Introduction to IP Multicast 1 Cisco Systems Confidential 0810_04F7_c2.

Slides:



Advertisements
Similar presentations
1April 16, 2002 Layer 3 Multicast Addressing IP group addresses – “Class D” addresses = high order bits of “1110” Special reserved.
Advertisements

Multicasting 1. Multicast Applications News/sports/stock/weather updates Distance learning Configuration, routing updates, service location Pointcast-type.
Multicast on the Internet CSE April 2015.
Multicasting CSE April Internet Multicast Service Model Multicast group concept: use of indirection a host “sends” IP datagrams to multicast.
IP Multicast Lecture 2: PIM-SM Carl Harris Communications Network Services Virginia Tech.
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
15-744: Computer Networking L-14 Multicast Routing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public BSCI Module 7 Lesson 3 1 IP Multicasting: Multicast Routing Protocols.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public BSCI Module 7 Lesson 2 1 IP Multicasting: IGMP and Layer 2 Issues.
COS 420 Day 18. Agenda Group Project Discussion Program Requirements Rejected Resubmit by Friday Noon Protocol Definition Due April 12 Assignment 3 Due.
IP Multicasting: Explaining Multicast
TDC375 Winter 2002John Kristoff - DePaul University1 Network Protocols IP Multicast.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Computer Networking Lecture 24 – Multicast.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
TDC375 Autumn 03/04 John Kristoff - DePaul University 1 Network Protocols Multicast.
EE689 Lecture 12 Review of last lecture Multicast basics.
Multicast Routing Wed. 28 MAY Introduction based on number of receivers of the packet or massage: “A technique for the efficient distribution of.
1 CSE 401N:Computer Network LECTURE-14 MULTICAST ROUTING.
MULTICASTING Network Security.
COMS/CSEE 4140 Networking Laboratory Lecture 11 Salman Abdul Baset Spring 2008.
1 0940_03F8_c1 NW97_US_106 Introduction to IP Multicast David Meyer Cisco Systems 0940_03F8_c1 NW97_US_106.
© J. Liebeherr, All rights reserved 1 IP Multicasting.
1 Computer Networks IP Multicast. 2 Recall Unicast Broadcast Multicast sends to a specific group.
EECS702: Topics in Computer Systems - Future Internet (Spring 2008)
Computer Networks 2 Lecture 1 Multicast.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Multicast Sources: Kurose and Ross cast/addresstranslation_01.html.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Multicast Outline Multicast revisited Protocol Independent Multicast - SM Future Directions.
Methods and Needs for Multicast Applications
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Chapter 15 Multicasting and Multicast Routing
Introduction to IP Multicast
Multicast Routing Protocols. The Need for Multicast Routing n Routing based on member information –Whenever a multicast router receives a multicast packet.
Multicast Outline Multicast Introduction and Motivation RIP-based and Protocol Independent Multicast Routing.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Multicast 1 Spencer Tsai Mobile Communication & Broadband Network Lab CSIE Fu-Jen Catholic University Introduction to Multicast.
CS 4396 Computer Networks Lab IP Multicast - Fundamentals.
Introduction to Multicast Routing Protocols
© J. Liebeherr, All rights reserved 1 IP Multicasting.
1 © 2000, Cisco Systems, Inc _05_2000_c2 Server Router Unicast Server Router Multicast Unicast vs. Multicast.
Fundamentals of IP Multicast
1 IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing.
Multicast Communications
1 Protocol Independent Multicast (PIM) To develop a scalable protocol independent of any particular unicast protocol –ANY unicast protocol to provide routing.
2/25/20161 Multicast on the Internet CSE 6590 Fall 2009.
IP Multicast Lecture 4: PIM-SM Carl Harris Communications Network Services Virginia Tech.
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
DMET 602: Networks and Media Lab
Multicasting protocols
Computer Networking Multicast.
Multicast Outline Multicast Introduction and Motivation DVRMP.
CMPE 252A: Computer Networks
ECE544: Communication Networks-II Spring 2013
Multicast Outline Homework #4 - posted later today, due in one week
Multicasting and Multicast Routing Protocols
Multicast on the Internet
IP Multicasting Let one packet go to multiple addresses and you can save much bandwidth. That’s the promise of IP multicasting…
Multicast Outline Multicast revisited
MULTICAST. 2 Agenda Introduction Multicast addressing Group Membership Protocol PIM-SM / SSM MSDP MBGP.
Introduction to IP Multicast David Meyer Cisco Systems
Introduction to IP Multicast
IP Multicast COSC /5/2019.
Implementing Multicast
Optional Read Slides: Network Multicast
Multicasting Unicast.
Presentation transcript:

Introduction to IP Multicast 1 Cisco Systems Confidential 0810_04F7_c2

Manoj Leelanivas 2 Cisco Systems Confidential 0810_04F7_c2 Software Engineer

3 Cisco Systems Confidential 0810_04F7_c2 •IP Multicast Technology and Concepts •IP Multicast Host-to-Router Protocols •IP Multicast Routing Protocols •Protocol Independent Multicast—PIM •General Multicast Concepts •Deliverables Agenda

4 Cisco Systems Confidential 0810_04F7_c2 •Why multicast? When sending same data to multiple receivers Better bandwidth utilization Lesser host/router processing Receivers’ addresses unknown •Applications Video/audio conferencing Resource discovery/service advertisement Stock distribution Eg. Vat, Vic, IP/TV, Pointcast Introduction to Multicast

5 Cisco Systems Confidential 0810_04F7_c2 Unicast/Multicast Host Router Unicast Host Router Multicast

6 Cisco Systems Confidential 0810_04F7_c2 •RFC 1112 •Each multicast group identified by a class-D IP address •Members of the group could be present anywhere in the Internet •Members join and leave the group and indicate this to the routers •Senders and receivers are distinct: i.e., a sender need not be a member •Routers listen to all multicast addresses and use multicast routing protocols to manage groups IP Multicast Service Model

7 Cisco Systems Confidential 0810_04F7_c2 IP Multicast Service Model (Cont.) •IP group addresses Class D address—high-order 3 bits are set ( ) Range from through •Well known addresses designated by IANA Reserved use: through —all multicast systems on subnet —all routers on subnet •Transient addresses, assigned and reclaimed dynamically Global scope: Limited Scope: •Site-local scope: /16 •Organization-local scope: /14

8 Cisco Systems Confidential 0810_04F7_c2 IP Multicast Service Model (Cont.) •Mapping IP group addresses to data-link multicast addresses RFC 1112 defines OUI 0x01005e Low-order 23-bits of IP address map into low-order 23-bits of IEEE address (eg –01005e ) Ethernet and FDDI use this mapping Token Ring uses functional address- c

9 Cisco Systems Confidential 0810_04F7_c2 IP Multicast Service Model (Cont.) Hosts Routers Host-to-Router Protocols (IGMP) Multicast Routing Protocols (PIM)

Internet Group Management Protocol—IGMP •How hosts tell routers about group membership •Routers solicit group membership from directly connected hosts •RFC 1112 specifies first version of IGMP •IGMP v2 and IGMP v3 enhancements •Supported on UNIX systems, PCs, and MACs 10 Cisco Systems Confidential 0810_04F7_c2

Internet Group Management Protocol—IGMP •IGMP v1 Queries Querier sends IGMP query messages to with ttl = 1 One router on LAN is designated/elected to send queries Query interval 60–120 seconds Reports IGMP report sent by one host suppresses sending by others Restrict to one report per group per LAN Unsolicited reports sent by host, when it first joins the group 11 Cisco Systems Confidential 0810_04F7_c2

12 Cisco Systems Confidential 0810_04F7_c2 IGMP—Joining a Group Host 1Host 2Host Sends Report to Sends Report to Periodically Sends IGMP Query to

13 Cisco Systems Confidential 0810_04F7_c2 •IGMP v2: Host sends leave message if it leaves the group and is the last member (reduces leave latency in comparison to v1) Router sends G-specific queries to make sure there are no members present before stopping to forward data for the group for that subnet Standard querier election •IGMP v3: In design phase Enables to listen only to a specified subset of the hosts sending to the group Internet Group Management Protocol—IGMP

14 Cisco Systems Confidential 0810_04F7_c2 IGMP—Leaving a Group Host 1Host 2Host 3 Sends Leave for to Sends Leave for to Sends Group Specific IGMP Query to Sends Report for Sends Group Specific IGMP Query to

15 Cisco Systems Confidential 0810_04F7_c2 Multicast Routing Protocols (Reverse Path Forwarding) •What is RPF? A router forwards a multicast datagram if received on the interface used to send unicast datagrams to the source B C A F SourceReceiver Unicast Multicast DE

16 Cisco Systems Confidential 0810_04F7_c2 Multicast Routing Protocols (Reverse Path Forwarding) •If the RPF check succeeds, the datagram is forwarded •If the RPF check fails, the datagram is typically silently discarded •When a datagram is forwarded, it is sent out each interface in the outgoing interface list never •Packet is never forwarded back out the RPF interface!

17 Cisco Systems Confidential 0810_04F7_c2 Multicast Routing Protocols—Characteristics Shortest Path or Source Distribution Tree Receiver 1 B E A D F Source Notation: (S, G) S = Source G = Group C Receiver 2

18 Cisco Systems Confidential 0810_04F7_c2 Multicast Routing Protocols—Characteristics Shared Distribution Tree Receiver 1 B E A D (Shared Root) F Source 1Notation: (*, G) * = All Sources G = Group C Receiver 2 Source 2

19 Cisco Systems Confidential 0810_04F7_c2 •Distribution trees Source tree Uses more memory O(S x G) but you get optimal paths from source to all receivers, minimizes delay Shared tree Uses less memory O(G) but you may get suboptimal paths from source to all receivers, may introduce extra delay •Protocols PIM, DVMRP, MOSPF, CBT Multicast Routing Protocols—Characteristics

20 Cisco Systems Confidential 0810_04F7_c2 Multicast Routing Protocols—Characteristics •Types of multicast protocols Dense-mode •Broadcast and Prune behavior •Similar to Radio broadcast Sparse-mode •Explicit Join behavior •Similar to Pay Per View

21 Cisco Systems Confidential 0810_04F7_c2 Multicast Routing Protocols—Characteristics •Dense-mode protocols Assumes dense group membership Branches that are pruned don’t get data Pruned branches can later be grafted to reduce join latency DVMRP—Distance Vector Multicast Routing Protocol Dense-mode PIM—Protocol Independent Multicast

22 Cisco Systems Confidential 0810_04F7_c2 Multicast Routing Protocols—Characteristics •Sparse-mode protocols Assumes group membership is sparsely populated across a large region Uses either source or shared distribution trees Explicit join behavior—assumes no one wants the packet unless asked Joins propagate from receiver to source or Rendezvous Point (Sparse mode PIM) or Core (Core-Based Tree)

23 Cisco Systems Confidential 0810_04F7_c2 •Broadcast and prune ideal for dense groups •Source trees created on demand based on RPF rule •If the source goes inactive, the tree is torn down •Easy plug-and-play •Draft: draft-ietf-idmr-pim-dense-spec-00.txt Dense Mode PIM

24 Cisco Systems Confidential 0810_04F7_c2 •Branches that don’t care for data are pruned •Grafts to join existing source tree •Uses Asserts to determine forwarder for multi-access LAN •Prunes on non-RPF P2P links •Rate-limited prunes on RPF P2P links Dense Mode PIM

Dense Mode PIM Example Source Receiver 2Receiver 1 DF IBCAE G H Link Data Control 25 Cisco Systems Confidential 0810_04F7_c2

Dense Mode PIM Example Initial Flood of Data and Creation of State Source Receiver 2Receiver 1 DF IBCAE G H 26 Cisco Systems Confidential 0810_04F7_c2

Dense Mode PIM Example Prune to Non-RPF Neighbor Source Prune Receiver 2Receiver 1 DF IBCAE G H 27 Cisco Systems Confidential 0810_04F7_c2

Dense Mode PIM Example C and D Assert to Determine Forwarder for the LAN, C Wins Source Asserts Receiver 2Receiver 1 DF IBCAE G H 28 Cisco Systems Confidential 0810_04F7_c2

Dense Mode PIM Example I Gets Pruned E’s Prune is Ignored G’s Prune is Overridden Source Prune Receiver 2Receiver 1 Join Override Prune DF IBCAE G H 29 Cisco Systems Confidential 0810_04F7_c2

Dense Mode PIM Example Source Graft Receiver 2 Receiver 3 Receiver 1 New Receiver, I Sends Graft DF IBCAE G H 30 Cisco Systems Confidential 0810_04F7_c2

Dense Mode PIM Example Source Receiver 2 Receiver 3 Receiver 1 DF IBCAE G H 31 Cisco Systems Confidential 0810_04F7_c2

32 Cisco Systems Confidential 0810_04F7_c2 •Explicit join model Receivers join to the Rendezvous Point (RP) Senders register with the RP Data flows down the shared tree and goes only to places that need the data from the sources Last hop routers can join source tree if the data rate warrants by sending joins to the source •RPF check for the shared tree uses the RP •RPF check for the source tree uses the source Sparse Mode PIM

33 Cisco Systems Confidential 0810_04F7_c2 •Only one RP is chosen for a particular group •RP statically configured or dynamically learned (Auto-RP, PIM v2 candidate RP advertisements) •Data forwarded based on the source state (S, G) if it exists, otherwise use the shared state (*, G) •Draft: draft-ietf-idmr-pim-sm-spec-10.txt (soon to be RFC) •Draft: draft-ietf-idmr-pim-arch-04.txt Sparse Mode PIM

34 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E AD Source C Receiver 2 RP Link Data Control

35 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E AD Source Receiver 1 Joins Group G C Creates (*, G) State, Sends (*, G) Join to the RP C Receiver 2 RP Join

36 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E A RP D Source RP Creates (*, G) State C Receiver 2

37 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E A RP D Source Source Sends Data A Sends Registers to the RP C Receiver 2 Register

38 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E A RP D Source RP De-Encapsulates Registers Forwards Data Down the Shared Tree Sends Joins Towards the Source C Receiver 2 Join

39 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E A RP D Source RP Sends Register-Stop Once Data Arrives Natively C Receiver 2 Register-Stop

40 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E A RP D Source C Sends (S, G) Joins to Join the Shortest Path (SPT) Tree C Receiver 2 (S, G) Join

41 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E A RP D Source When C Receives Data Natively, It Sends Prunes Up the RP tree for the Source. RP Deletes (S, G) OIF and Sends Prune Towards the Source C Receiver 2 (S, G) RP Bit Prune (S, G) Prune

42 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E A RP D Source New Receiver 2 Joins E Creates State and Sends (*, G) Join C Receiver 2 (*, G) Join

43 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E A RP D Source C Adds Link Towards E to the OIF List of Both (*, G) and (S, G) Data from Source Arrives at E C Receiver 2

44 Cisco Systems Confidential 0810_04F7_c2 Sparse Mode PIM Example Receiver 1 B E A RP D Source New Source Starts Sending D Sends Registers, RP Sends Joins RP Forwards Data to Receivers through Shared Tree C Receiver 2 Source 2 Register

•TTL scoping To keep multicast traffic within an administrative domain by setting ttl thresholds on interfaces on the border router •Administratively scoped addresses A multicast boundary can be setup on the borders for addresses in range of – Better than ttl scoping (pruning, solid wall) Multicast Features: Multicast Scope Control 45 Cisco Systems Confidential 0810_04F7_c2

46 Cisco Systems Confidential 0810_04F7_c2 •Multicast rate limiting Control the rate at which a sender can send traffic to a group Input and output rate-limits possible •Source-tree thresholds For PIM-SM Switch to SPT tree, if rate exceeds the threshold Shared tree saves state Multicast Features:

47 Cisco Systems Confidential 0810_04F7_c2 •Interoperability for different multicast protocols •PIM/DVMRP interoperability Interaction between PIM SM/DM regions with DVMRP regions MBONE connection •PIM-SM/PIM-DM interoperability RP has to be the border router Multicast Features: Border Router Functionality

48 Cisco Systems Confidential 0810_04F7_c2 •Limitation of Ethernet bridges/switches Forward all multicast traffic to all ports •Improvements: IGMP snooping Data goes to segments with routers and members Report suppression per segment CGMP (Cisco Group Management Protocol) Cisco routers tell switches about router/member segments Switches do not snoop into IGMP packets Multicast Features: IP Multicast and Switches

49 Cisco Systems Confidential 0810_04F7_c2 •IP Multicast fastswitching/fastdrop •IP Multicast rate limiting •IP Multicast static routes •mtrace/mrinfo support •PIM NBMA support •PIM SPT thresholding Cisco Deliverables (11.1)

50 Cisco Systems Confidential 0810_04F7_c2 •Scoped addresses •IGMP v2 •CGMP support •Auto-RP •SDR listener support •Helper maps Cisco Deliverables (11.1)

51 Cisco Systems Confidential 0810_04F7_c2 •11.2F features PIM over ATM DVMRP interoperability enhancements •Futures PIM v2 Performance improvements Multicast Tag Switching Cisco Deliverables—11.2F

52 Cisco Systems Confidential 0810_04F7_c2 • •ftp://ftp.cisco.com/ipmulticast.html •ftp://ftp.cisco.com/ipmulticast •Support •MBONE—open session “cisco PIM users” •Release recommended Stable—11.1(9) New features—11.2 and 11.2F Documentation