140 likes | 148 Views
This article discusses the challenges and solutions related to multicast deployment, including capacity, latency, reliability, and security. It also explores the use of overlays and underlays in network architecture. The Location/Identity split approach for mobility is also examined.
E N D
Network Architecture (R02) #3Multicast and Deployment Jon Crowcroft, http://www.cl.cam.ac.uk/~jac22 http://www.cl.cam.ac.uk/teaching/1011/R02
+ve multicast for publisher • Capacity win at sender • Some capacity win in network • Latency lower potentially • For very very popular live content • Might be only technique • Might steal broadcast tv/radio customers into ISP customer base • Ease of writing applications • Especially collaborative tools (wb/nte etc) for ASM • Except many-to-many reliability very hard:(
-ve for IP Multicast • Problems abounded early on with ASM • Only tunnel based implementation • Fanout limit 6! (ethernet:-( • DVMRP limits • First native code broke unicast • Berkeley report • Igmp v1 timers • PIM route loop!
Time to market • Slowed by bugs • Since then, timeshifting for media (tivo) • New Needs • Share trading still big customer • Urgent (zero day defense) software update • See vigilante for example • Market needs • ISP loses money from multicast:) • Big publisher wins • ISP loses money from CDNs too….
Architectural list of problems • Some are same as for CDN • Except who manages things • Even Inter-domain • E.g. neutrality debate is basically about CDN v. ISP and impact on peering • Security perhaps main pb • Esp. potential DDoS leverage… • multiplier bad
State complexity v. packet forwarding • PGM has same state complexity as SSM • Latches rx nack state on fwd filter • Can have local rtx too • Digital Fountain allows some timeshift • Complex to manage • All single ISP/AS, not interdomain • Interdomain addr allocation not solves really • Traffic breaks peering rules (reverse path:( • So does interdomain P2P and CDN traffic, though
Privacy, Integrity, DDoS prev • Need key distribution • key graph for ASM • Re-key cost (for fwd/reverse secrecy) expensive • Need source management • Need receiver control • Police IGMP join to group per group • Same as CDN, but free there already • Auth is from subscriber to cloud
ASM, SSM, CDN, pub/sub, p2p • Traffic Engineering? • Per source? Per Content? • Energy reduction? • With timeshifting? • V. p2p? • Hybrids? • Server assist P2P? • Multicast assist CDN? • In Net record/timeshift?
general deployment tricks… • Overlay • Underlay • Tunnel • Map/encap
Overlays and Underlays • IP was once an overlay • On x.25 and on PSTN • Then moved down to bare metal • ip on photons too • Overlays are a deployment/evolutionary route • see national academy of science on “looking over the fence at network research)
Other overlay schemes • Mbone, 6bone, abone • RON • Application Layer Multicast • IP on SMS and on Fb! • IP on DNS • Typically tunnel…but • IP in IP overhead • IP on VC - complexity • Circuit setup/teardown • #circuits, qos • routing
Underlays • more revolutionary than overlays • Not many examples - • MPLS, gMPLS • Finesse management/routing problem • 3gpp/cellular • Finesse mobility&billing problem • Other?
Multicast, mobile, multihome • Similar • More than 1 address (at time, in space) • Dynamic - add receiver/delete • Different • Group dynamics possibly fast • Mobility limited by physics • Multihoming slow
Next talk for 25/10/10 The Location/Identity split has been pushed since 8+8 as the solution to mobility (and multihoming) Discuss the various approaches (e.g. 8+8 and LISP) and their various merits and demerits