Multimedia Multicast on the Internet -  - E-Book

Multimedia Multicast on the Internet E-Book

0,0
248,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

This book examines multicast technology and will be a key text for undergraduate engineering students and master students in networks and telecoms. However, it will be equally useful for a wide range of professionals in this research field. Multicast routing was introduced with the advent of multiparty applications (for example, videoconferencing on the Internet) and collaborative work (for example, distributed simulations). It is related to the concept of group communication, a technique introduced to reduce communication costs. The various problems of multicast routing on the Internet are examined in detail. They include: group membership management, quality of service, reliability, safety, scalability and transport. Throughout the text, several protocols are introduced in order to analyze, compare and cover the various aspects of multicast routing.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 597

Veröffentlichungsjahr: 2013

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Preface

Chapter 1: Multicast Routing on the Internet

1.1. Introduction and definitions

1.2. Multicast addressing

1.3. Structure of a multicast router

1.4. Relationship with the other protocol layers

1.5. Belonging to groups: IGMP

1.6. Routing in flood-and-prune mode and the RPF

1.7. Link-state routing and MOSPF

1.8. Routing with explicit construction: PIM-SM and CBT

1.9. Inter-domain multicast routing

1.10. Model of multicasting with a single source: SSM

1.11. Multicasting and IPv6

1.12. Other multicast routing proposals

1.13. Comparison of various protocols

1.14. Alternatives to multicast routing

1.15. Conclusion

1.16. Bibliography

1.17. Glossary of acronyms

Chapter 2: Hierarchical Multicast Protocols with Quality of Service

2.1. Introduction

2.2. Multicast principle

2.3. Multicast routing protocols

2.4. Quality of service in multicast routing

2.5. Hierarchical multicasting

2.6. Hierarchical structure for multicasting

2.7. Conclusion

2.8. Bibliography

Chapter 3: A Transport Protocol for Multimedia Multicast with Differentiated Quality of Service

3.1. Introduction

3.2. State of the art

3.3. Network model, tree and QoS oriented multicast service

3.4. Fully Programmable Transport Protocol

3.5. Integration of multicast services and multimedia protocols

3.6. Conclusion

3.7. Bibliography

Chapter 4: Reliability in Group Communications: An Introduction

4.1. Introduction

4.2. Which reliability for which applications?

4.3. Challenges and big classes of solutions in the case of a reliable group communication service

4.4. FEC codes

4.5. Conclusion

4.6. Bibliography

Chapter 5: End-to-End Approaches for Reliable Communications

5.1. Introduction

5.2. The main protocol classes and the block approach of the IETF

5.3. The FEC building block

5.4. The NORM approach

5.5. ALC approach

5.6. The FLUTE file transfer application on ALC

5.7. A few NORM and FLUTE/ALC available implementations

5.8. Conclusion

5.9. Bibliography

Chapter 6: Router-assist Based Reliable Multicast

6.1. Introduction

6.2. Motivations and objectives

6.3. Protocol network architecture

6.4. Classification

6.5. Placement mechanisms

6.6. Performance analysis

6.7. Conclusion

6.8. Bibliography

Chapter 7: Congestion Control in Multicast Communications

7.1. Introduction

7.2. Congestion control

7.3. The congestion control in group communications

7.4. Single-rate approaches

7.5. Multi-rate approaches

7.6. Approaches with router assistance

7.7. Conclusion

7.8. Bibliography

7.9. Appendix 1: summary table of the approaches quoted in this chapter

7.10. Appendix 2: acronyms of the protocols presented

Chapter 8: Approaches to Multicast Traffic Engineering

8.1. Introduction

8.2. The use of DiffServ mechanisms

8.3. Multicast traffic engineering and MPLS networks

8.4. Conclusion

8.5. Bibliography

Chapter 9: Towards New Protocols for Small Multicast Groups: Explicit Routing and Recursive Unicast

9.1. Introduction

9.2. Explicit multicast routing protocols

9.3. Recursive unicast

9.4. Conclusion

9.5. Bibliography

Chapter 10: Secure Multicast Communications

10.1. Introduction to multicast security

10.2. Multicast authentication

10.3. Multicast confidentiality

10.4. Reliability of key distribution protocols

10.5. General conclusion

10.6. Bibliography

Chapter 11: Scalable Virtual Environments

11.1. Introduction

11.2. Specificities of the LSVE

11.3. Multipoint limitations

11.4. SCORE-ASM

11.5. SCORE-SSM

11.6. Final comment

11.7. Bibliography

List of Authors

Index

First published in France by Hermes Science/Lavoisier in 2005 entitled “Multicast multimédia sur Internet”.

First Published in Great Britain and the United States in 2007 by ISTE Ltd

Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:

ISTE Ltd6 Fitzroy SquareLondon W1T 5DXUKISTE USA4308 Patrice RoadNewport Beach, CA 92663USAwww.iste.co.uk 

© ISTE Ltd, 2007© LAVOISIER, 2005

The rights of Abderrahim Benslimane to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988.

Library of Congress Cataloging-in-Publication Data

Multicast multimedia sur Internet. English

Multimedia multicast on the Internet/edited by Abderrahim Benslimane.

p. cm.

Includes index.

ISBN-13: 978-1-905209-42-2

ISBN-10: 1-905209-42-8

1.  Multicasting (Computer networks) 2.  Multimedia systems--Design.  I. Benslimane, Abderrahim. II. Title.

TK5105.887.M85 2006

004.6'6--dc22

2006032330

British Library Cataloguing-in-Publication Data

A CIP record for this book is available from the British Library

ISBN 10: 1-905209-42-8

ISBN 13: 978-1-905209-42-2

Preface

Multimedia applications such as videoconferences and collaborative applications require an efficient management of networks resources. As such, multicast routing was introduced in order to reduce transmission costs and to enable group management. For the last 12 years, several protocols have been proposed in order to cover various aspects and to solve the problems entailed by multicast routing on the internet such as the management and acknowledgement of quality of service, reliability, security, the scaling factor, etc. The objective of this work is to introduce multicasting in all its forms and to propose a summary of the main elements that are necessary for the design of multicast protocols with several constraints.

Chapter 1 gives the definitions and the basic principles of multicasting. The author presents multicast addressing, the structure of a multicast router and the various intra-domain and inter-domain multicast routing protocols. Then he presents the various types of multicast routing: source specific, explicit and IPv6multicast.

Chapter 2 deals with the aspects of quality of service and with the scaling factor. After introducing several types of multicast trees, the authors describe the multicast protocols by taking into consideration the quality of service and the hierarchical multicast protocols. Finally, the authors present in detail the architecture of hierarchical communication for large scale multicasting by taking into account quality of service.

Chapter 3 deals with the transport protocols for multimedia multicast with quality of service. After introducing the various types of multipoint trees, of architecture and multimedia protocols, the authors present a hierarchized tree model based on a multipoint architecture at the level of the application and a multimedia transport protocol which is entirely programmable, meeting the constraints of quality of service.

Chapters 4 and 5 present the issue of reliability in multicasting. Firstly, the author describes the main principles of the design of reliable communication service while discussing the problems that come along with it, such as the scaling factor. Secondly, he presents the reliability support end-to-end approaches proposed, especially by the IETF.

Chapter 6 deals with the reliability support through remote intermediate nodes. The objective of this chapter is to give an outline of the router support protocols of the broadcast tree recently proposed in the field of reliable multicast communications and to classify them according to the solutions proposed in order to overcome the constraints of the scaling factor.

Chapter 7 presents the congestion control in group communications. The authors present several techniques which are classified based on three approaches: single-rate, multi-rate and router support.

Chapter 8 describes the multicast traffic engineering techniques. The author presents the use of DiffServ mechanisms in the context of the establishment and maintenance of broadcast trees with a differentiated processing of the traffic. Then he presents the use of MPLS traffic engineering techniques capable of establishing point-to-point or point-to-multipoint label switching paths.

Chapter 9 presents multicasting for small groups. The authors present two types of multicast: explicit and recursive unicast. The explicit protocols completely eliminate the multicast routing states by explicitly encoding the recipient list into the packets instead of using an address of the multicast group, whereas the recursive unicast routing protocols partially eliminate these states by using the branching routers of the multicast tree.

Chapter 10 discusses the security of communications in multicast. It classifies the multicast applications and outlines two requirements in terms of security: the authentication and the confidentiality of data. After analyzing these problems, the authors present the main current solutions by outlining their advantages and disadvantages in terms of performance and reliability.

Finally, Chapter 11 deals with multipoint communications for large scale virtual environments. After introducing the features and requirements of virtual environments, the authors describe the communication protocols for these environments, based on two multicast models: many to many and one to many.

To conclude, I would like to thank all the researchers, the authors of the different chapters, who contributed to the writing of this book.

Chapter 1

Multicast Routing on the Internet1

1.1. Introduction and definitions

Multicasting, or selective broadcasting, consists of sending the same data to several recipients. We only consider IP packet switching networks. Hence, multicasting consists of sending the same data packets to n recipients. Generally, there are different types of communication according to the number of recipients:

– unicast communications, where data is sent to one particular recipient;

– broadcast communications, where data is sent to all the machines of a given network. In certain situations, broadcast seeks to reach only one recipient whose address is unknown, as in the ARP protocol [PLU 82];

– multicast communications, which we have already mentioned and whose recipients represent a subset of all the machines of a network;

– anycast communications, where data must reach a recipient and if possible only one, for example the closest one out of a group of recipients.

When considering packet senders, we have point-to-point (one sender and one recipient), point-to-multipoint (one sender and n recipients) and finally multipointto-multipoint (m senders and n recipients) communications.

The concept of group is often associated with multicast communications. A group is a set of entities (machines, procedures, applicative entities, users) taking part in the same communication. According to each situation, there can be a group of recipients, of senders or both.

The applications that use group communications are varied. Here are a few:

– system applications, for example the routers that use the same routing protocol on the same local network discover each other mutually and establish a dialogue via one group (all-ospf-routers group for example). This type of use is usually limited to a single local network and does not need any explicit subscription: it basically means a broadcast replacement. Broadcast disappeared in IPv6, the new version of the IP protocol;

– information broadcast applications, where there is mainly one sender and a possibly very high number of recipients. We can distinguish multimedia multicasting (sound, video) which supposes real-time constraints from reliable computer data multicasting (quoted market prices, software, etc.);

– collaborative or cooperative group applications where the majority of participants are at the same time senders and recipients (network games, collaborative work).

One possibility to create a multicast service is to send from the source, in unicast, as many copies of the packet as the number of recipients. As a consequence, the bandwidth will be used in excess, particularly around the source, and this will impose a centralized management at the source of different recipients. The main goal of IP level multicasting is to reduce the network load by transmitting only the minimum of packet copies from the source towards different recipients and, in addition, to decentralize and reduce recipient management.

In particular, it is advisable that a maximum of one copy of the same multicast packet borrows a network link. If moreover we insist that (which is not always verified in practice) one network node does not receive the same packet by several links, then the graph covered by a multicast packet forms a tree, often called a multicast tree or a broadcast tree. In the case of a single source, we have an oriented tree whose source is the root. In the case of multiple sources, there are unidirectional shared trees, as in PIM-SM, or bidirectional shared trees, as in CBT. The shared trees are usually built around a distinguished node: the CBT core, the rendezvous point of PIM-SM.

The multicast model currently proposed on the Internet is based on the work of Steve Deering [DEE 91], and is sometimes called the Deering model. It is based on the following principles:

– the IP multicast packets have the same format as the IP unicast packets and differ only by the recipient address which is a multicast address (IP address of class D beginning with the bits 1110; see );

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!