Mobility and Multicast Mobility and Multicast Protocol Design and Analysis Protocol Design and Analysis Rolland Vida, Luis Costa, Serge Fdida Rolland Vida, Luis Costa, Serge Fdida Laboratoire d’Informatique de Paris 6 – LIP6 Laboratoire d’Informatique de Paris 6 – LIP6 Université Pierre et Marie Curie, Paris Université Pierre et Marie Curie, Paris ISCIS XVII, October 28-30, Orlando, FL ISCIS XVII, October 28-30, Orlando, FL
25
Embed
Mobility and Multicast Protocol Design and Analysis Rolland Vida, Luis Costa, Serge Fdida Laboratoire d’Informatique de Paris 6 – LIP6 Université Pierre.
ISCIS XVII, Orlando, FL 3 The problem More and more emerging mobile devices Mobility handling became an important service requirement Consider the following: a multicast group, identified by a multicast address G a source S that sends data to G a receiver r that listens to packets sent to G How to assure multicast data delivery if … the source S is mobile or the receiver r is mobile
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Mobility and MulticastMobility and Multicast Protocol Design and AnalysisProtocol Design and Analysis
Rolland Vida, Luis Costa, Serge FdidaRolland Vida, Luis Costa, Serge FdidaLaboratoire d’Informatique de Paris 6 – LIP6 Laboratoire d’Informatique de Paris 6 – LIP6
Université Pierre et Marie Curie, ParisUniversité Pierre et Marie Curie, Paris
ISCIS XVII, October 28-30, Orlando, FLISCIS XVII, October 28-30, Orlando, FL
ISCIS XVIIISCIS XVII, , Orlando, FLOrlando, FL 22
OutlineOutline
The mobility problem in a multicast group Traditional solutions
Bi-directional tunnelingRemote subscription
Reducing routing triangles in M-HBH Performance analysis
Theoretical modelsSimulation results
Conclusion
ISCIS XVIIISCIS XVII, , Orlando, FLOrlando, FL 33
The problemThe problem
More and more emerging mobile devices Mobility handling became an important service
requirement Consider the following:
a multicast group, identified by a multicast address G
a source S that sends data to G a receiver r that listens to packets sent to G
How to assure multicast data delivery if … the source S is mobile
or the receiver r is mobile
ISCIS XVIIISCIS XVII, , Orlando, FLOrlando, FL 44
Traditional solutions (1)Traditional solutions (1)
Proposed by Mobile IP [Perkins, RFC 3220] Bi-directional tunneling (BT)
tunnel between the home and the foreign location of the MN
Source mobility: data is tunneled to the home network, and then retransmitted on the old tree
Receiver mobility: data is delivered on the old tree, and then tunneled to the MN
Drawbacks: triangular routing encapsulation/decapsulation of data
ISCIS XVIIISCIS XVII, , Orlando, FLOrlando, FL 55
ExampleExample
R1
R5
R4
R2
R3
S
r4r3
r2
r1
S’ HA
ISCIS XVIIISCIS XVII, , Orlando, FLOrlando, FL 66
Traditional solutions (2)Traditional solutions (2) Remote subscription (RS)
reconfiguration of the multicast tree according to the new location of the MN
Source mobility: receivers redirect their Join messages towards the new location of the source
Receiver mobility: the MN joins the tree from its new location
Drawbacks: Source mobility:
• the entire tree must be reconstructed• reconstruction is costly, not efficient for a highly
mobile source Receiver Mobility
• cost is lower, only a branch has to be added
ISCIS XVIIISCIS XVII, , Orlando, FLOrlando, FL 77
ExampleExample
R1
R5
R4
R2
R3
S
r4r3
r2
r1
S’
R6
R7
ISCIS XVIIISCIS XVII, , Orlando, FLOrlando, FL 88
ExampleExample
R1
R5
R4
R2
R3
S
r4r3
r2
r1
S’
R6
R7
R1
S
ISCIS XVIIISCIS XVII, , Orlando, FLOrlando, FL 99
HBH multicast HBH multicast
In traditional multicast, the group is a single unit, identified by the multicast address
Mobility of an individual member is hard to handle Keep the unit (tree) + tunnel Reconstruct the unit (tree)
HBH – Hop-By-Hop Multicast Routing [Costa et al., Sigcomm ’01] Uses a recursive unicast addressing scheme to
provide multicast Data is not sent to the group, but to the next
branching node Nodes are handled as individuals, not as a