Abstract
While network-level multicast has tremendous potential for increasing the efficiency of group-oriented applications, the adoption of network-level multicast has been tepid at best. In this paper, we propose a novel concept entitled stealth multicast that allows for practical adoption of network-level multicast on a domain-wise basis rather than global scale. In the stealth multicast model, similar unicast packets are dynamically assembled into virtual groups for multicast transmission across the domain. At the edge of the domain, the packets are converted back to unicast, thus hiding the existence of stealth multicast from the external Internet. True to its namesake, stealth multicast operates in complete stealth, providing seamless interoperability without requiring any modifications to end-user applications nor requiring any inter-domain support. In this paper, we introduce the basic concepts of stealth multicast and show that the stealth multicast model can offer significant benefits in terms of bandwidth savings with minimal impact to the end-user QoS.
Chapter PDF
Similar content being viewed by others
Keywords
References
Almeroth, K.: A long-term analysis of growth and usage patterns in the multicast backbone. In: Proc. of IEEE INFOCOM′2000. (2000)
Beverly, R., K. Claffy: Wide-Area IP Multicast Traffic Characterization. IEEE Network (2003)
Diot, C, Levine, B., Lyles, B., Kassem, H., Balensiefen, D.: Deployment issues for IP multicast service and architecture. IEEE Network (2000) 78–89
El-Sayed, A., Roca, V., Mathy, L.: A survey of alternative group communication services. IEEE Network (2003)
Striegel, A.: Dynamically encapsulated trees for stealth multicast with mydeki. Technical Report TR-04–11, Univ. of Notre Dame Comp. Sci. and Engr. (2004)
Spring, N.T., Wetherall, D.: A protocol independent technique for eliminating redundant network traffic. In: Proc. of the 2000 ACM SIGCOMM Conference, Stockholm, Sweden (2000)
Striegel, A., Manimaran, G.: A scalable protocol for member join/leave in DiffServ multicast. In: Proc. of Local Computer Networks (LCN), Tampa, Florida (2001)
Chu, Y., Rao, S.G., Seshan, S., Zhang, H.: A case for end system multicast. (IEEE Journal on Selected Areas in Communication (JSAC), Special Issue on Networking Support for Multicast) To Appear.
Calvert, K.L., Griffioen, J., Muffins, B., Sehgal, A., Wen, S.: Concast: Design and implementation of an active network service. IEEE Journal on Selected Area in Communications (JSAC) (2001)
Badrinath, B., Sudame, P.: Gathercast: The design and implementation of a programmable aggregation mechanism for the internet. In: Proc. of IEEE Int’l Conf. on Computer Communications and Networks (ICCCN). (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Striegel, A. (2004). Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment. In: Mitrou, N., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds) Networking 2004. NETWORKING 2004. Lecture Notes in Computer Science, vol 3042. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24693-0_67
Download citation
DOI: https://doi.org/10.1007/978-3-540-24693-0_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21959-0
Online ISBN: 978-3-540-24693-0
eBook Packages: Springer Book Archive