• 沒有找到結果。

Analytical study of reliable multicast for host mobility in IP networks

N/A
N/A
Protected

Academic year: 2021

Share "Analytical study of reliable multicast for host mobility in IP networks"

Copied!
5
0
0

加載中.... (立即查看全文)

全文

(1)

Analytical Study of Reliable Multicast for Host Mobility in IP Networks

1





Jiunn-Ru Lai and Wanjiun Liao



Department of Electrical Engineering National Taiwan University

Taipei, Taiwan



1

This work is supported in part by the National Science Council, Taiwan, under Grant Number NSC 89-2219-E-002-004 and Grant Number NSC 89-E-FA06-2.

Abstract This paper studies analytically the performance of reliable multicast for host mobility in IP networks. In particular, we examine two schemes: global token rotating and local recovery with tunneling. Both schemes support reliable multicast for mobile hosts at the expense of extra buffer spaces in mobility agents. The token rotating mechanism uses a rotating token which reports global packet reception status for all the agents in the system to cope with host mobility. An agent cannot remove a packet out of the buffer unless all the mobile hosts in the global system have correctly received the packet. The local recovery with tunneling approach, on the other hand, relieves this global waiting constraint from each agent. It requires each mobile to be registered with one agent, but changeable to a different agent upon handoff. The packets not repairable by new agents are then tunneled from previous agents. Each agent cannot remove a packet unless all the registered hosts under its service have correctly received the packet. We model the buffer requirements of both protocols as an M/G/∞ queuing system, from which we can further derive service latency and system throughput. We have also conducted simulations to verify the derived analytical model. The results show that the local recovery with tunneling mechanism has much smaller buffer size, higher throughput, and lower service latency, as compared to the token rotating mechanism.

Keywords: Mobile reliable multicast, token rotating, RMMP

I. INTRODUCTION

IP multicasting is an efficient group

communications mechanism, providing the same

unreliable service as unicast IP transmission. Reliable multicast protocols [1][2][3][4][5] ensure end-to-end reliable reception of unreliable multicast datagrams for group members, assuming the existence of multicast delivery trees provided by underlying multicast routing protocols. Mobile reliable multicast adds the dimension of host mobility. With a mobile reliable multicast protocol, once a mobile has joined a multicast group, multicast datagrams will not be lost or duplicated due to roaming. Thus, the mobile is allowed to enjoy the service quality of reliable multicast as if it were a stationary host, and receives data streams continuously and reliably even while roaming.

This paper studies analytically the performance of reliable multicast for host mobility in IP networks. In

particular, we examine two protocols: global token rotating [6] and local recovery with tunneling [7]. Both protocols support reliable multicast for mobile hosts at the expense of extra buffer spaces in mobility agents. The token rotating mechanism uses a rotating token which reports global packet reception status for all the agents in the system to cope with host mobility. An agent cannot remove a packet from the buffer unless all the mobile hosts in the global system have correctly received the packet. The local recovery with tunneling approach, on the other hand, relieves this global waiting constraint from each agent. It requires each mobile to be registered with one agent, but changeable to a different agent upon handoff. The packets not repairable by new agents are then tunneled from previous agents. Each agent cannot remove a packet unless all the registered hosts under its service have correctly received the packet. We model the buffer requirements of both

protocols as an M/G/∞ queuing system, from which we

can further derive service latency and system

throughput. We have also conducted simulations to verify the derived analytical model.

The rest of the paper is organized as follows. The analytical model is described in Section II. The performance results are shown in Section III, including the analytical and simulation results. Finally, the concluding remarks are included in Section IV.

II. ANALYTICALMODEL

This section describes the analytical models of two protocols: the logical ring protocol [6] (denoted as Token Rotating (TR) protocol in the rest of the paper) and Reliable Mobile Multicast Protocol (RMMP) (i.e., local recovery with tunneling) [7]. It also examines the time until the last member in a group has successfully received a packet, and system throughput.

(2)

The network topology we consider is a D-by-D mesh with each cell (i.e., subnet) connected to four neighboring cells. Each cell has an agent associated with a multicast router. Suppose there is a single sender X multicasting packets to N identical mobile hosts distributed in theD2cells. Let Tlocal be the average

time to transmit a packet in one attempt in a cell, and

roam

T ,the average time a packet takes to travel one hop (i.e., from a cell to an adjacent cell).

We assume that the event that packets arrive in a cell (i.e., packet arrival to the buffer) is a Poisson distribution with a mean ofλ . To focus on the impact of roaming on packet losses, which in turn affect buffer requirement, we assume no packet loss in the wired part of the network and all the losses are caused in the wireless part. Let the probability of a packet loss in the wireless channel be p. Selective repeat retransmission is assumed to recover lost packets in both protocols due to its well-known property of the highest throughput and the smallest buffer requirement. In addition, it is assumed enough buffers are available to hold all the packets in each agent. Thus, we can regard an infinite buffer in each agent. Depending on which protocol is used, a packet cannot be removed from an agent’s buffer unless

(1) all the mobile hosts in the system have received it correctly (for TR).

(2) all the registered mobile hosts in the affiliated service area have received it correctly (for RMMP). Thus, we can model the buffer of an agent as an M/G/∞ queuing system. The packet arrival rate is λ ; the packet service time has the same distribution as the time a packet is held in the agent’s buffer. The buffer requirement B of each protocol is then equal to the

number of busy servers in the M/G/∞ queuing system.

T

B=λ× ,where T is the mean packet holding time in

the buffer (i.e., the mean service time in the queuing system). Note that since TR does not allow mobile hosts to dynamically join or leave a group, for a fair comparison, we assume a closed network for both protocols. We make two additional assumptions: (1) all loss events in multicast datagrams at any host are mutually independent, and (2) no acknowledgements are lost.

B Buffer Requirement

Let Mrbe the number of transmission attempts for a packet to be received successfully by mobile host r. With a packet loss probability p in the wireless channel, Mris geometrically distributed with a probability mass function as

Taking expectation, we obtain E[Mr] = 1/1-p.

Suppose that there are totally R mobile receivers

for each agent. Denote MR as the number of

transmission attempts for a packet to be successfully

received by all R receivers. Thus, max { }

... 3 , 2 , 1 R r r R M M = = .

Suppose the loss events among the R receivers are mutually independent. The probability cumulative

function of MR is

Taking expectation of MR, we have

1) Global Token Rotating Protocol

The Token Rotating (TR) protocol [6] employs a global token rotating around all the cells in the D-by-D mesh to cope with host mobility for reliable multicast in IP networks. In TR, a packet can be removed from the buffer only when all receivers in the global system have correctly received the packet. There are N mobiles in the system. In the steady state, it is assumed that the N mobiles are uniformly distributed in the D cells. Thus,2 there areNm =N/ D2mobiles in each cell. Suppose that the source is located at cell (m,n) in the D-by-D mesh. A packet cannot be removed from the buffer of any agent unless the agent in the cell farthest (in hop count) from the source has successfully delivered the packet. Thus, the cell farthest from the source dominates the actual packet holding time in TR. In other words, the packet holding time in TR is roughly equal to the time between when a packet has been received by an agent in the cell farthest from the source and when all the mobiles under the service of the agent have correctly received the packet plus the token rotation overhead.

[ ]

] ) 1 ( 1 [ )] 1 ( 1 [ ) ( ) ( 1 1 1 1 1 R k k R k R k M k R p k M P k M P k kP M E R − ∞ = ∞ = ∞ = ∞ = − − ∑ = − ≤ − ∑ = ≥ ∑ = ∑ =

(

)

{ }

,.... 3 , 2 , 1 , ) 1 ( ) ( 1 ,..., 2 , 1 max = − = ≤ ∏ =       ≤ = ≤ = = k p k M P k M P k M P R k r R r r R r R (1) (2) (3)

( )

   = = − otherwise k p p k P k Mr , 0 ,... 3 , 2 , 1 , ) 1 ( 1

(3)

Let Ttokendenote the time a token rotates around all the D cells. Thus,2

length packet Data length Token 2× × = roam token D T T

LetTi denote the mean packet holding time for the

buffer in cell i. Averaging over Ti,∀i=1,2,LD2, we obtain the average packet holding time in the buffer of each cell in TR as where [ ], ) , ( ) , ( ) , ( ) , ( ) , ( ) , (

∀ − = b a and n m between y x y x b a n m H E H Q ) , (ab

H is the distance between the source located at

point (m,n) to the farthest cell located at point (a,b) with

|} | | {| max )] , ( ), , [( ... 3 , 2 , 1 ... 3 , 2 , 1 y n x m b a n m d D y D x − + − = = = .

∀( , ) ) , ( ] [ y x y x H

E is the average distance to the source

located at (m,n) from any point located between the source at cell (m,n) to the farthest cell at point (a,b). Considering all possible points the source may be located,we have According to [8], we obtain odd is if , even is if , ) 1 6 5 ( 6 1 ) 4 6 5 ( 6 1 ] [ 2 2 ) , ( D D D D D D D D Q E mn      + − + − =

Denote BTR as the mean buffer size of TR. Thus, BTRis equal to the mean number of busy servers in an M/G/∞

queuing system with mean service time E[TTR] .

] [ TR

TR ET

B =λ× .

2) Local Recovery with Tunneling

The Reliable Mobile Multicast Protocol (RMMP) [7] employs local recovery with tunneling to cope with

host mobility. In RMMP, a mobile host is registered only with a single mobility agent, who serves as the reliability agent for the mobile as well. Each mobility agent in the affiliated cell maintains a buffer to provide reliable service for the registered mobiles under its service. A packet cannot be removed from the buffer unless all the registered receivers have acknowledged receptions. There are N mobiles in the system. Assume that in the steady state, the N mobiles are uniformly distributed in the D2cells. Thus, each agent provides

service to Nm =N/ D2 mobiles. A packet can be

removed from the buffer only when all theNmmobiles have correctly received the packet.

Let TRMMP denote the packet holding time in

RMMP. Hence,T MNm T

RMMP = × ,where m

N

M is the

number of transmission attempts to correctly receive the packet for Nmmobiles, and T is the transmission time at each attempt. A mobile host may be staying in a cell, or moving from cell to cell during packet receptions. When a cascading handoff occurs during packet receptions, packets may be tunneled across multiple cells. Suppose that the probability a mobile moves out of range (i.e., roams to another cell) from a cell is q. Accounting for possible cascading handoffs, we have

roam local roam local k k T q q T T k T q q T − + = × + − =

∞ = 1 ) ( ) 1 ( 0

Taking expectation of TRMMP, we obtain

Let BRMMPbe the mean buffer size of RMMP. Thus,

RMMP

B is equal to the mean number of busy servers in

an M/G/∞ queuing system with mean service timeE[TRMMP] . BRMMP=λ×E[TRMMP]

C. Other Performance Metrics

From Sec. 2.2, we can derive other performance metrics for both protocols, including the time until the last member in the system has successfully received a packet, and the system throughput. Due to space limitation, we skip the derivations and just present the results. Let R(m,n)be the distance (hop account) from a source located at the point (m,n) to the farthest cell in the D-by-D mesh network. For TR, the time until the

[

]

[

]

∞ = − − − = + × + × = + × + × = 1 1 ) , ( ) , ( ) 1 ( 1 ] [ 3) Eq. (from where ] [ ] [ ] [ ] [ k N k N token roam n m local N token roam n m local N TR m m m m p M E T T Q E T M E T T Q T M E E T E

[

]

(

)

] 1 [ ) 1 ( 1 ] [ ] [ ] [ 1 1 roam local k N k N N RMMP T q q T p T M E T M E T E m m m − + × − − = × = × =

∞ = − token roam n m local N TR E M T Q T T T [ m] (0.5 0.5) ) , ( × + + + × = (4) (5)

(4)

last member to receive a packet is

And for RMMP, it is

III. PERFORMANCE EVALUATION

In this section, we examine the analytical results of both protocols. We have also conducted simulations to verify the derived analytical model. Note that the curves from simulation are mainly for reference, in an attempt to demonstrate the correctness of our analytical model. In the following, we will compare the performance of both protocols in terms of buffer size, service time for the last member, and throughput (scalability).

Figure 1. Error rate vs. buffer size

Figs. 1 to 4 show the mean buffer requirements of both protocols using both the derived analytical model and simulation. The solid lines are from the analytical model; the dash lines are from simulation. Fig. 1 shows the impact of the packet error rate in the wireless channel on mean buffer size. We fixed the following parameters for both the analytical model and the simulation: N=600, D=100, and q=0.1. Both approaches have increasing mean buffer sizes as error rate increases. Compared to RMMP, TR requires much larger average buffer size due to its global token rotation mechanism.

Fig. 2 shows the impact of the mesh dimension on mean buffer sizes of both protocols. We fixed the following parameters: N=600, p=0.1, and q=0.1. The average buffer size of TR increases linearly as mesh buffer size increases. This is because the cell farthest from the source determines the mean buffer size of the agents in TR. Thus, the packets in the cells nearest to the source cannot be removed unless the packets in the farthest cells can be removed. RMMP, on the other hand, relieves this global waiting constraint from the agents. Thus, it is invariant to mesh size and thus has a rather flat curve. In fact, the mean buffer size of RMMP decreases slightly as mesh size increases as shown in Fig. 2. This is because we have fixed mobiles for both approaches (due to assuming a closed network for the analysis. See Sec. 2.1.). According to [8],

) log 1 ( ) log 1 ( 2 D N p p O R p p O BRMMP − = − ≅

The larger the mesh size, the more cells in the system, and the fewer mobile hosts in each cell, resulting in smaller mean buffer requirement.

Figure 2. Mesh size vs. buffer size

Fig. 3 shows the impact of host mobility on the mean buffer sizes of both approaches. We fixed the following parameters: N=600, D=100, and p=0.1. It can be observed that TR is invariant to host mobility because it uses the global token rotating mechanism to cope with packet losses due to host mobility. RMMP, on the other hand, makes use of local recovery and tunneling to deal with packet losses caused by roaming. Therefore, it needs a larger buffer as hosts move more frequently. Nevertheless, even under high mobility, the buffer requirement of RMMP is still much smaller than that of TR.

Fig. 4 shows the time until the last member in the system has successfully received a packet. It can be observed that the curves of the two protocols stay very close together. Note that Fig. 4 shows the finishing time above. as same the is ] [ where ] [ ] ) 1 ( [ ] [ ] [ ) , ( ) , ( n m roam n m roam local N RMMP R E T R E T q q T M E LR E m + × − + × = odd is if , even is if , ) 1 )( 1 3 ( 2 1 ) 2 3 ( 2 1 ] [ where ] [ ] [ ] [ ) , ( ) , ( D D D D D D R E T R E T M E LR E n m roam n m local N TR m      − + − = × + × = 0.0 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0 0.00 0.05 0.10 0.15 0.20 0.25 Error rate A v er age buf fe r si z e Ana_TR Ana_RMMP Sim_TR Sim_RMMP (6) (7) 0.0 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0 10.0 11.0 0 20 40 60 80 100 120 140 Mesh size A v erage buffer si z e Ana_TR Ana_RMMP Sim_TR Sim_RMMP

(5)

of the last member in both protocols. Even if we consider the average service time of each packet in each protocol, according to Eqs. 4 and 5, RMMP still performs better.

Figure 3. Mobility vs. buffer size

Figure 4. Error rate vs. last member finishing time

Figure 5. Scalability

Fig. 5 shows the scalability of both protocols in terms of the number of mobile hosts supported with any given buffer size. We varied the buffer size from 1 to 9 packets, but fixed D=100, N=600, p=0.2, and q=0.3. It can be observed that RMMP scale better than TR even with very small buffer size. For example, with a buffer size less than 8 packets, say 5 packets, RMMP can support up to 100 mobile hosts in a cell, while TR is still unable to work with such small buffer size. The RMMP

curve grows exponentially. With a buffer size of 8, RMMP can support more than 10000 mobiles.

IV. CONCLUSION

We have proposed an analytical model for reliable multicast protocols for host mobility in IP networks. We considered a global token rotating mechanism (i.e., TR) and a local recovery with tunneling (i.e., RMMP) mechanism, and modeled the buffer requirements of

both protocols as an M/G/∞ queue. We then compared

both protocols using both the derived analytical model and simulation. The results have shown that RMMP has much better performance in terms of mean buffer requirements, mean packet holding time, and system throughput, as compared to the global token rotating mechanism.

Reference

[1]S. Floyd et al., “A Reliable Multicast Framework for

Light-weight Sessions and Application Level

Framing,” IEEE/ACM Transaction on Networking, Dec. 1997, Vol.5, No. 6, pp. 784-803.

[2]Jo-Mei Chang and N. F. Maxemchuk, “Reliable

Broadcast Protocols,” ACM Transactions on

Computer Systems, Vol. 1, No. 3, pp. 151-173, Aug. 1984.

[3]S. Paul et al, “Reliable Multicast Transport Protocol (RMTP),” IEEE Journal on Selected Areas in Communications, Vol. 15, No. 3, pp. 407-421, 1997.

[4]D. Li and D. R. Cheriton, “OTHER (On-Tree

Efficient Recovery using Subcasting): A Reliable Multicast Protocol,” in Proc. IEEE ICNP ’99, pp. 237-245, Oct. 1998.

[5]C. Papadopoulos, G. Parulkar, and G. Varghese, “An Error Control Scheme for Large-Scale Multicast Applications,” Proc. IEEE INFOCOM ’98, pp. 1188-1196.

[6]Ioanis Kilolaidis and J. J. Harms, “A Logical Ring Reliable Multicast Protocol for Mobile Nodes,” Proc. IEEE ICNP ’99, Vancouver, Canada, pp. 106-113.

[7]Wanjiun Liao, Jen-an Ke, and Jiunn-Ru Lai,

“Reliable Multicast with Host Mobility,” in Proc. IEEE GLOBECOM 2000, San Francisco, CA, 2000.

[8]Jiunn-Ru Lai and Wanjiun Liao, “Performance

Evaluation of Reliable Multicast Protocols for Host Mobility in IP Networks,” Technical Report, Department of Electrical Engineering, National Taiwan University (TR-NTU-EE-S01-0323), 2001. 0.0 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0 0 0.1 0.2 0.3 0.4 0.5 0.6 Mobility probability A v erage buffer si z e Ana_TR Ana_RMMP Sim_TR Sim_RMMP 0 3 6 9 12 15 18 0.00 0.05 0.10 0.15 0.20 0.25 Error rate L ast recei ver fi n is hi ng ti m e Ana_RMMP Ana_TR Sim_RMMP Sim_TR 0.0 1.0 2.0 3.0 4.0 5.0 6.0 0 1 2 3 4 5 6 7 8 9 10

Buffer size in terms of packet number

N u m b er of MH (l og) Ana_RMMP Ana_TR

數據

Figure 1. Error rate vs. buffer size
Figure 4. Error rate vs. last member finishing time

參考文獻

相關文件

Thus, for example, the sample mean may be regarded as the mean of the order statistics, and the sample pth quantile may be expressed as.. ξ ˆ

(Once again, please be reminded that increase in money supply does not mean that it automatically increases the money holding by the people. It must go through the process that

Particularly, combining the numerical results of the two papers, we may obtain such a conclusion that the merit function method based on ϕ p has a better a global convergence and

Although we have obtained the global and superlinear convergence properties of Algorithm 3.1 under mild conditions, this does not mean that Algorithm 3.1 is practi- cally efficient,

In this paper, we have shown that how to construct complementarity functions for the circular cone complementarity problem, and have proposed four classes of merit func- tions for

Cumulative emissions of CO2 largely determine global mean surface warming by the late 21 st century and beyond.. Cumulative emissions of CO2 largely determine global mean surface

Table 3 Numerical results for Cadzow, FIHT, PGD, DRI and our proposed pMAP on the noisy signal recovery experiment, including iterations (Iter), CPU time in seconds (Time), root of

However, Humanistic Buddhism’s progress in modern times has occurred in the means of reforms, thus the author believes that we can borrow from the results of the analytical