Free Essay

Multicast

In:

Submitted By qwertyvmd12
Words 6080
Pages 25
C H A P T E R

43

Chapter Goals
• • • • • • • • •

Explain IP multicast addressing. Learn the basics of Internet Group Management Protocol (IGMP). Explain how multicast in Layer 2 switching works. Define multicast distribution trees. Learn how multicast forwarding works. Explain the basics of protocol-independent multicast (PIM). Define multiprotocol BGP. Learn how Multicast Source Discovery Protocol (MSDP) works. Explain reliable multicast: PGM.

Internet Protocol Multicast
Background
Internet Protocol (IP) multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to thousands of corporate recipients and homes. Applications that take advantage of multicast include videoconferencing, corporate communications, distance learning, and distribution of software, stock quotes, and news. IP Multicast delivers source traffic to multiple receivers without adding any additional burden on the source or the receivers while using the least network bandwidth of any competing technology. Multicast packets are replicated in the network by Cisco routers enabled with Protocol Independent Multicast (PIM) and other supporting multicast protocols resulting in the most efficient delivery of data to multiple receivers possible. All alternatives require the source to send more than one copy of the data. Some even require the source to send an individual copy to each receiver. If there are thousands of receivers, even low-bandwidth applications benefit from using Cisco IP Multicast. High-bandwidth applications, such as MPEG video, may require a large portion of the available network bandwidth for a single stream. In these applications, the only way to send to more than one receiver simultaneously is by using IP Multicast. Figure 43-1 demonstrates how data from one source is delivered to several interested recipients using IP multicast.

Internetworking Technologies Handbook 1-58705-001-3

43-1

Chapter 43 Multicast Group Concept

Internet Protocol Multicast

Figure 43-1 Multicast Transmission Sends a Single Multicast Packet Addressed to All Intended Recipients

Multicast group

IP multicast

Phone

Multicast Group Concept
Multicast is based on the concept of a group. An arbitrary group of receivers expresses an interest in receiving a particular data stream. This group does not have any physical or geographical boundaries—the hosts can be located anywhere on the Internet. Hosts that are interested in receiving data flowing to a particular group must join the group using IGMP. Hosts must be a member of the group to receive the data stream.

IP Multicast Addresses
Multicast addresses specify an arbitrary group of IP hosts that have joined the group and want to receive traffic sent to this group.

IP Class D Addresses
The Internet Assigned Numbers Authority (IANA) controls the assignment of IP multicast addresses. It has assigned the old Class D address space to be used for IP multicast. This means that all IP multicast group addresses will fall in the range of 224.0.0.0 to 239.255.255.255.

Note

This address range is only for the group address or destination address of IP multicast traffic. The source address for multicast datagrams is always the unicast source address.

Internetworking Technologies Handbook

43-2

1-58705-001-3

Chapter 43

Internet Protocol Multicast IP Multicast Addresses

Reserved Link Local Addresses
The IANA has reserved addresses in the 224.0.0.0 through 224.0.0.255 to be used by network protocols on a local network segment. Packets with these addresses should never be forwarded by a router; they remain local on a particular LAN segment. They are always transmitted with a time-to-live (TTL) of 1. Network protocols use these addresses for automatic router discovery and to communicate important routing information. For example, OSPF uses 224.0.0.5 and 224.0.0.6 to exchange link state information. Table 43-1 lists some of the well-known addresses.
Table 43-1 Link Local Addresses

Address 224.0.0.1 224.0.0.2 224.0.0.5 224.0.0.6 224.0.0.12

Usage All systems on this subnet All routers on this subnet OSPF routers OSPF designated routers DHCP server/relay agent

Globally Scoped Address
The range of addresses from 224.0.1.0 through 238.255.255.255 are called globally scoped addresses. They can be used to multicast data between organizations and across the Internet. Some of these addresses have been reserved for use by multicast applications through IANA. For example, 224.0.1.1 has been reserved for Network Time Protocol (NTP). More information about reserved multicast addresses can be found at http://www.isi.edu/in-notes/iana/assignments/multicast-addresses.

Limited Scope Addresses
The range of addresses from 239.0.0.0 through 239.255.255.255 contains limited scope addresses or administratively scoped addresses. These are defined by RFC 2365 to be constrained to a local group or organization. Routers are typically configured with filters to prevent multicast traffic in this address range from flowing outside an autonomous system (AS) or any user-defined domain. Within an autonomous system or domain, the limited scope address range can be further subdivided so those local multicast boundaries can be defined. This also allows for address reuse among these smaller domains.

Glop Addressing
RFC 2770 proposes that the 233.0.0.0/8 address range be reserved for statically defined addresses by organizations that already have an AS number reserved. The AS number of the domain is embedded into the second and third octets of the 233.0.0.0/8 range. For example, the AS 62010 is written in hex as F23A. Separating out the two octets F2 and 3A, we get 242 and 58 in decimal. This would give us a subnet of 233.242.58.0 that would be globally reserved for AS 62010 to use.

Internetworking Technologies Handbook 1-58705-001-3

43-3

Chapter 43 IP Multicast Addresses

Internet Protocol Multicast

Layer 2 Multicast Addresses
Normally, network interface cards (NICs) on a LAN segment will receive only packets destined for their burned-in MAC address or the broadcast MAC address. Some means had to be devised so that multiple hosts could receive the same packet and still be capable of differentiating among multicast groups. Fortunately, the IEEE LAN specifications made provisions for the transmission of broadcast and/or multicast packets. In the 802.3 standard, bit 0 of the first octet is used to indicate a broadcast and/or multicast frame. Figure 43-2 shows the location of the broadcast/multicast bit in an Ethernet frame.
Figure 43-2 IEEE 802.3 MAC Address Format
7 Octet 0 0 Octet 1 7 0 xxxxxxxx Octet 2 7 0 xxxxxxxx Octet 3 7 0 xxxxxxxx 7 Octet 4 0 Octet 5 7 0 xxxxxxxx

xxxxxx11

xxxxxxxx

Broadcast/multicast bit Locally administrated address bit

This bit indicates that the frame is destined for an arbitrary group of hosts or all hosts on the network (in the case of the broadcast address, 0xFFFF.FFFF.FFFF). IP multicast makes use of this capability to transmit IP packets to a group of hosts on a LAN segment.

Ethernet MAC Address Mapping
The IANA owns a block of Ethernet MAC addresses that start with 01:00:5E in hexadecimal. Half of this block is allocated for multicast addresses. This creates the range of available Ethernet MAC addresses to be 0100.5e00.0000 through 0100.5e7f.ffff. This allocation allows for 23 bits in the Ethernet address to correspond to the IP multicast group address. The mapping places the lower 23 bits of the IP multicast group address into these available 23 bits in the Ethernet address (shown in Figure 43-3).

Internetworking Technologies Handbook

43-4

1-58705-001-3

Chapter 43

Internet Protocol Multicast Internet Group Management Protocol

Figure 43-3 Mapping of IP Multicast to Ethernet/FDDI MAC Address
32 bits 28 bits Mcast addr

1110 IP multicast address 5 bits Lost MAC address (Ethernet/FDDI)

239.255.0.1

01-00-5e-7f-00-01 25-bit prefix 48 bits 23 bits

Because the upper 5 bits of the IP multicast address are dropped in this mapping, the resulting address is not unique. In fact, 32 different multicast group IDs all map to the same Ethernet address (see Figure 43-4).
Figure 43-4 MAC Address Ambiguities
32 - IP multicast addresses 224.1.1.1 224.129.1.1 225.1.1.1 225.129.1.1 . . . 238.1.1.1 238.129.1.1 239.1.1.1 239.129.1.1

Multicast MAC addresses 0x0100.5E01.0101

Internet Group Management Protocol
IGMP is used to dynamically register individual hosts in a multicast group on a particular LAN. Hosts identify group memberships by sending IGMP messages to their local multicast router. Under IGMP, routers listen to IGMP messages and periodically send out queries to discover which groups are active or inactive on a particular subnet.

IGMP Version 1
RFC 1112 defines the specification for IGMP Version 1. A diagram of the packet format is found in Figure 43-5.

Internetworking Technologies Handbook 1-58705-001-3

43-5

Chapter 43 Multicast in the Layer 2 Switching Environment

Internet Protocol Multicast

Figure 43-5 IGMP Version 1 Packet Format

In Version 1, there are just two different types of IGMP messages:
• •

Membership query Membership report

Hosts send out IGMP membership reports corresponding to a particular multicast group to indicate that they are interested in joining that group. The router periodically sends out an IGMP membership query to verify that at least one host on the subnet is still interested in receiving traffic directed to that group. When there is no reply to three consecutive IGMP membership queries, the router times out the group and stops forwarding traffic directed toward that group.

IGMP Version 2
RFC 2236 defines the specification for IGMP Version 2. A diagram of the packet format follows in Figure 43-6.
Figure 43-6 IGMPv2 Message Format
0 Type 7 Maximum response time Group address 15 23 Checksum 31

In Version 2, there are four types of IGMP messages:
• • • •

Membership query Version 1 membership report Version 2 membership report Leave group

IGMP Version 2 works basically the same as Version 1. The main difference is that there is a leave group message. The hosts now can actively communicate to the local multicast router their intention to leave the group. The router then sends out a group-specific query and determines whether there are any remaining hosts interested in receiving the traffic. If there are no replies, the router times out the group and stops forwarding the traffic. This can greatly reduce the leave latency compared to IGMP Version 1. Unwanted and unnecessary traffic can be stopped much sooner.

Multicast in the Layer 2 Switching Environment
The default behavior for a Layer 2 switch is to forward all multicast traffic to every port that belongs to the destination LAN on the switch. This would defeat the purpose of the switch, which is to limit traffic to the ports that need to receive the data.

Internetworking Technologies Handbook

43-6

1-58705-001-3

Chapter 43

Internet Protocol Multicast Multicast in the Layer 2 Switching Environment

Two methods exist by which to deal with multicast in a Layer 2 switching environment efficiently—Cisco Group Management Protocol (CGMP) and IGMP snooping.

Cisco Group Management Protocol
CGMP is a Cisco-developed protocol that allows Catalyst switches to leverage IGMP information on Cisco routers to make Layer 2 forwarding decisions. CGMP must be configured both on the multicast routers and on the Layer 2 switches. The net result is that with CGMP, IP multicast traffic is delivered only to those Catalyst switch ports that are interested in the traffic. All other ports that have not explicitly requested the traffic will not receive it. The basic concept of CGMP is shown in Figure 43-7. When a host joins a multicast group (part A), it multicasts an unsolicited IGMP membership report message to the target group (224.1.2.3, in this example). The IGMP report is passed through the switch to the router for the normal IGMP processing. The router (which must have CGMP enabled on this interface) receives this IGMP report and processes it as it normally would, but in addition it creates a CGMP join message and sends it to the switch. The switch receives this CGMP join message and then adds the port to its content addressable memory (CAM) table for that multicast group. Subsequent traffic directed to this multicast group will be forwarded out the port for that host. The router port is also added to the entry for the multicast group. Multicast routers must listen to all multicast traffic for every group because the IGMP control messages are also sent as multicast traffic. With CGMP, the switch must listen only to CGMP join and CGMP leave messages from the router. The rest of the multicast traffic is forwarded using its CAM table exactly the way the switch was designed.
Figure 43-7 Basic CGMP Operation

IGMP report Dst MAC = 0100.5e01.0203 Src MAC = 0080.c7a2.1093 Dst IP = 224.1.2.3 Src IP = 192.1.1.1 IGMPgroup = 224.1.2.3 1/1 1/1

CGMP join USA = 0080.c7a2.1093 GDA = 0100.5e01.0203

5/1

5/1

(a)

(b)

IGMP Snooping
IGMP snooping requires the LAN switch to examine, or snoop, some Layer 3 information in the IGMP packets sent between the hosts and the router. When the switch hears the IGMP host report from a host for a particular multicast group, the switch adds the host’s port number to the associated multicast table entry. When the switch hears the IGMP leave group message from a host, it removes the host’s port from the table entry. Because IGMP control messages are transmitted as multicast packets, they are indistinguishable from multicast data at Layer 2. A switch running IGMP snooping examine every multicast data packet to check whether it contains any pertinent IGMP must control information. If IGMP snooping has been implemented on a low-end switch with a slow CPU, this could have a severe performance impact when

Internetworking Technologies Handbook 1-58705-001-3

43-7

Chapter 43 Multicast Distribution Trees

Internet Protocol Multicast

data is transmitted at high rates. The solution is to implement IGMP snooping on high-end switches with special ASICs that can perform the IGMP checks in hardware. CGMP is ideal for low-end switches without special hardware.

Multicast Distribution Trees
Multicast-capable routers create distribution trees that control the path that IP multicast traffic takes through the network to deliver traffic to all receivers. The two basic types of multicast distribution trees are source trees and shared trees.

Source Trees
The simplest form of a multicast distribution tree is a source tree whose root is the source of the multicast tree and whose branches form a spanning tree through the network to the receivers. Because this tree uses the shortest path through the network, it is also referred to as a shortest path tree (SPT). Figure 43-8 shows an example of an SPT for group 224.1.1.1 rooted at the source, Host A, and connecting two receivers, hosts B and C.
Figure 43-8 Host A Shortest Path Tree
Source Host A 192.1.1.1 Notation: (S, G) S = Source G = Group

224.1.1.1 Traffic

A

B

D

F

C

E

192.2.2.2 Receiver Host B Receiver Host C

192.3.3.3

The special notation of (S,G), pronounced “S comma G,” enumerates an SPT in which S is the IP address of the source and G is the multicast group address. Using this notation, the SPT for the example in Figure 43-7 would be (192.1.1.1, 224.1.1.1). The (S,G) notation implies that a separate SPT exists for each individual source sending to each group, which is correct. For example, if Host B is also sending traffic to group 224.1.1.1 and hosts A and C are receivers, then a separate (S,G) SPT would exist with a notation of (192.2.2.2,224.1.1.1).

Internetworking Technologies Handbook

43-8

1-58705-001-3

Chapter 43

Internet Protocol Multicast Multicast Distribution Trees

Shared Trees
Unlike source trees that have their root at the source, shared trees use a single common root placed at some chosen point in the network. This shared root is called the rendezvous point (RP). Figure 43-9 shows a shared tree for the group 224.2.2.2 with the root located at Router D. When using a shared tree, sources must send their traffic to the root, and then the traffic is forwarded down the shared tree to reach all receivers.
Figure 43-9 Shared Distribution Tree
Source 1 Host A 192.1.1.1 Notation: (*, G) * = All sources G = Group Source 2 Host D

A

B

D (Shared root)

F 192.4.4.4

224.2.2.2 Traffic C E

192.2.2.2 Receiver Host B Receiver Host C

192.3.3.3

In this example, multicast traffic from the source hosts A and D travels to the root (Router D) and then down the shared tree to the two receivers, hosts B and C. Because all sources in the multicast group use a common shared tree, a wildcard notation written as (*, G), pronounced “star comma G,” represents the tree. In this case, * means all sources, and the G represents the multicast group. Therefore, the shared tree shown in Figure 43-8 would be written as (*, 224.2.2.2). Both SPT and shared trees are loop-free. Messages are replicated only where the tree branches. Members of multicast groups can join or leave at any time, so the distribution trees must be dynamically updated. When all the active receivers on a particular branch stop requesting the traffic for a particular multicast group, the routers prune that branch from the distribution tree and stop forwarding traffic down that branch. If one receiver on that branch becomes active and requests the multicast traffic, the router dynamically modifies the distribution tree and starts forwarding traffic again. Shortest path trees have the advantage of creating the optimal path between the source and the receivers. This guarantees the minimum amount of network latency for forwarding multicast traffic. This optimization does come with a price, though: The routers must maintain path information for each source. In a network that has thousands of sources and thousands of groups, this can quickly become a resource issue on the routers. Memory consumption from the size of the multicast routing table is a factor that network designers must take into consideration.

Internetworking Technologies Handbook 1-58705-001-3

43-9

Chapter 43 Multicast Forwarding

Internet Protocol Multicast

Shared trees have the advantage of requiring the minimum amount of state in each router. This lowers the overall memory requirements for a network that allows only shared trees. The disadvantage of shared trees is that, under certain circumstances, the paths between the source and receivers might not be the optimal paths—which might introduce some latency in packet delivery. Network designers must carefully consider the placement of the RP when implementing an environment with only shared trees.

Multicast Forwarding
In unicast routing, traffic is routed through the network along a single path from the source to the destination host. A unicast router does not really care about the source address—it only cares about the destination address and how to forward the traffic towards that destination. The router scans through its routing table and then forwards a single copy of the unicast packet out the correct interface in the direction of the destination. In multicast routing, the source is sending traffic to an arbitrary group of hosts represented by a multicast group address. The multicast router must determine which direction is upstream (toward the source) and which direction (or directions) is downstream. If there are multiple downstream paths, the router replicates the packet and forwards the traffic down the appropriate downstream paths—which is not necessarily all paths. This concept of forwarding multicast traffic away from the source, rather than to the receiver, is called reverse path forwarding.

Reverse Path Forwarding
Reverse path forwarding (RPF) is a fundamental concept in multicast routing that enables routers to correctly forward multicast traffic down the distribution tree. RPF makes use of the existing unicast routing table to determine the upstream and downstream neighbors. A router forwards a multicast packet only if it is received on the upstream interface. This RPF check helps to guarantee that the distribution tree will be loop-free.

RPF Check
When a multicast packet arrives at a router, the router performs an RPF check on the packet. If the RPF check is successful, the packet is forwarded. Otherwise, it is dropped. For traffic flowing down a source tree, the RPF check procedure works as follows:
Step 1 Step 2 Step 3

Router looks up the source address in the unicast routing table to determine whether it has arrived on the interface that is on the reverse path back to the source. If packet has arrived on the interface leading back to the source, the RPF check is successful and the packet is forwarded. If the RPF check in Step 2 fails, the packet is dropped. Figure 43-10 shows an example of an unsuccessful RPF check.

Internetworking Technologies Handbook

43-10

1-58705-001-3

Chapter 43

Internet Protocol Multicast Protocol-Independent Multicast

Figure 43-10 RPF Check Fails
Multicast packet from source 151.10.3.21 RPF check fails! Multicast route table Network 151.10.0.0/16 198.14.32.0/24 204.1.16.0/24 Interface S1 S0 E0 Packet arrived on wrong interface! Discard packet. S1 E0

X

S0 S2

A multicast packet from source 151.10.3.21 is received on interface S0. A check of the unicast route table shows that the interface that this router would use to forward unicast data to 151.10.3.21 is S1. Because the packet has arrived on S0, the packet will be discarded. Figure 43-11 shows an example of a successful RPF check.
Figure 43-11 RPF Check Succeeds
Multicast packet from source 151.10.3.21 RPF check succeeds! Multicast route table Network 151.10.0.0/16 198.14.32.0/24 204.1.16.0/24 Interface S1 S0 E0 Packet arrived on correct interface! S1 E0 S0 S2

This time the multicast packet has arrived on S1. The router checks the unicast routing table and finds that S1 is the correct interface. The RPF check passes and the packet is forwarded.

Protocol-Independent Multicast
Protocol-independent multicast (PIM) gets its name from the fact that it is IP routing protocol-independent. PIM can leverage whichever unicast routing protocols are used to populate the unicast routing table, including EIGRP, OSPF, BGP, or static routes. PIM uses this unicast routing information to perform the multicast forwarding function, so it is IP protocol-independent. Although PIM is called a multicast routing protocol, it actually uses the unicast routing table to perform the reverse path forwarding (RPF) check function instead of building up a completely independent multicast routing table. PIM does not send and receive multicast routing updates between routers like other routing protocols do.

PIM Dense Mode
PIM Dense Mode (PIM-DM) uses a push model to flood multicast traffic to every corner of the network. This is a brute-force method for delivering data to the receivers, but in certain applications, this might be an efficient mechanism if there are active receivers on every subnet in the network.

Internetworking Technologies Handbook 1-58705-001-3

43-11

Chapter 43 Multiprotocol Border Gateway Protocol

Internet Protocol Multicast

PIM-DM initially floods multicast traffic throughout the network. Routers that do not have any downstream neighbors prune back the unwanted traffic. This process repeats every 3 minutes. The flood and prune mechanism is how the routers accumulate their state information—by receiving the data stream. These data streams contain the source and group information so that downstream routers can build up their multicast forwarding tables. PIM-DM can support only source trees—(S,G) entries. It cannot be used to build a shared distribution tree.

PIM Sparse Mode
PIM Sparse Mode (PIM-SM) uses a pull model to deliver multicast traffic. Only networks that have active receivers that have explicitly requested the data will be forwarded the traffic. PIM-SM is defined in RFC 2362. PIM-SM uses a shared tree to distribute the information about active sources. Depending on the configuration options, the traffic can remain on the shared tree or switch over to an optimized source distribution tree. The latter is the default behavior for PIM-SM on Cisco routers. The traffic starts to flow down the shared tree, and then routers along the path determine whether there is a better path to the source. If a better, more direct path exists, the designated router (the router closest to the receiver) will send a join message toward the source and then reroute the traffic along this path. PIM-SM has the concept of an RP, since it uses shared trees—at least initially. The RP must be administratively configured in the network. Sources register with the RP, and then data is forwarded down the shared tree to the receivers. If the shared tree is not an optimal path between the source and the receiver, the routers dynamically create a source tree and stop traffic from flowing down the shared tree. This is the default behavior in IOS. Network administrators can force traffic to stay on the shared tree by using a configuration option (lp pim spt-threshold infinity). PIM-SM scales well to a network of any size, including those with WAN links. The explicit join mechanism prevents unwanted traffic from flooding the WAN links.

Sparse-Dense Mode
Cisco has implemented an alternative to choosing just dense mode or just sparse mode on a router interface new IP. This was necessitated by a change in the paradigm for forwarding multicast traffic via PIM that became apparent during its development. It turned out that it was more efficient to choose sparse or dense on a per group basis rather than a per router interface basis. Sparse-dense mode facilitates this ability. Network administrators can also configure sparse-dense mode. This configuration option allows individual groups to be run in either sparse or dense mode, depending on whether RP information is available for that group. If the router learns RP information for a particular group, it will be treated as sparse mode; otherwise, that group will be treated as dense mode.

Multiprotocol Border Gateway Protocol
Multiprotocol Border Gateway Protocol (MBGP) gives a method for providers to distinguish which route prefixes they will use for performing multicast RPF checks. The RPF check is the fundamental mechanism that routers use to determine the paths that multicast forwarding trees will follow and successfully deliver multicast content from sources to receivers.

Internetworking Technologies Handbook

43-12

1-58705-001-3

Chapter 43

Internet Protocol Multicast Multicast Source Discovery Protocol

MBGP is described in RFC 2283, Multiprotocol Extensions for BGP-4. Since MBGP is an extension of BGP, it brings along all the administrative machinery that providers and customers like in their interdomain routing environment. Including all the inter-AS tools to filter and control routing (e.g., route maps). Therefore, by using MBGP, any network utilizing internal or external BGP can apply the multiple policy control knobs familiar in BGP to specify routing (and thereby forwarding) policy for multicast. Two path attributes, MP_REACH_NLRI and MP_UNREACH_NLRI have been introduced in BGP4+. These new attributes create a simple way to carry two sets of routing information—one for unicast routing and one for multicast routing. The routes associated with multicast routing are used to build the multicast distribution trees. The main advantage of MBGP is that an internet can support noncongruent unicast and multicast topologies. When the unicast and multicast topologies are congruent, MBGP can support different policies for each. MBGP provides a scalable policy based interdomain routing protocol.

Multicast Source Discovery Protocol
In the PIM Sparse mode model, multicast sources and receivers must register with their local Rendezvous Point (RP). Actually, the closest router to the sources or receivers registers with the RP but the point is that the RP knows about all the sources and receivers for any particular group. RPs in other domains have no way of knowing about sources located in other domains. MSDP is an elegant way to solve this problem. MSDP is a mechanism that connects PIM-SM domains and allows RPs to share information about active sources. When RPs in remote domains know about active sources they can pass on that information to their local receivers and multicast data can be forwarded between the domains. A nice feature of MSDP is that it allows each domain to maintain an independent RP which does not rely on other domains, but it does enable RPs to forward traffic between domains. The RP in each domain establishes an MSDP peering session using a TCP connection with the RPs in other domains or with border routers leading to the other domains. When the RP learns about a new multicast source within its own domain (through the normal PIM register mechanism), the RP encapsulates the first data packet in a Source Active (SA) message and sends the SA to all MSDP peers. The SA is forwarded by each receiving peer using a modified RPF check, until it reaches every MSDP router in the interconnected networks—theoretically the entire multicast internet. If the receiving MSDP peer is an RP, and the RP has a (*,G) entry for the group in the SA (there is an interested receiver), the RP will create (S,G) state for the source and join to the shortest path tree for the state of the source. The encapsulated data is decapsulated and forwarded down that RP’s shared tree. When the packet is received by a receiver’s last hop router, the last-hop may also join the shortest path tree to the source. The source’s RP periodically sends SAs, which include all sources within that RP’s own domain. Figure 43-12 shows how data would flow between a source in domain A to a receiver in domain E.

Internetworking Technologies Handbook 1-58705-001-3

43-13

Chapter 43 Multicast Source Discovery Protocol

Internet Protocol Multicast

Figure 43-12 MSDP Example
Domain E RP Domain C RP

MSDP peers Multicast traffic

R

Domain B RP

RP Domain D

S

RP Domain A

192.1.1.1, 224.2.2.2

MDSP was developed for peering between Internet Service Providers (ISPs). ISPs did not want to rely on an RP maintained by a competing ISP to service their customers. MSDP allows each ISP to have their own local RP and still forward and receive multicast traffic to the Internet.

Anycast RP-Logical RP
A very useful application of MSDP is called anycast RP. This is a technique for configuring a multicast sparse-mode network to provide for fault tolerance and load sharing within a single multicast domain. Two or more RPs are configured with the same IP address on loopback interfaces—say, 10.0.0.1, for example (refer to Figure 43-13). The loopback address should be configured as a 32 bit address. All the downstream routers are configured so that they know that their local RP’s address is 10.0.0.1. IP routing automatically selects the topologically closest RP for each source and receiver. Because some sources might end up using one RP and some receivers a different RP, there needs to be some way for the RPs to exchange information about active sources. This is done with MSDP. All the RPs are configured to be MSDP peers of each other. Each RP will know about the active sources in the other RP’s area. If any of the RPs fail, IP routing will converge and one of the RPs will become the active RP in both areas.

Note

The Anycast RP example above uses IP addresses from RFC 1918. These IP addresses are normally blocked at interdomain borders and therefore are not accessible to other ISPs. You must use valid IP addresses if you want the RPs to be reachable from other domains.

Internetworking Technologies Handbook

43-14

1-58705-001-3

Chapter 43

Internet Protocol Multicast Review Questions

Figure 43-13 Anycast RP

Note

The RPs are used only to set up the initial connection between sources and receivers. After the last-hop routers join the shortest path tree, the RP is no longer necessary.

Multicast Address Dynamic Client Allocation Protocol
The Multicast Address Dynamic Client Allocation Protocol (MADCAP) is defined in RFC 2730 as a protocol that allows hosts to request a multicast address allocation dynamically from a MADCAP server. The concept is very similar to the way DHCP works today and is built on a client/server model.

Multicast-Scope Zone Announcement Protocol
Multicast-Scope Zone Announcement Protocol (MZAP) is defined in RFC 2776 as a protocol that allows networks to automatically discover administratively scoped zones relative to a particular location.

Reliable Multicast-Pragmatic General Multicast
Pragmatic General Multicast (PGM) is a reliable multicast transport protocol for applications that require ordered, duplicate-free, multicast data delivery from multiple sources to multiple receivers. PGM guarantees that a receiver in a multicast group either receives all data packets from transmissions and retransmissions, or can detect unrecoverable data packet loss. The PGM Reliable Transport Protocol itself is implemented on the sources and the receivers. The source maintains a transmit window of outgoing data packets and retransmits individual packets when it receives a negative acknowledgment (NAK). The network elements (routers) assist in suppressing an implosion of NAKs (when a failure does occur) and aids in efficient forwarding of the retransmitted data just to the networks that need it. PGM is intended as a solution for multicast applications with basic reliability requirements. The specification for PGM is network layer-independent. The Cisco implementation of PGM Router Assist supports PGM over IP. Today, the specification for PGM is an Internet draft that can be found on the IETF web site (http://www.ietf.org) under the name “PGM Reliable Transport Protocol.”

Review Questions
Q—What is the range of available IP multicast addresses?

Internetworking Technologies Handbook 1-58705-001-3

43-15

Chapter 43 For More Information

Internet Protocol Multicast

A—224.0.0.0 to 239.255.255.255. Q—What is the purpose of IGMP? A—IGMP is used between the hosts and their local multicast router to join and leave multicast groups. Q—What is an advantage of IGMPv2 over IGMPv1? A—IGMPv2 has a leave group message that can greatly reduce the latency of unwanted traffic on a LAN. Q—What is a potential disadvantage of IGMP snooping over CGMP on a low-end Layer 2 switch? A—IGMP snooping requires the switch to examine every multicast packet for an IGMP control message. On a low-end switch, this might have a severe performance impact. Q—What is an advantage of shortest path (or source) trees compared to shared trees? A—Source trees guarantee an optimal path between each source and each receiver, which will minimize network latency. Q—What is an advantage of using shared trees? A—Shared trees require very little state to be kept in the routers, which requires less memory. Q—What information does the router use to do an RPF check? A—The unicast routing table. Q—Why is protocol-independent multicast called “independent”? A—PIM works with any underlying IP unicast routing protocol—RIP, EIGRP, OSPF, BGP or static routes. Q—What is the main advantage of MBGP? A—Providers can have noncongruent unicast and multicast routing topologies. Q—How do RPs learn about sources from other RPs with MSDP? A—RPs are configured to be MSDP peers with other RPs. Each RP forwards source active (SA) messages to each other. Q—What is the purpose of the anycast RP? A—Load balancing and fault tolerance.

For More Information
Williamson, Beau. Developing IP Multicast Networks. Indianapolis: Cisco Press, 2000. Multicast Quick Start Configuration Guide (http://www.cisco.com/warp/customer/105/48.html)

Internetworking Technologies Handbook

43-16

1-58705-001-3

Similar Documents

Free Essay

Multicast Capacity in Manet with Infrastructure Support

...1 Multicast Capacity in MANET with Infrastructure Support Zhenzhi Qian, Xiaohua Tian, Xi Chen, Wentao Huang and Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {199012315171, xtian, qfbzcx, yelohuang, xwang8}@sjtu.edu.cn ! Abstract—We study the multicast capacity under a network model featuring both node’s mobility and infrastructure support. Combinations between mobility and infrastructure, as well as multicast transmission and infrastructure, have already been showed effective ways to increase it. In this work, we jointly consider the impact of the above three factors on network capacity. We assume that m static base stations and n mobile users are placed in an ad hoc network. A general mobility model is adopted, such that each user moves within a bounded distance from its home-point with an arbitrary pattern. In addition, each mobile node serves as a source of multicast transmission, which results in a total number of n multicast transmissions. We focus on the situations in which base stations actually benefit the capacity improvement, and find that multicast capacity in a mobile hybrid network falls into several regimes. For each regime, reachable upper and lower bounds are derived. Our work contains theoretical analysis of multicast capacity in hybrid networks and provides guidelines for the design of real hybrid system combing cellular and ad hoc networks. 1 Index Terms—Wireless ad hoc network; multicast capacity; mobility;...

Words: 6686 - Pages: 27

Free Essay

Ipv6 Multicast Address vs Ipv4 Broadcast

...IPv6 MULTICAST ADDRESS VS IPv4 BROADCAST Multicast enables you to send a single packet but still communicate with multiple systems on the network. Although IPv4 can employ multicast, in IPv6 multicast takes a much more prominent role. IPv6 does not have a broadcast address, which is not surprising considering the default subnet size is 2^64. Multicast is used in various ways to communicate with specific device groups, such as All Hosts on the local network or All Routers on the local network. In IPv6 all nodes are required to support multicast. Without multicast, many services that you need will simply not work. There’s a constant hum from the network on the multicast channels. When IPv4 was specified about 30 years ago, there was no multicast standard for IP networks initially. A lot of network services, like DHCP and ARP, had to depend on broadcast to work. IPv6 is a new protocol and had multicast services from start, so network discovery functions now builds upon multicast instead. This means that hosts that run these servers listen to the multicast addresses and other hosts will not be bothered when a client sends IP packets to these addresses. Multicast also enables site-wide and global services where clients subscribe to a data stream. ICMP messages to these multicast groups enable IPv6’s Neighbor Discovery to operate efficiently. Other groups include all DHCP Servers and all Mobile Agents. The increased reliance on multicast goes hand-in-hand with the increased dependence...

Words: 300 - Pages: 2

Free Essay

Project

...CENTRALISED GROUP KEY MANAGEMENT WITH OFT ALGORITHM DESCRIPTION: Group communication can be defined as a process where a group of n users can communicate with each other. Improvements in IP multicast have expanded the horizons of the group communication oriented applications. Applications like video conferencing, pay per-view broadcasts, e-newspaper are representatives of the growing trend. Multicast networks are built in such a way that anyone joining a multicast group can have access to the group communication. As a result, the entire multicast based applications face the problem of security of data over the multicast network. The problem of securing group communications is well studied. A primary method of limiting access to the information is through encryption and selective distribution of encryption key. Various centralized, decentralized and distributed key management schemes are proposed. Access control in all these schemes depends upon possession of the group key, which is termed as the Traffic Encryption Key (TEK). Users who have the TEK can access the group communication. EXISTING SYSTEM We present a scalable method for establishing group session keys for secure large, dynamic groups such as multicast sessions. Our method is based on a novel application of One-Way Function Trees (OFTs). The number of keys stored by group members, the number of keys broadcast to the group when new members are added or evicted, and the computational...

Words: 616 - Pages: 3

Free Essay

Light Tree

...connecti n g a t r a n s m i t t e r a t a s o u r c e n o d e t o a receiver a t a d e s t i n a t i o n n o d e . L i g h t p a t h communication can significantly reduce the number o f hops (or lightpaths) a packet has t o traverse; and this reduction can, in turn, significantly improve t h e network’s t h r o u g h p u t . We extend the lightpath concept by incorporating an optical multicasting capability at the r o u t i n g nodes i n order t o increase t h e logical connectivity o f t h e n e t w o r k a n d f u r t h e r decrease its hop distance. We refer t o such a point-to-multipoint extension as a light-tree. Light-trees can n o t only provide improved performance f o r unicast traffic, b u t they naturally can better support multicast traffic and broadcast traffic. In this study, w e shall concentrate o n the application and advantages o f light-trees t o unicast and broadcast traffic. We f o r m u l a t e t h e light-tree-based virtual t o p o l o g y design p r o b l e m as an o p t i m i z a t i o n problem w i t h one o f t w o possible objective functions: f o r a given traffic matrix, (i) minimize the network-wide average packet hop distance, or (ii) minimize the t o t a l number o f transceivers i n t h e network. We demonstrate t h a t an o p t i m u m light-tree-based virtual t o p o l o g y has clear advantages over an o p t i m u m lightpath-based virtual t o p o l o g y w i t h respect t o the above t w o objectives. ABSTRACT introduce the concept of...

Words: 6430 - Pages: 26

Free Essay

Student

...NT2640 Unit 8 – Assignment 1 – IPv6 Address Type – Multicast One of the most significant modifications in the general addressing model in IPv6 was a change to the basic types of addresses and how they were used. For example, the Broadcast addressing type has been eliminated in IPv6. Instead, support for multicast addressing has been expanded and made a required part of the protocol, and a new type of addressing called Anycast has been implemented. In IPv6, multicasting is used to allow a single device to send a datagram to a group of recipients, where IPv4 supported multicast addressing using the Class D address block in the “classful” addressing scheme. In IPv6, the well-known multicast addresses for the “All Nodes” (FF0x:0:0:0:0:0:1) and “All Routers” (FF0x:0:0:0:0:0:2) enable the equivalent function of what broadcast used to perform in IPv4. To send a message, either an “All Nodes” or “All Routers” multicast address is used along with the scope value to determine the scope (Node-Local, Link-Local or Site-Local) where messages are to be sent. Apart from the regular multicast address, each unicast address has a special multicast address called its solicited-node address. These solicited-node addresses are used by the IPv6 Neighbor Discovery (ND) Protocol to provide more efficient address resolution than the ARP method used in IPv4. When a host wants to get the layer two address of a datagram destination it sends a Neighbor Solicitation ICMPv6 message containing the...

Words: 572 - Pages: 3

Free Essay

Comptuer

...used on traditional, circuit-switched PSTN connections? a. SIP b. SS7 c. H.323 d. MEGACO 5. Watching a YouTube video on the Web is an example of which of the following types of video-over-IP services? a. Videoconferencing b. Streaming video c. IP multicasting d. IPTV 6. In an IPTV system, which of the following functions does a set top box perform? a. Decodes video signals and issues them to a television b. Determines the appropriate amount of bandwidth necessary to deliver a requested video and adjusts the connection accordingly c. Interprets multicast routing protocols to determine the most efficient means of distributing video signals d. Generates video content based on a subscriber’s channel selection 7. What type of video-over-IP service relies on full-duplex communication? a. Webcasting b. Streaming video c. Videoconferencing d. IPTV 8. What protocol manages addressing for multicast groups? a. IGMP b. MGCP c. MEGACO d. H.245 9. Which of the following protocols would be used by a video bridge to invite a video phone to join a videoconference? a. MGCP b. H.225 c. IGMP d. RSVP 10. Suppose your organization’s PSTN and VoIP systems are integrated,...

Words: 1510 - Pages: 7

Free Essay

New 205

...Packet Tracer – Who Hears the Broadcast? Topology Objectives Part 1: Observe Broadcast Traffic in a VLAN Implementation Part 2: Complete Review Questions Scenario In this activity, a 24-port Catalyst 2960 switch is fully populated. All ports are in use. You will observe broadcast traffic in a VLAN implementation and answer some reflection questions. Part 1: Observe Broadcast Traffic in a VLAN Implementation Step 1: Use ping to generate traffic. a. Click PC0 and click the Desktop tab> Command Prompt. b. Enter the ping 192.168.1.8 command. The ping should succeed. Unlike a LAN, a VLAN is a broadcast domain created by switches. Using Packet Tracer Simulation mode, ping the end devices within their own VLAN. Based on your observation, answer the questions in Step 2. Step 2: Generate and examine broadcast traffic. a. Switch to Simulation mode. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2 Packet Tracer - Who Hears the Broadcast? b. Click Edit Filters in the Simulation Panel. Uncheck the Show All/None checkbox. Check the ICMP checkbox. c. Click the Add Complex PDU tool, this is the open envelope icon on the right toolbar. d. Float the mouse cursor over the topology and the pointer changes to an envelope with a plus (+) sign. e. Click PC0 to serve as the source for this test message and the Create Complex PDU dialog window opens. Enter the following values:  Destination IP Address:...

Words: 503 - Pages: 3

Premium Essay

Twitch

...April 7, 2015 I have decided to do my research paper on the website ‘www.twitch.tv’ which has been rapidly growing in the last couple of years. Twitch is a website which features thousands of different ‘live streams’ by thousands of different ‘streamers’, which are viewed by hundreds of thousands of viewers throughout the day. The definition of live streaming would be the act of capturing live video and audio feed through the internet. What makes Twitch.tv unique is that it is the most popular live stream site for video game gameplay. From March 2014, there were over 45 million people watching and over 13 billion minutes watched every month (Ohannessian, 2014). It started as a small website by a group of a few friends, and within years it has become a billion dollar enterprise with no signs of slowing down and immense potential. Twitch.tv didn’t always use the handle ‘twitch’, when it first started out it was called Justin.tv named after the co-founder and co-owner of twitch, Justin Kan. The original site Justin.tv was just a single 24/7 live stream of Justin Kan, pretty much like a reality television show (S.A.I.D, 2014). Eventually this led to people wanting to know how to be able to stream themselves and by August 29, 2011 it was rebranded as Twitch.tv and solely focused on videogame gameplay. Along with Justin Kan, Emmett Shear was a co-founder and when they shifted to Twitch.tv he became CEO (S.A.I.D, 2014). The option to start streaming your own gameplay for any viewer...

Words: 962 - Pages: 4

Premium Essay

Streaming Media

...Streaming Media Meggan Wood ENGL 135 18 May 2015 Prof. Joan Snyder Streaming Media The last few decades have brought about numerous changes to the audio and video delivery method. Where once a family would gather around a large and stationary radio to hear their favorite programs broadcast, nowadays a person can log in to one of many music sites and listen to pretty much whatever they want. Also, television programming providers such as cable and satellite are getting a run for their money with the introduction of various websites and gadgets that allow one to pay much less for much more personalized content. This has all been made possible by advances in streaming media technology. Streaming media is defined as “video and/or audio data transmitted over a computer network for immediate playback rather than for file download and later (offline) playback” (Mitchell, 2015, para. 1). As streaming media becomes more accessible, it is forever changing how the general population receives content and communicates with one another. Without a doubt, consumers have seen the ability to obtain, view, save, and replay various types of streaming media change drastically over the last 100 years. Radio started the whole streaming media movement back in 1916 with regular Morse Code weather pattern communications in Wisconsin. These were the first regular broadcasts outside of a military or maritime function (VanBerkum, 2014, para. 3). From there, Muzak, recorded background music...

Words: 3545 - Pages: 15

Free Essay

Xxxxx

...is typically used for streaming video and audio such as Microsoft's NetMeeting or Windows Media viewer. Without the ability to define multicast groups, messages that must be sent to a specific group could only use the following: * With unicasting, messages are sent to a specific host address. Using unicasting to send messages to a group of computers would mean that the sending device must know the IP address of all recipients, and must create a separate packet for each destination device. * With broadcasting, a single packet is sent to the broadcast address and is processed by all hosts. However, using broadcasting for sending data to a group would mean that all hosts, and not just group members, would receive the packet. In addition, broadcast packets are typically not forwarded by routers, so broadcast traffic is limited to within a single subnet. The Internet Group Management Protocol (IGMP) is used to identify group members and to forward multicast packets onto the segments where group members reside. IGMP routers keep track of the attached subnets that have group members as follows: * A router sends out a host membership query. This query is addressed to the IP address of 224.0.0.1. * Hosts that are members of any group respond with a list of the groups to which the host belongs. Each group is identified with a multicast IP address in the range of 224.0.0.0 to 239.255.255.255. * The router uses these responses to compile a list of the groups on that...

Words: 822 - Pages: 4

Free Essay

Light Tree

...LIGHT TREE A SEMINAR REPORT Submitted By SUJIT KUMAR In partial fulfillment of the award of the degree of BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSITY OF SCIENCE & TECHNOLOGY KOCHI-682022 SEPTEMBER 2008 DIVISION OF COMPUTER SCIENCE AND ENGINEERING SCHOOL OF ENGINEERING COCHIN UNIVERSITY OF SCIENCE & TECHNOLOGY, COCHIN-682022 Certificate Certified that this is a bonafide record of the Seminar Entitled “Light Tree” Done by the following Student Sujit Kumar Of the VIIth semester, Computer Science and Engineering in the year 2008 in partial fulfillment of the requirements to the award of Degree Of Bachelor Of Technology in Computer Science and Engineering of Cochin University of Science and Technology. Ms. Sheena S. Dr. David Peter Seminar Guide Date: Head of Department ACKNOWLEDGEMENT At the outset, I thank the Lord Almighty for the grace, strength and hope to make my endeavor a success. I also express my gratitude to Dr. David Peter, Head of the Department and my Seminar Guide for providing me with adequate facilities, ways and means by which I was able to complete this seminar. I express my sincere gratitude to him for his constant support and valuable suggestions without which the successful completion of this seminar would not have been possible. I thank Ms. Sheena S, my seminar guide for her boundless cooperation and helps extended for this seminar. I express my immense pleasure...

Words: 5142 - Pages: 21

Free Essay

Ipv6 Address Type Multicast

...Matthew Reece 8/22/2015 IPv6 address type- multicast There is are several differences between ipv4 and ipv6 below I will break them down a bit IPV4 is 32 bit over 4 octets doesn’t have built in security uses broadcast and bits extend from 2^32 power IPv6 is 128 bits over 8 quadrats has built in security doesn’t use broadcast and bits extend from 2^128 power Those are the major differences between IPv4 and IPv6 next we get into a function of IPv6 which is unique it’s called multicast Neighbor Discovery Neighbor Discovery uses ICMPv6 messages to manage neighboring node interaction. Neighbor Discovery replaces ARP, ICMP Router Discovery, and ICMP Redirect and provides additional functionality. Neighbor Discovery Messages All functions of Neighbor Discovery are performed with the following messages: * Router Solicitation  IPv6 hosts send Router Solicitation messages to discover IPv6 routers present on the link. To prompt IPv6 routers to respond immediately, hosts send multicast Router Solicitation messages rather than waiting for a periodic Router Advertisement message. * Router Advertisement  IPv6 routers send Router Advertisement messages either periodically or in response to the receipt of Router Solicitation messages. Router Advertisement messages contain the information required by hosts to determine what the link prefixes are, what the link MTU is, whether or not to use address autoconfiguration, and the duration for which addresses created through address...

Words: 1401 - Pages: 6

Free Essay

Ipv6 Address Type

...IPv6 Address Type - Multicast Overview: As part of your assigned readings and material covered in class lecture, you have learned about IPv6 address types, including unicast and multicast addresses. For this assignment, you will expand your knowledge of the use of multicast addresses compared to the use of broadcast addresses in IPv4. Required Resources:  Textbook and lecture notes  Internet access Research Resources: • IPv6 multicast address – overview o http://www.tcpipguide.com/free/t_IPv6MulticastandAnycastAddressing.htm • IPv6 subnet scanning RFC o http://www.ietf.org/rfc/rfc5157.txt Deliverables  Perform additional research to understand the use of multicast addresses in IPv6 protocol compared to IPv4 broadcast addresses with emphasis on: o Neighbor discovery o All nodes address o All routers address  Describe the process of neighbor discovery including the use the all nodes address for achieving the same result as the IPv4 ARP protocol.  Include the IPv6 multicast address for all routers and all hosts.  Perform research to determine: o Are you able to perform subnet “scanning” by simple sending an ICMP echo packet to the “all hosts” multicast address? Similar to the concept of sending an ICMP echo packet to the broadcast address on an IPv4 subnet. o Provide an estimate of how long it would take to scan, through a tool similar to NMAP, an entire /64 IPv6 subnet to find every possible host, not using the multicast “all host” address. Use...

Words: 883 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment

...Abstract: Multicast establishes a group communication, where one sender can transmit the message to multiple receivers. Multicasting makes this transmission efficient by making the client to send just one copy. But for secure transmission in the multicast environment is a major issue it should maintain the authentication, non-repudiation and integrity of messages. For this we have created a multicast environment which ensures all these properties by applying digital signature for authentication by signing the messages by private key of sender and using more secure hash algorithm SHA-192 for improving integrity of messages. Keywords: SHA-192, multicast, authentication, integrity, non repudiation, DSA 1 Introduction Multicast is an efficient...

Words: 1122 - Pages: 5

Free Essay

Information Technology

...A multicast address is a logical identifier for a group of hosts in a computer network, that are available to process datagrams or frames intended to be multicast for a designated network service. Multicast addressing can be used in the Link Layer (Layer 2 in the OSI model), such as Ethernet multicast, and at the Internet Layer (Layer 3 for OSI) for Internet Protocol Version 4 (IPv4) or Version 6 (IPv6) multicast. The Neighbor Discovery Protocol (NDP) is a protocol in the Internet protocol suite used with IPv6. It operates in the link layer of the Internet model and is responsible for address auto-configuration of nodes, discovery of other nodes on the link, determining the link layer addresses of other nodes, duplicate address detection, finding available routers and Domain Name System (DNS) servers, address prefix discovery, and maintaining reachability information about the paths to other active neighbor nodes. The protocol defines five different ICMPv6 packet types to perform functions for IPv6 similar to the Address Resolution Protocol (ARP) and Internet Control Message Protocol(ICMP) Router Discovery and Router Redirect protocols for IPv4. However, it provides many improvements over its IPv4 counterparts. For example, it includes Neighbor Unreachability Detection (NUD), thus improving robustness of packet delivery in the presence of failing routers or links, or mobile nodes. All nodes addresses Host Extensions for IP Multicasting specifies the extensions...

Words: 573 - Pages: 3