Professional Documents
Culture Documents
On The Efficiency of Multicast
On The Efficiency of Multicast
Abstract— The average number of joint hops in a shortest- model for the hopcount in the Internet in [17] and for -ary
path graphs [13]. Finally, using the same measurement data as in
multicast tree from a root to arbitrary chosen group member [13], our analysis indicates that the Internet is an exponentially
nodes is studied. A general theory for all graphs, hence including
the graph representation of the Internet, is presented which growing graph (defined in Section VI) with an effective degree
quantifies the multicast reduction in network links compared to of approximately 3.2.
times unicast. For two special types of graphs, the random Inspired by a remarkable paper by Phillips, Shenker, and
graph ( ) and the -ary tree, exact and asymptotic results are Tangmunarunkit [13], which was in turn triggered by the work
derived. Comparing these explicit results with previously
of Chuang and Sirbu [5], the present article extends and
published Internet measurements [13] indicates that the number
of routers in the Internet that can be reached from a root grows complements their work. The extension lies in the fact that
exponentially in the number of hops with an effective degree of we present general results for which show that the
approximately 3.2. empirical power law , coined by Phillips et al. the
Index Terms— Efficiency, -ary tree, multicast, random graph. Chuang– Sirbu scaling law, might be a reasonable
approximation for small , but cannot be valid for large
(meaning of the same order1 as the number of Internet routers,
I. INTRODUCTION
i.e., , with ). This result is illustrated in Figs. 4 and
6. The complementarity refers to the need of considering their
(1)
Hence (2)
(3)
(4)
and
for
Then
However, computing for general graphs is a highly non-
trivial exercise.
Corollary 4: For any connected graph with nodes
and
(6)
The above scaling explains the empirical Chuang–Sirbu law for IV. THE RANDOM GRAPH
: for small with respect to , the graphs of There exists an astonishingly large amount of literature on
and look very alike in a properties of random graphs. We refer to Bollobas [3] and to
log–log plot as illustrated in Fig. 3. [17] for additional references. The class of random graphs de-
For small to moderate values of , (as observed for noted by consists of all graphs with nodes in which the
Internet-like topologies in [13]) is very close to a straight edges (or links) are chosen independently and with proba-bility .
line in a log–log plot. This “power law behavior” implies that Although random graphs are not modeling realistic net-
, which is a first-order work topologies well, computations in of the shortest path
Taylor expansion of in . It further suggests to from a source to an arbitrary destination result in a re-markably
compute3 as effective power exponent good model of the hopcount (i.e., the number of links) from that
source to a destination, as demonstrated theoretically in [16] and
(9) verified with Internet measurements in [17]. The explanation for
the quality of a random graph with exponen-tially distributed link
3
Although (5) only has meaning for integer m, analytic continuation to a
weights can be understood when reasoning from the source node
complex variable is possible and, hence, differentiation can be defined. on. The view of the source node is a
VAN MIEGHEM et al.: ON THE EFFICIENCY OF MULTICAST 723
(14)
The difference monotonously decreases and is
largest, 0.048 at while 0.008 31 at and 0.0037
where is the digamma function.
at . This effective power exponent is drawn
Proof of Theorem 7: See Appendix A.
in the insert of Fig. 4, which shows that is increasing and not
We observe that and that, since
a constant close to 0.8. More interestingly, for large , we
, .
find with (11) and (12) that and
Using the asymptotic properties of the digamma function , we
that . In [17], the ratio pops up
obtain (8) as an excellent approximation for large (and all
naturally as the extreme value index of the distribu-tion of the link
) or, in normalized form with and weights in a topology. Since measurements of
the hopcount in Internet indicate that , this
(15) index strongly favors the model of the hopcount based on
shortest paths in , although random graphs do not model
The normalized Chuang–Sirbu law is the Internet topology well.
. It is interesting to note that the Chuang–Sirbu law is Thus, if the number of nodes in the Internet is still growing
“best” if , since then both endpoints and well modeled by the random graph, we suggest, only for
724 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 6, DECEMBER 2001
Fig. 5. The left-hand side tree (k = 2) has N = 31 and D = 4, while the right-hand side (k = 5) has N = 31 and D = 2.
small to moderate values of , to consider as a power law ap- which shows that is a polynomial in of degree
proximation . Moreover, the terms in the -sum rapidly decrease;
their ratio equals
V. -ARY TREES
Let us consider, as in [13], the -ary tree of depth4 with
the source at the root of the tree and receivers at randomly
chosen nodes (see Fig. 5). In a -ary tree, the total number of
nodes satisfies
(16)
Fig. 6 indicates that (17), although derived subject to (16), also
so that . seems valid when
Theorem 8: For the -ary tree
(19)
Fig. 6. Multicast function g (m) computed for the k-ary tree with four values
of k, the random graph (with “effective” k = e = 2:718 . . .), and the that
Chuang–Sirbu power law for N = 10 on a linear scale where the prefactor
E[H ] is given by (11).
(20)
. The upper bound is attained in a line topology
where , , and . Further, for Since
real values of , the set of curves specified by (17)
covers the total allowable state space of , as shown in
Fig. 1. This suggests to consider (17) for estimating in real
topologies (see Section VI).
The asymptotic form for is deduced from (17) as
follows. If is large
and similarly
(21)
or, for large
VIII. CONCLUSION
In this paper, general results are presented on the multicast
efficiency , which are valid for all connected graphs and
Fig. 8. MBone measurement from [13] where N = 4179 and g (m) computed
where is the number of multicast group members. Using these
for the k-ary tree for various values of k. The upper curve corresponds to k = 2; the
curves decrease monotonuously for increasing k. The best fit corresponds to k = 4:2. general theorems, we show that the so-called Chuang–Sirbu
The insert shows the same data on a log–log scale. power law, , cannot generally hold if
grows logarithmically inand the number of multi-
However, it is easy to produce graphs that are not exponentially cast group membersis of the same order as the number of
increasing, but that have an arbitrarily large average degree as nodesin the graph. Moreover, we define the effective power
grows large. On the other hand, a distribution of the outde-gree at exponent and show that, in general, is not a con-
each level of the tree relates better to . Chalmers and Almeroth stant equal to 0.8.
[4, Figs. 8–11] present measurements of average de-gree per level. We have also derived exact and asymptotic expressions
Their values agree in magnitude with the -values we found from for in the case of random graphs of the class
the data of [13]. and for -ary trees. These expressions generalize previous
Based on the measurement data, the two differently computed results obtained in [13]. They confirm that only for small
-values agree for the Internet, which seems to indicate that the and moderate values of the number of multicast group
Internet is exponentially growing with effective degree approxi- members the Chuang–Sirbu law is a reasonable approximation
for . Based on computations for the random graph, we find
mately 3.2. Also the quality of the fit on both linear and log–log
that the Chuang–Sirbu law is 1) best for , but 2)
scale in Fig. 7 over the whole -range is persuasive. This is an
degrades for . In addition, the analysis for random
important consequence, since it is difficult to judge whether a
graphs suggests, only for small to moderate values of , to
graph is exponentially increasing without knowing its precise
consider instead of the
topological structure. The above considerations clearly indicate
Chuang–Sirbu law because the effective power exponent
that this fact cannot be decided upon the information of the av-
is not constant, but slowly increases
erage degree solely. In contrast to the Internet data, the Mbone data
from 0.71 at toward 1 as . Our proposed
is not so well fitted, as illustrated in Fig. 8. The insert on a log–log power law depends on the size , which is important since the
scale shows that the MBone shifts gradually when increases Internet is still in evolution. A similar expression can be deduced
toward higher -curves. The discrepancy by almost a from our computations on the -ary tree where
factor 2 between derived from the unicast hopcount at is replaced by in (22).
and fitted from the entire -range of the multi- Finally, previously reported Internet measurements have been
cast gain may be explained by the abundant use of IP tunnels fitted with the exact expression of for the -ary tree. Based on
in the MBone [2]. Tunnels may be viewed as an overlay tree: they these measurement data, our analysis seems to indicate that the
shortcut branches in the shortest-path tree and de- Internet is growing exponentially with an effective degree
crease the possible overlap in paths which diminishes . The approximately . As far as we are aware, this is the first time
more group members are subscribed, the more tunnels seem to effect the exponential growth of the Internet has been quantified.
the structure of the shortest-path tree. Chalmers and Almeroth [4]
also report differences in the unicast hopcount and multicast APPENDIX A
hopcount and assign the origin to tunnels in the multi-cast PROOF OF THEOREM 7
architecture, but also hint to the possible influence of policy routing
Before embarking with the proof of Theorem 7, we first
(as a deviating factor from shortest-path routing) in in-terdomain
proof the following lemma.
multicast routing. Although the Mbone is a connected subgraph of
Lemma 10: For ,
the Internet, exponential growth in the Internet does not necessarily
imply exponential growth in the MBone. How-ever, the practical
method in previous section is applicable with which suggests
exponential growth in the MBone, al-
728 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 6, DECEMBER 2001
and
because we must sum over all possible sizes for the first cluster. If
not all group member nodes are in the first cluster, the group
member nodes are divided over the two clusters. But, in that
case, we have no joint overlaps or . Thus, if not all group
from which the lemma follows.
members nodes are in the first cluster, the only way that
Proof of Theorem 7: We will investigate
there are possible joint overlaps ( , is that all group member
on the uniform tree with nodes. Here is the number nodes are in the second cluster. However, by removing the first
of joint hops in a multicast shortest-path tree from the root to cluster, we are left again with a uniform recursive tree
uniformly chosen nodes in the uniform tree and where all the of size . The average number of joint hops in this case is
group member nodes are different from the root. Let be
the same quantity where we allow the group member nodes to
be the root. Then
VAN MIEGHEM et al.: ON THE EFFICIENCY OF MULTICAST 729
We next write
(27)
Subtracting
(25)
The -summation can be executed as follows. Consider
(26)
APPENDIX B
PROOF OF THEOREM 8
and Let be the number of joint hops for different multicast
group members (we allow the root to be a user in which case
), then Pr is the probability that all group members
belong to the same cluster connected to the root. Due to the
structure of the -ary tree, this probability Pr equals
times the probability that all group members belong to the
first cluster connected to the root. Thus
Pr
(29)
Pr
Pr (30)
Then
Note that for the probability Pr , because
if some destinations must be identical. From the well-
known identity that Pr , we obtain for
(31)
VAN MIEGHEM et al.: ON THE EFFICIENCY OF MULTICAST 731
(32) Hence
For the value of and , we find
and
Thus
Invoking Theorem 3 yields
ACKNOWLEDGMENT
The authors would like to thank R. van den Berg (CWI, The
Concentrating on the inner sum with lower sum bound , Netherlands) for his input to Theorem 2. They also thank J.
denoted as , and substituting , we have Chuang, M. Sirbu, G. Philips, S. Shenker, and H. Tangmu-
narunkit for sending the data in [13, Fig. 1b]. Finally, they are
grateful to one of the reviewers for pointing to the alternative
proof (B) in Corollary 5.