This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Dual-Homing Based Scalable Partia Multicast Protection
September 2006 (vol. 55 no. 9)
pp. 1130-1141
In this paper, we propose a scalable multicast protection scheme based on a dual-homing architecture where each destination host is connected to two edge routers. Under such an architecture, there are two paths from the source of a multicast session to each destination host, which provides a certain level of protection for the data traffic from the source to the destination host. The protection level varies from 0 percent to 100 percent against a single link failure, depending on the number of shared links between these two paths. The major advantage of the proposed scheme lies in its scalability due to the fact that the protection is provided by constructing a dual-homing architecture at the access network while keeping the routing protocols in the core network unchanged. The selection of dual edge routers plays an important role in enhancing the protection level. Two problems arise for the proposed dual-homing partial multicast protection scheme. One is to calculate the survivability from the source to any pair of edge routers. The other is to assign a pair of edge routers for each destination host such that the total survivability is maximized for the multicast session subject to the port number constraint of each edge router. We propose an optimal algorithm to solve the first problem. We prove the decision version of the second problem is NP-complete and propose two heuristic algorithms to solve it. Simulation results show that the proposed heuristic algorithms achieve performance close to the calculated lower bound.

[1] R.K. Ahuja, T.L. Magnanti, and J.B. Orlin, Network Flows: Theory, Algorithms, and Applications. Upper Saddle River, N.J.: Prentice-Hall, 1993.
[2] A. Akella, A. Shaikh, and R. Sitaraman, “A Measurement-Based Analysis of Multihoming,” Proc. ACM SIGCOMM, pp. 353-364, 2003.
[3] D. Din and S. Tseng, “A Genetic Algorithm for Solving Dual-Homing Cell Assignment Problem of the Two-Level Wireless ATM Network,” Computer Comm., vol. 25, no. 17, pp. 1536-1547, Nov. 2002.
[4] A. Fei, J. Cui, M. Gerla, and D. Cavendish, “A Dual-Tree Scheme for Fault-Tolerant Multicast,” Proc. Int'l Computer Conf., vol. 3, pp.690-694, 2001.
[5] M.R. Garey and D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness. Bell Labs, 1979.
[6] M. Hiltunen, R. Schlichting, and C. Ugarte, “Building Survivable Services Using Redundancy and Adaptation,” IEEE Trans. Computers, vol. 52, no. 2, pp. 181-194, Feb. 2003.
[7] M. Kallahalla, M. Uysal, R. Swaminathan, D.E. Lowell, M. Wray, T. Christian, N. Edwards, C.I. Dalton, and F. Gittler, “SoftUDC: A Software-Based Data Center for Utility Computing,” Computer, vol. 37, no. 11, pp. 38-46, Nov. 2004.
[8] C. Lee and S. Koh, “A Design of the Minimum Cost Ring-Chain Network with Dual-Homing Survivability: A Tabu Search Approach,” Computer Operations Research, vol. 24, no. 9, pp. 883-897, 1997.
[9] A. Orda and R. Rom, “Multihoming in Computer Networks: A Topology-Design Approach,” Computer Networks ISDN, vol. 18, no. 2, pp. 133-141, 28 Feb. 1990,
[10] A. Phillips, J. Senior, R. Mercinelli, M. Valvo, P. Vetter, C. Martin, M. Deventer, P. Vaes, and X. Qiu, “Redundancy Strategies for a High Splitting Optically Amplified Passive Optical Network,” J. Lightwave Technology, vol. 19, no. 2, pp. 137-149, Feb. 2001.
[11] A. Proestaki and M. Sinclair, “Design and Dimensioning of Dual-Homing Hierarchical Multi-Ring Networks,” IEE Proc.-Comm., vol. 147, no. 2, pp. 96-104, Apr. 2000.
[12] S. Ramamurthy and B. Mukherjee, “Survivable WDM Mesh Networks, Part I—Protection,” Proc. IEEE INFOCOM, vol. 2, pp.744-751, 2003.
[13] P. Sanjoy, Multicast on the Internet and Its Applications. Kluwer Academic, June 1998.
[14] G. Sasaki and C. Su, “The Interface between IP and WDM and Its Effect on the Cost of Survivability,” IEEE Comm. Magazine, vol. 41, no. 1, pp. 74-79, Jan. 2003.
[15] J. Shi and J. Fonseka, “Analysis and Design of Survivable Telecommunications Networks,” IEE Proc.-Comm., vol. 144, no. 5, pp. 322-330, Oct. 1997.
[16] N. Singhal, L. Sahasrabuddhe, and B. Mukherjee, “Dynamic Provisioning of Survivable Multicast Sessions in Optical WDM Mesh Networks,” Proc. Optical Fiber Comm. Conf. (OFC), vol. 1, pp.207-209, 2003.
[17] N. Singhal, L. Sahasrabuddhe, and B. Mukherjee, “Provisioning of Survivable Multicast Sessions against Single Link Failures in Optical WDM Mesh Networks,” J. Lightwave Technology, vol. 21, no. 11, pp. 2587-2594, Nov. 2003.
[18] D. Xu, Y. Xiong, and C. Qiao, “Novel Algorithms for Shared Segment Protection,” IEEE J. Selected Areas in Comm., vol. 21, no. 8, pp. 1320-1331, Oct. 2003.
[19] http://www.msblabs.org/as-attackreport-100.txt , 2006.
[20] Cisco Systems, Cisco Router Guide, http://www.cisco.com/application/pdf/en/ us/guest/products/ps5855/c1031cdccont_ 0900aecd8019dc1f.pdf , 2005.

Index Terms:
Networks, multicast, survivability, protection, complexity, NP-completeness.
Citation:
Jianping Wang, Mei Yang, Bin Yang, S.Q. Zheng, "Dual-Homing Based Scalable Partia Multicast Protection," IEEE Transactions on Computers, vol. 55, no. 9, pp. 1130-1141, Sept. 2006, doi:10.1109/TC.2006.144
Usage of this product signifies your acceptance of the Terms of Use.