Deploying IP Multicast

2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential. JMB. 1 ...... V - Virtual, Ac - Accounted towards access control limit,. M - SSM Mapping) ... U - URD, I - Received Source Specific Host Report, Z - Multicast Tunnel. Y - Joined ...
6MB taille 87 téléchargements 366 vues
Deploying IP Multicast

Jean-Marc Barozet Consulting System Engineer [email protected]

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

1

Multicast Advantages

Unicast Source Router

Multicast Source Router JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

2

Digital IP Video Surveillance Increasing Interest, and Deployment in progress …. 1. Commercial Security 2. Public law Enforcement 3. Traffic/Transportation monitoring 4. Manufacturing Processing 5. Residential security 6. Campus and K 12 School security 7. Retail Buyer behavior 8. Remote/Local Medical Monitoring

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

3

Next Generation Carrier Ethernet Multicast for IPTV delivery Portal

Monitoring

Billing

Mobile

Subscriber Database

Identity

Address Mgmt

Policy Definition

Policy Control Plane Residential

Access

Edge/Aggregation

Edge BSC

WIMAX STB Business

DSL Corporate

RNC

PSTN BRAS - 10K

Multicast deliver Multicast is is the the ONLY ONLY way way to to deliver cable cable style style 7600/SR broadcast broadcast video video content content to to million million of of homes homes for for IPTV IPTV MPLS/IP

MPLS/IP

CEoIP

DPI

7600 Deployment == Multicast Deployment IPTV IPTV Deployment == Multicast Deployment

Residential

IP

ETTx

7600/SR PE - 12K PON STB

Aggregation

Distribution VOD

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

TV

SIP 4

FUNDAMENTALS

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

5

IP Multicast Addressing (1/2)  Group Addresses (224.0.0.0 – 239.255.255.255) Class D address High-order 3 bits are set (224.0.0.0)

 Link-Local addresses designated by IANA Reserved use: 224.0.0.0 through 224.0.0.255 224.0.0.1—all multicast systems on subnet 224.0.0.2—all routers on subnet See “http://www.iana.org/assignments/multicast-addresses”

 Transient addresses, addresses assigned and reclaimed dynamically Global scope: 224.0.1.0-238.255.255.255 Limited Scope: 239.0.0.0-239.255.255.255 JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

6

IP Multicast Addressing (2/2)  Administratively Scoped Addresses 239.0.0.0 – 239.255.255.255 Private address space similar to RFC1918 unicast addresses Not used for global Internet traffic Used to limit “scope” of multicast traffic Same addresses may be in use at different locations for different multicast sessions

 SSM (Source Specific Multicast) Range 232.0.0.0 – 232.255.255.255 Primarily targeted for Internet style Broadcast

 RFC3180 – Glop Addressing in 233/8 Temporary method to meet immediate needs Static Global Group Address Assignment Group range: 233.0.0.0 – 233.255.255.255 Your AS number is inserted in middle two octets Remaining low-order octet used for group assignment JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

7

Multicast Distribution Trees Shortest Path or Source Distribution Tree Source 1 Notation: (S, G) S = Source G = Group Source 2 A

B

C

E

Receiver 1 JMB

© 2007 Cisco Systems, Inc. All rights reserved.

F

D

Receiver 2 Cisco Confidential

8

Multicast Distribution Trees Shared Distribution Tree Notation: (*, G) * = All Sources G = Group

A

B

D (RP)

E

C

F

(RP)

PIM Rendezvous Point Shared Tree

Receiver 1

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Receiver 2

Cisco Confidential

9

Multicast Distribution Trees Source AND Shared Distribution Tree Source 1

Notation: (*, G) * = All Sources G = Group Source 2

A

B

C

D (RP)

E

F

(RP)

PIM Rendezvous Point Shared Tree Source Tree

Receiver 1

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Receiver 2

Cisco Confidential

10

Multicast Forwarding  Multicast Routing is backwards from Unicast Routing Unicast Routing is concerned about where the packet is going. Multicast Routing is concerned about where the packet came from.

 Multicast Routing uses “Reverse Path Forwarding” (RPF) A router forwards a multicast datagram only if received on the up stream interface to the source (i.e. it follows the distribution tree).

 The RPF Check The routing table used for multicasting is checked against the “source” IP address in the packet. If the datagram arrived on the interface specified in the routing table for the source address; then the RPF check succeeds.

 Otherwise, the RPF Check fails.

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

11

Multicast Forwarding Example: RPF Checking

Source 151.10.3.21

RPF Check Fails Packet arrived on wrong interface! Mcast Packets

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

12

Types of Multicast Protocols  Dense mode Uses “push” model Traffic flooded throughout network Pruned back where it is unwanted Flood-and-prune behavior (every 3 minutes)

 Sparse mode Uses “pull” model Traffic sent only to where it is requested Explicit join behavior

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

13

Which Mode—Sparse or Dense  Sparse mode !!!!!!!! Must configure a Rendezvous Point (RP) Very efficient Uses Explicit Join model Traffic only flows to where it’s needed Separated control and data planes Router state only created along flow paths Deterministic topological behavior Scales well Works for both sparsely or densely populated networks

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

14

PIM-SM (RFC 2362)  Supports both source and shared trees Assumes no hosts want multicast traffic unless they specifically ask for it

 Uses a Rendezvous Point (RP) Senders and Receivers “rendezvous” at this point to learn of each others existence. Senders are “registered” with RP by their first-hop router. Receivers are “joined” to the Shared Tree (rooted at the RP) by their local Designated Router (DR).

 Appropriate for… Wide scale deployment for both densely and sparsely populated groups in the enterprise Optimal choice for all production networks regardless of size and membership density. JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

15

PIM Sparse Mode Explicit Join Mechanism

Source 1

1. No one receives group traffic until specific join 2. Rendezvous point queried 3. Sites pruned back permanently as needed 4. No periodic flooding as in dense-mode Rendezvous Point (Shared Root)

B

A

Receiver 1 © 2007 Cisco Systems, Inc. All rights reserved.

F

E

C

JMB

D

Cisco Confidential

Non Viewers

Uses “Shared Tree” Initially. Can Switch over to Shortest Path Tree if Needed/Defined.

Non Viewer 16

PIM Configuration Steps  Enable Multicast Routing on every router  Configure every interface for PIM  Configure the RP for ASM/Bidir Groups Highly consider Anycast-RP & MSDP Or using Auto-RP or BSR Configure certain routers as Candidate RP(s) All other routers automatically learn elected RP Or using Static RP addressing RP address must be configured on every router

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

17

Group Mode vs. Interface Mode  Group & Interface mode are independent.  Interface Mode Determines how the interface operates when sending/receiving multicast traffic.

 Group Mode Determines whether the group is Sparse or Dense.

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

18

Group Mode  Group mode is controlled by local RP info  Local RP Information Stored in the Group-to-RP Mapping Cache May be statically configured or learned via Auto-RP or BSR

 If RP info exists, Group = Sparse  If RP info does not exist, Group = Dense Trivia moment; if dm-fallback is enabled there will be a default 0.0.0.0 RP address

 Mode Changes are automatic. i.e. if RP info is lost, Group falls back to Dense. JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

19

Configuring Interface Mode  Interface Mode Configuration Commands Enables multicast forwarding on the interface. Controls the interface’s mode of operation. ip pim sparse-mode Interface mode is set to Sparse mode operation. Auto-RP groups can be an exception. ip pim sparse-dense-mode Interface mode is determined by the Group mode. If Group is Dense, interface operates in Dense mode. If Group is Sparse, interface operates in Sparse mode. ip pim dense-mode Interface mode is set to Dense mode operation.

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

20

RP Configuration Methods  Static  Auto-RP  BSR  Anycast-RP RFC 3446 Anycast RP mechanism using PIM and MSDP Give each RP the same IP address assignment Sources and receivers use closest RP Sources from one RP are made known to other RPs using MSDP When an RP goes down, sources and receivers are taken to new RP via unicast routing - Fast convergence JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

21

Anycast RP Configuration interface interface loopback loopback 00 ip address 10.0.0.2 255.255.255.255 ip address 10.0.0.2 255.255.255.255

Interface Interface loopback loopback 00 ip address ip address 10.0.0.3 10.0.0.3 255.255.255.255 255.255.255.255

interface loopback 1 interface loopback 1 ip address 10.1.1.1 255.255.255.255 ip address 10.1.1.1 255.255.255.255 !! ip ip msdp msdp peer peer 10.0.0.3 10.0.0.3 connect-source connect-source loopback0 loopback0 ip ip msdp msdp originator-id originator-id loopback loopback 00

Interface Interface loopback loopback 11 ip ip address address 10.1.1.1 10.1.1.1 255.255.255.255 255.255.255.255 !! ip ip msdp msdp peer peer 10.0.0.2 10.0.0.2 connect-source connect-source loopback0 loopback0 ip msdp originator-id loopback 0 ip msdp originator-id loopback 0

RP1

RP2

MSDP 10.1.1.1 ip ip pim pim rp-address rp-address 10.1.1.1 10.1.1.1

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

10.1.1.1 ip ip pim pim rp-address rp-address 10.1.1.1 10.1.1.1

Cisco Confidential

22

What are the considerations…  When Using Loopback interfaces – you can effect Router ID’s (RID) for routing protocols like OSPF & BGP  Duplicate IP addresses for RP redundancy is good  Duplicate IP addresses as RID for OSPF is bad…  Set your RID don’t let the router pick one

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

23

Avoiding DM Flooding  Use global command ip pim autorp listener

 Recommended

Added support for Auto-RP Environments. Modifies interface behavior. Forces interfaces to always use DM for Auto-RP groups. Use only if Auto-RP is to be used. Available 12.3(4)T, 12.2(28)S, 12.1(26)E

 Use with interface command.  Recommended

ip pim sparse-mode

Prevents DM Flooding. Does not prevent DM Fallback!

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

24

Avoiding DM Flooding  Prior to “listener” in IOS 12.3(4)T, 12.2(28)S, 12.1(26)E Must use ip pim sparse-dense mode interface command to support Auto-RP.

 Use RP-of-last-resort Assign local Loopback as RP-of-last-resort on each router. Example ip pim rp-address 10 access-list 10 deny 224.0.1.39 access-list 10 deny 224.0.1.40 access-list 10 permit any

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

25

Avoiding DM Flooding  New IOS global command no ip pim dm-fallback

 Recommended

 Totally prevents DM Fallback!! No DM Flooding since all state remains in SM

 Default RP Address = 0.0.0.0 [nonexistent] Used if all RP’s fail. Results in loss of Shared Tree. All SPT’s remain active.

 Available 12.3(4)T, 12.2(28)S

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

26

General RP Recommendations  Use combined Anycast-RP with Static: When rapid RP failover is critical When valid Group/RP cache is critical at all times No requirement for dynamic Group/RP cache

 Pros Fastest RP Convergence method With override option, Group/RP cache can not be impacted via Auto-RP or BSR Required when connecting to Internet

 Cons Manual Group/RP configuration change on routers Requires use of MSDP between RP’s

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

27

General RP Recommendations  Use combined Anycast-RP & Auto-RP with autorp listener: When rapid RP failover is critical When dynamic Group/RP cache required When Admin scoping is required

 Pros Fastest RP Convergence Most flexible and easy to maintain

 Cons No Group/RP cache until a MA packet is received Admin scoping can greatly increase complexity Requires use of MSDP between RP’s

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

28

General RP Recommendations  Use Auto-RP with autorp listener When minimum configuration is desired and/or When maximum flexibility is desired

 Pros Most flexible method Easiest to maintain

 Cons Increased RP Failover times vs Anycast-RP inclusive configurations No Group/RP cache until a MA packet is received

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

29

General RP Recommendations  Use BSR: When dynamic Group/RP cache is required and When maximum interoperability is needed

 Pros Interoperates with all Vendors

 Cons Some methods greatly increase configuration Does not support Admin. Scoping

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

30

USING ADMIN SCOPED ZONES

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

31

Administratively Scoped Address Range 239.0.0.0

• Address Range: 239.0.0.0/8 Private multicast address space.

RFC 2365 Org.-Local Expansion

• RFC 2365 Administratively Scoped Zones.

239.192.0.0 RFC 2365 Org-Local Scope

239.196.0.0 239.255.253.0

239.255.0.0 239.255.255.255

Similar to RFC1918 private unicast address space.

Unassigned RFC 2365 Local Scope Expansion RFC 2365 Local Scope

• Organization-Local Scope (239.192/14) – Largest scope within the Enterprise network (i.e. Enterprise-wide). – Expands downward in address range. • Local Scope (239.255/16) – Expands downward in address range. – Smallest possible scope within the Enterprise network. – Other scopes may be equal but not smaller.

(Not to scale.) JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

32

Example Scope Address Assignments 239.0.0.0 Org.-Local Expansion

• Allocate all ranges from the Org-Local space. • Keep Local space separate.

239.191.0.0

– Avoids moving applications when smaller scopes are added later.

239.192.0.0 239.193.0.0 239.194.0.0 239.195.0.0

Campus Scope (/16) Region Scope (/16) Enterprise Scope (/16)

RFC RFC2365 2365 Organization-Local Organization-LocalScope Scope

239.196.0.0 Local Expansion 239.255.0.0 239.255.255.255 JMB

RFC 2365 Local Scope

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

33

Address Ranges to Avoid 239.0.0.0/24

239.0.0.0

239.191.0.0 239.192.0.0 239.193.0.0 239.194.0.0 239.195.0.0

Org.-Local Scope Expansion Sub-Region Scope (/16) Building Scope (/16) Campus Scope (/16) Region Scope (/16) Enterprise Scope (/16)

239.128.0.0/24

• Avoid ranges that map to a MAC address of 0x0100-5E00-00xx! – i.e. 239.128.0/24 & 239.0.0/24 – These addresses are always flooded by Layer 2 switches!

239.196.0.0 Local Scope Expansion 239.255.0.0 239.255.255.255 JMB

RFC 2365 Local Scope

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

34

Adding Private SSM Space 239.0.0.0

Org.-Local Scope Expansion

• Allocate 239.232/16 from Local Scope Expansion range for private SSM space. – Subdivide SSM space into scoped zones.

239.192.0.0 239.193.0.0 239.194.0.0 239.195.0.0

Campus Scope (/16) Region Scope (/16) Enterprise Scope (/16)

239.232.0.0

Expansion

239.196.0.0 239.232.0.0 239.232.255.255

Private SSM (/16)

Campus SSM Scope (/24) Region SSM Scope (/24) Enterprise SSM Scope (/24)

Local Scope Expansion 239.255.0.0 239.255.255.255 JMB

RFC 2365 Local Scope

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

239.232.252.255 239.232.253.0 239.232.253.255 239.232.254.0 239.232.254.255 239.232.255.0 239.232.255.255 35

Scoping – TTL Thresholds • What is a TTL Threshold? A “TTL Threshold” may be set on a multicast router interface to limit the forwarding of multicast traffic to outgoing packets with TTLs greater than the Threshold.

• The TTL Threshold Check 1) All incoming IP packets first have their TTL decremented by one. If Source S

Set Top Box (STB) JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

49

SSM mapping for MoH  Used when the Corporate Standard is SSM globally Provides interim configuration for non-IGMPv3 hosts

 No RPs to configure Simplifies control plane across routers

 Simple configuration on LHRs SSM mapping is configured only on the LHRs Same configurations on all LHRs

 SSM mapping was first introduced in 12.3(2)T

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

50

SSM DNS Mapping – Configuration Enabling SSM Mapping ip ip igmp igmp ssm-map ssm-map enable enable ip igmp ssm-map query ip igmp ssm-map query dns dns !! ip ip pim pim ssm ssm range range SSM-GROUP SSM-GROUP !! ip ip access-list access-list standard standard SSM-GROUP SSM-GROUP permit 239.0.0.0 0.255.255.255 permit 239.0.0.0 0.255.255.255 !! ip ip name-server name-server 10.151.1.103 10.151.1.103 ip domain multicast ip domain multicast ssm.cisco.fr ssm.cisco.fr ip domain-name cisco.fr ip domain-name cisco.fr

JMB

IN IN IN IN

AA AA

© 2007 Cisco Systems, Inc. All rights reserved.

Specific DNS Server zone for SSM

cat-3#sh cat-3#sh ip ip igmp igmp ssm-mapping ssm-mapping 239.1.1.2 239.1.1.2 Group Group address: address: 239.1.1.2 239.1.1.2 Database :: DNS Database DNS DNS :: 2.1.1.239.ssm.cisco.fr DNS name name 2.1.1.239.ssm.cisco.fr Expire time : 604623026 Expire time : 604623026 Source list : 10.151.1.102 Source list : 10.151.1.102 cat-3# cat-3#

cat-3#sh ip igmp ssm-mapping cat-3#sh ip igmp ssm-mapping SSM SSM Mapping Mapping :: Enabled Enabled DNS Lookup : Enabled DNS Lookup : Enabled Mcast Mcast domain domain :: ssm.cisco.fr ssm.cisco.fr Name servers : 10.151.1.103 Name servers : 10.151.1.103 cat-3# cat-3#

1.1.1.239 1.1.1.239 2.1.1.239 2.1.1.239

Enabling DNS Mapping

10.151.1.104 10.151.1.104 10.151.1.102 10.151.1.102

Cisco Confidential

DNS zone for SSM

51

IGMP Report Received 001959: 001959: 3w4d: 3w4d: IGMP(0): IGMP(0): Received Received v2 v2 Report Report on on Vlan100 Vlan100 from from 10.149.3.3 10.149.3.3 for for 239.1.1.2 239.1.1.2 001960: 3w4d: IGMP(0): Convert IGMPv2 report (*, 239.1.1.2) to IGMPv3 with 001960: 3w4d: IGMP(0): Convert IGMPv2 report (*, 239.1.1.2) to IGMPv3 with 11 source(s) source(s) using using DNS DNS

cat-3#sh cat-3#sh ip ip igmp igmp groups groups 239.1.1.2 239.1.1.2 detail detail Flags: Flags: LL -- Local, Local, UU -- User, User, SG SG -- Static Static Group, Group, VG VG -- Virtual Virtual Group, Group, SS Static Source, VS Virtual Source SS - Static Source, VS - Virtual Source Interface: Vlan100 Interface: Vlan100 Group: 239.1.1.2 Group: 239.1.1.2 Flags: SSM Flags: SSM Uptime: 00:01:04 Uptime: 00:01:04 Group mode: INCLUDE Group mode: INCLUDE Last reporter: 0.0.0.0 Last reporter: 0.0.0.0 CSR 00:02:28 CSR Grp Grp Exp: Exp: 00:02:28 Group source list: Group source list: (C (C -- Cisco Cisco Src Src Report, Report, UU -- URD, URD, RR -- Remote, Remote, SS -- Static, Static, VV -- Virtual, Ac Accounted towards access control Virtual, Ac - Accounted towards access control limit, limit, MM -- SSM Mapping) SSM Mapping) Source Address Uptime v3 Source Address Uptime v3 Exp Exp CSR CSR Exp Exp Fwd Fwd Flags Flags 10.151.1.102 00:01:04 stopped 00:02:28 Yes 10.151.1.102 00:01:04 stopped 00:02:28 Yes CM CM cat-3# cat-3# JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

52

IP MROUTE for 239.1.1.2 cat-3#sh cat-3#sh ip ip mroute mroute IP Multicast IP Multicast Routing Routing Table Table Flags: Flags: DD -- Dense, Dense, SS -- Sparse, Sparse, BB -- Bidir Bidir Group, Group, ss -- SSM SSM Group, Group, CC -- Connected, Connected, LL -- Local, P Pruned, R RP-bit set, F Register flag, Local, P - Pruned, R - RP-bit set, F - Register flag, TT -- SPT-bit SPT-bit set, set, JJ -- Join Join SPT, SPT, MM -- MSDP MSDP created created entry, entry, XX -- Proxy Proxy Join Join Timer Timer Running, Running, AA -- Candidate Candidate for for MSDP MSDP Advertisement, Advertisement, UU -- URD, I Received Source Specific Host Report, Z URD, I - Received Source Specific Host Report, Z - Multicast Multicast Tunnel Tunnel YY -- Joined Joined MDT-data MDT-data group, group, yy -- Sending Sending to to MDT-data MDT-data group group Outgoing Outgoing interface interface flags: flags: HH -- Hardware Hardware switched, switched, AA -- Assert Assert winner winner Timers: Uptime/Expires Timers: Uptime/Expires Interface Interface state: state: Interface, Interface, Next-Hop Next-Hop or or VCD, VCD, State/Mode State/Mode (10.151.1.102, 239.1.1.2), 00:00:21/00:02:57, flags: sTI (10.151.1.102, 239.1.1.2), 00:00:21/00:02:57, flags: sTI Incoming interface: GigabitEthernet1/0/1, RPF nbr 10.149.35.5 Incoming interface: GigabitEthernet1/0/1, RPF nbr 10.149.35.5 Outgoing interface list: Outgoing interface list: Vlan100, Forward/Sparse, 00:00:21/00:02:38 Vlan100, Forward/Sparse, 00:00:21/00:02:38 (*, 224.0.1.40), 01:29:37/00:03:15, RP 10.149.149.149, flags: SJCL (*, 224.0.1.40), 01:29:37/00:03:15, RP 10.149.149.149, flags: SJCL Incoming Incoming interface: interface: GigabitEthernet1/0/1, GigabitEthernet1/0/1, RPF RPF nbr nbr 10.149.35.5 10.149.35.5 Outgoing Outgoing interface interface list: list: GigabitEthernet1/0/2, GigabitEthernet1/0/2, Forward/Sparse, Forward/Sparse, 00:03:13/00:03:15 00:03:13/00:03:15 Vlan100, Forward/Sparse, 01:29:35/00:02:05 Vlan100, Forward/Sparse, 01:29:35/00:02:05 cat-3# cat-3#

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

53

SOURCE REDUNDANCY

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

54

Multicast Source Redundancy  What Is It? Anything that deals with redundant sources!

 Benefits: High availability for video stream(s) Video stream(s) not subject to single point of failure User experience unaffected during video failures

 Approaches: Duplicate Streams Server Heartbeat Source Specific Multicast (SSM) Anycast Sources

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Application Solutions Network Solutions

55

Source Redundancy : Two Approaches Primary-Backup

Hot-Hot

Two sources, One is active and src’ing content, Second is in standby mode (not src’ing content)

Two sources, both are active and src’ing multicast into the network

Heartbeat mechanism used to communicate with each other

No Protocol between the two sources

Only one copy is on the network at any instant

Two copies of the multicast packets will be in the network at any instant

Single Multicast tree is built per the unicast routing table

Two Multicast tree on almost redundant Infrastructure

Uses required bandwidth

Uses 2x network bandwidth

Receiver’s functionality simpler:

Receiver is smarter:

Aware of only one src, fail-over logic handled between sources.

Is aware/configured with two feeds (s1,g1), (s2,g2) / (*,g1), (*,g2) Joins both and receives both feeds

This approach requires the network to have fast IGP and PIM convergence JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

This approach does not require fast IGP and PIM convergence 56

Multicast Source Redundancy Application Solutions Duplicate Streams

Server Heartbeat

X

S1,G

S2,G

S1,G

I’m responsible for dropping duplicate packets JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

S2,G

I will only receive one stream at a time 57

Multicast Source Redundancy Network Solutions Source Specific Multicast

Anycast Sources

X

X S1,G

S2,G

S2,G Join

1.1.1.1

v2 join

S2,G IGMPv3 Report It appears the Primary source failed. I’ll switch to the Secondary source, S2,G.

JMB

1.1.1.1

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

I will send join to the nearest 1.1.1.1/32

58

Multicast Source Redundancy Using Anycast Sources How is source redundancy achieved in the network?

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

X

 Enable SSM on all routers  Have R1 and R2 advertise same prefix for each source segment.  R3 and R4 follow best path towards source based on IGP metrics.  Let’s say R3’s best path to SF is through R1. The source in SF now suddenly fails.  R3’s IGP will reconverge and trigger SSM joins towards R2 in NY.

Anycast Sources 1.1.1.1

1.1.1.1

R1

R2

v2 join R3

R4

I will send join to the nearest 1.1.1.1/32

59

ADMISSION CONTROL

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

60

Multicast CAC Managing Oversubscription 1. 1. 250 250 –– 1000 1000 end end users users need need to to be be supported on a 1 Gbps DSLAM supported on a 1 Gbps DSLAM uplink. uplink.

250-1000 users per DSLAM

Aggregation 10GE

Access GE

2. 2. Triple Triple Play Play Services Services need need to to support 250 – 1000 users support 250 – 1000 users 1. 1. 2. 2. 3. 3. 4. 4.

...

Cisco 7600

1 GE may not be enough BW for all the Triple Play Services

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

-- Voice Voice :: 22 IP IP phone phone connections connections per per home home -- Video : 200 – 500 Video : 200 – 500 cable cable channels channels -- Data Data :: Internet Internet VOD VOD :: 10 10 % % users users using using VOD VOD

3. 3. IfIf 250 250 homes homes on on aa single single DSLAM DSLAM are all watching a different channel, are all watching a different channel, the the total total BW BW required required for for video video alone would be 250 x 4Mbps alone would be 250 x 4Mbps == 1Gbps! 1Gbps!

Multicast Multicast CAC CAC is is the the Solution Solution to to Manage Manage Video Video Broadcast Broadcast Oversubscription! Oversubscription! 61

Multicast Call Admission Control (Single) Per Interface IGMP State Limit Cisco IOS® IGMP State Limit

MCAC Use Case Phase 1

interface Gig0/0 description --- Interface towards DSLAM --... ip igmp limit 125 …

300 SDTV channels M

3. 50% of each outgoing 1Gbps link (500Mbps) needs to be provisioned for multicast video leaving the remaining 50% for Voice, Internet & VoD.

10GE

as tic l u

eo id V t

& SI H , IP Vo

D Vo

0% (5

)

1GE Cisco 7600

4. The required CAC needed per interface comes out to:

...

2. Each SDTV channel is approximately 4Mbps.

) 0% (5

...

1. Say the total number of SDTV channels offered by a Service Provider is 300.

500Mbps/4Mbps = 125 mroutes

300 channels x 4Mbps = 1.2Gbps > 1GE JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

62

Route Limits Global / per-VRF Route Limits ip multicast route-limit [ ] ip ip multicast multicast route-limit route-limit 1500 1500 1460 1460 rtr-a> rtr-a> show show ip ip mroute mroute count count IP Multicast Statistics IP Multicast Statistics 1460 1460 routes routes using using 471528 471528 bytes bytes of of memory memory 404 groups, 2.61 average sources per 404 groups, 2.61 average sources per group group

%MROUTE-4-ROUTELIMITWARNING %MROUTE-4-ROUTELIMITWARNING :: multicast route-limit warning 1461 threshold 1460 multicast route-limit warning 1461 threshold 1460 %MROUTE-4-ROUTELIMIT %MROUTE-4-ROUTELIMIT :: 1501 1501 routes routes exceeded exceeded multicast multicast route-limit route-limit of of 1500 1500

rtr-a PIM Join

rtr-b

 No state created beyond State triggering packets still punted, but discarded

 Syslog warnings created beyond JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

63

Multicast Call Admission Control (Multiple) Per Interface Mroute State Limits MCAC Use Case Phase 2 1. Say the total number of SDTV channels offered by a Service Provider is 300. 2. Each SDTV channel is ca. 4Mbps. 3. Service Provider will offer three TV bundles (Basic, Premium, Gold). Each bundle will have 100 channels. 4. 50% of each outgoing 1Gbps link (500Mbps) needs to be provisioned for multicast video leaving the remaining 50% for Voice, Internet & VoD.

Cisco IOS® Per Interface Mroute State Limit with support for ingress, egress, PIM/IGMP, ASM/SSM interface Gig0/0 description --- Interface towards DSLAM --... ip multicast limit out 75 Basic ip multicast limit out 25 Premium ip multicast limit out 25 Gold Basic (100 channels) Premium (100 channels) Gold (100 channels)

Vo

10GE

I HS , IP

&

D Vo

) 0% 5 (

& SI H , IP Vo

D Vo

0% (5

)

• 60% will be for Basic (300Mbps) • 20% will be for Premium (100Mbps) • 20% will be for Gold (100Mbps)

Cisco 7600

...

5. Within this provisioned 50%:

...

1GE

6. The required CAC needed per interface comes out to: • Basic mroute limit = 300/4 = 75 • Premium mroute limit = 100/4 = 25 • Gold mroute limit = 100/4 = 25 JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

300 channels offered 300 channels x 4Mbps = 1.2Gbps 64

Multicast Call Admission Control Cost factor for per-interface Mroute State Limits

1. Consider the following. Three

Content Providers (CPs) are providing multicast content. 2. Multiple CP will have TV • MPEG2 SDTV: 4 Mbps • MPEG2 HDTV: 18 Mbps • MPEG4 SDTV: 1.6 Mbps • MPEG4 HDTV: 6 Mbps

3. Service Provider (SP) would like to provision fair sharing of bandwidth between these three content providers to its consumers across 1Gbps links.

Content Provider 2

4. 250Mbps for each CP, 250 Mbps

Content Provider 3

MPEG2 SDTV MPEG2 HDTV MPEG4 SDTV MPEG4 SDTV

MPEG2 SDTV MPEG2 HDTV MPEG4 SDTV MPEG4 SDTV

5. Simple extension of multicast limits: global cost factor config.

© 2007 Cisco Systems, Inc. All rights reserved.

bp

MPEG2 SDTV MPEG2 HDTV MPEG4 SDTV MPEG4 SDTV

for Voice/Internet/VoD.

Cisco Confidential

Paying Customers

! Global ip multicast limit cost acl-MP2SD-channels 4000 ! from any provider ip multicast limit cost acl-MP2HD-channels 18000 ! from any provider ip multicast limit cost acl-MP4SD-channels 1600 ! from any provider ip multicast limit cost acl-MP4HD-channels 6000 ! from any provider

Content Provider 1

programs w/ different BW:

JMB

Service Provider

10GE

s)

) 0M ps 25 ( b -1 0M s) CP 25 ( ) bp 2 0M 5% P 5 2 C ( (2 -2 oD P V C & SI H , IP Vo

1GE Cisco 7600

... ...

MCAC Use Case Phase 3

Content Providers

interface Gig0/1 description --- Interface towards DSLAM --... ! CAC ip multicast limit out 250000 acl-CP1-channels ip multicast limit out 250000 acl-CP2-channels ip multicast limit out 250000 acl-CP3-channels

65

CONCLUSION

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

66

ASM vs. SSM summary  SSM solves all three ASM issues … but does provide of course a different type of service

 Both ASM and SSM are essential Many-to-Many applications in well controlled networks scale/operate better with ASM Resource discovery applications MUST have ASM Interdomain and broadcast style application scale/operate best with SSM SSM is simpler than ASM for the network, ASM is simpler but more unsecure for application developers

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

67

CONCLUSION  Multicast applications are there Lots of deployment in France for Enterprises More and more used in IP Communications deployment (MoH, IPICS) IP Video Surveillance Corporate Communications via Video Streaming Multicast File Transfer, Data and File Replication

 Multicast for IPTV Delivery (example – Triple Play Networks) Scalable (national deployment) Dynamic (no provisioning necessary) And forwarding performance (~400 Mbps)

 Both ASM and SSM are essential Many-to-Many applications in well controlled networks scale/operate better with ASM Interdomain and broadcast style application scale/operate best with SSM

 More informations on CCO Multicast page: http://www.cisco.com/go/ipmulticast JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

68

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

69

APPENDIX

PIM SSM Mapping Configuration

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

70

SSM Static Mapping – Configuration Enabling SSM Mapping ip ip igmp igmp ssm-map ssm-map enable enable no ip igmp ssm-map no ip igmp ssm-map query query dns dns ip igmp ssm-map static SSM-SERVER2 ip igmp ssm-map static SSM-SERVER2 10.151.1.102 10.151.1.102 !! ip ip pim pim ssm ssm range range SSM-GROUP SSM-GROUP !! ip ip access-list access-list standard standard SSM-GROUP SSM-GROUP permit 239.0.0.0 0.255.255.255 permit 239.0.0.0 0.255.255.255 !! ip ip access-list access-list standard standard SSM-SERVER2 SSM-SERVER2 permit 239.1.0.0 0.0.255.255 permit 239.1.0.0 0.0.255.255 !!

Enabling Static Mapping (no DNS) Defining SSM Range

cat-3#sh cat-3#sh ip ip igmp igmp ssm-mapping ssm-mapping 239.1.1.2 239.1.1.2 Group address: 239.1.1.2 Group address: 239.1.1.2 Database :: Static Database Static Source list : 10.151.1.102 Source list : 10.151.1.102 cat-3# cat-3#

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

71

APPENDIX

Multicast CAC

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

72

Host Receiver Side Admission Control ip igmp limit [ except ] ipv6 mld limit [ except ]  Always per interface  Global command sets per-interface default  Counts entries in IGMP cache ip ip access-list access-list extended extended channel-guides channel-guides permit ip any host 239.255.255.254 permit ip any host 239.255.255.254 !! SDR SDR announcements announcements deny ip any any deny ip any any !! ip ip igmp igmp limit limit 11 except except channel-guides channel-guides !! interface interface ethernet ethernet 00 ip ip igmp igmp limit limit 22 except except channel-guides channel-guides

JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

73

Example Usage of igmp Limit Admission Control on Agg-DSLAM Link interface interface Gig0/0 Gig0/0 description description Interface Interface towards towards DSLAM DSLAM ip ip igmp igmp limit limit 125 125

 300 SDTV channels ) ) 0% 0% 5 5 ( ( 250-500 eo oD id V E V DSLAM 1Gcast net & i r t ul Inte M , e ic Vo

 4Mbps each  Gbps link to DSLAM 500 Mbps for TV rest for Internet etc.

300 SDTV channels

10GE

users per DLAM

1GE PE Cat7600

 500Mbps/4Mbps = 125 IGMP states

DSLAM

1G E DSLAM

IGMP/MLD = Receiver side only No PIM JMB

© 2007 Cisco Systems, Inc. All rights reserved.

300 channels x 4Mbps = 1.2Gbps > 1GE Cisco Confidential

74

Route Limits Global / per-VRF Route Limits ip multicast route-limit [ ] ip ip multicast multicast route-limit route-limit 1500 1500 1460 1460 rtr-a> rtr-a> show show ip ip mroute mroute count count IP Multicast Statistics IP Multicast Statistics 1460 1460 routes routes using using 471528 471528 bytes bytes of of memory memory 404 groups, 2.61 average sources per 404 groups, 2.61 average sources per group group

%MROUTE-4-ROUTELIMITWARNING %MROUTE-4-ROUTELIMITWARNING :: multicast route-limit warning 1461 threshold 1460 multicast route-limit warning 1461 threshold 1460 %MROUTE-4-ROUTELIMIT %MROUTE-4-ROUTELIMIT :: 1501 1501 routes routes exceeded exceeded multicast multicast route-limit route-limit of of 1500 1500

rtr-a PIM Join

rtr-b

 No state created beyond State triggering packets still punted, but discarded

 Syslog warnings created beyond JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

75

Per Interface mroute Limits Multicast Lookup/ingress states Accounted against s0 Ingress (rpf/connected)

 ip multicast limit [ rpf | out | connected ]  Per interface mroute state (PIM/IGMP)  Input: Rpf, connected = (S,G) with S connected

s0 S1,G1

 Output: Out  Multiple limits allowed per interface  Each establishes one limiter  Input / Output state accounted against first limiter permitting state in

s1

s2

Multicast Egress/Replication states, accounted Against s1, s2 egress (out) JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

76

Example Use of per Interface mroute Limits Admission Control on Agg-DSLAM Link interface interface Gig0/0 Gig0/0 description description Interface Interface towards towards DSLAM DSLAM ip multicast limit out 75 acl-basic ip multicast limit out 75 acl-basic ip ip multicast multicast limit limit out out 25 25 acl-ext acl-ext ip multicast limit out 25 acl-premium ip multicast limit out 25 acl-premium

 300 SD channels with 4 Mbps each

Basic (100 channels)

 Basic, Extended, Premium bundles 100 channels ea.

Premium (100 channels)

 Want to allow:

10GE

Gold (100 channels)

) ) 0% 0% 5 5 ( ( E D DSLAM eo 1G t Vid & Vo as et tic tern l u n M ,I ce i Gig0/0 Vo

250-500 users per DLAM

1GE

PE

60%/300Mbps Basic 20%/100Mbps Extended 20%/100Mbps Premium

Cat7600

DSLAM

1G E DSLAM

 Need to limit: Basic 75 states Premium 25 states Gold 25 states JMB

© 2007 Cisco Systems, Inc. All rights reserved.

300 channels offered 300 channels x 4Mbps = 1.2Gbps Generic interface multicast route limit feature with support for Ingress, egress, PIM/IGMP, ASM/SSM. Cisco Confidential

77

Example Use of per Interface mroute Limits Input admission control interface interface Gig0/0 Gig0/0 description description Interface Interface towards towards DSLAM DSLAM ip multicast limit rpf 75 acl-basic ip multicast limit rpf 75 acl-basic ip ip multicast multicast limit limit rpf rpf 25 25 acl-ext acl-ext ip multicast limit rpf 25 acl-premium ip multicast limit rpf 25 acl-premium

 Instead of ‘out’ limit on the upstream devices outbound interface:  use ‘rpf’ limits on the downstream devices RPF interface – same result!

IOS-Rtr

E 1G

Gig0/0

10GE

 Example:

Eg: FTTH

1GE

Rtr Non-Cisco?

IOS-Rtr

Eg: FTTH

1G E

IOS routers instead of DSLAMs (FTTH) (shown) RPF-interface to content providers. JMB

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

IOS-Rtr

Eg: FTTH

78