same network delay and loss characteristics • Dynamic cross traffic was not modelled for simulation efficiency • Network links are characterized by – loss rate li – delay [di , αdi ]

Sigmetrics '99

[email protected]

16

Simulation Methodology • • • • •

Backbone topology emulating the Internet based on 3 Internet Service Providers’ backbones (MCI, Sprint, and BBN) Waypoints are connected to backbone routers One constant bit rate ‘audio’ source Receiver distribution Bottleneck Scenarios – – – –

Backbone Backbone hotspots Network access point Local domain

Sigmetrics '99

Backbone

Network access point

Local domain

[email protected]

17

Performance Indices • Loss rates observed by receivers – without any recovery – with STORM – with STORM and waypoints

• Change in recovery protocol processing load • Additional network overhead incurred by waypoints

Sigmetrics '99

[email protected]

18

Simulation Experiment

Network access point bottleneck 23 receivers “Sparse receivers” Waypoints are attached to all backbone routers

Sigmetrics '99

[email protected]

19

Loss rates after recovery (%)

Waypoints Helped: Network Access Point Bottleneck 15

STORM

10

STORM with waypoints 5

0 0 Sigmetrics '99

5

10

Loss rates without recovery (%) [email protected]

15 20

Backbone Bottleneck

Loss rates after recovery (%)

30 25 20 STORM 15

STORM with waypoints

10 5 0 0

Sigmetrics '99

10

20

Loss rates without recovery (%) [email protected]

30 21

Maximum Help Across Simulations

Loss rates after recovery (%)

30 25 20 STORM 15

STORM with waypoints

10 5 0 0

Sigmetrics '99

10

20

Loss rates without recovery (%) [email protected]

30 22

Loss Rates Across All Simulations

Loss rates after recovery (%)

30 25 20

STORM

15

STORM with waypoints

10 5 0 0

5

10

15

20

25

30

Loss rates without recovery (%) Sigmetrics '99

[email protected]

23

Network Overhead from Waypoints: Number of Additional Links

Number of additional links introduced by waypoints Total number of links

Sigmetrics '99

[email protected]

=

(2%,35%)

24

Results Summary: When do waypoints help? • Waypoints improve receivers’ loss rates when – Isolated, sparse or skewed receivers – Parents and children share losses – Congestion between parents and children

• Waypoints reduce receivers’ protocol processing load • Waypoints do not significantly increase the source’s processing load. • Waypoints incur moderate network overhead

Sigmetrics '99

[email protected]

25

Conclusions • Proposed a general architecture for introducing services into the network without requiring changes to routers or existing infrastructure • Waypoints enhance error recovery in reliable multicast – More parent choices – More advantageous positions

Sigmetrics '99

[email protected]

26

Future Work • Evaluation – – – –

Effects of dynamic receivers Effects of multiple groups More sophisticated loss/delay models Implementation of a prototype service for the MBONE

• Algorithm – Improve waypoint invocation algorithm – Improve waypoint join and leave algorithms

• Architecture – Extension to other reliable multicast protocols – Extension to other services Sigmetrics '99

[email protected]

27

A Third-Party Value-Added Network Service Approach ...

Third-party value-added service provider places servers around the network ... Backbone topology emulating the Internet based on 3 Internet. Service Providers' ...

202KB Sizes 0 Downloads 234 Views

Recommend Documents

A Third-Party Value-Added Network Service Approach ...
a growing number of network applications that require sup- port for multipoint .... of view, these waypoint machines are ordinary end systems, and not part of the IP ..... ing, waypoints also need to maintain STORM state as well as to buffer some ...

Peer Effects in the Workplace: A Network Approach
Dec 21, 2017 - endogenous and exogenous peer effects in the workplace using an explicit network approach. We begin ... exposure to peers off of the stable part of a worker's co-worker network, which is prone to .... on the returns to training, see Le

A Social Network Approach to Free/Open Source ... - Patrick Wagstrom
data from a social networking web site, Advogato.org, .... that most users, 99%, have users have a social network of fewer than 10 alters for the time period.

A Network Pruning Based Approach for Subset-Specific ...
framework for top-k influential detection to incorporate γ. Third, we ... online social networks, we believe that it is useful in other domains ... campaign which aims to focus only on nodes which are sup- .... In [10], an alternate approach is pro-

A Conceptual Network Approach to Structuring of Meanings in Design ...
A Conceptual Network Approach to Structuring of Meanings in Design.pdf. A Conceptual Network Approach to Structuring of Meanings in Design.pdf. Open.

A Suboptimal Network Utility Maximization Approach for ...
Department of Computer Science, Princeton University, ... admission control approach for such utilities, called “self- ..... metrics and rate requirements. Recall that ...

A Suboptimal Network Utility Maximization Approach for ...
Department of Computer Science, Princeton University,. Emails: {mstalebi, ak, hajiesamaili}@ipm.ir, [email protected]. Abstract—Wired and wireless data ...

A Dynamic Bayesian Network Approach to Location Prediction in ...
A Dynamic Bayesian Network Approach to Location. Prediction in Ubiquitous ... SKK Business School and Department of Interaction Science. Sungkyunkwan ...

A Cognitive Network Approach to Educing Shared ...
This approach to investigating political identity in Macedonia is novel, as it presents an opportunity to .... numbers of open-ended or unstructured interviews.

a service oriented wireless sensor network for power metering
basic functionalities for delivering data collected by the sensors. The sensor ... oriented implementation of a WSN platform for monitoring power meters. The next ...

Adaptive Quality of Service for a Mobile Ad Hoc Network
Adaptive Quality of Service for a Mobile Ad Hoc Network. Antonis Dimakis ... routing system that can provide different classes of service in ... typical applications.

Virtual Network Diagnosis as a Service
ture from tenants as well as prevents deploying exist- ing network diagnosis ... and enable suitable analysis to be run on the data, while scaling to .... In this section, we describe the design of our virtual net- ..... the query is optimized to an