Multicast routing in datagram internetworks and extended LANs
ACM Transactions on Computer Systems (TOCS)
SIGCOMM '93 Conference proceedings on Communications architectures, protocols and applications
An architecture for wide-area multicast routing
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
An Efficient k-Means Clustering Algorithm: Analysis and Implementation
IEEE Transactions on Pattern Analysis and Machine Intelligence
VMScope: a virtual multicast VPN performance monitor
Proceedings of the 2006 SIGCOMM workshop on Internet network management
Chainsaw: eliminating trees from overlay multicast
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Polynomial time algorithms for multicast network code construction
IEEE Transactions on Information Theory
Minimum-cost multicast over coded packet networks
IEEE Transactions on Information Theory
Hi-index | 0.00 |
IP multicast, after spending much of the last 20 years as the subject of research papers, protocol design efforts and limited experimental usage, is finally seeing significant deployment in production networks. The efficiency afforded by one-to-many network layer distribution is well-suited to such emerging applications as IPTV, file distribution, conferencing, and the dissemination of financial trading information. However, it is important to understand the behavior of these applications in order to see if network protocols are appropriately supporting them. In this paper we undertake a study of enterprise multicast traffic as observed from the vantage point of a large VPN service provider. We query multicast usage information from provider edge routers for our analysis. To our knowledge, this is the first study of production multicast traffic. Our purpose is both to understand the characteristics of the traffic (in terms of flow duration, throughput, and receiver dynamics) and to gain insight as to whether the current mechanisms support multicast VPNs can be improved. Our analysis reveals several classes of multicast traffic for which changes to the underlying protocols may yield benefits.