Implementation of multicast communication in internet
Individual hosts are configured as members of different multicast groups
One particular user may a member of many multicast groups
For a one multicast can be few members/nodes
IP Multicast group is identified by Class D address (224.0.0.0 – 239.255.255.255)
Every IP datagram send to a multicast group is transferred to all members of group
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
1) Configure a router to route between multiple directly connected networks
2) Describe the primary functions and features of a router.
3) Explain how routers use information in data packets to make forwarding decisions in a small- to medium-sized business network.
4) Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces.
5) Compare ways in which a router builds a routing table when operating in a small- to medium-sized business network.
6) Explain routing table entries for directly connected networks.
7) Explain how a router builds a routing table of directly connected networks.
8) Explain how a router builds a routing table using static routes.
9) Explain how a router builds a routing table using a dynamic routing protocol.
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
1) Configure a router to route between multiple directly connected networks
2) Describe the primary functions and features of a router.
3) Explain how routers use information in data packets to make forwarding decisions in a small- to medium-sized business network.
4) Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces.
5) Compare ways in which a router builds a routing table when operating in a small- to medium-sized business network.
6) Explain routing table entries for directly connected networks.
7) Explain how a router builds a routing table of directly connected networks.
8) Explain how a router builds a routing table using static routes.
9) Explain how a router builds a routing table using a dynamic routing protocol.
Edge Device Multi-unicasting for Video StreamingTal Lavian Ph.D.
Multicast data stream from a server to multiple clients at the application level.
Overlay network structure must be constructed at the application layer to connect participating end systems
Mechanisms for adapting the overlay structure are necessary to provide and maintain adequate level of QoS of the application
Yoid – generic structure for overaly networks for content distribution
Overcast – single-source multicast
End System Multicast – small-scale multicast for teleconference
ALMI – an ALM infrastructure for multi-sender multicast that scales to a large number of groups with small number of members
Edge devices form overlay structure
Edge devices can replicate and multi-unicast to multiple clients
Overcome bottleneck problem over access link
The future of internet marketing - how exponential technology is changing our...Mariana Juliette
The future and new trends in online and digital marketing. To find out where out technology will leading us in the future is best to look at the history. The exponential growth in computing and Internet, the fact that almost the whole earth population is connected with mobile device and there are billion people on Internet is a fact that our life is changing rapidly.
Find out what Marketing has to do with this.
In multicast communication, there is one source and a group of destination.
In multicasting, the router may forward the received packet through several of its interfaces.
The source address is a unicast address, but destination address is a group address.
Solving QoS multicast routing problem using aco algorithm Abdullaziz Tagawy
In IP multicasting messages are sent from the source node to all destination nodes. In order to meet QoS requirements an optimizing algorithm is needed. We propose an Ant Colony Optimization algorithm to do so. Ants release a chemical called pheromone while searching for food. They are capable of finding shortest path to their target. This can give an effective optimal solution to our Multicast Routing Problem.
Implementing multicast communication system making use of an existing data ne...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
If the number of spine switches were to be merely doubled, the effect of a single switch failure is halved. With 8 spine switches, the effect of a single switch failure only causes a 12% reduction in available bandwidth. So, in modern data centers, people build networks with anywhere from 4 to 32 spine switches. With a leaf-spine network, every server on the network is exactly the same distance away from all other servers – three port hops, to be precise. The benefit of this architecture is that you can just add more spines and leaves as you expand the cluster and you don't have to do any recabling. Intuition Systems will also get more predictable latency between the nodes.
As a trend, disaggregation seems to be most useful for very large companies like Facebook and Google, or cloud providers. The technology does not necessarily have significant implications for small or medium sized businesses. Historically, however, technology has a way of trickling down from the pioneering phases of existing only within large companies with tremendous resources, to becoming more standardized across the board.
Multicast routing configuration and lab example in MikroTik
video multicast routing 1 router
https://www.youtube.com/watch?v=nqUlUIB93Mg
video multicast routing 2 router over wireless
https://www.youtube.com/watch?v=eYEocGYsGZ4
Konfig VLC sebagai stream server multicast
https://www.youtube.com/watch?v=Z1lthcBSSrM
Konfig VLC sebagai player
https://www.youtube.com/watch?v=s2uTs8NRQpY
Advanced Routing. Routing is the process of forwarding packets from one network to the destination address in another network. ... Each route is known as a routing entry
Financil Contracts (FCs) specify rights and obligations that parties are legally
bind.Hence effective management of FCs is vital.Domain Specific Language (DSL)
approach provides a method of defining rights and obligations of contracts using fixed
and precisely defined set of combinators and observables.As a result, any contract can
be composed using fixed set of symbols, the contract management becomes efficient and effective.The Haskell Contract Combinator Library (HCCL) is the driving forcebehind the DSL approach in finance sector
Financil Contracts (FCs) specify rights and obligations that parties are legally
bind.Hence effective management of FCs is vital.Domain Specific Language (DSL)
approach provides a method of defining rights and obligations of contracts using fixed
and precisely defined set of combinators and observables.As a result, any contract can
be composed using fixed set of symbols, the contract management becomes efficient and effective.The Haskell Contract Combinator Library (HCCL) is the driving forcebehind the DSL approach in finance sector
Tianhe 2 is the worlds fastest super computer according to top500.org. This presentation is based on Tianhe 2. Tianhe 2 Software architecture, Hardware architecture, specifications, motive factors and several other key aspects are highlighted in this presentation.
This presentation prepared by me with 4 other Computer Science Undergraduate from University of Colombo School of Computing, Sri Lanka.
Structured Cabling
Cabling system that allows constant moves and changes to be performed by on site personnel
Growth and flexibility built into the cabling scheme
Can be either proprietary (closed) or non proprietary (open)
What is “Last Mile Access”
It is the final leg of delivering connectivity from a communications provider to a customer. Usually referred to by the telecommunications and cable television industries. It is typically scene as an expensive challenge because “fanning out” wires and cables is a considerable physical undertaking.” (from Wikipedia)
Big Data Social Network Analysis (BDSNA) is the focal computational and graphical
study of powerful techniques that can be used to identify clusters, patterns, hidden
structures, generate business intelligence, in social relationships within social networks
in terms of network theory. Social Network Analysis (SNA) has a diversified set of
applications and research areas such as Health care, Travel and Tourism, Defence and
Security, Internet of Things (IoT) etc. . . With the boom of the internet, Web 2.0
and handheld devices, there is an explosive growth in size, complexity and variety in
unstructured data, thus the analysis and information extraction is of great value and
adaptation of Big Data concept to SNA is vital.
This literature survey aims to investigate the usefulness of SNA in the “Big Data
(BD)” arena. This survey report reviews major research studies that have proposed
business strategies, BD approaches to generate predictive models by gratifying contemporary
challenges that have arises from SNA.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
IP Multicasting
1. “
”
IP Multicasting
Background knowledge, What is IP Multicasting
Applications and Architecture
IGMP
Multicast routing
Reverse Path Forwarding (RPF)
Multicast distribution
PIM and Mapping and Rendezvous point
Address translation
2. IP Multicasting
“Implementation of multicast communication in
internet”
Individual hosts are configured as members of different multicast groups
One particular user may a member of many multicast groups
For a one multicast can be few members/nodes
IP Multicast group is identified by Class D address (224.0.0.0 –
239.255.255.255)
Every IP datagram send to a multicast group is transferred to all members
of group
3. Applications
Situations where multiple end points need to receive identical info at same
time
News/Sports/Stocks/Weather updates
Teleconferencing (Audio, Video, White board etc…)
Distance learning
Data replication
Stream video
Issues
Complexity
Early days routers are not configured to do multicasting in proper
manner
4. IP Multicasting components
IP multicast addressing (how we address
IP Group management
Multicast routing
Multicasting is UDP based
Best effort delivery
No congestion avoidance
Added complexity
IP Multicasting considerations
7. Multicast Address translation
In Ethernet Mac addresses a multicast address is identified by setting the
lowest bit of the most left byte
First 4 bytes -> Class D address
Special Class D addresses
224.0.0.1 really means all systems on this subnet
224.0.0.2 means all routers on this subnet
224.0.1.1 is for NTP (Network Time Protocol) used for synchronizing
machines
224.0.0.9 is for RIP-2 (a routing protocol).
8. Internet Group Management Protocol (IGMP)
Use by host to notify the local router that it wishes to receive (or stop
receiving) multicast traffic for given destination node or group
IGMP operates on physical network
Eg: single Ethernet segment
IGMP supports
Joining a multicast group
Query membership
Send membership reports
IGMP snooping
Send multicast only to needed ports
9. Multicast Routing
Source can determine who can be the member of group and who will not
be
Required mechanism
Packet forwarding can send multiple copies of same packet
Multicast routing algorithm which builds spanning tree
Two types of trees
Source Tree
Shared Tree
Single copy replicate in network
Routing tables are different in the two trees
10. Protocol Independent Multicast (PIM)
Router to router signal protocol
Use by a router to notify an upstream router that it wishes to receive (or
stop receiving) multicast traffic
Three main classifications of PIM
Dense
Sparse
Sparse dense
Source specific
Bidirectional
12. PIM-SM Rendezvous Point (RP)
PIM-SM uses a router called Rendezvous Point
The purpose of RP to allow, the first hop router to find out the IP address of
the source for a particular group.
The receiver don’t know the source address
A RP is mandatory for PIM Sparse Mode
PIM-SM Rendezvous Point Discovery
Static RP configuration
Dynamic RP configuration
13. Multicast advantages
Enhanced scalability
Network utilization is independent of the number of receivers
Network handle replication
Reduce resource utilization
Controls network bandwidth and reduces server and router load
Deterministic performance
Subscriber number 1 and subscriber number 10000 have identical
experience
14. Summery
IP Multicasting is somewhat similar to “spreading of virus”
Replication at each router
Functions are layered
IGMP to handle host to router
PIM to inter router signaling
Different message formats for IP Multicasting
Scalability accommodate more functions and features
15. References
[1] YouTube. “Lecture - 32 IP Multicasting”. Youtube.com. [Online]. Available
https://www.youtube.com/watch?v=TApIo_BiX6U [Accessed: 3 Aug2014].
[2] YouTube. “Cisco Live 2014: IP Multicast Concepts, Design and Troubleshooting
(Melbourne)”. Youtube.com. [Online]. Available https://www.youtube.com/watch?v=l9RJdrdjDU8
[Accessed: 3 Aug2014].
Editor's Notes
The flow of the presentation mentioned in this slide.
At the end of the presentation there will be two slides stating a “summery” and “references”.
3 modes of operations
Unicast : One sender to one receiver
Broadcast: One sender to all receivers
Multicast: One /Many sender/senders to many receivers in the group
There for “Multicasting” is “1 to Many” or “Many to Many”
IP Multicasting more concern on from where the packets come from
In IP Multicasting, packet replicating happens inside the network
Developing multicast-enabled applications is ostensibly simple. Having datagram access allows any application to send to a multicast address. A multicast application need only increase the Internet Protocol (IP) time-to-live (TTL) value to more than 1 (the default value) to allow outgoing datagrams to traverse routers. To receive a multicast datagram, applications join the multicast group, which transparently generates an [IGMPv2, IGMPv3] group membership report.
This apparent simplicity is deceptive, however. Enabling multicast support in applications and protocols that can scale well on a heterogeneous network is a significant challenge. Specifically, sending constant bit rate data streams, reliable data delivery, security, and managing many-to-many communications all require special consideration. Some solutions are available, but many of these services are still active research areas.
IP Multicast considerations in detail
Multicast is UDP based
No flow control
Sequencing
Error correction
Retransmission
Best effort delivery
Sender has no idea if all the subscribers have received the data. Subscribers don’t know if they have missed a packet. Applications should handled missed packets
No congestion avoidance
Slow start hence might result in network congestion
Added complexity
If we have the bandwidth available then unicast delivery model may be a simple option.
Adding protocol mean adding complexity
Right hand side, source pours multicast to network
Left hand side, nodes that receive the multicast
No control plan from receiver to sender
A device can be multicast sender/receiver at same time
Layer 2: Host to Router protocol : IGMP
Layer 3: Multicast Routing protocol
IP Multicast only support UDP as higher layer (Connectionless datagram oriented protocol)
So use UDP as transport layer protocol
“IP” takes part in normal routing protocol
“IP Multicast” takes care of multicast routing protocol
Mapping process
Suppose in this 1110, the first 4 bits and suppose this is the class D address and we are looking at the first byte of that address and the first four bits 1110 identifies that this is a class D address. Then this bit is actually ignored and then we have a 23 bit address. This 23 bit address comes straight to the Ethernet address. So these 7 bits, these 8 bits and these 8 bits are matched straight to the last 3 bytes of the Ethernet address. For the first three bytes of the Ethernet address we have a one here showing that this is multicast. Actually the Ethernet address with 01, 00, 5e in the first 3 bytes are reserved for IP multicast. So 01, 00 and this is 101 is 5e and 1110 is e. So, this is 01, 00, 5e and this is first 3 bytes, this is reserved for multicast and this part comes straight away.
IGMP : Joining group
Receiver sends IGMP membership report to router
Once received, send it to LAN and to host
Second receiver asks for same
That report is redundant ( since router is already doing what it suppose to do)
IGMP : Maintaining group
A host does not want multicast any more
It sends IGMP leave message to Router
Router check if is there any one still need it
If still need, still forward (Switch also knows)
IGMP : Leaving
Last host on the network say that it doesn’t need multicasting anymore
Router turnoff packet sending
Advantages of IGMP snooping
Hosts only receive MC traffic that they request
Fast
Multicast routing protocol
This is an additional service by router since unicast is already there
Building spanning tree between all members of multicast group
Source tree
Packet goes directly from source to receiver
Receiver needs knowledge of receiver
Traffic travel from source to receiver
Packets are replicated at branches
Provide optimal routing
Representation (S,G)
Shared tree
Packets don’t go directly from source to receiver
Flows through an arbitrary point : “Rendezvous point”
Root is common
Less state required
PIM-SM Router-Router Signaling
Each PIM router forms neighbor relationship with adjacent PM router at every 30 seconds
When PIM router wants to receive a multicast stream it sends a “PIM Join” message
When want to stop receiving send “Prune” message
Tree formed from destination
Each potential destination reach up-to source
For each recipient minimize path cost
RPF forward: forward only if receive from neighbor
PIM-SM operation
Advantages of Source Specific Multicasting
Easy to configure and maintain
Efficient network usage
Enforce security
PIM-SSM mapping
Use PIM-SSM in the network when we have hosts that only supports IGMP v2
Mapping can used as an interim measure until IGMP v3 is supposed on all hosts
Two ways to map
* PIM-SSM is static mapping
* PIM-SSM dynamic mapping (DNS)
Following drawbacks can be identified
Issues with multicast source
Issues with receiver
Underlying network issues
MC network misconfiguration