Multicast Communication
Multicast Communication
Abstract:
Multicast potentially optimises bandwidth consumption and node resources, when several users
simultaneously participate in a communication session. Nevertheless, contrary to the expectations,
IP multicast has not experienced widespread deployment, with the exception of IPTV. On the other
hand, emerging Wireless Sensor Network (WSN) applications could greatly benefit from multicast
and constitute another field where multicast can be an effective and efficient technique. The
question is: do multicast advantages hold in WSN scenarios? This paper discusses and evaluates
the use of multicast in Wireless Sensor Networks. A WSN platform with IP support and multicast
is being developed. Concurrently, simulation studies were performed in order to assess the
usefulness of multicast in WSNs. The results clearly point to the benefits of the use of this
technique in processing and energy-restricted environments such as this one.
Introduction:
Traditional networking involves communications between two end systems. However, important
emerging applications like IPTV, remote teaching or videoconference, require simultaneous
communication between groups of users.
Multicast protocols can offer several benefits. The use of a set of point-to-point channels to support
a virtual multicast environment results in a complex and inefficient process, mainly in wide area
networks. When a source needs to transmit a message to n receivers using point-to-point channels,
it is necessary to transmit the same message n times. In the case of IPTV, where the number of
receivers is extremely high, this is not only technologically impossible but also the required
resources are prohibitive.
The emergence of applications with inherent multicast requirements led to the development of
native multicast protocols. In the case of IP networks, multicast support was typically based on the
Internet Group Management Protocol (IGMP) to announce hosts interested in receiving multicast
information, and on Protocol-Independent Multicast – Sparse Mode (PIM-SM), Multicast Border
Gateway Protocol (MBGP) and Multicast Source Discovery Protocol (MSDP) to route multicast
messages between core routers.
With the increasing demand for multicast support, new protocols were proposed. The most
promising protocol is the Source-Specific Multicast (SSM) protocol. According to this protocol,
when a host decides to join a multicast group it is necessary to specify not only the IP multicast
address, as usual, but also the source address or a list of source addresses that the node joining the
multicast sessions accepts to receive information from. This source identification significantly
reduces the routing complexity. However, SSM has several limitations when applied to mobile
environments.
Recent advances in wireless communications, electronics and miniaturization supported the
development of a new generation of multi-functional, low-cost sensor nodes. These new sensor
nodes, with control components and communication functionality, are at the base of the
development of Wireless Sensor Networks (WSNs).
Wireless Sensor Networks are composed by a set of several nodes which can cooperate in order to
perform certain measurements and tasks and can re-organize themselves in an ad-hoc way.
Typically, sensors collect ambient measurements, process them and transmit them to a sink node.
The applicability of WSNs is becoming very high, and although some approaches have already
been proposed, it is crucial to evaluate if:
- multicast can be useful for the next generation Internet, which will integrate WSNs, -
the current multicast protocols are well prepared for WSN environments.
When no data needs to be transmitted, the tree is inactive and all required TCP connections to
build the distribution overlay are closed. Nodes can only join to a multicast group while its tree
is inactive. This limitation ensures, that subscribed members get all data for a dissemination
session, because late joins are avoided. In the de-centralized and source-driven approach, the
source sends the list of all receivers of the multicast data to its one-hop neighbours. The
neighbour nodes then check if all receivers in the list can be reached through a single of their
next-hop neighbours. In this case, such a node just forwards the list to its next hop and
remembers that it acts as a forwarder for that multicast group. If nodes from the list can be
reached via different neighbours, the list is split accordingly and the partial lists (with the
node's own address as source of the message) are forwarded to the respective neighbours. The
node splitting the list becomes a branching node and opens a TCP connection for the overlay
link to the sender of the original list, when the corresponding tree is activated. Finally, if such
a list message arrives at the receiver (group member), then that node prepares the overlay link
to the source of the message (normally the last branching point). Therefore, TCP connections
for the overlay network links are only established between the source, branching nodes and the
receivers (see also Figure 1) when the corresponding multicast tree becomes active. New nodes
are added to the multicast tree by sending a list message including the new nodes as described
before. Only when a tree is inactive, new nodes can be added, Therefore, no connections are
established directly, but potential new overlay links are just prepared and only established upon
activation of the tree. If a branching node now receives a list message with new nodes, it
changes the source address of the list message, splits the list if required, and forwards it/them
further. If a forwarding node has to become a branching node, it prepares the overlay link to
the source of the list message, splits the message and forwards the new list messages further
as described before. This new branching node tells the source of the original list message which
receivers it handles in the future. Therefore, the previous branching node removes the overlay
link that previously was using this new branching node as forwarder. Upon reactivation of the
modified tree, the overlay link connections are opened from the source, via branching nodes
to the receivers. New and old receivers then become aware of their new group membership or
of the change of branching nodes for existing group memberships. Nodes can also be removed
using remove list messages accordingly and the forwarding and branching nodes have enough
information (as with adding new nodes) to modify the resulting tree. In the source-driven
centralized approach, the source node determines all required branching nodes ahead.
Therefore, the source also creates the complete distribution tree that is required for a multicast
group. The branching nodes are then notified, process the information and further forward
these notifications. If new receivers need to be added to a tree while it is inactive, the source
calculates the new and/or modified branching nodes. Only these nodes are notified about the
changes in the tree, branching nodes that do not need to be changed require no notification.
Removing receivers from the tree is done similarly, branching nodes that need to be modified
or removed are notified accordingly. For the centralized receiver-driven approach, the join
messages from the receivers are forwarded to the source, which manages the tree as described
for the source-driven centralized approach. In the receiver-driven de-centralized approach,
receivers send the join message to their neighbour responsible for the default route. If this node
is not a forwarder or branching node for that group it becomes a forwarding node (only
knowing that it is on the path of an overlay link when the tree would become active) and
forwards the join message further. Intermediate nodes, which are already branching nodes of
the requested group drop the join message and prepare the overlay link to the new receiver.
Forwarding nodes receiving join messages, become new branching nodes, prepare the new
overlay link and send this information (about becoming a branching node) towards the source,
dropping the original join message. A branching node receiving such a message modifies its
overlay link in that direction. Therefore, the overlay link of which the new branching node has
been acting just a forwarder before, is removed and replaced by an overlay link to this new
branching node. Receivers that want to leave a group send a leave message towards the source.
Forwarders on the path update their status for that group and forward the leave message further.
Branching nodes receiving a leave message update their status, remove the overlay link to the
leaving node, and discard the leave message. If the branching node has just one overlay link
left, it has to change its status to a simple forwarding node for the remaining receiver and
removes the affected overlay link. Further, it sends a notification towards the source and all
intermediate nodes update their states accordingly. They forward the message until it reaches
a branching node, which then establishes the overlay link to the remaining receiver. To support
end-to-end reliability in overlay multicast, the receivers have to acknowledge the receipt of
each multicast message or acknowledge the receipt accumulated after a series of messages.
Branching nodes aggregate and forward the acknowledgments. In case of missing
acknowledgments, they send negative acknowledgments further towards the source. Branching
nodes also take care of retransmission of lost packets and therefore need to cache the multicast
data up to a certain degree.
• Reliable IP-based Multicast
Contrary to Overlay Multicast (which uses TCP) we do not have a reliable end-to-end transport
protocol. Instead we are using UDP. End-to-end reliability is realized using acknowledgment
messages as described above. Branching nodes know only that their one-hop neighbours are
forwarding the packets on their behalf. Acknowledgments be handled on one-neighbour basis
(hop-to-hop), and not between branching nodes as for Overlay Multicast.
For the source-driven de-centralized approach the source sends the join list to its direct
neighbours that should act as forwarders. The next forwarder is determined on a hop-to-hop
basis. If a node has to become a branching node, it remembers from which neighbours it
expects acknowledgments. Joins and leaves are handled by appropriate messages that could
cause forwarders to become branching nodes (and vice versa) triggering a modification of the
expected acknowledgments state for a node. In the centralized source-driven approach the
source sends the list of all branching nodes to the closest branching node, which processes and
forwards them further to the nearest branching nodes on the path. Intermediate nodes become
forwarders and store the status for the involved multicast group. Acknowledgments are handled
directly between the branching nodes. Additional joining nodes trigger an update of the
affected branching nodes all initiated directly by the source. Leaves are handled accordingly
triggering updates of the branching and forwarding nodes involved. In the receiver-driven
centralized approach joins are sent to the source, which then acts as in the source-driven
centralized approach. In the de-centralized receiver-driven approach, joins cause intermediate
nodes to react as in the Overlay Multicast case. They either become forwarding nodes for that
group if they are not handling that group yet or become branching nodes if applicable.
Acknowledgments are handled the same way as described above in the de-centralized
sourcedriven approach.
Protocol Stack:
Figure 2 shows a possible protocol stack for reliable multicast in WSNs. End-to-end reliability for
reliable IP-based Multicast is ensured by REMC (Reliable Multicast) and for Overlay Multicast
by SNOMC (Sensor Network Overlay Multicast). To avoid unnecessary end-to-end retransmission
or caching in branching, we use a hop-to-hop reliable network protocol realized by H2HR (HopTo-
Hop Reliability) in combination with the MAC protocol. This allows to directly delete cached
packets after successful transmission to the next hop. To optimize the mentioned protocols,
information is exchanged across different layers using the cross-layer interface. For example, the
MAC layer informs H2HR about the successful (or unsuccessful) transmission of a packet. H2HR
is caching the packet until it has been transmitted successfully. Additional neighbourhood
information for deciding how to forward multicast packets and the involved paths is also requested
from the cross-layer interface by REMC and SNOMC. TSS (TCP Support for Sensor Nodes)
supports optimizations of TCP-specific mechanisms, such as intermediate caching, local
retransmission and acknowledgment recovery and regeneration. Additional energy-saving is
achieved by disabling the radio interface by the MAC layer when no transmission is required.
Applications of Multicasting:
As businesses use more intranet, groupware, multimedia, and client/server technologies, they need
more IP multicasting applications. Video conferencing, audio conferencing, online training, news
distribution, software distribution, and database replication are all good candidates for IP
multicasting, one-to-many communication from a source to a group of selected destinations.
Multicasting applications can minimize the demand for network bandwidth while delivering
information from a source to multiple destinations via one stream.
Traditionally, network traffic is either unicast or broadcast. Unicasting is one-toone
communication from a source to a destination on the network. If n hosts request the same
information from the same source, n copies of the information move from the source host to n
destination hosts. Broadcasting is one-to-everyone communication from a source to the rest of
hosts on the network. The broadcast information reaches every host regardless of whether the host
needs the information. Broadcasting wastes network bandwidth by flooding the network when only
a small number of users need the information.
Unicasting and broadcasting do not work for certain applications. For example, your CEO wants
to conduct an audio conference with 50 senior managers through the network. If the multimedia
application for the conference uses unicasting, the CEO's computer repeatedly sends out 50 audio
streams to 50 managers' computers. Unicasting wastes bandwidth because it sends 50 duplicate
copies over the network, and it causes a significant delay before the last manager hears the CEO.
Broadcasting cannot solve the problem: Broadcasting sends only one audio stream over the
network, but it sends the information to every computer on the network. Therefore, the audio
stream floods every corner of the network and can bring the network down.
Multicasting comes to the rescue. The multicast host sends out only one copy of the information,
and only the destination hosts that need the information receive it. In the audio conferencing
example, the CEO's computer sends only one audio stream to the network, and only the 50 senior
managers receive the stream. The information uses only required network bandwidth and arrives
at every manager's computer without a noticeable delay.
Conclusion:
The full potential of Wireless Sensor Networks can only be explored if Internet connectivity is
provided. In order to do this, IP must, somehow, be supported in WSNs. Although sensor nodes
have stringent energy and processing limitations that constitute an obstacle to the use of a
fullyfledged IP protocol, simplified versions are already being used. In this respect, exploring the
use of IPv6 is also promising, because IPv6 uses simpler headers and offers native support for
mobility and multicast.
In this paper we have addressed both the use of IPv6 and the use of multicast in WSNs. The results
clearly show that WSNs can greatly benefit from both. Specifically, multicast leads to reductions
in the number of transmitted packets and, consequently, in energy consumption. In fact, WSNs
may become the next successful field of multicast deployment, in addition to the emerging field
of IPTV.
Further research will continue to explore the use of multicast in WSNs. Specifically, a new
multicast protocol based on Source Specific Multicast is being developed and will be deployed
and evaluated in the WSN platform presented in this paper.
References:
1. C. Sule, P. Shah, K. Doddapaneni, O. Gemikonakli and E. Ever, "On Demand Multicast
Routing in Wireless Sensor Networks," 2014 28th International Conference on Advanced
Information Networking and Applications Workshops, 2014, pp. 233-238
2. M. Hosseini, D. T. Ahmed, S. Shirmohammadi, N. D. Georganas A Survey of
ApplicationLayer Multicast Protocols Communications Surveys & Tutorials, 9(3), 58-74,
2007
3. J. S. Silva, T. Camilo, A. Rodrigues, M. Silva, F. Gaudencio and F. Boavida, "Multicast in
Wireless Sensor Networks The next step," 2007 2nd International Symposium on Wireless
Pervasive Computing, 2007, pp.