⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1458.txt

📁 中、英文RFC文档大全打包下载完全版 .
💻 TXT
📖 第 1 页 / 共 4 页
字号:
   XTP is also similar to IP/Multicast as there is no explicit set-up   processing between the sender and the receivers prior to the   establishment of group communications.  While there is implicit   processing in key management, an external mechanism is required for   passing the multicast group address to the receivers.  The receivers   must have established "filters" for the address prior to transmission   in order to receive the data, and suffers the same problems as   IP/Multicast.   In contrast to IP/Multicast, XTP does require explicit handshakingBraudes & Zabele                                                [Page 5]RFC 1458          Requirements for Multicast Protocols          May 1993   between the sender and receivers that wish to join an existing group;   however, there is no parallel communication for receivers dropping   out of groups, and the only mechanism for a sender to know if there   are any receivers is the polling scheme used for error control and   recovery.  This causes the same problems with sending traffic to   groups without members discussed under IP/Multicast.   The XTP specification does not address how routers distribute a   multicast stream among different connected networks; however it does   include a discussion of the optional bucket, damping, slotting, and   cloning algorithms to reduce duplicate multicast traffic within a   local network.   The specification allows the user to determine whether multicast   transfers are unreliable or semi-reliable, where semi-reliable   transfers are defined to provide a "high-probability of success [9]"   of delivery to all receivers.  Reliability cannot be guaranteed due   to the fact that XTP does not maintain the cardinality of the   receiver set, and so cannot know that the data has been received by   all hosts.   XTP recovers from errors using a go-back-n approach (assuming that   the bucket algorithm has been implemented) by retransmitting dropped   packets to all members of the multicast group, as group members are   unknown.  This has the potential of flooding the network if only a   single receiver dropped a packet. If all dropped packets belong to a   single network on an internet, with traffic generated over the entire   connected network.3.3 ST-II   ST-II is another network protocol that provides support for multicast   communications.  Similar to IP/Multicast and XTP, ST-II requires a   separate application-specific protocol for assigning and   communicating multicast group addresses.   While ST-II is a network level protocol, it guarantees end-to-end   bandwidth and delay, and so obviates the need for many of the   functions of a transport protocol.  The guarantee is provided by   requiring bandwidth reservations for all connections, which are made   at set-up time, and ensuring that the requested bandwidth is   available throughout the lifetime of the connection.  The enforcement   policy ensures that the same path is followed for all transmissions,   and prohibits new connections over the network unless there is   sufficient bandwidth to accommodate the expected traffic.  This is   accomplished by maintaining the state of all connections in the   network routers, trading the overhead of this connection set-up for   the performance guarantees.Braudes & Zabele                                                [Page 6]RFC 1458          Requirements for Multicast Protocols          May 1993   Connection set-up involves negotiation of the bandwidth and delay   parameters and path between the sender, intermediate routers, and   receivers. If the requested resources cannot be made available, the   sender is given the option of either accepting what is available or   canceling the connection request.   To add a new user to an existing group, the new receiver must first   communicate directly with the sender using a different protocol to   exchange relevant information such as the group address.  The sender   then requests ST-II to add the new receiver, with the basic   connection set-up processing invoked as before with the new   connection completed only if there is sufficient bandwidth to process   the user.   While the resource guarantee system imposed by ST-II tries to prevent   network congestion from occurring, there are situations where   priority traffic must be introduced into the network.  ST-II makes   this very expensive, as the resource requirements for existing   connections must be adjusted, which can only be accomplished by the   origin of each stream.  This must be completed prior to the   connection set-up for the priority stream, introducing a large delay   before the important data can be transmitted.   ST-II connections can be closed by either the sender or the receiver.   When the last receiver along a path has been removed, the resources   allocated over that path are released.  When all receivers have been   removed, the sender in informed and has the option of either adding a   new receiver or tearing down the group.3.4 MTP   MTP is a transport level protocol designed to support efficient,   reliable multicast transmissions on top of existing network protocols   such as IP/Multicast.  It is based on the notion of a multicast   "master" which controls all aspects of group communications.   Allocation of a specific group address, or network service access   point, is not considered part of MTP, and as with the other multicast   protocols requires the use of an outside addressing authority.  The   MTP specification does require the master to make a "robust effort   [2]" to ensure the address selected is not already in use by trying   to join an existing group at that address, but the problems described   above remain.   Once the address is established, receivers issue a request to join   the existing group using a unique connection identifier that is pre-   assigned.  The MTP specification addresses neither how the identifier   is allocated nor how the receivers learn its value, but is assumed toBraudes & Zabele                                                [Page 7]RFC 1458          Requirements for Multicast Protocols          May 1993   be handled through an external protocol.  The join request specifies   whether the receiver wishes to be a producer of information or only a   receiver, whether the connection should be reliable or best effort,   whether the receiver is able to accept multiple senders of   information, the minimum throughput desired, and the maximum data   packet size.  If the request can be granted, then the master replies   with an ACK with a multicast connection identifier; otherwise a NAK   is returned.   Dropping membership in a group is coordinated through the master.   The specification does not address what action the master should take   when the group is reduced to a single member, but a logical action   would be to stop distributing transmit tokens if there are no active   receivers.   One of the major features in MTP is the ordering of received data.   The master distributes transmit tokens to data producers in the   group, which allow data to be provided at a specified rate.  Rate   control provides flow control within the protocol, with members that   cannot maintain a minimum flow requested to leave the group.   Error recovery utilizes a NAK-based selective retransmission scheme.   Senders are required to maintain data for a time period specified by   the master, and to be able to retransmit this data when requested by   members of the group.  These retransmissions are multicast to the   entire group, requiring receivers to be able to cope with duplicate   packets.  If a retransmission request arrives after the data has been   released, the sender must NAK the request.   A potential problem with MTP is the significant amount of overhead   associated with the protocol, with virtually all control traffic   flowing through the master.  The extra delay and congestion makes MTP   inappropriate for the image dissemination applications.3.5 Summary   Our analysis has determined that there are significant problems with   all of the major multicast protocols for the reliable, adaptive   multicast transport of large data items.  The problems include   inadequate address management, excessive processing of control   information, poor response to network congestion, inability to handle   high priority traffic, and suboptimal error recovery and   retransmission procedures.  We have developed a high-level notion of   the requirements for a service that addresses these issues, which we   now discuss.Braudes & Zabele                                                [Page 8]RFC 1458          Requirements for Multicast Protocols          May 19934.  Protocol Suite for Reliable, Adaptive Multicast   We present an integrated set of three basic components required to   provide a reliable multicast service: the Multicast Group Authority   (MGA); the Reliable, Adaptive Multicast Protocol (RAMP); and modified   routing algorithms.  These components are designed to be compatible   with, and take full advantage of, reservation systems such as RSVP   [12].   In this discussion, we have broadened the definition of the term   "Quality of Service (QOS)."  There are many applications where the   information content of the underlying data can be reduced through   data compression techniques.  For example, a 1,024 x 1,024 pixel   image can be sub-sampled down to 512 x 512 pixels.  This degradation   results in a lower quality of service for the end user, while   reducing the traditional network QOS requirements for the transfer.4.1 The Multicast Group Authority   The Multicast Group Authority (MGA) provides services related to   managing the multicast address space and high-level management   support to existing multicast groups.  The MGA has three primary   responsibilities: address management, service registration, and group   membership maintenance.   The MGA is hierarchical in nature, similar to the Internet Domain   Name System (DNS) [7].  Requests for service are directed to an MGA   agent on the local workstation, which are propagated upwards as   required.4.1.1 Address Management   The MGA is responsible for the allocation and deallocation of   addresses within the Internet Class D address space.  Address   requests received from application processes or other MGA nodes   result in a block of addresses being assigned to the requesting MGA   node.  The size of the address block allocated is dependent on the   position of the requester in the MGA hierarchy, to reduce the number   of address requests propagated through the MGA tree.   Figure 1 can be used to show what happens when an application   requests a multicast address from the authority at node 1.1.1.   Assuming that this is the first request from this branch of the MGA,   node 1.1.1 issues a request to its parent, node 1.1, which propagates   the request to node 1.  Node 1 passes this request to the root, which   issues a block of, say, 30 class D addresses.  Of these 30, 10 are   returned to node 1.1, with the remaining 20 reserved for requests   from node 1's other children. Similarly, node 1.1 passes 3 addressesBraudes & Zabele                                                [Page 9]RFC 1458          Requirements for Multicast Protocols          May 1993   to node 1.1.1, reserving the other 7 for future requests.  Finally,   node 1.1.1 answers the applications request for an address, keeping   the remaining 2 addresses for future use.                         --------                         | root |                         --------                          /  |  \                         /   |   \                  --------       --------                  |   1  |  ...  |   n  |                  --------       --------                   /  |  \                  /   |   \           --------       --------           |  1.1 |  ...  |  1.n |           --------       --------            /  |  \           /   |   \        --------       --------        |1.1.1 |  ...  |1.1.n |        --------       --------                    Figure 1.  Sample MGA Hierarchy

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -