Incremental Deployment Strategies for

Incremental deployment of a new network service or protocol is typically a hard problem, especially when it has to be deployed at the routers. First, an incrementally deployable version of the protocol may be needed. Second, a systematic study of the performance impact of incremental deployment is needed to eval- uate potential deployment strategies. Choosing the wrong strategy can be disastrous, as it may inhibit reaping the benefits of an oth- erwise robust service and prevent widespread adoption. We focus on two router-assisted reliable multicast protocols, namely PGM and LMS. Our evaluation consists of three parts: 1) selection and classification of deployment strategies; 2) defi- nition of performance metrics; and 3) systematic evaluation of deployment strategies. Our study yields several interesting results: 1) the performance of different deployment strategies varies widely, for example, with some strategies, both PGM and LMS approach full deployment performance with as little as 5% of the routers deployed; other strategies require up to 80% deployment to approach the same level; 2) our sensitivity analysis reveals relatively small variation in the results in most cases; and 3) the impact associated with partial deployment is different for each of these protocols; PGM tends to impact the network, whereas LMS the endpoints. Our study clearly demonstrates that the choice of a strategy has a substantial impact on performance.

[1]  Dah Ming Chiu,et al.  TRAM: A Tree-based Reliable Multicast Protocol , 1998 .

[2]  Madhu Sudan,et al.  A reliable dissemination protocol for interactive collaborative applications , 1995, MULTIMEDIA '95.

[3]  Randy H. Katz,et al.  An analysis of multicast forwarding state scalability , 2000, Proceedings 2000 International Conference on Network Protocols.

[4]  Kenneth L. Calvert,et al.  Concast: design and implementation of an active network service , 2001, IEEE J. Sel. Areas Commun..

[5]  John S. Heidemann,et al.  A framework for classifying denial of service attacks , 2003, SIGCOMM '03.

[6]  Dino Farinacci,et al.  PGM Reliable Transport Protocol Specification , 2001, RFC.

[7]  Hongsuda Tangmunarunkit,et al.  Scaling of multicast trees: comments on the Chuang-Sirbu scaling law , 1999, SIGCOMM '99.

[8]  Jun Li,et al.  SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[9]  Stephen J. Garland,et al.  Active reliable multicast , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[10]  Steven McCanne,et al.  Search party: using randomcast for reliable multicast with local recovery , 1998, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[11]  Steven McCanne,et al.  A reliable multicast framework for light-weight sessions and application level framing , 1995, SIGCOMM '95.

[12]  George Varghese,et al.  An error control scheme for large-scale multicast applications , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[13]  Ramesh Govindan,et al.  Heuristics for Internet map discovery , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[14]  Pavlin Radoslavov,et al.  A comparison of application-level and router-assisted hierarchical schemes for reliable multicast , 2001, IEEE/ACM Transactions on Networking.

[15]  Kenneth L. Calvert,et al.  Concast: design and implementation of a new network service , 1999, Proceedings. Seventh International Conference on Network Protocols.

[16]  Heejo Lee,et al.  On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM 2001.

[17]  Sanjoy Paul,et al.  RMTP: a reliable multicast transport protocol , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[18]  Dina Katabi,et al.  A framework for scalable global IP-anycast (GIA) , 2000, SIGCOMM 2000.

[19]  Kenneth L. Calvert,et al.  Modeling Internet topology , 1997, IEEE Commun. Mag..

[20]  Sneha Kumar Kasera,et al.  Scalable fair reliable multicast using active services , 2000, IEEE Netw..

[21]  Pavlin Radoslavov,et al.  Topology-informed Internet replica placement , 2002, Comput. Commun..

[22]  David R. Cheriton,et al.  OTERS (on-tree efficient recovery using subcasting): a reliable multicast protocol , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[23]  J. J. Garcia-Luna-Aceves,et al.  Improving Internet multicast with routing labels , 1997, Proceedings 1997 International Conference on Network Protocols.

[24]  Kenneth L. Calvert,et al.  Lightweight network support for scalable end-to-end services , 2002, SIGCOMM 2002.

[25]  J. J. Garcia-Luna-Aceves,et al.  Organizing multicast receivers deterministically by packet-loss correlation , 1998, MULTIMEDIA '98.

[26]  John Jannotti,et al.  Network layer support for overlay networks , 2002, 2002 IEEE Open Architectures and Network Programming Proceedings. OPENARCH 2002 (Cat. No.02EX571).