Você está na página 1de 19

1

Page 1
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Wireless Communication Protocols and
Technologies
by Haibo Wang, Petar Popovski, Hans Peter Schwefel
Mm1 Advanced mobility support (hps)
Mm2 Ad-hoc networks (pp)
Mm3 Wireless multi-cast (hw)
Mm4 Intro to performance modelling (HPS)
Mm5 Simulation Techniques and Measurements (HPS)
www.kom.auc.dk/~hw/
Page 2
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Content
1. Introduction of mobile
Multicast
1.1 What is Multicast?
1.2 WhyMulticast is needed?
1.3 Motivation of using Multicast
in wireless network
2. Multicast on the Internet
2.1 MBONE
2.2 Group Membership
Management
2.3 Multicast Routing
2.4 Application Layer Multicast
3. Multicast in wireless Access Network
challenges and solutions
3.1 Multicast Routing in mobile scenario
3.4 Heterogeneityin Access Networks
3.2 Reliable multicast
3.3 Bandwidth limitation
4. Summary
5. Exercise
2
Page 3
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
1.1 What Is Multicast?
There are three fundamental data transmission methods
Unicast is a type of point-to-point traffic between two users (one-to-
one type of traffic) (PTP)
Multicast is a type of traffic from one sender to a specific group of
users (one-to-many type of traffic) (PTM)
Broadcast is a type of traffic from one sender to all the users who are
able to recieve it.
Q: Can you think of some examples of them?
Page 4
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Example
Unicast Broadcast Multicast
B C D
Communication
Network
A
B C D
Communication
Network
A
B C D
Communication
Network
A
3
Page 5
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
1.2 Why Multicast is needed?
When there is no Multicast, if several users require the same
content, several unicast traffic streams carring the same
content have to pass one link several times, which waste
network bandwidth!
Source
Internet
Router Router
Router
Router
Router
Page 6
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Why Multicast is needed? -cont
In case of multicast, the content will be deliver along the Multicast
Tree, and only be copied when the two branches split.
->Multicast saves network resources, which is expecially important
for broadband application.
Source
Internet
Router Router
Router
Router
Router
4
Page 7
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
1.3 Motivation of using Multicast in wireless
network
Bandwidth to end users in wired and wireless networks
Comparing to wired network, bandwidth in wireless networks is much more
scarce, hence it is more crucial to share bandwidth via multicast!
Up to 11.3M WiMAX Up to 30M Cable TV +cable
Modem
384K WCDMA Up to 12M ADSL
11M/54M (shared) Wireless LAN 10M/100M LAN
Downlink bit rate
(bps)
Wireless Access
Technology
Downlink bit
rate
(bps)
Wired Access
Technology
Page 8
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Content
1. Introduction of mobile
Multicast
1.1 What is Multicast?
1.2 WhyMulticast is needed?
1.3 Motivation of using Multicast
in wireless network
2. Multicast on the Internet
2.1 MBONE
2.2 Group Membership
Management
2.3 Multicast Routing
2.4 Application Layer Multicast
3. Multicast in wireless Access
Network challenges and
solutions
3.1 Multicast Routing in mobile scenario
3.4 Heterogeneityin Access Networks
3.2 Reliable multicast
3.3 Bandwidth limitation
4. Summary
5. Exercise
5
Page 9
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
2. Multicast on the Internet
Reviewthe three fundamental communication methods for the Internet:
IP Unicast
IP Broadcast
Q: If it is pratical for LAN and WAN?
IP Multicast
- Based on a user group, which users can join by exchanging
messages.
- Only groupmembers receive the data streamno matter where
they are in the Internet.
Page 10
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Internet Protocol (IP) provides best effort
and connectionless service
Reliability provided by upper levels
IP Multicast
OSI 7 Layers Model
IP
TCP UDP
In IPv4, Class D of IP-addresses is used for multicast groups
From 224.0.0.0 to 239.255.255.255
Special addresses
- 224.0.0.0 is never used
- 224.0.0.1 all multicast hosts on the local networks
- 224.0.0.2 all multicast routers on the local networks
Group Identification 0 1 1 1
0 2 1 31 3
6
Page 11
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
2.1 MBONE
Router
Multicast
Router
Multicast
Router
Multicast
Router
Router
Router
UE
Tunnel
Tunnel
Tunnel
UE
UE
Multicast backbone (MBONE) is a well-known implementation
of IP Multicast.
Page 12
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
MBONE Features
Virtual overlay network, operated since 1992
uses User Datagram Protocol (UDP)
Most IP routers in that period didnt support multicast routing
Forwarding of multicast datagrams between multicast-enabled
subnetworks is handled by multicast routersthrough tunnels
Tunnels are implemented by encapsulating IP packets (destined to
a multicast address) within an IP packet with the unicast address
of next multicast capable router along the path [1].
7
Page 13
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
MBONE Multimedia Applications
Video conferencing
uses RTPv2 (Real Time Protocol)
allows slow frame rates
Audio conferencing
Freephone, uses special coding
Internet Radio and TV
Other free applications for Audio, Video and Whiteboard
Page 14
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
2.2 Group Membership Management
- IGMP
Internet Group Management Protocol
When a hosts joins a group, sends IGMP to all neighboring
multicast routers and other multicast-enabled hosts on local
network.
Multicast routers listen to IGMP messages and periodically send
out queries to discover which groups are active or inactive on a
particular subnet.[2]
If there is no reply of its queries, the router times out the group and
stops forwarding traffic directed toward that group.
8
Page 15
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
IGMP Message Format
Type =Query or Response
0 8 16 4 31
CheckSum Unused Type Version
Group Address (0 in query)
Page 16
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
2.3 Multicast Routing
- Multicast Distribution Trees
Multicast-capable routers create distribution trees as the path to
deliver traffic to all receivers.
The two basic types of multicast distribution trees [2]
- Source Trees
The tree root is simply the traffic source. This tree uses the shortest path through
the network, so it is also named as a shortest path tree (SPT).
- Shared Trees
Shared trees use a single common root at a chosen point in the network. This
shared root is called the Rendezvous Point (RP).
9
Page 17
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Examples
Source
Router Router
Router Router
Router
Source
Router Router
Router Router
Router
RP
Source tree Shared tree
Page 18
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Comparison of Source Trees & Shared
Trees
-the paths between the source
and receivers might not be the
optimal path;
- longer latency
The routers must maintain path
information for each source.
(What problem could it cause in
a large scale network?)
Disadva
ntages
- minimum amount of state
need to be kept in each router,
which lowers the overall
memory requirements (for a
network that allows only shared
trees).
- optimal path between the
source and the receivers;
- minimum transmission delay
Advanta
ges
Shared Trees Source Trees
10
Page 19
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Multicast Routing
- Reverse Path Forwarding (RPF)
Source
Router
Router
Upstream
Downstream
Router
Router
- In multicast forwarding, the router must identifydirection is upstreamand which
is downstream.
- To forward multicast traffic away from the source, rather than to the receiver, is
called reverse path forwarding (RPF).
Page 20
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
- Reverse Path Forwarding (RPF) cont.
When a multicast packet arrives at a
router, an RPF check is performed
on the packet.
Step 1 Router checks the source
address in the unicast routing table
->whether it was received on the
interface that is on the reverse path
back to the source(upstream).
Step 2 If packet is from upstream, the
RPF check is successful and the
packet is forwarded.
Step 3 If not from upstream, the RPF
check fails and the packet is dropped.
Router
Upstream
Downstream
S0
S2
S1
S1 198.14.32.0/24
S2 204.1.16.0/24
S0 151.10.0.0/16
Interface Network
Multcast route table
Source: 151.10.5.21
11
Page 21
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Multicast Routing Protocols
Sparse and
Dense mode
From unicast
routing table
Source trees or
shared trees
PIM
Not scalable Link state
database
Source trees MOSPF
Not scalable
Used by MBONE
Message
exchange
between routers
Source trees DVMRP
Memo Information
Collection
Tree Type Protocol
DVMRP: Distance Vector Multicast Routing Protocol
MOSPF: Multicast Open Shortest Path First
PIM: Protocol Independent Multicast
Page 22
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Protocol-Independent Multicast (PIM)
PIM does not depend on any specific IP routing protocols.
PIM uses existing unicast routing information to perform the
multicast forwarding function, such as the reverse path forwarding
(RPF) check.
PIM does not build up a completely multicast routing table at all.
PIM does not exchange multicast routing updates between routers
like other routing protocols do.
12
Page 23
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
PIM - Dense Mode & Sparse Mode
PIM Dense Mode (PIM-DM)
PIM-DM initially push multicast traffic to all the subnet. Routers
that do not have any downstream receivers will prune back the
unwanted traffic.
- In this Push and Prune process routes collect their state
information and build up their multicast forwarding tables.
- PIM-DM can support only source trees.
Page 24
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
PIM - Dense Mode & Sparse Mode (cont)
PIM Sparse Mode (PIM-SM)
A pull model is used in PIM-SM to deliver multicast traffic. Only
active receivers who have explicitly requested the data will be
forwarded the traffic to their network.
- PIM-SM uses a shared tree for multicast traffic distribution.
- PIM-SM scales well to different sizes of networks.
Q: Can you think in which case PIM-DM will performbetter and in
which case PIM-SM will performbetter?
13
Page 25
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Tip: Multicast provisioning in IPv6
In IPv6, multicast is a part of the protocol and supported by all IPv6
nodes.
->No specific Multicast router needed!
A multicast address format starts with FF (the first 8 bits of the total 128
bits IP address).
The IGMP functionality is included in ICMPv6 and named as Multicast
Listener Discovery (MLD).
Page 26
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
2.4 Application Layer Multicast (ALM)
How does ALM work?
Hosts self-organize into an overlay network and deliver data like
routers.
The multicast functions like Group Management and Distribution
Tree building are shifted from network layer (IP layer) to application
layer (end hosts) [3] .
Why ALM?
The multicast schemes talked before all rely on multicast-
enabled routers.
However, many networks are not designed to support
multicast communications
14
Page 27
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
3. Multicast in wireless Access
Network challenges and
solutions
3.1 Multicast Routing in mobile scenario
3.4 Heterogeneityin Access Networks
3.2 Reliable multicast
3.3 Bandwidth limitation
4. Summary
5. Exercise
Content
1. Introduction of mobile
Multicast
1.1 What is Multicast?
1.2 WhyMulticast is needed?
1.3 Motivation of using Multicast
in wireless network
2. Multicast on the Internet
2.1 MBONE
2.2 Group Membership
Management
2.3 Multicast Routing
2.4 Application Layer Multicast
Page 28
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Mobility
- Frequent changes on the multicast tree due to the group
members moving to different subnet.
Heterogeneity in Access networks
- Different Bandwidth for group members in the same group
(WLAN, GPRS, 3G)
Wireless transmission is unreliable comparing to wired
transmission
- High bit error rate (i.e., 10%), packet loss, delay and jitter
Limited and asymmetrical bandwidth in wireless link [4].
3. IP Mobile Multicast Challenges &
possible solutions
15
Page 29
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
3.1 Multicast Routing for Mobile Hosts
MIP solutions
Solution 1: Remote Subscription
MC
Source
Network 1
HA
Router
Network 2
FA
Page 30
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
MC
Source
Network 1
HA
Router
Network 2
FA
Solution 2: Bi-directional tunneled multicast
Tunnel
16
Page 31
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
3.2 Heterogeneity in Access networks
Multicast
source
IP based core network
UMTS
WLAN GPRS
64K
384K
11M
Page 32
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Heterogeneity in Access networks -cont
Adapt QoS to access network capacity
such as to us multiple flow/ multi-layer coded video traffic stream
for different QoS level [5]
L
a
y
e
r
e
d
C
o
d
e
r
D
+
+
D
D
Layer 0
Layer 1
Layer 2
64kbps
1Mbps
256kbps
Video
received
video
quality
Low
Medium
High
17
Page 33
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
3.3. Reliable multicast
Power control
Error control coding
Retransmission, possiblely from the neighbour users (Co-operative
retransmission)
Wireless
AP
Router
Multicast
Traffic
The group
member has
good signal
helpto
retransmit.
Members
in poor
signal
condition.
Page 34
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
- Protocols to adapt membership management and routing
updates to the bandwidth available, with reduced overhead
(such as header compression)
3.4 Bandwidth limitation
18
Page 35
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
3. Multicast in wireless Access Network
challenges and solutions
3.1 Multicast Routing in mobile scenario
3.4 Heterogeneityin Access Networks
3.2 Reliable multicast
3.3 Bandwidth limitation
4. Summary
5. Exercise
4. Summary
1. Introduction of mobile
Multicast
1.1 What is Multicast?
1.2 WhyMulticast is needed?
1.3 Motivation of using Multicast
in wireless network
2. Multicast on the Internet
2.1 MBONE
2.2 Group Membership
Management
2.3 Multicast Routing
2.4 Application Layer Multicast
Page 36
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
References
1. Mikko Mustakallio, Lecture Notes: Multicasting Issues and Networking
Support, 2002
2. Internetworking Technologies Handbook, chapter 43, www.cisco.com
3. A.Garyfalos, K.Almeroth, J .Finney, A Comparison of Network and
Application Layer Multicast for Mobile IPv6 Networks, MSWiM03,
September 19, 2003, San Diego, California, USA.
4. Upkar Varshney, Multicast over wireless Networks, Communications of the
ACM, Dec 2002/Vol45, No12.
5. Dapeng Wu, Yiwei Thomas Hou and Ya-qin Zhang, Scalable Video Coding
and Transport over Broad-Band Wireless Networks, proceedings of the
IEEE, vol. 89, No. 1, J anuary 2001
19
Page 37
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
Exercise
1. In section 3, assume the multicast source is a mobile host, and it moves from its home
network (network 1) to another network(network 2), which connect to a different
interace of the router which is the root of a shared tree to a group of users. What will
happen when a MC packet from the new source position arrive at the root
router? Discuss which solution from MIP can solve this problem better? Can
you think of any other proposal to adapt the MC tree to mobile scenario?
Network 2
MC
Source
Network 1
HA
FA
interface1
MC
Source
interface2
Router
Root
Router
Router
Page 38
Hans Peter Schwefel
Wireless Networks II, Lecture 1, Spring 04
2. If in a WLAN cell there are 8 mobile hosts demanding the same
video streaming service, which requires a 1Mbps data rate
transmission. Calculate howmuch cell capacity (in terms of Mbps)
could be saved by using one multicast instead of 8 unicast
transmission.
3. Discuss whether multicast is applicable in your project scenario, if it
is, what benefits and challenge will it bring to your scenario?

Você também pode gostar