SlideShare a Scribd company logo
1
Submitted To: 
Submitted By: 
Date: 
2
 In unicasting, the router forwards the received packet through 
only one of its interfaces. 
 The relationship between the source and the destination is one-to- 
one. 
Figure 1 Unicasting. 
3
 In multicast communication, there is one source and a group of 
destination. 
 In multicasting, the router may forward the received packet 
through several of its interfaces. 
 The source address is a unicast address, but destination address 
is a group address. 
4
Packets are 
duplicated in 
routers 
Figure 2 Multicasting. 
5
 Emulation of multicasting through multiple unicasting is not 
efficient and may create long delays, particularly with a large 
group. 
6 
Multicasting 
Multiple Unicasting
One-to-many: 
 Scheduled audio-video distribution (lectures, business TV) 
 Push media (news headlines, weather updates, radio broadcast) 
 File distribution and caching (web site content, file-based updates) 
 Announcements (network time, session schedules) 
 Monitoring (stock prices, telemetry) 
Many-to-many: 
 Multimedia conferencing (audio/video, whiteboards) 
 Synchronized resources (shared distributed databases) 
 Concurrent processing (distributed parallel processing) 
 Collaboration (shared document editing) 
 Distance learning (one-to-many + feedback) 
 Chat groups 7
 In unicast routing, each router in the domain has a table that 
defines a shortest path tree to possible destinations. 
8 
Figure 4 Shortest Path Tree (Unicast Routing). 
.
 Basic requirements of multicast routing: 
 Every group member should receive only one copy of the sent packet. 
 Nonmembers must not receive a copy. 
 A packet must not visit router more than once (no loops). 
 Paths from the source to each destination must be optimal (shortest path). 
 In multicast routing, each involved router needs to construct a 
shortest path tree for each group. 
 Multicast trees (with source at the root and the group members 
being lives) are called spanning trees. The optimal tree is called 
shortest path spanning tree. 
9
 In the source-based tree approach, each router needs to have one 
shortest path tree for each group. 
10 
Figure 5 Source-based tree approach.
 In the group-shared tree , only the core router, which has a 
shortest path tree for each group, is involved in multicasting. 
11 
Figure 6 Group-shared tree approach.
 In multicast routing, Packets from remote sources will only be 
forwarded by IP routers onto a local network only if they know 
there is at least one recipient for that group on that network. 
 Internet Group Management Protocol (IGMP) 
 Used by end hosts to signal that they want to join a specific 
multicast group. 
 Used by routers to discover what groups have interested 
member hosts on each network to which they are attached. 
 Implemented directly over IP. 
12
13 
Figure 7 Taxonomy of common multicast protocols.
 Multicast link state routing is a direct extension of unicast 
routing, uses the source-based tree approach. 
 Every router creates n (n is the number of groups) shortest path 
trees, using Dijkstra’s algorithm. 
 Problem with this protocol is the time and space needed to 
create and store that much trees. 
 MOSPF(Multicast Open Shortest Path First) 
 It used multicast link state routing to create source-based trees. 
 It calculates trees on demand. 
14
 Multicast distance vector routing uses source-based trees, but the 
router never actually makes a routing table. 
 The trees are evanescent, that is after a packet is forwarded the 
table is destroyed. 
 To accomplish the routing, multicast distance vector algorithm 
uses a process based on one of the four decision-making 
strategies. 
 Flooding. 
 Reverse Path Forwarding (RPF). 
 Reverse Path Broadcasting (RPB). 
 Reverse Path Multicasting (RPM). 
15
 Flooding: 
 In flooding, a router receives a packet and sends it out to every 
interface except the from which it was received. 
 Flooding broadcasts packets not multicast. 
 It creates loops in the systems. 
 Reverse Path Forwarding (RPF): 
 RPF eliminates the loops in the flooding process. 
 In RPF , a router forwards only one copy of a packet that has 
traveled the shortest path from the source to the router. 
 To checkout if the packet has come though its shortest path RPF 
uses unicast routing table. 
16
17 
Figure 8 An Example of RPF .
 RPF can eliminate loops but can not guarantee that each network 
receives a single copy of a packet. 
18 
Figure 9 Problem with RPF
 Reverse Path Broadcasting (RPB): 
 RPB creates a shortest path broadcast tree from the source to each 
destination. 
 It guarantees that each destination receives one and only one 
copy of the packet. 
 For each network a designated parent router is selected. The router will 
send a packet to a network only if that router is the designated parent router 
for this network. 
19 
Figure 10 RPF versus RPB
 Truncated RPB (TRPB): 
 Both, RPF and RPB broadcast the packets. Consequently a network 
that doesn't contain the multicast group will receive the packet, and the 
second layer of each host in the network will decide whether to deliver 
or to drop the packet, based on the MAC address. Which is very 
inefficient. 
 In TRPB a designated parent router can determine (via IGMP) 
whether members of a given multicast group are present on the router 
sub-network or not. If this sub-network is a leaf sub-network (it doesn't 
have any other router connected to it) the router will truncate the 
spanning tree. 
20
 Reverse Path Multicasting (RPM): 
 RPM adds pruning and grafting to RPB to create a multicast shortest path 
tree that supports dynamic membership changes. 
 Pruning: 
 The router sends a prune message to the upstream router ,so that the 
upstream router can stop sending multicast messages for this group 
though that interface. 
 Grafting: 
 The graft message forces the upstream router to resume sending the 
multicast messages. 
21
22 
Figure 11 Reverse Path Multicasting (RPM).
23 
Figure 12 RPF, RPB, and RPM.
 The Core-Based Tree (CBT) protocol is a group-shared protocol 
that uses a core as the root of the tree. The autonomous system is 
divided into regions and a core (center router or rendezvous 
router) is chosen for each region. 
 CBT algorithm uses shared trees, instead of source-based trees 
24 
Rendezvous point 
(core router) gets 
JOIN/LEAVE 
requests and forms 
the shared tree 
Unicast packets 
(JOIN/LEAVE 
requests) 
Hosts A and C 
want to join 
group 
Figure 13 CBT structure.
25 
Host E sends a 
message to 
group G1. This 
message is unicast 
to the RP. 
CBT routers 
decapsulate the 
message from E and 
multicast it to the 
group G1 
Sender doesn’t 
necessarily need 
to be a member 
of the group. 
Anybody can be 
a sender, this 
won’t change the 
CBT. 
This router 
doesn’t have to 
be a CBT router 
Each CBT 
router has an 
entry for group 
G1 in routing 
table 
Figure 14 CBT Routing structure.
Advantages: 
 Smaller routing tables (only one entry per group). 
 Senders do not need to join a group to send messages. 
 Simple and robust (only core router maintains connectivity). 
Disadvantages: 
 Shared trees are not as optimal as source-based trees. 
 Core routers can become bottlenecks. 
 A single point of failure. 
26
 Protocol Independent Multicast (PIM) is the name given to two 
independent multicast routing protocols: 
 Protocol Independent Multicast, Dense Mode (PIM-DM), and 
 Protocol Independent Multicast, Sparse Mode (PIM-SM). 
 Dense mode (PIM-DM): 
 Uses source-based trees. 
 PIM-DM uses RPF and pruning/grafting strategies to handle multicasting. 
 It is independent from the underlying unicast protocol. 
 Used in a dense multicast environment, such as a LAN environment. 
 Sparse mode (PIM-SM): 
 Uses shared trees. 
 PIM-SM is used in a sparse multicast environment such as a WAN. 
 PIM-SM is similar to CBT but uses a simpler procedure. 
27
 A multicast router may not find another multicast router in the 
neighborhood to forward the multicast packet. 
 A solution for this problem is tunneling. We make a multicast 
backbone (MBONE) out of these isolated routers using the 
concept of tunneling. 
28 
Virtual point-to- 
point link 
Isolated 
island of 
routers 
nonmulticast 
routers 
Figure 15 Logical tunneling.
 Easy to deploy (no explicit router support). 
 Manual tunnel creation/maintenance. 
 No routing policy – single tree. 
29 
Figure 16 MBONE.
30 
IP header 
G=224.x.x.x 
Data 
Nonmulticast 
routers 
IP header 
G=224.x.x.x 
Data 
Encapsulator 
( router entry 
point of 
the tunnel) 
Decapsulator 
( router exit 
point of 
the tunnel) 
Figure 16 MBONE IP in IP Tunneling
31
Ad

More Related Content

What's hot (20)

Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
Routing
RoutingRouting
Routing
Saima Azam
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
Smriti Tikoo
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
selvakumar_b1985
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
NetProtocol Xpert
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
Ahmad Khalid Nasrat
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
Gunasekara Reddy
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
Nishant Munjal
 
Ospf
 Ospf Ospf
Ospf
DeeN Mohammad
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
Manusha Dilan
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 

Viewers also liked (7)

IP multicast
IP multicastIP multicast
IP multicast
Aqique Kazi
 
data communication
data communicationdata communication
data communication
Abirami Thangavel
 
Multicast vs unicast diagram
Multicast vs unicast diagramMulticast vs unicast diagram
Multicast vs unicast diagram
internetstreams
 
Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)
Sri Prasanna
 
Multicast
MulticastMulticast
Multicast
Sagar Surve
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systems
SHATHAN
 
Multicast vs unicast diagram
Multicast vs unicast diagramMulticast vs unicast diagram
Multicast vs unicast diagram
internetstreams
 
Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)
Sri Prasanna
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systems
SHATHAN
 
Ad

Similar to Multicastingand multicast routing protocols (20)

jpl-multicast.ppt
jpl-multicast.pptjpl-multicast.ppt
jpl-multicast.ppt
RicckySingh
 
Ch14
Ch14Ch14
Ch14
tejindershami
 
Multicasting.ppt
Multicasting.pptMulticasting.ppt
Multicasting.ppt
JebaRaj26
 
Multicast routing protocols
Multicast routing protocolsMulticast routing protocols
Multicast routing protocols
KanwalBloach
 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks
Sasank Chaitanya
 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networks
Reliance Comm
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
Raj Jain The Ohio State University
Raj Jain The Ohio State UniversityRaj Jain The Ohio State University
Raj Jain The Ohio State University
Videoguy
 
One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)
Mumbai Academisc
 
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Subhajit Sahu
 
Incremental deployment service of hop by hop multicast routing protocol(synop...
Incremental deployment service of hop by hop multicast routing protocol(synop...Incremental deployment service of hop by hop multicast routing protocol(synop...
Incremental deployment service of hop by hop multicast routing protocol(synop...
Mumbai Academisc
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
Munnakumar518378
 
Network Layer Protocol.pptx
Network Layer Protocol.pptxNetwork Layer Protocol.pptx
Network Layer Protocol.pptx
SeekayAlaisKaruppaia
 
NetSim Technology Library- Advanced Routing
NetSim Technology Library- Advanced RoutingNetSim Technology Library- Advanced Routing
NetSim Technology Library- Advanced Routing
Vishal Sharma
 
Unit 4
Unit  4Unit  4
Unit 4
APARNA P
 
On-Demand Multicast Routing Protocol
On-Demand Multicast Routing ProtocolOn-Demand Multicast Routing Protocol
On-Demand Multicast Routing Protocol
Senthil Kanth
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
Chamin Nalinda Loku Gam Hewage
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
kuldeep Dwivedi
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
niran10
 
jpl-multicast.ppt
jpl-multicast.pptjpl-multicast.ppt
jpl-multicast.ppt
RicckySingh
 
Multicasting.ppt
Multicasting.pptMulticasting.ppt
Multicasting.ppt
JebaRaj26
 
Multicast routing protocols
Multicast routing protocolsMulticast routing protocols
Multicast routing protocols
KanwalBloach
 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks
Sasank Chaitanya
 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networks
Reliance Comm
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
Raj Jain The Ohio State University
Raj Jain The Ohio State UniversityRaj Jain The Ohio State University
Raj Jain The Ohio State University
Videoguy
 
One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)
Mumbai Academisc
 
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Subhajit Sahu
 
Incremental deployment service of hop by hop multicast routing protocol(synop...
Incremental deployment service of hop by hop multicast routing protocol(synop...Incremental deployment service of hop by hop multicast routing protocol(synop...
Incremental deployment service of hop by hop multicast routing protocol(synop...
Mumbai Academisc
 
NetSim Technology Library- Advanced Routing
NetSim Technology Library- Advanced RoutingNetSim Technology Library- Advanced Routing
NetSim Technology Library- Advanced Routing
Vishal Sharma
 
On-Demand Multicast Routing Protocol
On-Demand Multicast Routing ProtocolOn-Demand Multicast Routing Protocol
On-Demand Multicast Routing Protocol
Senthil Kanth
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
niran10
 
Ad

More from Iffat Anjum (20)

Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentation
Iffat Anjum
 
Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2
Iffat Anjum
 
Lecture 16 17 code-generation
Lecture 16 17 code-generationLecture 16 17 code-generation
Lecture 16 17 code-generation
Iffat Anjum
 
Lecture 14 run time environment
Lecture 14 run time environmentLecture 14 run time environment
Lecture 14 run time environment
Iffat Anjum
 
Lecture 12 intermediate code generation
Lecture 12 intermediate code generationLecture 12 intermediate code generation
Lecture 12 intermediate code generation
Iffat Anjum
 
Lecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptxLecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptx
Iffat Anjum
 
Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2
Iffat Anjum
 
Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05
Iffat Anjum
 
Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01
Iffat Anjum
 
Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4
Iffat Anjum
 
Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3
Iffat Anjum
 
Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2
Iffat Anjum
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysis
Iffat Anjum
 
Lecture 04 syntax analysis
Lecture 04 syntax analysisLecture 04 syntax analysis
Lecture 04 syntax analysis
Iffat Anjum
 
Lecture 02 lexical analysis
Lecture 02 lexical analysisLecture 02 lexical analysis
Lecture 02 lexical analysis
Iffat Anjum
 
Lecture 01 introduction to compiler
Lecture 01 introduction to compilerLecture 01 introduction to compiler
Lecture 01 introduction to compiler
Iffat Anjum
 
Compiler Design - Introduction to Compiler
Compiler Design - Introduction to CompilerCompiler Design - Introduction to Compiler
Compiler Design - Introduction to Compiler
Iffat Anjum
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
Iffat Anjum
 
On qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcareOn qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcare
Iffat Anjum
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentation
Iffat Anjum
 
Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2
Iffat Anjum
 
Lecture 16 17 code-generation
Lecture 16 17 code-generationLecture 16 17 code-generation
Lecture 16 17 code-generation
Iffat Anjum
 
Lecture 14 run time environment
Lecture 14 run time environmentLecture 14 run time environment
Lecture 14 run time environment
Iffat Anjum
 
Lecture 12 intermediate code generation
Lecture 12 intermediate code generationLecture 12 intermediate code generation
Lecture 12 intermediate code generation
Iffat Anjum
 
Lecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptxLecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptx
Iffat Anjum
 
Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2
Iffat Anjum
 
Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05
Iffat Anjum
 
Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01
Iffat Anjum
 
Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4
Iffat Anjum
 
Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3
Iffat Anjum
 
Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2
Iffat Anjum
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysis
Iffat Anjum
 
Lecture 04 syntax analysis
Lecture 04 syntax analysisLecture 04 syntax analysis
Lecture 04 syntax analysis
Iffat Anjum
 
Lecture 02 lexical analysis
Lecture 02 lexical analysisLecture 02 lexical analysis
Lecture 02 lexical analysis
Iffat Anjum
 
Lecture 01 introduction to compiler
Lecture 01 introduction to compilerLecture 01 introduction to compiler
Lecture 01 introduction to compiler
Iffat Anjum
 
Compiler Design - Introduction to Compiler
Compiler Design - Introduction to CompilerCompiler Design - Introduction to Compiler
Compiler Design - Introduction to Compiler
Iffat Anjum
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
Iffat Anjum
 
On qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcareOn qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcare
Iffat Anjum
 

Recently uploaded (20)

Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
MEMS IC Substrate Technologies Guide 2025.pptx
MEMS IC Substrate Technologies Guide 2025.pptxMEMS IC Substrate Technologies Guide 2025.pptx
MEMS IC Substrate Technologies Guide 2025.pptx
IC substrate Shawn Wang
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
ACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentationACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentation
DanielEriksen5
 
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Gary Arora
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
How to Build an AI-Powered App: Tools, Techniques, and Trends
How to Build an AI-Powered App: Tools, Techniques, and TrendsHow to Build an AI-Powered App: Tools, Techniques, and Trends
How to Build an AI-Powered App: Tools, Techniques, and Trends
Nascenture
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
MEMS IC Substrate Technologies Guide 2025.pptx
MEMS IC Substrate Technologies Guide 2025.pptxMEMS IC Substrate Technologies Guide 2025.pptx
MEMS IC Substrate Technologies Guide 2025.pptx
IC substrate Shawn Wang
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
ACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentationACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentation
DanielEriksen5
 
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Gary Arora
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
How to Build an AI-Powered App: Tools, Techniques, and Trends
How to Build an AI-Powered App: Tools, Techniques, and TrendsHow to Build an AI-Powered App: Tools, Techniques, and Trends
How to Build an AI-Powered App: Tools, Techniques, and Trends
Nascenture
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 

Multicastingand multicast routing protocols

  • 1. 1
  • 3.  In unicasting, the router forwards the received packet through only one of its interfaces.  The relationship between the source and the destination is one-to- one. Figure 1 Unicasting. 3
  • 4.  In multicast communication, there is one source and a group of destination.  In multicasting, the router may forward the received packet through several of its interfaces.  The source address is a unicast address, but destination address is a group address. 4
  • 5. Packets are duplicated in routers Figure 2 Multicasting. 5
  • 6.  Emulation of multicasting through multiple unicasting is not efficient and may create long delays, particularly with a large group. 6 Multicasting Multiple Unicasting
  • 7. One-to-many:  Scheduled audio-video distribution (lectures, business TV)  Push media (news headlines, weather updates, radio broadcast)  File distribution and caching (web site content, file-based updates)  Announcements (network time, session schedules)  Monitoring (stock prices, telemetry) Many-to-many:  Multimedia conferencing (audio/video, whiteboards)  Synchronized resources (shared distributed databases)  Concurrent processing (distributed parallel processing)  Collaboration (shared document editing)  Distance learning (one-to-many + feedback)  Chat groups 7
  • 8.  In unicast routing, each router in the domain has a table that defines a shortest path tree to possible destinations. 8 Figure 4 Shortest Path Tree (Unicast Routing). .
  • 9.  Basic requirements of multicast routing:  Every group member should receive only one copy of the sent packet.  Nonmembers must not receive a copy.  A packet must not visit router more than once (no loops).  Paths from the source to each destination must be optimal (shortest path).  In multicast routing, each involved router needs to construct a shortest path tree for each group.  Multicast trees (with source at the root and the group members being lives) are called spanning trees. The optimal tree is called shortest path spanning tree. 9
  • 10.  In the source-based tree approach, each router needs to have one shortest path tree for each group. 10 Figure 5 Source-based tree approach.
  • 11.  In the group-shared tree , only the core router, which has a shortest path tree for each group, is involved in multicasting. 11 Figure 6 Group-shared tree approach.
  • 12.  In multicast routing, Packets from remote sources will only be forwarded by IP routers onto a local network only if they know there is at least one recipient for that group on that network.  Internet Group Management Protocol (IGMP)  Used by end hosts to signal that they want to join a specific multicast group.  Used by routers to discover what groups have interested member hosts on each network to which they are attached.  Implemented directly over IP. 12
  • 13. 13 Figure 7 Taxonomy of common multicast protocols.
  • 14.  Multicast link state routing is a direct extension of unicast routing, uses the source-based tree approach.  Every router creates n (n is the number of groups) shortest path trees, using Dijkstra’s algorithm.  Problem with this protocol is the time and space needed to create and store that much trees.  MOSPF(Multicast Open Shortest Path First)  It used multicast link state routing to create source-based trees.  It calculates trees on demand. 14
  • 15.  Multicast distance vector routing uses source-based trees, but the router never actually makes a routing table.  The trees are evanescent, that is after a packet is forwarded the table is destroyed.  To accomplish the routing, multicast distance vector algorithm uses a process based on one of the four decision-making strategies.  Flooding.  Reverse Path Forwarding (RPF).  Reverse Path Broadcasting (RPB).  Reverse Path Multicasting (RPM). 15
  • 16.  Flooding:  In flooding, a router receives a packet and sends it out to every interface except the from which it was received.  Flooding broadcasts packets not multicast.  It creates loops in the systems.  Reverse Path Forwarding (RPF):  RPF eliminates the loops in the flooding process.  In RPF , a router forwards only one copy of a packet that has traveled the shortest path from the source to the router.  To checkout if the packet has come though its shortest path RPF uses unicast routing table. 16
  • 17. 17 Figure 8 An Example of RPF .
  • 18.  RPF can eliminate loops but can not guarantee that each network receives a single copy of a packet. 18 Figure 9 Problem with RPF
  • 19.  Reverse Path Broadcasting (RPB):  RPB creates a shortest path broadcast tree from the source to each destination.  It guarantees that each destination receives one and only one copy of the packet.  For each network a designated parent router is selected. The router will send a packet to a network only if that router is the designated parent router for this network. 19 Figure 10 RPF versus RPB
  • 20.  Truncated RPB (TRPB):  Both, RPF and RPB broadcast the packets. Consequently a network that doesn't contain the multicast group will receive the packet, and the second layer of each host in the network will decide whether to deliver or to drop the packet, based on the MAC address. Which is very inefficient.  In TRPB a designated parent router can determine (via IGMP) whether members of a given multicast group are present on the router sub-network or not. If this sub-network is a leaf sub-network (it doesn't have any other router connected to it) the router will truncate the spanning tree. 20
  • 21.  Reverse Path Multicasting (RPM):  RPM adds pruning and grafting to RPB to create a multicast shortest path tree that supports dynamic membership changes.  Pruning:  The router sends a prune message to the upstream router ,so that the upstream router can stop sending multicast messages for this group though that interface.  Grafting:  The graft message forces the upstream router to resume sending the multicast messages. 21
  • 22. 22 Figure 11 Reverse Path Multicasting (RPM).
  • 23. 23 Figure 12 RPF, RPB, and RPM.
  • 24.  The Core-Based Tree (CBT) protocol is a group-shared protocol that uses a core as the root of the tree. The autonomous system is divided into regions and a core (center router or rendezvous router) is chosen for each region.  CBT algorithm uses shared trees, instead of source-based trees 24 Rendezvous point (core router) gets JOIN/LEAVE requests and forms the shared tree Unicast packets (JOIN/LEAVE requests) Hosts A and C want to join group Figure 13 CBT structure.
  • 25. 25 Host E sends a message to group G1. This message is unicast to the RP. CBT routers decapsulate the message from E and multicast it to the group G1 Sender doesn’t necessarily need to be a member of the group. Anybody can be a sender, this won’t change the CBT. This router doesn’t have to be a CBT router Each CBT router has an entry for group G1 in routing table Figure 14 CBT Routing structure.
  • 26. Advantages:  Smaller routing tables (only one entry per group).  Senders do not need to join a group to send messages.  Simple and robust (only core router maintains connectivity). Disadvantages:  Shared trees are not as optimal as source-based trees.  Core routers can become bottlenecks.  A single point of failure. 26
  • 27.  Protocol Independent Multicast (PIM) is the name given to two independent multicast routing protocols:  Protocol Independent Multicast, Dense Mode (PIM-DM), and  Protocol Independent Multicast, Sparse Mode (PIM-SM).  Dense mode (PIM-DM):  Uses source-based trees.  PIM-DM uses RPF and pruning/grafting strategies to handle multicasting.  It is independent from the underlying unicast protocol.  Used in a dense multicast environment, such as a LAN environment.  Sparse mode (PIM-SM):  Uses shared trees.  PIM-SM is used in a sparse multicast environment such as a WAN.  PIM-SM is similar to CBT but uses a simpler procedure. 27
  • 28.  A multicast router may not find another multicast router in the neighborhood to forward the multicast packet.  A solution for this problem is tunneling. We make a multicast backbone (MBONE) out of these isolated routers using the concept of tunneling. 28 Virtual point-to- point link Isolated island of routers nonmulticast routers Figure 15 Logical tunneling.
  • 29.  Easy to deploy (no explicit router support).  Manual tunnel creation/maintenance.  No routing policy – single tree. 29 Figure 16 MBONE.
  • 30. 30 IP header G=224.x.x.x Data Nonmulticast routers IP header G=224.x.x.x Data Encapsulator ( router entry point of the tunnel) Decapsulator ( router exit point of the tunnel) Figure 16 MBONE IP in IP Tunneling
  • 31. 31
  翻译: