MULTICAST ROUTING
Unicasting
• In unicast communication, there is one source
and one destination.
• The relationship between the source and the
destination is one-to-one.
• In this type of communication, both the
source and destination addresses, in the IP
datagram, are the unicast addresses assigned
to the hosts
In unicasting, the router forwards the
received packet through
only one of its interfaces.
Note
Figure Unicasting
Broadcasting
 In broadcast communication, the
relationship between the source and
the destination is one-to-all.
 There is only one source, but all the
other hosts are the destinations.
Multicasting
 In multicast communication, there is one
source and a group of destinations.
 The relationship is one-to-many.
 source address is a unicast address, but
the destination address is a group
address, which defines one or more
destinations.
 The group address identifies the members
of the group.
In multicasting, the router may
forward the received packet
through several of its interfaces.
Note
Figure Multicasting
Figure Multicasting versus multiple unicasting
Emulation of multicasting through
multiple unicasting is not efficient
and may create long delays,
particularly with a large group.
Note
In unicast routing, each router in the
domain has a table that defines
a shortest path tree to possible
destinations.
Note
Figure Shortest path tree in unicast routing
In multicast routing, each involved
router needs to construct
a shortest path tree for each group.
Note
• When a router receives a multicast packet,
the situation is different from when it receives
a unicast packet.
• A multicast packet may have destinations in
more than one network.
• Forwarding of a single packet to members of a
group requires a shortest path tree
Taxonomy of common multicast protocols
Source-Based Tree:
• In the source-based tree approach, each router needs
to have one shortest path tree for each group.
• The shortest path tree for a group defines the next hop
for each network that has loyal member(s) for that
group
• five groups in the domain: GI, G2, G3, G4, and G5.
• At the moment GI has loyal members in four networks,
G2 in three, G3 in two, G4 in two, and G5 in two.
• There is one shortest path tree for each group;
therefore there are five shortest path trees for five
groups.
Computer networks multicastrouting12.ppt
Group-Shared Tree:
• In the group-shared tree approach, instead of
each router having m shortest path trees, only
one designated router, called the center core, or
rendezvous router, takes the responsibility of
distributing multicast traffic.
• The core has m shortest path trees in its routing
table.
• The rest of the routers in the domain have none.
If a router receives a multicast packet, it
encapsulates the packet in a unicast packet and
sends it to the core router
Computer networks multicastrouting12.ppt
Multicast Distance Vector: DVMRP
• Multicast routing does not allow a router to send
its routing table to its neighbours.
• The multicast distance vector algorithm uses a
process based on four decision-making strategies.
– Flooding
– Reverse path forwarding (RPF)
– Reverse path Broadcasting (RPB)
– Reverse path Multicasting (RPM)
20
Flooding
• A router receives a packet and, without even
looking at the destination group address,
sends it out from every interface except the
one from which it was received.
• Every network with active members receives
the packet.
• This is a broadcast, not a multicast.
• It creates loops. A packet that has left the
router may come back again from another
interface or the same interface and be
forwarded again.
21
Reverse Path Forwarding (RPF)
• RPF is a modified flooding strategy.
• To prevent loops, only one copy is forwarded; the
other copies are dropped.
• router forwards only the copy that has
travelled the shortest path from the source to
the router.
• To find this copy, RPF uses the unicast routing
table
• The router receives a packet and extracts the
source address (a unicast address).
22
TCP/IP Protocol Suite 23
Figure RPF
• RPF guarantees that each network receives a
copy of the multicast packet
• RPF does not guarantee that each network
receives only one copy;
• a network may receive two or more copies.
The reason is that RPF is not based on the
destination address.
RPF eliminates the loop in the
flooding process.
TCP/IP Protocol Suite 27
Figure Problem with RPF
Reverse Path Broadcasting(RPB).
• To eliminate duplication, define only one
parent router for each network.
• A network can receive a multicast packet
from a particular source only through a
designated parent router.
• For each source, the router sends the packet
only out of those interfaces for which it is the
designated parent.
RPB
• RPB guarantees that the packet reaches every
network and that every network receives only
one copy
• The designated parent router can be the
router with the shortest path to the source
RPF Versus RPB
30
RPB creates a shortest path broadcast tree
from the source to each destination. It
guarantees that each destination receives one
and only one copy of the packet.
32
Reverse Path Multicasting (RPM).
• RPB does not multicast the packet, it broadcasts it.
• multicast packet must reach only those networks
that have active members for that particular
group. This is called reverse path multicasting
(RPM).
• The designated parent router of each network is
responsible for holding the membership
information. This is done through the IGMP
protocol
Prune Message
•when a router connected to a network finds
that there is no interest in a multicast packet.
The router sends a prune message to the
upstream router so that it
can exclude the corresponding interface.
Graft Message
•one of its networks is again interested in
receiving the multicast packet. It can send a
graft message. The graft message forces the
upstream router to resume sending the
multicast messages.
RPF, RPB, and RPM
RPM adds pruning and grafting to RPB to
create a multicast shortest
path tree that supports dynamic
membership changes.
Protocol Independent Multicast
Protocol Independent Multicast (PIM) is the
name given to two independent multicast
routing protocols:
•Protocol Independent Multicast, Dense Mode
(PIM-DM) and
•Protocol Independent Multicast, Sparse Mode
(PIM-SM).
• PIM-DM is used when there is a possibility
that each router is involved in multicasting
(dense mode).
• a protocol that broadcasts the packet because
almost all routers are involved in the process.
• PIM-DM is a source-based tree routing
protocol that uses RPF and pruning and
grafting strategies for multicasting.
• PIM-SM is used when there is a slight possibility
that each router is involved in multicasting
(sparse mode).
• PIM-SM is a group-shared tree routing protocol
that has a rendezvous point (RP) as the source of
the tree.
• Its operation is like CBT
• It is simpler because it does not require
acknowledgment from a join message
• It creates a backup set of RPs for each region to
cover RP failures.
• It can switch from a group-shared tree strategy
to a source-based tree strategy when necessary.

More Related Content

PPTX
Multicastingand multicast routing protocols
PPTX
Multicast routing
PPTX
Multicastingand multicast routing protocols
PPT
Raj Jain The Ohio State University
PPTX
Routing in Multicast Communication
PPT
Multicast Routing Protocols
PPTX
Unit 4
PPTX
Network Layer Protocol.pptx
Multicastingand multicast routing protocols
Multicast routing
Multicastingand multicast routing protocols
Raj Jain The Ohio State University
Routing in Multicast Communication
Multicast Routing Protocols
Unit 4
Network Layer Protocol.pptx

Similar to Computer networks multicastrouting12.ppt (20)

PPTX
Multicast routing protocols
PPT
Multicasting and multicast routing protocols
PPT
Multicasting and multicast routing protocols
PDF
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
PPT
PPT
Lecture 19- Multicasting.ppt
PPTX
Network Engineering - Multicast Routing.pptx
PPTX
UNIT-IV.pptx
PPT
Ip multicast
PPT
Raj Jain The Ohio State University
PDF
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
PPTX
Presentation 2
PPTX
Unit 4_Network Layer_Part II.pptx
PDF
IP Multicast Routing
PPTX
PPT
Multicast in computer Architecture
PDF
module 5 ch22_networking_routing.pdf
PPTX
IP multicast
PPT
Routing protocols
Multicast routing protocols
Multicasting and multicast routing protocols
Multicasting and multicast routing protocols
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Lecture 19- Multicasting.ppt
Network Engineering - Multicast Routing.pptx
UNIT-IV.pptx
Ip multicast
Raj Jain The Ohio State University
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
Presentation 2
Unit 4_Network Layer_Part II.pptx
IP Multicast Routing
Multicast in computer Architecture
module 5 ch22_networking_routing.pdf
IP multicast
Routing protocols
Ad

More from mcjaya2024 (20)

PPT
Application layer protocols in CN123.ppt
PPT
cyber forensics Email Investigations.ppt
PPT
Cell Phone and Mobile Devices Forensics.ppt
PPT
Computer Forensics Analysis and Validation.ppt
PPT
cyber forensics Footprinting and Scanning.ppt
PPT
cyber forensics-enum,sniffing,malware threat.ppt
PPT
Classless Interdomain Data Routing CIDR.ppt
PPT
Computer Network in Network software.ppt
PPT
web program-Extended MARKUP Language XML.ppt
PPTX
Web programming-Introduction to JSP.pptx
PPT
web program -Life cycle of a servlet.ppt
PPT
web programmimg- concpt in JAVABEANS.ppt
PPT
web program-Inheritance,pack&except in Java.ppt
PPT
123 JAVA CLASSES, OBJECTS AND METHODS.ppt
PPT
web programming-Multithreading concept in Java.ppt
PPT
Processing Crime and Incident Scenes.ppt
PPT
Working with Windows and DOS Systems (1).ppt
PDF
enterprise resource plnning ERP vendors.pdf
PPT
ERP and elctronic commerce online12.ppt
PPT
Enterprise resourse planning ERPlife cycle.ppt
Application layer protocols in CN123.ppt
cyber forensics Email Investigations.ppt
Cell Phone and Mobile Devices Forensics.ppt
Computer Forensics Analysis and Validation.ppt
cyber forensics Footprinting and Scanning.ppt
cyber forensics-enum,sniffing,malware threat.ppt
Classless Interdomain Data Routing CIDR.ppt
Computer Network in Network software.ppt
web program-Extended MARKUP Language XML.ppt
Web programming-Introduction to JSP.pptx
web program -Life cycle of a servlet.ppt
web programmimg- concpt in JAVABEANS.ppt
web program-Inheritance,pack&except in Java.ppt
123 JAVA CLASSES, OBJECTS AND METHODS.ppt
web programming-Multithreading concept in Java.ppt
Processing Crime and Incident Scenes.ppt
Working with Windows and DOS Systems (1).ppt
enterprise resource plnning ERP vendors.pdf
ERP and elctronic commerce online12.ppt
Enterprise resourse planning ERPlife cycle.ppt
Ad

Recently uploaded (20)

PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
advance database management system book.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
20th Century Theater, Methods, History.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
202450812 BayCHI UCSC-SV 20250812 v17.pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
History, Philosophy and sociology of education (1).pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
HVAC Specification 2024 according to central public works department
Paper A Mock Exam 9_ Attempt review.pdf.
advance database management system book.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
20th Century Theater, Methods, History.pptx
Hazard Identification & Risk Assessment .pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
LDMMIA Reiki Yoga Finals Review Spring Summer
B.Sc. DS Unit 2 Software Engineering.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين

Computer networks multicastrouting12.ppt

  • 2. Unicasting • In unicast communication, there is one source and one destination. • The relationship between the source and the destination is one-to-one. • In this type of communication, both the source and destination addresses, in the IP datagram, are the unicast addresses assigned to the hosts
  • 3. In unicasting, the router forwards the received packet through only one of its interfaces. Note
  • 5. Broadcasting  In broadcast communication, the relationship between the source and the destination is one-to-all.  There is only one source, but all the other hosts are the destinations.
  • 6. Multicasting  In multicast communication, there is one source and a group of destinations.  The relationship is one-to-many.  source address is a unicast address, but the destination address is a group address, which defines one or more destinations.  The group address identifies the members of the group.
  • 7. In multicasting, the router may forward the received packet through several of its interfaces. Note
  • 9. Figure Multicasting versus multiple unicasting
  • 10. Emulation of multicasting through multiple unicasting is not efficient and may create long delays, particularly with a large group. Note
  • 11. In unicast routing, each router in the domain has a table that defines a shortest path tree to possible destinations. Note
  • 12. Figure Shortest path tree in unicast routing
  • 13. In multicast routing, each involved router needs to construct a shortest path tree for each group. Note
  • 14. • When a router receives a multicast packet, the situation is different from when it receives a unicast packet. • A multicast packet may have destinations in more than one network. • Forwarding of a single packet to members of a group requires a shortest path tree
  • 15. Taxonomy of common multicast protocols
  • 16. Source-Based Tree: • In the source-based tree approach, each router needs to have one shortest path tree for each group. • The shortest path tree for a group defines the next hop for each network that has loyal member(s) for that group • five groups in the domain: GI, G2, G3, G4, and G5. • At the moment GI has loyal members in four networks, G2 in three, G3 in two, G4 in two, and G5 in two. • There is one shortest path tree for each group; therefore there are five shortest path trees for five groups.
  • 18. Group-Shared Tree: • In the group-shared tree approach, instead of each router having m shortest path trees, only one designated router, called the center core, or rendezvous router, takes the responsibility of distributing multicast traffic. • The core has m shortest path trees in its routing table. • The rest of the routers in the domain have none. If a router receives a multicast packet, it encapsulates the packet in a unicast packet and sends it to the core router
  • 20. Multicast Distance Vector: DVMRP • Multicast routing does not allow a router to send its routing table to its neighbours. • The multicast distance vector algorithm uses a process based on four decision-making strategies. – Flooding – Reverse path forwarding (RPF) – Reverse path Broadcasting (RPB) – Reverse path Multicasting (RPM) 20
  • 21. Flooding • A router receives a packet and, without even looking at the destination group address, sends it out from every interface except the one from which it was received. • Every network with active members receives the packet. • This is a broadcast, not a multicast. • It creates loops. A packet that has left the router may come back again from another interface or the same interface and be forwarded again. 21
  • 22. Reverse Path Forwarding (RPF) • RPF is a modified flooding strategy. • To prevent loops, only one copy is forwarded; the other copies are dropped. • router forwards only the copy that has travelled the shortest path from the source to the router. • To find this copy, RPF uses the unicast routing table • The router receives a packet and extracts the source address (a unicast address). 22
  • 23. TCP/IP Protocol Suite 23 Figure RPF
  • 24. • RPF guarantees that each network receives a copy of the multicast packet • RPF does not guarantee that each network receives only one copy; • a network may receive two or more copies. The reason is that RPF is not based on the destination address.
  • 25. RPF eliminates the loop in the flooding process.
  • 26. TCP/IP Protocol Suite 27 Figure Problem with RPF
  • 27. Reverse Path Broadcasting(RPB). • To eliminate duplication, define only one parent router for each network. • A network can receive a multicast packet from a particular source only through a designated parent router. • For each source, the router sends the packet only out of those interfaces for which it is the designated parent.
  • 28. RPB • RPB guarantees that the packet reaches every network and that every network receives only one copy • The designated parent router can be the router with the shortest path to the source
  • 30. RPB creates a shortest path broadcast tree from the source to each destination. It guarantees that each destination receives one and only one copy of the packet.
  • 31. 32 Reverse Path Multicasting (RPM). • RPB does not multicast the packet, it broadcasts it. • multicast packet must reach only those networks that have active members for that particular group. This is called reverse path multicasting (RPM). • The designated parent router of each network is responsible for holding the membership information. This is done through the IGMP protocol
  • 32. Prune Message •when a router connected to a network finds that there is no interest in a multicast packet. The router sends a prune message to the upstream router so that it can exclude the corresponding interface. Graft Message •one of its networks is again interested in receiving the multicast packet. It can send a graft message. The graft message forces the upstream router to resume sending the multicast messages.
  • 34. RPM adds pruning and grafting to RPB to create a multicast shortest path tree that supports dynamic membership changes.
  • 35. Protocol Independent Multicast Protocol Independent Multicast (PIM) is the name given to two independent multicast routing protocols: •Protocol Independent Multicast, Dense Mode (PIM-DM) and •Protocol Independent Multicast, Sparse Mode (PIM-SM).
  • 36. • PIM-DM is used when there is a possibility that each router is involved in multicasting (dense mode). • a protocol that broadcasts the packet because almost all routers are involved in the process. • PIM-DM is a source-based tree routing protocol that uses RPF and pruning and grafting strategies for multicasting.
  • 37. • PIM-SM is used when there is a slight possibility that each router is involved in multicasting (sparse mode). • PIM-SM is a group-shared tree routing protocol that has a rendezvous point (RP) as the source of the tree. • Its operation is like CBT • It is simpler because it does not require acknowledgment from a join message • It creates a backup set of RPs for each region to cover RP failures. • It can switch from a group-shared tree strategy to a source-based tree strategy when necessary.

Editor's Notes

  • #32: Notes: 3.2 Network Layer: Multicast Addressing and Group Management 3-6