1 / 22

Spanning Tree and Multicast

Spanning Tree and Multicast. The Story So Far. Switched ethernet is good Besides switching needed to join even multiple classical ethernet networks Routing is expensive, learning switches seem cheaper Flooding in a network with a cycle of switches is bad (why?). Flooding With Cycles.

lilah
Download Presentation

Spanning Tree and Multicast

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Spanning Tree and Multicast

  2. The Story So Far • Switched ethernet is good • Besides switching needed to join even multiple classical ethernet networks • Routing is expensive, learning switches seem cheaper • Flooding in a network with a cycle of switches is bad (why?)

  3. Flooding With Cycles • A wants to send a packet to D • A sends packet to 1 • 1 Floods to 2 and 4 • 2 Floods to B and 3 • 4 Floods to D and 3 <- D receives packet • 3 Floods packet from 2 to C and 4 • 3 Floods packet from 4 to C and 2 • 4 Floods packet from 3 to D and 1 • 2 Floods packet from 3 to B and 1 • 1 Floods packet from 2 to A and 4 • 1 Floods packet from 4 to B and 2 • …. • When does this craziness stop? A 1 2 4 B D 3 C

  4. Fixing with Cycles • DEC (which is long dead) faced the same problem in the mid-1980s (connecting Catenets) • Choices offered • Rely on network administrators to build loop-free topologies • Turns out to be hard • Build a protocol • Given a loopy graph, want no loops • Trees are nice, they don’t have loops • Need a tree that connects all the nodes somehow • Spanning Trees <- Trees spanning over all nodes

  5. The High Level Protocol • Pick a root • For the purposes of this class, root node is the one with the lowest MAC address. • In reality also adds a user specified “priority” into the mix A 1 2 4 B D 3 C

  6. The High Level Protocol • For each node, determine shortest path to root • Break ties by choosing the lower of two MAC addresses • In the example 3 picks the path through 2 rather than 4 A 1 2 4 B D 3 C

  7. The High Level Protocol • Disable all links not used by the previously picked paths. A 1 2 4 B D 3 C

  8. The High Level Protocol • Recomputation for resilience: • If root goes down, select a new root, rerun algorithm • If another node goes down adjust links to recreate the tree. A 1 2 4 B D 3 C

  9. The Protocol in Real Life • Uses messages of the form • (proposed root, distance to root, node sending message) • From example (1, 0, 1) <- “Node 1 proposes that 1 be the root, also it is distance 0 away from 1” • Messages allow for election of root and determining distances • Messages (when sent described next) are always flooded out all ports of a switch • This is not a problem even in the presence of loops. Why?

  10. The Protocol in Real Life • Initially all switches send a message proposing themselves as the root • Messages like (1, 0, 1), (2, 0, 2) etc • Switches update their view of the root • On receiving a message (Y, d, Z) from Z, if id(Y) < id(root), root = Y • Compute distance from the root • If root or shortest distance has changed, flood an update message notifying neighbors of new root and distance • Periodically everyone reannounces their distance and perceived root • Includes the root which sends (root, 0, root) • Used to detect failures and recompute tree when needed.

  11. Multicast • Promise of the 90s • All TV and live events broadcast over the internet • More viewers, more revenue, all over the world. • Too expensive to run one stream per user.

  12. The Problem Your favorite media conglomerate (The Producer) … The Network You A B ZZZZ Everyone else in the world • The individual connections from the “producer” to the network all carry the exact same data. • Similarly each individual stream uses network bandwidth, so there might be 15 copies of thesame data needlessly using up bandwidth. • IDEA: Why not just have the network deal with this, give it one copy of the data and have it determine where the packets go. • Does this violate End-to-End? • Multicast!!!!

  13. Multicast • Fundamentally things to do • Join a multicast group (set of end hosts listening to packets) • Send to group • Different implementation at different layers • Link layer • Easiest to implement, used in LANs • IP • Harder to implement, but allows for greater efficiency (as implemented) • Application level • We ignore this.

  14. Link Layer Multicast • Each multicast groups is denoted by an address G • Join a group by telling NIC about G • NIC then listens for packets sent to address G • Send by broadcasting packet with a destination address of G. • Very efficient in terms of state (end-host stores everything) • Inefficient in terms of bandwidth

  15. IP Multicast • We focus on intra-domain • Portion of IP address space is reserved for Multicast • Receivers join group using IGMP (anyone can join) • Anyone can send (don’t need to be a part of the group) Receiver Receiver Sender

  16. IP Multicast • Take graph on right. • Want Sender to be able to multicast to receivers • Minimize number of packets sent to get one packet from sender to all receivers. • A few ways to do this Receiver Receiver Sender

  17. IP Multicast • Must build a tree from source to all destinations • We know how to flood along a tree • Can build a tree based on a specific source • Distance Vector Multicast Routing Protocol • Build one tree for all possible sources • Core Based Trees Receiver Receiver Sender

  18. DVMRP • An extension to distance vector routing. • Consider distances to source (use source as root of spanning tree). • Three steps, each getting us closer to the ideal. • Reverse Path Flooding • Reverse Path Broadcasting • Truncated Reverse Path Broadcasting Receiver Receiver Sender

  19. DVMRP • RPF • If incoming link is shortest path to source • Send on all links except incoming • Otherwise drop • Packets sent along the black links in the direction marked will be flooded. • Sometimes two of the same packet are sent. • For instance Node X receives the same packet along both L0 and L1, forwards both of them along L2. Receiver L2 X L1 L0 Receiver Sender

  20. DVMRP • RPB • Pick a single parent for each link. • Send packets from parent along a link. • In example to the right Y is picked as the parent for L2. • Packet from Z is not forwarded by X, while packet from Y is, therefore only one packet goes through L2. • Still suboptimal, X does not really need to receive the packet. Receiver L2 X Z L1 L0 Y Receiver Sender

  21. DVMRP • Pruning • Do not send packet to destinations not in the multicast group. • Start by sending to everyone as in RPB • Nodes send an explicit non-membership request if no one below them on the tree wants the data. • In this example X might send a NMR. • Do not send data to a pruned node. • NMR eventually expires, at which point data is again transmitted. Receiver L2 X Z L1 L0 Y Receiver Sender

  22. Core Based Trees • Build a common tree • For each group pick a “rendezvous point” (the Core) • Build a spanning tree rooted at the rendezvous point • Flood using spanning tree algorithm Receiver Receiver Sender

More Related