Ip Multicast Explained

Ip Multicast Explained

IP MULTICAST EXPLAINED June 2004 Jon Hardwick Data Connection Ltd. [email protected] Data Connection Limited 100 Church Street Enfield, UK Tel: +44 20 8366 1177 http://www.dataconnection.com/ Copyright © 2004 Data Connection Limited. All Rights Reserved. TABLE OF CONTENTS 1. INTRODUCTION AND OVERVIEW ................................................................1 1.1 Introduction ...........................................................................................1 1.2 What is Multicast?.................................................................................1 1.3 History of Multicast ...............................................................................3 1.4 Overview of Multicast............................................................................4 1.5 Document Roadmap.............................................................................9 2. MULTICAST ADDRESSING .........................................................................10 2.1 Multicast Address Allocation...............................................................10 2.2 Multicast Address Scoping .................................................................11 2.3 ASM versus SSM................................................................................11 3. MULTICAST GROUP MEMBERSHIP DISCOVERY PROTOCOLS ............13 3.1 Internet Group Management Protocol (IGMP)....................................13 3.1.1 Basic IGMP operation .............................................................13 3.1.2 Sending Group Membership Queries......................................14 3.1.3 Responding to Group Membership Queries............................14 3.1.4 Improving Group Membership Latency ...................................14 3.1.5 Source Address Filtering .........................................................15 3.2 Multicast Listener Discovery (MLD)....................................................15 3.3 IGMP/MLD Proxying...........................................................................15 3.4 IGMP/MLD Snooping..........................................................................16 3.5 Multicast over ATM .............................................................................16 4. MULTICAST ROUTING PROTOCOLS.........................................................17 4.1 Properties of Multicast Routing Protocols...........................................17 4.1.1 Opt-in and Opt-out Protocols...................................................17 4.1.2 Source-Based and Shared Tree Protocols..............................19 4.1.3 Determining the Upstream Router...........................................22 4.1.4 Data Plane Interactions ...........................................................22 4.1.5 Summary of Multicast Routing Protocols ................................23 4.2 Protocol Independent Multicast (PIM) ................................................24 4.2.1 PIM Sparse Mode....................................................................25 4.2.2 PIM Dense Mode.....................................................................30 4.2.3 Bi-directional PIM ....................................................................33 4.2.4 RP Discovery...........................................................................35 4.2.5 Mixed-mode PIM Configurations .............................................38 4.3 Distance Vector Multicast Routing Protocol (DVMRP).......................39 4.4 Multicast Extensions to OSPF (MOSPF)............................................39 5. INTERDOMAIN MULTICAST ROUTING ......................................................41 5.1 Multicast Source Discovery Protocol (MSDP) ....................................41 5.1.1 Alternatives to MSDP ..............................................................43 5.2 Multicast Border Routers ....................................................................44 5.3 Border Gateway Multicast Protocol (BGMP) ......................................44 Copyright © 2004 Data Connection Limited. All Rights Reserved. 6. MULTICAST SIGNALING .............................................................................46 6.1 RSVP-TE P2MP LSPs........................................................................47 6.1.1 LSP Association and Secondary Explicit Route Object (SERO) Approach 47 6.1.2 P2P LSP Merging Approach ...................................................48 6.1.3 RSVP Broadcast Approach .....................................................48 6.2 PIM P2MP LSPs .................................................................................48 6.3 Tunneling IP Multicast Traffic Through an MPLS Network.................49 6.4 Tunneling VPN IP Multicast Traffic Through a Provider Network.......54 7. MULTICAST DATA PLANE OPERATION....................................................56 7.1 Host Functionality ...............................................................................56 7.1.1 Sending Data...........................................................................56 7.1.2 Receiving Data ........................................................................56 7.2 Router Functionality............................................................................57 7.2.1 Forwarding Data......................................................................57 7.2.2 Unicast Encapsulation and Decapsulation..............................57 7.2.3 Packet Arrival Information .......................................................58 8. SUMMARY.....................................................................................................59 9. ABOUT DATA CONNECTION ......................................................................60 10. GLOSSARY ...................................................................................................61 11. REFERENCES...............................................................................................64 11.1 Multicast Addressing...........................................................................64 11.2 Multicast Group Membership Discovery Protocols.............................64 11.3 Multicast Routing Protocols ................................................................65 11.4 Interdomain Multicast Routing ............................................................65 11.5 Multicast Signaling..............................................................................65 Copyright © 2004 Data Connection Limited. All Rights Reserved. 1. INTRODUCTION AND OVERVIEW 1.1 Introduction In contrast to the one-to-one model of IP unicast, in which data packets are sent from a single source to a single recipient, IP multicast provides a method of efficient many-to-many communication. This concept is becoming increasingly important, both in the Internet and in private networks, for providing services such as multimedia content delivery. This is especially true for services that require material to be propagated simultaneously to a subset of subscribers. For example, multicast may be used in the provision of e-learning courses, in the distribution of information to stock-market feeds or news feeds, or in broadcasting webinars, radio and television. There is a large and ever-expanding range of protocols used to provide and support various aspects of multicast, including address allocation, group membership, and multicast routing and signaling. It can be hard to keep track of and understand the protocols in all these areas. This white paper gives an overview of the most important network-layer protocols used in multicast. We aim to provide a guide for developers or network managers familiar with unicast routing but new to multicast. We begin by giving an introduction to the key concepts of multicast, starting from the ground up. We then go into more depth about the main protocols in each area, focusing particularly on multicast routing. Where there are multiple protocols offering similar functionality, we compare and contrast the different approaches. 1.2 What is Multicast? Normal IP packets are sent from a single source to a single recipient. Along the way these packets are forwarded by a number of routers between the source and recipient, according to forwarding table information that has been built up by configuration and routing protocol activity. This form of IP packet delivery is known as unicast. However, some scenarios (for example, audio/video streaming broadcasts) need individual IP packets to be delivered to multiple destinations. Sending multiple unicast packets to achieve this is unacceptable because • it would require the source to hold a complete list of recipients • multiple identical copies of the same data would flow over the same links, increasing bandwidth requirements and costs.1 Instead, data to multiple destinations can be delivered using multicast. 1 This is particularly inefficient on transport networks (such as Ethernet) that support one-to-many transmission. Copyright © 2004 Data Connection Limited. All Rights Reserved. Page 1 http://www.dataconnection.com Multicast allows the source to send a single copy of data, using a single address for the entire group of recipients. Routers between the source and recipients use the group address to route the data. The routers forward duplicate data packets wherever the path to recipients diverges. A multicast group identifies a set of recipients that are interested in a particular data stream, and is represented by an IP address from a well-defined range, as discussed in Chapter 2, Multicast

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    69 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us