Considering Capacities in Application-Layer Multicast over Shared Access Networks

نویسنده

  • Christian Hübsch
چکیده

A huge number of application scenarios would greatly benefit from a group communication service in the Internet, but the existing IP Multicast solution still lacks global availability due to several technical and political issues [1]. As a consequence, Application-Layer Multicast (ALM) [2] arose as a promising solution to overcome this missing global multicast deployment. In ALM, forwarding functionality and membership state is exclusively handled on the participating end systems, following the well-known peer-to-peer paradigm. A typical ALM node has to handle higher traffic load than compared with native IP Multicast because packets are duplicated and forwarded on the nodes rather than in infrastructure routers. Therefore, ALM approaches were initially limited to stationary (comparably high-capacity) end systems that could cope with this higher load. However, recent and ongoing developments in the sectors of access technologies (e.g. VDSL, LTE etc.) and end system capabilities lead to scenarios in which employing ALM on mobile systems becomes feasible. Soon, these developments will render two-digit MBit upand downstream rates possible on every mobile device. This—together with alwayson possibilities at an affordable price— will lead to an intense growth in the number of users of such devices. Additionally, modern end system devices are able to communicate via more than one technology, potentially concurrently (compare Figure 1). Examples are cellular networks, WiFi, or even PANs like Bluetooth. We refer to these devices as multi-modal end systems, which we believe to hold great potential for ALM dissemination. At the same time, consumed contents will also grow in order to use the higher technical capabilities of the devices. Although individual capacities grow, some access technologies used are bound to upper capacity limits (e.g. in cellular network cells). Recently in the US, first service providers suffered from service outages triggered by too many iPhone users congesting the shared medium1. Although not clear if these congestions occured in the backbone or the access domain, the problem will be amplified in ALM scenarios where data is duplicated in end systems rather than infrastructure routers. Consider a videostreaming scenario, already being one of the most bandwidth-intense applications in the Internet. Since cellular networks will be the technology with the highest availability for mobile users, assume that a number of nodes in these access networks want to receive

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Multicast Routing Approaches in Wireless Mesh Networks

Wireless mesh networks (WMNs) which mediates the broadband Internet access, have been recently received many attentions by the researchers. In order to increase capacity in these networks, nodes are equipped with multiple radios tuned on multiple channels emerging multi radio multi-channel WMNs (MRMC WMNs). Therefore, a vital challenge that poses in MRMC WMNs is how to properly assign channels ...

متن کامل

Hierarchical Multicast Tree Algorithms for Application Layer Mesh Networks

This paper proposes a set of novel multicast algorithms for m-D mesh overlay networks that can achieve shorter multicast delay and less resource consumptions. In contrast to previous approaches, our algorithms partition the group members into clusters in the lower layer, seeking an optimal core (root) to guarantee the minimum routing delay for each cluster and building a shared tree within each...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

Title of Dissertation : MULTI - USER SECURITY FOR MULTICAST COMMUNICATIONS

Title of Dissertation: MULTI-USER SECURITY FOR MULTICAST COMMUNICATIONS Yan Sun, Doctor of Philosophy, 2004 Dissertation directed by: Professor K. J. Ray Liu Department of Electrical and Computer Engineering The ubiquity of communication networks is facilitating the development of wireless and Internet applications aimed at allowing users to communicate and collaborate amongst themselves. In th...

متن کامل

Multicast computer network routing using genetic algorithm and ant colony

Due to the growth and development of computer networks, the importance of the routing topic has been increased. The importance of the use of multicast networks is not negligible nowadays. Many of multimedia programs need to use a communication link to send a packet from a sender to several receivers. To support such programs, there is a need to make an optimal multicast tree to indicate the opt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010