Multicasting: Architectures, Algorithms and Applications
May 2 - 4, 2001
DIMACS Center, Rutgers University, Piscataway, NJ
- Organizers:
- Micah Adler, University of Massachusetts, micah@cs.umass.edu
- D. Frank Hsu, Fordham University, hsu@trill.cis.fordham.edu
Presented under the auspices of the Special Year on Next Generation Networks Technologies and Applications.
Abstracts:
1.
Compression Using Efficient Multicasting
Micah Adler, University of Massachusetts
Many multiprocessor systems have the ability to broadcast
and/or multicast information efficiently. However, this ability is
often overlooked when designing algorithms for these systems. In this
talk, we introduce a new compression technique that uses efficient
multicasting to significantly reduce the amount of information
communicated during parallel and distributed computation, resulting in
significantly faster algorithms for Fast Fourier
Transforms and sorting on shared memory parallel models with limited
bandwidth. These algorithms demonstrate the importance of taking
advantage of efficient multicasting. The compression technique uses a
new, natural variant of Ramsey theory, which may be of independent
interest.
(Joint work with Tom Leighton)
2.
Multicast in Optical Networks
J-C. Bermond
Motivated by wavelength division multiplexing in all-optical networks,
we consider the problem of finding a set of paths from a fixed source
to a multiset of destinations, which can be coloured by the fewest
number of colours so that paths of the same colour do not share an arc.
We prove that this minimum number of colours is equal to the maximum
number of paths that share one arc, minimized over all sets of paths
from the source to the destinations. We do this by modeling the problems
as network flows in two different networks and relating the structure of
their minimum cuts. The problem can be efficiently solved (paths found
and coloured) using network flow techniques.
(this lecture covers work by B. Beauquier, P.Hell and S. Perennes)
3.
Fault-Tolerant and Time-Step Optimal Multicasting
in Mesh Multicomputers Using Faulty-Block-Information
Dr. Xiao Chen
We propose a fault-tolerant and time-step optimal multicast algorithm
for mesh multicomputers based on the concept of the extended safety
level which is a vector associated with each node to capture fault
information in the neighborhood. In the approach each destination is
reached through a minimum number of hops. In order to minimize the total
number of traffic steps, three heuristic strategies are proposed. This
approach can be easily implemented by pipelined circuit switching (PCS).
A simulation study is conducted to measure the total number of traffic
steps under different strategies. Our approach is the first attempt to
address the fault-tolerant and time-step optimal multicast problem in
mesh muticomputers based on limited global information with a simple
model and succinct information.
4.
Supporting Fast Intra-Domain Handoffs and Paging
using Multicast in the Dynamic Mobility Agent
(DMA) Architecture
Subir Das, Archan Misra, Anthony McAuley and
Sajal K. Das (Speaker)
In this talk we will first propose a new architecture, called
Dynamic Mobility Agent (DMA) architecture, for third and fourth
generation (3/4G) wireless cellular networks. The objective is to
reduce the latency of intra-domain location updates and the mobility
related signaling traffic. Then we will discuss the base protocol that
provide fast intra-domain handoffs by using a duration-limited,
proactive packet `multicasting' scheme. We will quantify the
expected buffering requirement of the proposed multicasting scheme for
typical 3/4G network characteristics and compare it with alternative
IP-based fast handoff solutions. We will also present a paging scheme
under the base protocol that replicates the current cellular paging
structure. Our paging mechanism supports generic paging
strategies and can significantly reduce the mobility-related IP
signaling load.
Our scheme allows the use of either mobile node (MN) initiated or
base station (BS) initiated handoff triggers and is applicable to
multiple future link-layer technologies. Moreover, the IP-based
fast handoff technique provides a secure fast handoff solution that does
not assume the existence of specific layer-2 authentication functions
or require the adjacent BSs to be aware of each other's identity.
Finally, the IP-layer paging mechanism, which allows an idle MN to be
located even though it does not perform IP-layer
registration/configuration
at every change in the subnet (BS), makes the scheme relatively
independent of the radio technology.
5.
Reducing the Multicast Routing State
Michalis Faloutsos
IP multicast suffers from scalability problems for large numbers of
multicast groups. In mulitcast routing requires from each router to
keep forwarding state for every multicast tree passing through
it. Therefore, the state grows with the number of multicast groups.
In this work, we propose an approach to reduce multicast forwarding
states. In our approach, multiple groups are forced to share a single
delivery tree. We discuss the advantages and the imlementations
issues of our approach, and conclude that it is feasible and
promising. We then propose metrics to quantify state reduction and
analyze the bounds on state reduction of our approach. Finally, we use
simulations to verify our analytical bounds and quantify the state
reduction. In parallel, we study properties of multicast trees and
the behavior of the members. The initial simulations suggest that our
method can aggregate the routing state significantly.
6.
Issues in Scalable Multicast Protocols
Art Farley, Virginia Lo,(Speaker) Andrzej Proskurowski,(Speaker)
Daniel Zappala
We investigate two related ideas supporting development of scalable
multicast protocols. They concern new network substructures
(generalizing the standard distribution trees) and multiple
"dissemination centers" ("multiple cores"). Our investigations include
both theoretical analysis and experimental evaluation.
In particular, we will present some or
all of the following (time-permitting):
- Definition, distributed protocols for construction, and
experimental evaluation of shared network substructures
(spanners and stanners).
- Theoretical analysis of shared multicast trees for fixed set of sources
- Experimental evaluation of multiple core trees and a distributed
protocol for core placement ("k-domination")
- Experimental evaluation of SSM proxies, an application-level protocol
that implements any-source multicast on top of a source-specific
infrastructure.
7.
Computing connectivity of Cayley networks
Shuhong Gao
The connectivity of a network measures the number of disjoint paths
between any two nodes, or from one node to several other nodes in the network.
It also measures the fault tolerance of the network.
Cayley networks (or Cayley graphs) are constructed from finite groups.
They have many nice properties that make them excellent candidates for
interconnection networks for distributed and parallel computer systems.
In this talk, we show how to compute the connectivity of any given
Cayley network that is connected (i.e. has only one component).
Our algorithm depends only on local information, that is, the degree
of a node and a small neighborhood of the node within a certain distance.
The algorithm is deterministic and has a polynomial time in term of the
degree. Note the number of nodes in the network is generally exponential
in the degree, so our method is efficient in a strong sense.
8.
Service Location Protocols and Architecture for ad-hoc Networks
Guillermo GuiChal
Ad-hoc networks are infrastructureless networks formed on-the-fly by
devices with wireless communication capabilities. They have bandwidth and
device power limitations, as well as the need to deal with mobility. If
client - server interactions are to be present in such networks, a method
for performing service location is needed. When two nodes that are several
hops apart communicate, resources on all the intermediate nodes are
wasted, so it is better to find services that are "closer" to the clients.
Existing service location protocols do not seem suitable for mobile
wireless environments. An underlying, low-level architecture that
addresses network access issues could enable existing protocols to work in
an ad-hoc environment. We have evaluated distributed and centralized
architectures for service location and examined service availability and
message overhead performance using simulations.
9.
Building Dynamic VPN Multicast Trees Using Active Networks
Yaser Haggag and Sampalli Srinivas
Virtual Private Networks (VPN) have emerged as an important
solution to security threats (e.g. eavesdropping, data manipulation,
repudiation) surrounding the use of public networks for private
communications. VPNs provide strong security by integrating a
set of security components such as authentication, encryption, access
control and session management to proof the identity of both
communicating parties, to hide the exchanged data, to only
restrict access to legitimate parties and to insure efficient
operations of the established secure sessions respectively.
Furthermore, VPNs have been proven to be a commercial competitor
to the security offered by leased lines hence allowing
geographically dispersed parties to communicate economically
with each other [18,19].
With the increasing popularity of one-to-many and many-to-many
applications and services being deployed over public networks,
many multicast protocols are being developed to solve issues
in group communications [1,2,3,4]. One major issue is
scalability, which is a resultant of more members joining the
broadcast session thus overwhelming the server causing a decline
in server performance, which in turn slows server data delivery
[5]. Another issue is security, which is required to keep the
broadcast session hidden and unmodified by unauthenticated/unauthorized
recipients [6,7]. One approach to solving the issue of scalability
is to move the broadcast session closer to the members by caching
the broadcast data onto the nearest routers securely, thus improving
scalability and reducing the server loads [8,9].
In this paper we introduce a novel approach under development
called "deployable virtual private networks" (DVPNs) to help
build dynamic (i.e. on demand) secure multicast trees between
the broadcast sever and the cached routers. The novelty of
the approach comes from the use of active network technology
to deploy VPNs. Active network is a new networking technology
that inserts intelligence inside the network to offer on demand
processing and programming capabilities to network nodes and
packets traversing the network [12,13]. This allows routers to
perform computations up to the application layer, thus increasing
the flexibility of the network to speed up the deployment of
new protocols and applications. Active networks offer many benefit
in terms of secure code execution, access control, congestion control
and data caching [13].
According to [13], several architectures have emerged to study
the benefits offered by active networks. One architecture
called active packets, inserts the programmable code only in the
packets travelling the network. Another called active nodes, builds
the programmable code into the intermediate nodes of the network.
However, a hybrid version combing the programmability of the
active packet and node approach appears to be the most promising one.
This paper presents the preliminary results of an ongoing
research project within the Secure Active VPN Environment
(SAVE) project in active networks at Dalhousie University.
PLAN (Programming Language for Active Networks) has been
selected as the execution engine for developing active network
applications and protocols on our test bed since it has emerged
as an important hybrid architecture
combining security, flexibility and efficiency [11,14,15].
DESIGN APPROACH
This section describes the design approach under development
to deploy VPNs for dynamic multicast trees. To build a secure
multicast tree a few assumptions are in place:
(a) Routers are active.
(b) Routers employ Public Key Infrastructure [19].
(c) Routes with statically installed DVPN services are
trusted by the organization deploying the VPN.
(d) VPN multicast trees are most likely to be small or medium
in member's size.
(e) Trusted router can be trusted to enforce multicast
session policies.
In addition to the core services available to PLAN programs,
we have successfully implemented and statically installed five
DVPN services (i.e. functions). Our goal is to dynamically
install DVPN services to demonstrate on demand VPN functionality.
The following is an overview of the implemented services:
1. chuckToBlob: This service converts a chuck (a code hunk
that contains code, a function to execute and bindings
(e.g.. arguments such as data and destination)) into a blob
(a byte array) to be able to encrypt it later using the
encryptBlob service [20].
2. encryptBlob: This service encrypts (scrambles) a blob.
By this we hide any data sent (what ever type it may be)
along with the service(s) required by it to be evaluated.
3. decryptBlob: This service decrypts (unscrambles) a blob
to evaluate it.
4. blobDigest: This service produces a hash value [19] of
the encrypted blob for
the purpose of message integrity check performed by
verifyBlobDigest.
5. verifyBlobDigest: This service checks the integrity
of the received encrypted blob, then decrypts it to be
evaluated.
We have created a network configuration to test the operation
of the above PLAN services by creating a tunnel between two
active routers. To experiment with multicast like applications,
we have created a client chat program using Java (an object orient
programming language) [16] to simulate a broadcast session over active
networks. When the client chat program is injected, the routers interpret
the PLAN code calling on the cryptographic services installed
statically and applying the passed data to them. The implemented
cryptographic mechanisms ensure the exchanged chat text will
remain private. This design provides so far two different levels of
security, data confidentiality and integrity. The client can
either select to call on the encryption and integrity services or on
the encryption service only.
FEATURES OF THE DESIGN
The goal of this design is to develop VPN services that can
be installed dynamically and can be terminated on demand to
provide strong security mechanisms to a multitude of unicast
and multicast applications. Current traditional VPN solutions are
not flexible enough to offer on demand tunnel creation and
termination and are not easy to integrate with many applications
due to their complex interface. DVPNs can offer varying levels of
security, flexibility and usability (such as client-to-client,
client-to-node and node-to-node communication). The flexibility
of the DVPN services allows for the selection between a strong
secure procedure or a performance tailored one. For example,
data exchanges and backups between a main office and its
branch is a trusted one, on the other hand it is performance
demanding. Therefore, requiring fast encryption processing and
fewer authentications. Another example, communication between
businesses and customers can be tailored towards more
authentication than performance to ensure legitimate exchanges.
Furthermore, active networks allow VPN services to be installed
dynamically in a resource-controlled environment. Thus extending
DVPN reachability to traverse untrusted intermediate routers and
networks eliminating interoperability issues suffered by traditional
VPN solutions.
REFERENCES
[1] B. N. Levine, J.J. Garcia-Luna-Aceves, "A Comparison of Reliable
Multicast Protocols", Multimedia Systems, 1998.
[2] R. Canetti, P-C. Cheng, D. Pendarakis, J. R. Rao, P. Rohatgi, D. Saha,
"An Architecture for secure Internet Multicast", IETF Internet Draft
(work in progress), February 1999.
[3] W. Fenner, "Internet Group Management Protocol", Version 2, RFC 2236,
November 1997.
[4] M. Calderon, M. Sedano, A. Azcorra, C. Alonso, "Active Network Support
for Multicast Applications", IEEE Network, May/June 1998, pp. 46-52.
[5] B. Quinn, "IP Multicast Applications, Challenges and Solutions", IETF
Internet Draft (work in progress), November 1998.
[6] M. J. Moyer, J. R. Rao, P. Rohatgi, "A Survey of Security Issues in
Multicast Communications", IEEE Network, November/December 1999, pp. 12-23.
[7] R. Canetti, B. Pinkas, "A Taxonomy of Multicast Security Issues", IETF
Internet Draft (work in progress), April 1999.
[8] L. H. Lehman, S. J. Garland, D. L. Tennenhouse, "Active Reliable
Multicast", IEEE INFOCOM, 1998.
[9] U. Legedza, D. J. Wetherall, J. Guttag, "Improving the Performance of
Distributed Applications Using Active Networks", IEEE INFOCOM, 1998.
[10] D. Alexander, W. Arbaugh, A. Keromytis, J. Smith, "Security in Active
Networks", University of Pennsylvania, 1999.
[11] M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, S. M. Nettles, "PALN:
A Packet Language for Active Networks", in International Conference on
Functional Language (ICFP '98), Baltimore, MD, 1998.
[12] D. L. Tennenhouse et al, "A Survey of Active Network Research", IEEE
Communications Magazine, January 1997, pp 80-86.
[13] K. Psounis, "Active Networks: Application, Security, Safety and
Architectures", IEEE Communications Survey, 1999, Vol. 2, No. 1.
[14] M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, S. M. Nettles,
"Network Programming Using PLAN", University of Pennsylvania. DARPA.
[15] Official PALN web site:
http://www.cis.upenn.edu/~switchware/PLAN
[16] Sun Microsystems Java web site:
http://java.sun.com
[17] M. Hicks, A. Keromytis, "A Secure PLAN", University of Pennsylvania.
DARPA.
[18] D. Kosiur, Building and Managing Virtual Private Networks, John Wiley
and Sons, Inc, USA, 1998.
[19] B. Schneier, Applied Cryptography, John Wiley and Sons, Inc, USA,
1996.
[20] M. Hicks, P. Kakkar, "The PLAN Tutorial", v. 3.1. DARPA.
10.
Scheduled RMP and a Stock Market Application
Nicholas F. Maxemchuk
The reliable multicast protocol,RMP (a.k.a RBP, a.k.a the
Chang/Maxemchuk protocol) was implemented in 1983, and was
the first reliable multicast protocol.RMP has several
characteristics that made it a likely candidate for the stock market
application. In particular:
1. the receivers in RMP all place the messages from all of
the sources in the same sequence,
2. we can eventually guarantee that all of the receivers have
a message, and,
3. at a later time we can guarantee that all of the receivers
know that all of the other receiver have the message.
Using RMP, we created three international stock market systems,
with useful fairness properties:
1. A unified stock ticker of the transactions that are being
conducted on the various physical and electronic exchanges.
This system simultaneously delivers the same composite ticker to
all receivers, anywhere in the world.
2. A unified sequence of buy and sell offers that are delivered to
a single exchange or a collection of exchanges. This system
gives all of the traders the same fair access to an exchange,
independent of their relative distances to the exchange or
the delay and loss characteristics of the international network.
3. A distributed, electronic trading floor. This system has the
fairness attributes of the first two systems and also conducts
irrefutable, distributed trades. The original version of RMP
implemented a distributed database on a local area network.
There were a few tens of sources and receivers and a small number
of messages per minute.
The stock market applications have to accommodate tens of millions
of sources and receivers, transferring millions of messages per
second, internationally, in a hostile environment, here protocol
participants cannot be trusted to cooperate. Most of the differences
in requirements between the original RMP application and the stock
market applications were solved architecturally, by good engineering,
rather than by modifying the protocol.During this presentation,
I will describe the architecture of the stock market systems and
show how it provides the fairness and security that are required.
The high message throughput and the short delivery delays in the stock
market applications required a modification of the protocol.
We solved these problems by changing the protocol from an event
driven protocol to a scheduled protocol. The original version of
RMP is driven by the arrival of source messages.Each source message
is only explicitly acknowledged by one receiver, instead of
by each receiver, by using a combination of positive
acknowledgements, negative acknowledgements, and token passing.When
a receiver accepts the token, it implicitly acknowledges all of the
previously, explicitly acknowledged messages.The penalty for
reducing the number of acknowledgement messages is the delay until
we know that all of the receivers have received an acknowledged
a message. When there are N receivers, the delay is the time
required to acknowledge the next N-1 source message, and is
therefore, a function of both the number of receivers and
the arrival times of future source messages.
The modified version of RMP sends acknowledgements at scheduled
times,rather than being driven by the source messages.
In this scheduled protocol if there is no negative acknowledgement
by a specified time it is the same as a positive acknowledgment.
As a result, we can guarantee that all of the receivers have a
source message at a predetermined time after it is first acknowledged,
independent of the number of other receivers or the message arrival rate.
I am currently determining how tight I can make the interval between the
time a message is first transmitted until I can guarantee that all
of the receivers have the message.The time depends on the network
loss rate and the propagation delay. In certain networks the
guarantees are adequate to meet the quality of service required
by real time applications.
11.
Hierarchical Path QoS on the QoS-based Multicast
Protocol SRSVP
Yasuo Okabe, Takaaki Sekiguchi, Kenji Fujikawa, Kazuo Iwama
We argue on a method to collect information of each
existing multicast flow on hierarchical networks, and describe an
algorithm for Qos multicast routing based on it.
In computing a multicast path with per-flow QoS guarantees precisely,
it is an important problem how routers collect information of
each existing multicast flow. SRSVP, a QoS-based multicast routing
protocol,
is designed as it collects flow-specific detailed information,
called PathQoS, by putting it into signaling messages, so that
the derived QoS path becomes more efficient.
In this paper, we have designed an algorithm to calculate PathQoS
corresponding to an aggregated link state among areas on a hierarchical
network for SRSVP to compute more efficient QoS paths.
We have presented that the methods to calculate PathQoS among areas are
classified to four cases, have considered dependence upon information
needed by the calculations, and have designed an algorithm for routers
to be able to process the methods efficiently. We have implemented
the mechanism to collect PathQoS based on the algorithm.
Now SRSVP is fully adapted to a hierarchical network model.
12.
Bid-based Pricing Approaches for Multicast Sessions in
Heterogeneous Networking Environments
Dan Rubenstein and Micah Adler
One reason that multicast has seen limited deployment is that ISPs are
unsure of how they should charge for such a service. A justifiable
pricing mechanism must satisfy three requirements. First, it must
guarantee the network a profit. Second, the protocols that implement
the pricing mechanism should must themselves be simple and efficient.
Last, the mechanism must permit admission of sessions that allow for
session heterogeneity: receivers within a session should be allowed to
receive at differing rates, and it should not be assumed that all
nodes within the network will provide multicast (i.e., some form of
multicast overlay may be required). In this talk, we demonstrate that
it is indeed possible to efficiently implement a bid-based pricing
mechanism in a multi-rate overlay multicast that optimizes network
profits when a session's transmission is restricted to a single tree.
We also explore the complexities that arise when we attempt to
extending the session's transmission beyond a single tree. Last, we
demonstrate how these bid-based protocols can be used in heterogeneous
environments to implement pricing mechanisms that are strategyproof,
such that receivers have no incentive to bid less than what receiving
the transmission is worth to them.
13.
Distance Learning using IP Multicasting for the Ateneo
Educational System
Rafael P. Saldana
The Ateneo Educational System consists of schools located in various
parts of the Philippine archipelago. Lead by the Ateneo de Manila
University, a distance education program is currently being implemented
in the educational system. Due to IP multicasting technology,
the delivery of high performance computing applications over the
the Internet is now a reality. To enhance the delivery of distance
learning in the Ateneo educational system we are proposing the
utilization of IP multicasting.
14.
How to spread a rumor when not everyone is talking
to each other OR Multicasting in heterogeneous networks
Baruch M. Schieber
In heterogeneous networks, sending messages may incur different
delays on different links, and each node may have a different
switching time between messages. The well-studied telephone
model is obtained when all link delays and switching times are
equal to one unit. We investigate the problem of finding the
minimum time required to multicast a message from one source to
a subset of the nodes of size k. The problem is NP-hard even in
the basic telephone model. We present a polynomial-time algorithm that
approximates the minimum multicast time within a factor of O(log k).
Our algorithm improves on the best known approximation factor
for the telephone model by a factor of O(logn/loglogk), where n
is the total number of nodes. No approximation algorithms
were known for the general model considered by us.
This is joint work with Amotz Bar-Noy, Sudipto Guha and Seffi Naor
16.
A Distributed QoS Multicast Routing Protocol
Yuval Shavitt
Many Internet multicast applications such as teleconferencing
and remote diagnosis have Quality-of-Service (QoS) requirements.
Such requirements can be additive (end-to-end delay),
multiplicative (loss rate) or with a bottleneck nature (bandwidth).
For these applications, QoS multicast routing protocols are
important in enabling new receivers to join a multicast group.
However, current routing protocols are either too restrictive in their
search for a feasible path between a new receiver and the multicast
tree, or burden the network with excessive overhead.
In this talk I'll present S-QMRP, a new Stateless QoS Multicast Routing
Protocol that supports all three QoS requirement types. S-QMRP is
scalable because it has very small communication overhead and
requires no state outside the multicast tree; yet, it retains
a high success probability. S-QMRP achieves the favorable tradeoff
between routing performance and overhead by carefully selecting the
network sub-graph in which it conducts the search for a path
that can support the QoS requirement, and by auto-tuning the
selection according to the current network conditions.
S-QMRP does not require any global network state to be maintained
and can operate on top of any unicast routing protocol.
Our extensive simulation shows that S-QMRP performs better than
the previously suggested protocols.
Joint work with Shigang Chen
17.
Some Techniques for Multicasting in Hypercubes
Hal Sudborough
We consider techniques to minimize message congestion when doing
multicasting in a hypercube architecture. That is, for any integer k, we
consider one-to-k maps which specify, for each node x in the hyper cube,
to which nodes packets are to be sent from x. Our results give techniques
to route such packets that satisfy the requests in specified sets of
one-to-k maps and that guarantee minimal message congestion in any of the
hypercube connections.
18.
The Challenge of Multicasting over Ad Hoc Mobile
Wireless Networks
C-K. Toh
Multicasting over wireless networks has traditionally been investigated in
the view of mobile users moving from the radio coverage of one cell to
another. Current multicasting technqiues used in the Internet are robust
but not necessarily efficient when applied to wireless networks. Most
multicast routing schemes rely on building some forms of multicast trees,
be it source- or core-based. In addition, assumptions were made that
intermediate routers in the tree paths do not move. However, an emerging
new form of totally wireless and pervasive networks known as ad hoc
wireless networks have evolved. Such networks has a completely wireless
backbone, and use multiple wireless links for end-to-end communications.
Multicasting of audio/video/data information in such networks shall
present great challenges to researchers due to the presence of mobility,
bandwidth, and power constraints. One should question the suitability of
multicast trees in such networks and also suggest mechanisms to deal with
group membership dynamics. One should also examine scalability issues
associated with multicasting in an ad hoc based wireless intranet. This
talk shall reveal these problems and encourage thoughts for further
investigations.
19.
Deadlock-Free Prefix Multicasting in Irregular Networks
Jie Wu, Fei Dai, Li Sheng
A deadlock-free multicast scheme called prefix multicasting
in irregular networks is studied. Prefix routing is a special
type of routing where a compact routing table is associated with
each node (processor). Basically, each outgoing channel of a node
is assigned a special label and an outgoing channel is selected if
its label is a prefix of the label of the destination node. Node
and channel labeling in an irregular network are done by using
a pre-defined spanning tree which may or may not be minimum.
The routing process follows a two-phase process of going up and
then down along the spanning tree, with a possible cross channel
between two branches of the tree between two phases. It is shown
that the proposed routing scheme is deadlock- and livelock-free. The
approach is extended to multicasting in which the multicast packet is
first forwarded to the longest common prefix (LCP) of destinations in
the multicast. The packet is then treated as a multi-head worm that
can split at branches of the spanning tree as the packet is forwarded
down the tree. Comparison between prefix multicasting and
Libeskind-Hadas et al's approach for multicasting is given.
Possible extensions are also discussed including reliable prefix routing
and multicasting.
20.
A Scalable Topology for High-Speed LAN and WAN Networks
Sotirios G. Ziavras
We propose a topology to implement backbone networks in the LAN
or WAN environment. This network topology assumes the employment of
fiber optic devices. Wavelengths used in this scalable network are
reusable and a high degree of reliability is supported. We present
efficient algorithms for randomized many-to-all broadcasting and
multicasting in the proposed network. These implementations are tested
under realistic communication traffic patterns and message generations.
A modification of the multicast algorithm applies congestion control
to improve the performance.
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on May 1, 2001.