M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

Size: px
Start display at page:

Download "M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic"

Transcription

1 M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08

2 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast routing and protocols Recent development: BIER (RFC879, Nov. 07) Next week: Presentations on protocols; network- and applicationlevel

3 C A S T S Unicast: one-to-one Broadcast: one-to-all Multicast: one-to-group The group is a subset of all Most general notion Anycast: one-to-one-from-a-group

4 O N E - TO- M A N Y C O M M U N I C AT I O N Sender needs to send the same information to all three receivers Sender Router Receiver Receiver transmissions over the same link! Receiver 4

5 O N E - TO- M A N Y C O M M U N I C AT I O N Sender needs to send the same information to all three receivers Sender Router Receiver Receiver Only one transmission Receiver 5

6 I P M U LT I C A S T C H A L L E N G E S Internet is designed for one-to-one communication IP packet header contains one source and one destination address How to Identify a group of users wishing to receive same data How the host tells the network it wishes to join a group Route packets efficiently Route between the networks 6

7 E N D - TO- E N D S U P P O R T. API Multicast uses Class D addresses Sessions are associated to these addresses or groups. Host-network interface Internet Group Management 7 Protocol (IGMP). Network (routing) Main focus of this lecture Application OS Application OS Router Router Router Application OS

8 G R A P H - A L G O R I T H M I C B A C K G R O U N D Network topology mapped to a graph G=(V, E) Problem: Given a node set S V, Create a spanning tree that interconnects S 8

9 S T E I N E R T R E E S Each link in the tree has an associated cost The minimal spanning tree we call Steiner tree Constructing this tree is a wellknown NP-complete problem 4 4 9

10 A P P R O X I M AT E A L G O R I T H M S

11 A P P R O X I M AT E A L G O R I T H M S ( ) Cost: 7 Optimal cost: 4

12 A P P R O X I M AT E A L G O R I T H M S ( ) Optimal tree (cost 4) Heuristic tree (cost 7)

13 S PA N N I N G T R E E S I N P R A C T I C E Creating a minimal spanning tree is an NP-complete problem More than one metric adds to the complexity (cost/delay optimization) Research shows that best effort trees are often quite good (0% costlier on average)

14 S PA N N I N G T R E E S I N P R A C T I C E ( ) Practical algorithm: Use communication delay or # hops as metric Find the (unicast) shortest path between a special node and all other nodes in the group G This special root node can be: An administratively assigned node: Core Based Tree (CBT) Data source: Shortest Path Tree (SPT) 4

15 C O R E B A S E D A N D S H O R T E S T PAT H T R E E S Core

16 B U I L D I N G M U LT I C A S T T R E E S Traffic flooding ( Flood-and-prune ) Include receivers by extending the tree until all reached Explicit messaging Receivers join the tree by sending control messages 6

17 F L O O D - A N D - P R U N E Senders start transmitting packets on all adjacent links Receivers Sender 7

18 F L O O D - A N D - P R U N E Senders start transmitting packets on all adjacent links Receivers Sender Candidate branch 8

19 F L O O D - A N D - P R U N E Routers forward data on all links except where the data arrived Receivers Sender Candidate branch 9

20 F L O O D - A N D - P R U N E Routing loops must be avoided! Receivers Sender Candidate branch 0

21 F L O O D - A N D - P R U N E Prune control messages are sent downstream on inactive links Receivers Sender Candidate branch

22 F L O O D - A N D - P R U N E Prunes are also sent downstream if prunes are received on all upstream interfaces Receivers Sender Candidate branch

23 F L O O D - A N D - P R U N E Receivers Sender Candidate branch Tree branch

24 F L O O D - A N D - P R U N E Receivers Sender Candidate branch Tree branch 4

25 F L O O D - A N D - P R U N E What if a new receiver wants to join? - Flooding is periodically repeated! Receivers Sender Candidate branch Tree branch 5

26 F L O O D - A N D - P R U N E P R O B L E M Can we flood the Internet in order to reach 5 receivers? NO! Flood-and-prune was used in the first Internet-wide multicast overlay (Mbone) This was the main reason why Mbone did not scale, collapsed under its own weight, and was abandoned 6

27 R E V E R S E PAT H F O R WA R D I N G Basis for explicit messaging protocols Utilizes the unicast routing tables Send control messages toward the known source (core) Reject data packets coming from directions other than the source R OK, add (S, G): 4 Join (S, G) Discard multicast data from S at any interface except Multicast data is forwarded only in opposite direction of unicast data Prevents looping R (S, (S, G): G): {, {4} 7 S

28 E X P L I C I T M E S S A G I N G Receivers send a Join message to the group core (or source in SPT) Receivers Sender Core 8

29 E X P L I C I T M E S S A G I N G Senders use unicast to reach the core in CBT (*, G): {, } Receivers Sender Core Tree branch pp stream 9

30 TA X O N O M Y O F M U LT I C A S T S O L U T I O N S Different categorizations: Tree type (CBT / SPT) Service model Unidirectional vs. bidirectional forwarding Intra- and inter-domain Protocol stack position 0

31 C B T V S. S P T Core Based Tree Multiple sources use the same tree, but single point of failure Fewer routers involved More complex operation, less optimal paths Shortest Path Tree Only one source Optimal path Scalability challenge due to increased amount of state information

32 UNI- O R B I D I R E C T I O N A L F O R WA R D I N G Should the data flow along the multicast tree in one or both directions? 4 Unidirectional: for each branch in the multicast tree, data is flowing in one direction only Simple Most used (PIM-SM)

33 B I D I R E C T I O N A L F O R WA R D I N G Only, and 4 in the tree, do not send on and the incoming In multicast protocols with bidirectional forwarding, data flowing in both directions 4 More complex, not widely used in practice

34 S E R V I C E M O D E L S Single source (one-to-many) simple, one-tree approach (SPT) sufficient for most applications E.g.: IPTV streaming Multiple sources (many-to-many) general, powerful, but... problematic in many ways, security in particular E.g.: Conferencing 4

35 M U LT I C A S T A D D R E S S I N G Class D address range in IPv Last 8 bits is the group ID reserved Never forwarded by routers E.g all hosts ( try to ping, UNINETT is multicast friendly) all routers 6

36 G L O B A L I P V 4 A D D R E S S A S S I G N M E N T Is problematic if no global rules GLOP: allocates 56 addresses to each AS 8 bits 8 bits 6 bits 0-55 AS number (GLOP was suggested before 4-byte AS numbers) PIM SSM introduces channel concept that prevents address collisions Requires knowledge of sender address Uses

37 I N T E R - N E T W O R K I S S U E S Multicast between network domains particularly challenging: scalability policing payments CBT core placement and communication heterogeneous multicast protocols Router Router Router? Router Router Router 8

38 G E N E R A L I P M U LT I C A S T I S S U E S Support only for unreliable datagram service Open service model Anyone can join, address collisions, prone to Denial of Service attacks Service billing Scalability Most approaches target only one application profile Patchy deployment 9

39 B I T I N D E X E X P L I C I T R E P L I C AT I O N ( B I E R ) Multicast state is a real issue, specially in large, transit networks. BIER does not require any state, nor explicit building of multicast distribution trees. Instead, multicast packets are encapsulated in BIER header, containing a bit string where each bit represents one egress router in BIER-domain. Each transit router in the BIER domain forwards the packets on one or more outgoing interfaces, shortest path to the domain egress, clearing the egress bits to prevent looping.

40 B I E R I N P R A C T I C E Multicast Flow Overlay used to inform ingress about egress routers for any given multicast group. [] 7 [, 6, 9, 5] [] 5 [5] 8 0 Egress Ingress 4 [6, 9] 6 [9] 4 [a, b, c] bits a, b and c set in the header, others

41 P R O T O C O L S TA C K P O S I T I O N Multicast can be implemented from physical to application level Network Layer (L) Multicast Very efficient Difficult to deploy Application Layer (L5-L7) Multicast Easy to deploy, no changes on lower layers Network system support not required, controlled by end-systems 4

42 S U M M A R Y: W H AT H AV E W E L E A R N E D? Algorithms: Optimal multicast is an NP complete problem Good behavior in practice using simple means SPT and CBT Tree construction: Flood-and-Prune Explicit messaging Reverse Path Forwarding Uni- and bidirectional forwarding Many challenges, some could be solved on application level (more on that next week) 47

Configuring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging

Configuring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging Contents Configuring OSPF 1 Overview 1 OSPF packets 1 LSA types 1 OSPF areas 2 Router types 4 Route types 5 Route calculation 6 OSPF network types 6 DR and BDR 6 Protocols and standards 8 OSPF configuration

More information

Lecture 8 Link-State Routing

Lecture 8 Link-State Routing 6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-5, 7-8 are

More information

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31)

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31) Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/09 11:25:31) Tuesday, March 7, 2017 Karst Koymans (UvA) Link State Routing Tuesday,

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

Grundlagen der Rechnernetze. Introduction

Grundlagen der Rechnernetze. Introduction Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction

More information

Link-state protocols and Open Shortest Path First (OSPF)

Link-state protocols and Open Shortest Path First (OSPF) Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

Table of Contents. OSPF Configuration 1

Table of Contents. OSPF Configuration 1 Table of Contents OSPF Configuration 1 Introduction to OSPF 1 Basic Concepts 2 Area Based OSPF Network Partition 3 Router Types 7 Classification of OSPF Networks 9 DR and BDR 9 OSPF Packet Formats 11 Supported

More information

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.4, 2017/11/30 12:33:57)

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.4, 2017/11/30 12:33:57) Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 17.4, 2017/11/30 12:33:57) Tuesday, November 28, 2017 Karst Koymans (UvA) Link State Routing Tuesday,

More information

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX KillTest Q&A Exam : JN0-643 Title : Enterprise Routing and Switching, Professional (JNCIP-ENT) Version : Demo 1 / 10 1.Which connection method do OSPF routers use to communicate with each other? A. IP

More information

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013 Link State Routing Brad Karp UCL Computer Science CS 33/GZ 3 rd December 3 Outline Link State Approach to Routing Finding Links: Hello Protocol Building a Map: Flooding Protocol Healing after Partitions:

More information

Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing

Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing C O R P O R A T E T E C H N O L O Y Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing nformation & Sandrine PASQUALINI Antoine FROT Andreas Iselt Andreas Kirstädter C O R P O R A T

More information

Link State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008

Link State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008 Link State Routing In particular OSPF dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 4, 2008 dr. C. P. J. Koymans (UvA) Link State Routing March 4, 2008 1 / 70 1 Link State Protocols

More information

Configuring OSPF. Information About OSPF CHAPTER

Configuring OSPF. Information About OSPF CHAPTER CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The

More information

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network

More information

Interlayer routing issues for wireless networks

Interlayer routing issues for wireless networks NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),

More information

Chapter 10 Mobile Communication Systems

Chapter 10 Mobile Communication Systems Chapter 10 Mobile Communication Systems Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Cellular System Infrastructure Registration Handoff Parameters and Underlying

More information

Introduction to Local and Wide Area Networks

Introduction to Local and Wide Area Networks Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2

More information

Papers. Ad Hoc Routing. Outline. Motivation

Papers. Ad Hoc Routing. Outline. Motivation CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013 Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

OSPF Inbound Filtering Using Route Maps with

OSPF Inbound Filtering Using Route Maps with OSPF Inbound Filtering Using Route Maps with a Distribute List Finding Feature Information OSPF Inbound Filtering Using Route Maps with a Distribute List Last Updated: July 19, 2011 The OSPF Inbound Filtering

More information

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic

More information

Low-Power Interoperability for the IPv6 Internet of Things

Low-Power Interoperability for the IPv6 Internet of Things for the IPv6 Adam Dunkels, Joakim Eriksson, Nicolas Tsiftes Swedish Institute of Computer Science Presenter - Bob Kinicki Fall 2015 Introduction The is a current buzz term that many see as the direction

More information

Programming with network Sockets Computer Science Department, University of Crete. Manolis Surligas October 16, 2017

Programming with network Sockets Computer Science Department, University of Crete. Manolis Surligas October 16, 2017 Programming with network Sockets Computer Science Department, University of Crete Manolis Surligas surligas@csd.uoc.gr October 16, 2017 Manolis Surligas (CSD, UoC) Programming with network Sockets October

More information

OSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda

OSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda OSPF Domain / OSPF Area OSPF Advanced Topics Areas,, Backbone, Summary-LSA, ASBR, Stub Area, Route Summarization, Virtual Links, Header Details OSPF domain can be divided in multiple OSPF areas to improve

More information

ITE PC v4.0. Chapter Cisco Systems, Inc. All rights reserved. Cisco Public

ITE PC v4.0. Chapter Cisco Systems, Inc. All rights reserved. Cisco Public OSPF Routing Protocols and Concepts Chapter 11 1 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate l

More information

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724 ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets

More information

Survey of MANET based on Routing Protocols

Survey of MANET based on Routing Protocols Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities. Ala I. Al-Fuqaha, Ph.D.

Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities. Ala I. Al-Fuqaha, Ph.D. Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities Ala I. Al-Fuqaha, Ph.D. Overview Transport Network Architectures: Current Vs. IP

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

OSPF for IPv6. ISP Workshops

OSPF for IPv6. ISP Workshops OSPF for IPv6 ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 17

More information

Junos Intermediate Routing

Junos Intermediate Routing Junos Intermediate Routing Chapter 4: Open Shortest Path First 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing

More information

Network Working Group Request for Comments: Category: Standards Track A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008

Network Working Group Request for Comments: Category: Standards Track A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008 Network Working Group Request for Comments: 5250 Obsoletes: 2370 Category: Standards Track L. Berger LabN I. Bryskin Adva A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008 The OSPF Opaque

More information

Question No: 2 In an OSPF Hello packet, which of the following fields must match for all neighbor routers on the segment? Choose three answers.

Question No: 2 In an OSPF Hello packet, which of the following fields must match for all neighbor routers on the segment? Choose three answers. Volume: 335 Questions Question No: 1 What is the default preference value for a static route in the Alcatel-Lucent 7750 SR? A. 0 B. 5 C. 10 D. 15 Answer: B Question No: 2 In an OSPF Hello packet, which

More information

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END The Pennsylvania State University The Graduate School College of Engineering PERFORMANCE ANALYSIS OF END-TO-END SMALL SEQUENCE NUMBERS ROUTING PROTOCOL A Thesis in Computer Science and Engineering by Jang

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

Guide to OSPF Application on the CSS 11000

Guide to OSPF Application on the CSS 11000 Guide to OSPF Application on the CSS 11000 Document ID: 12638 Contents Introduction Before You Begin Conventions Prerequisites Components Used Description OSPF Configuration Task List Configuration Global

More information

Energy Saving Routing Strategies in IP Networks

Energy Saving Routing Strategies in IP Networks Energy Saving Routing Strategies in IP Networks M. Polverini; M. Listanti DIET Department - University of Roma Sapienza, Via Eudossiana 8, 84 Roma, Italy 2 june 24 [scale=.8]figure/logo.eps M. Polverini

More information

Computer Networks II

Computer Networks II ipartimento di Informatica e Sistemistica omputer Networks II Routing protocols Overview Luca Becchetti Luca.Becchetti@dis.uniroma.it.. 2009/200 Goals escribe approaches and give overview of mechanisms

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

Cisco IOS IP Routing: OSPF Command Reference

Cisco IOS IP Routing: OSPF Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

http://www.expertnetworkconsultant.com/configuring/ospf-neighbor-adjacency/ Brought to you by Expert Network Consultant.com OSPF Neighbor Adjacency Once upon a time, we walked together holding hands, we

More information

RPR Protection Gal Mor, Corrigent Systems Jim Kao, Cisco Systems

RPR Protection Gal Mor, Corrigent Systems Jim Kao, Cisco Systems RPR Protection, Corrigent Systems, Cisco Systems Requirements Protection within 50 msec Wrap protection is required Packets may indicate Steering Only Data (SWIS) Steer protection is optional Use Topology

More information

CSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP)

CSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP) CSE/EE 46 Link State Routing Last Time Routing Algorithms Introduction Distance Vector routing (RIP) Application Presentation Session Transport Network Data Link Physical This Lecture Routing Algorithms

More information

Configuring OSPF. The Cisco OSPF Implementation

Configuring OSPF. The Cisco OSPF Implementation Configuring OSPF This chapter describes how to configure Open Shortest Path First (OSPF). For a complete description of the OSPF commands in this chapter, refer to the OSPF s chapter of the Cisco IOS IP

More information

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks Laura Marie Feeney Swedish Institute of Computer Science http://www.sics.se/~lmfeeney Overview mobile ad hoc networks routing protocols communication

More information

Distance-Vector Routing

Distance-Vector Routing Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation

More information

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours Internet of Things Prof. M. Cesana Exam June 26, 2011 Family Name Given Name John Doe Student ID 3030 Course of studies 3030 Total Available time: 2 hours E1 E2 E3 Questions Questions OS 1 Exercise (8

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

CS649 Sensor Networks IP Lecture 9: Synchronization

CS649 Sensor Networks IP Lecture 9: Synchronization CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization

More information

Global State and Gossip

Global State and Gossip Global State and Gossip CS 240: Computing Systems and Concurrency Lecture 6 Marco Canini Credits: Indranil Gupta developed much of the original material. Today 1. Global snapshot of a distributed system

More information

Foundations of Distributed Systems: Tree Algorithms

Foundations of Distributed Systems: Tree Algorithms Foundations of Distributed Systems: Tree Algorithms Stefan Schmid @ T-Labs, 2011 Broadcast Why trees? E.g., efficient broadcast, aggregation, routing,... Important trees? E.g., breadth-first trees, minimal

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks Renato Lo Cigno www.disi.unitn.it/locigno/teaching Part of this material (including some pictures) features and are freely reproduced from: Ian F.Akyildiz, Xudong Wang,Weilin Wang,

More information

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced

More information

Chapter 4. TETRA and GSM over satellite

Chapter 4. TETRA and GSM over satellite Chapter 4. TETRA and GSM over satellite TETRA and GSM over satellite have been addressed a number of times in the first three chapters of the document. Their vital roles in the present project are well

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

OSPF. Routing Protocols and Concepts Chapter 11. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Cisco Public

OSPF. Routing Protocols and Concepts Chapter 11. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Cisco Public OSPF Routing Protocols and Concepts Chapter 11 1 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate the

More information

Multiwavelength Optical Network Architectures

Multiwavelength Optical Network Architectures Multiwavelength Optical Network rchitectures Switching Technology S8. http://www.netlab.hut.fi/opetus/s8 Source: Stern-Bala (999), Multiwavelength Optical Networks L - Contents Static networks Wavelength

More information

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,

More information

IP Routing: OSPF Configuration Guide, Cisco IOS XE Release 2

IP Routing: OSPF Configuration Guide, Cisco IOS XE Release 2 IP Routing: OSPF Configuration Guide, Cisco IOS XE Release 2 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

A Mathematical Formulation for Joint Channel Assignment and Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks

A Mathematical Formulation for Joint Channel Assignment and Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks A Mathematical Formulation for Joint Channel Assignment and Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks M. Jahanshahi 1 Department of Computer Engineering, Science and Research

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

The problem of upstream traffic synchronization in Passive Optical Networks

The problem of upstream traffic synchronization in Passive Optical Networks The problem of upstream traffic synchronization in Passive Optical Networks Glen Kramer Department of Computer Science University of California Davis, CA 95616 kramer@cs.ucdavis.edu Abstaract. Recently

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

WiMOD LR Base Plus Firmware

WiMOD LR Base Plus Firmware WiMOD LR Base Plus Firmware Feature Specification Version 1.0 Document ID: 4000/40140/0137 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Overview Document Information File name WiMOD_LR_Base_Plus_Feature_Spec.docx

More information

A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes *

A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 5, 559-574 (009) A Systematic avelength Assign Algorithm for Multicast in DM Networks with Sparse Conversion Nodes * I-HSUAN PENG, YEN-EN CHEN AND HSIANG-RU

More information

2632 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013

2632 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 2632 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 213 Datacast: A Scalable and Efficient Reliable Group Data Delivery Service for Data Centers Jiaxin Cao, Chuanxiong Guo,

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 20 Spring 2012 April 4, 2012 Announcements HW9 due this week HW10 out HW11 and HW12 coming soon! Student presenta)ons HW9 Capture packets using Wireshark

More information

Mathematical Problems in Networked Embedded Systems

Mathematical Problems in Networked Embedded Systems Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous

More information

) A C K A c k n o w l e d g m e n t (

) A C K A c k n o w l e d g m e n t ( C Tim Parker A B I Application Binary Interface( A C B Access Control Block( A C I A Asynchronous Communications Interface Adapter( A C K A c k n o w l e d g m e n t ( A F Address Family( A F P A p p l

More information

Routing Messages in a Network

Routing Messages in a Network Routing Messages in a Network Reference : J. Leung, T. Tam and G. Young, 'On-Line Routing of Real-Time Messages,' Journal of Parallel and Distributed Computing, 34, pp. 211-217, 1996. J. Leung, T. Tam,

More information

Proxy Mobile IPv6? Sangheon Pack (Korea University, Korea) Sri Gundavelli (Cisco, USA)

Proxy Mobile IPv6? Sangheon Pack (Korea University, Korea) Sri Gundavelli (Cisco, USA) MobiArch 2008 Shall we apply paging technologies to Proxy Mobile IPv6? Jong-Hyouk Lee, Tai-Myoung Chung (Sungkyunkwan k University, it Korea) Sangheon Pack (Korea University, Korea) Sri Gundavelli (Cisco,

More information

More Efficient Routing Algorithm for Ad Hoc Network

More Efficient Routing Algorithm for Ad Hoc Network More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks

More information

Sybex ICND Chapter 4 and 18: OSPF. Instructor & Todd Lammle

Sybex ICND Chapter 4 and 18: OSPF. Instructor & Todd Lammle Sybex ICND2 200-105 Chapter 4 and 18: OSPF Instructor & Todd Lammle Chapter 4 objectives The ICND2 topics covered in this chapter include: 2 OSPF design example. An OSPF hierarchical design minimizes routing

More information

IX Series 2. Description. IX Series 2 System Features

IX Series 2. Description. IX Series 2 System Features IX Series 2 Description The IX Series 2 is a network-based video intercom platform. It is designed for access entry, internal communication, audio paging, and emergency calling applications. The IX Series

More information

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks The InsTITuTe for systems research Isr TechnIcal report 2009-9 Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks Kiran Somasundaram Isr develops, applies and

More information

Monitoring Cable Technologies

Monitoring Cable Technologies 27 CHAPTER Cable broadband communication operates in compliance with the Data Over Cable Service Interface Specification (DOCSIS) standard which prescribes multivendor interoperability and promotes a retail

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Evaluation of the 6TiSCH Network Formation

Evaluation of the 6TiSCH Network Formation Evaluation of the 6TiSCH Network Formation Dario Fanucchi 1 Barbara Staehle 2 Rudi Knorr 1,3 1 Department of Computer Science University of Augsburg, Germany 2 Department of Computer Science University

More information

Wireless Sensor Network based Shooter Localization

Wireless Sensor Network based Shooter Localization Wireless Sensor Network based Shooter Localization Miklos Maroti, Akos Ledeczi, Gyula Simon, Gyorgy Balogh, Branislav Kusy, Andras Nadas, Gabor Pap, Janos Sallai ISIS - Vanderbilt University Overview CONOPS

More information

Microwave Radio Rapid Ring Protection in Pubic Safety P-25 Land Mobile Radio Systems

Microwave Radio Rapid Ring Protection in Pubic Safety P-25 Land Mobile Radio Systems White Paper Microwave Radio Rapid Ring Protection in Pubic Safety P-25 Land Mobile Radio Systems Achieving Mission Critical Reliability Overview New data, video and IP voice services are transforming private

More information

Joint QoS Multicast Routing and Channel Assignment in Multiradio Multichannel Wireless Mesh Networks using Intelligent Computational Methods

Joint QoS Multicast Routing and Channel Assignment in Multiradio Multichannel Wireless Mesh Networks using Intelligent Computational Methods Joint QoS Multicast Routing and Channel Assignment in Multiradio Multichannel Wireless Mesh Networks using Intelligent Computational Methods Hui Cheng,a, Shengxiang Yang b a Department of Computer Science,

More information

Network-building. Introduction. Page 1 of 6

Network-building. Introduction. Page 1 of 6 Page of 6 CS 684: Algorithmic Game Theory Friday, March 2, 2004 Instructor: Eva Tardos Guest Lecturer: Tom Wexler (wexler at cs dot cornell dot edu) Scribe: Richard C. Yeh Network-building This lecture

More information

Mobile & Wireless Networking. Lecture 4: Cellular Concepts & Dealing with Mobility. [Reader, Part 3 & 4]

Mobile & Wireless Networking. Lecture 4: Cellular Concepts & Dealing with Mobility. [Reader, Part 3 & 4] 192620010 Mobile & Wireless Networking Lecture 4: Cellular Concepts & Dealing with Mobility [Reader, Part 3 & 4] Geert Heijenk Outline of Lecture 4 Cellular Concepts q Introduction q Cell layout q Interference

More information

Aizaz U Chaudhry *, Nazia Ahmad and Roshdy HM Hafez. Abstract

Aizaz U Chaudhry *, Nazia Ahmad and Roshdy HM Hafez. Abstract RESEARCH Open Access Improving throughput and fairness by improved channel assignment using topology control based on power control for multi-radio multichannel wireless mesh networks Aizaz U Chaudhry

More information

Secure Ad-Hoc Routing Protocols

Secure Ad-Hoc Routing Protocols Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol

More information

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks The InsTITuTe for systems research Isr TechnIcal report 2009-8 Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks Kiran K. Somasundaram, John S. Baras Isr develops, applies and teaches

More information

Robonet - MANET for Robot Communication

Robonet - MANET for Robot Communication Robonet - MANET for Robot Communication Authors: Stiven Andre Supervisor: Aram Movsisian Motivation Robotic developers need a way for robots to communicate. Swarm of robots want to communicate in a constantly

More information

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Chittabrata Ghosh and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing

More information

Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks

Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks Krishna N. Ramachandran, Elizabeth M. Belding, Kevin C. Almeroth, Milind M. Buddhikot University of California at Santa Barbara

More information

WirelessHART Modeling and Performance Evaluation

WirelessHART Modeling and Performance Evaluation WirelessHART Modeling and Performance Evaluation Anne Remke and Xian Wu October 24, 2013 A. Remke and X. Wu (University of Twente) WirelessHART October 24, 2013 1 / 21 WirelessHART [www.hartcomm.org] A.

More information

Lecture 18: Network Layer Link State and Distance Vector Routing

Lecture 18: Network Layer Link State and Distance Vector Routing Lecture 8: Network Laer Link State and Distance Vector Routing COMP 33, Spring 08 Victoria Manfredi Acknowledgements: materials adapted Computer Networking: A Top Down Approach 7 th edition: 996-06, J.F

More information