H3C S9500 Operation Manual-Release1648[v1.24]-04 IP Multicast Volume

HomeSupportSwitchesH3C S9500 Series SwitchesConfigure & DeployConfiguration GuidesH3C S9500 Operation Manual-Release1648[v1.24]-04 IP Multicast Volume
01-Multicast Overview
Title Size Download
01-Multicast Overview 205.12 KB

Chapter 1  Multicast Overview

 

An Ethernet switch functions as a router when it runs IP multicast protocol. The term “router” in this document refers to a router in a generic sense or a Layer 3 Ethernet switch that running the IP multicast protocol.

 

1.1  IP Multicast Overview

Compared with unicast and broadcast, multicast effectively addresses the issue of point-to-multipoint data transmission. By allowing high-efficiency point-to-multipoint data transmission, multicast greatly saves network bandwidth and reduces network load.

With the multicast technology, a service provider can easily provide new value-added services, such as live Webcasting, Web TV, Tele-education, Tele-medicine, Web radio, online videoconferencing, and other bandwidth- and time-sensitive information services.

1.1.1  Comparison of Three Information Transmission Technologies

With the development of the Internet, more and more data, voice, and video information services are running on the Internet. In addition, bandwidth and time sensitive data services, such as e-business, Web conferencing, Web auction, video on demand, and distance learning, have ever higher security and privacy requirements.

I. Unicast

In unicast mode, the sender has to send a separate copy of information to each user. See Figure 1-1.

Figure 1-1 Data transmission in unicast mode

Suppose that Host B, Host D and Host E need the information, the information source (Server in the figure) establishes a separate transmission channel for each of them. Since the traffic in unicast transmission increases with the number of users, excessive copies of the information would spread over the network if there are a large number of users in need of this information. This means a tremendous pressure on the information source and the network bandwidth.

As we can see from the information transmission process, unicast is not suitable for batch transmission of information.

II. Broadcast

In broadcast mode, every user on the network receives the information regardless of their needs. See Figure 1-2.

Figure 1-2 Data transmission in broadcast mode

Suppose Host B, Host D and Host E need the information and the information source Server broadcasts the information through the router. User A and User C can also receive the information. In addition to information security issues, this also causes traffic flooding on the same subnet.

Therefore, broadcast is disadvantageous in transmitting data to specific hosts; moreover, broadcast transmission is a significant waste of network resources.

In short, the unicast mode is useful in networks with scattered users, and the broadcast mode is suitable for networks with dense users. When the number of users is uncertain, the adoption of unicast or broadcast mode results in low efficiency.

III. Multicast

IP multicast technology solves those problems. When some users on the network need the information, the multicast information sender (namely, the multicast source) sends only one copy of the information. With a distribution tree established through a multicast routing protocol, multicast packets are duplicated and distributed only where the tree branches. See Figure 1-3.

Figure 1-3 Data transmission in multicast mode

Assume that Host B, Host D and Host E need the information. To receive the information, these users need to join a receiver group. The multicast source sends only one copy of the information to the multicast group. The routers on the network duplicate and forward the information based on the distribution of the group members. Finally, the information is correctly delivered to Host B, Host D and Host E.

In multicast mode, an information sender is called a multicast source, a receiver group is called a multicast group, and the routers that deliver the multicast information are called multicast routers. Members of a multicast group can scatter around the Internet without any geographical restrictions. It should be noted that a multicast source does not necessarily belong to a multicast group. Multiple sources can send multicast streams to the same multicast group simultaneously.

IV. Advantages of multicast

The main advantages of multicast are:

l           Enhanced efficiency: It reduces network traffic and relieves the server and CPU of loads.

l           Optimized performance: It eliminates traffic redundancy.

l           Distributed application: It allows point-to-multipoint application.

1.1.2  Application of Multicast

IP multicast technology effectively implements point to multi-point forwarding with high speed, as saves network bandwidth a lot and can relieve network loads. It also facilitates the development of new value-added services in the Internet information service area, such as online live show, Web TV, tele-education, telemedicine, network radio station and real-time audio/video conferencing. Multicast applications mainly include:

l           Multimedia and streaming media application

l           Occasional communication for training and cooperation

l           Data storage and finance (stock) operation

l           Point-to-multipoint data distribution

With the increasing popularity of multimedia services over IP network, multicast is gaining its marketplace. In addition, the multicast service becomes popular and prevalent gradually.

1.2  Implementation of IP Multicast

1.2.1  IP Multicast Addresses

In multicast mode, there are questions about where to send the information, how to locate the destination or know the receiver. All these questions can be narrowed down to multicast addressing. To guarantee the communication between a multicast source and a multicast group, a network layer multicast address (namely an IP multicast address is required for the group, and a technique is needed to map the IP multicast address to a MAC multicast address. Following is the introduction to these two kinds of multicast addresses.

I. IP Multicast addresses

According to the definition by Internet Assigned Number Authority (IANA), IP addresses fall into five classes: Class A, Class B, Class C, Class D, and Class E. Unicast packets use IP addresses of Class A, Class B, and Class C addresses. Destination addresses of multicast packets use IP addresses of Class D. A Class D address must not appear in the source address field of IP packets, while all Class E addresses are reserved for future use..

During unicast data transmission, a packet is routed "hop-by-hop" from the source address to the destination address. However, in IP multicast environment, the destination address of a packet is not a unicast IP address but a multicast address that identifies a group of users. All the receivers that need this information need to join the group.

Group memberships are dynamic. A host can join or leave a group at any time. A multicast group can be permanent or temporary. Some multicast group addresses are allocated by IANA, called permanent multicast group. The IP address of a permanent multicast group is unchangeable, but its memberships are changeable, and the number of members is not fixed. Addresses not reserved for permanent multicast groups can be used by temporary multicast groups. Class D multicast addresses range from 224.0.0.0 to 239.255.255.255. More information is listed in Table 1-1.

Table 1-1 Ranges and meanings of Class D addresses

Class D address range

Description

224.0.0.0 to 224.0.0.255

Reserved multicast addresses (permanent multicast addresses). All but 224.0.0.0 are assigned to routing protocols.

224.0.1.0 to 238.255.255.255

Multicast addresses available for users (addresses for temporary groups). They are valid in the entire Internet.

239.0.0.0 to 239.255.255.255

Administratively scoped multicast addresses. They are valid only in the specified local range.

 

Reserved multicast addresses that are commonly used are described in the following table.

Table 1-2 Reserved multicast addresses

Address range

Description

224.0.0.1

All systems in the local subnet, including hosts and routers

224.0.0.2

All multicast routers in the local subnet

224.0.0.3

Unassigned

224.0.0.4

DVMRP routers

224.0.0.5

OSPF routers

224.0.0.6

OSPF DRs/backup OSPF DRs

224.0.0.7

ST routers

224.0.0.8

ST hosts

224.0.0.9

RIP-2 routers

224.0.0.11

Mobile agents

224.0.0.12

DHCP server/Relay agent

224.0.0.13

All PIM routers

224.0.0.14

RSVP encapsulation

224.0.0.15

All CBT routers

224.0.0.16

Specified SBM

224.0.0.17

All SBMS

224.0.0.18

VRRP

……

……

 

II. Ethernet multicast MAC addresses

When a unicast IP packet is transmitted on an Ethernet, the destination MAC address is the MAC address of the receiver. However, for a multicast packet, the destination is no longer a specific receiver but a group with unspecific members. Therefore, the multicast MAC address should be used.

As Internet Assigned Number Authority (IANA) provisions, the high 24 bits of a multicast MAC address are 0x01005e and the low 23 bits of a MAC address are the low 23 bits of a multicast IP address. The high twenty-fifth bit is 0, a fixed value.

Figure 1-4 Mapping between a multicast IP address and an Ethernet MAC address

The first four bits of the multicast address are 1110, representing the multicast identifier. Among the rest 28 bits, only 23 bits are mapped to the MAC address, and the other five bits are lost. This may results in that 32 IP multicast addresses are mapped to the same MAC address.

1.2.2  IP Multicast Protocols

Typically, the IP multicast protocols working at the network layer are called Layer 3 multicast protocols, including IGMP, PIM, MBGP, and MSDP; while the IP multicast protocols working at the data link layer are called Layer 2 multicast protocols, including IGMP Snooping and multicast VLAN.

I. Layer 3 multicast protocols

Layer 3 multicast protocols mainly include multicast group management protocols and multicast routing protocols. Figure 1-5 shows where they work in the network.

Figure 1-5 Positions of Layer 3 multicast protocols

1)         Multicast group management protocols

Internet Group Management Protocol (IGMP) is the IPv4 multicast group management protocol, which runs between receiver hosts and routers directly connected with receivers. IGMP defines the membership establishment and maintenance mechanism between them.

2)         Multicast routing protocols

A multicast routing protocol runs between Layer 3 multicast devices to create and maintain multicast routes for correct and efficient forwarding of multicast packet. The multicast routing creates a loop-free data transmission path from one source to multiple receivers, namely, a multicast distribution tree.

For the ASM model, multicast routing falls into intra-domain and inter-domain routing.

l           Intra-domain multicast routing is to discover multicast sources in an autonomous system (AS), establish a multicast forwarding tree, and deliver multicast traffic through the forward tree to receivers. Among multiple inter-domain multicast routing protocols, Protocol Independent Multicast (PIM) is the most prevalent one. PIM delivers multicast data to receivers on the basis of source discovery and forwarding path establishment. Depending on the forwarding mechanisms, PIM can be further divided into PIM dense mode (PIM-DM) and PIM sparse mode (PIM-SM).

l           Inter-domain multicast routing implements multicast transmission among ASs. Mature solutions include the Multicast Source Discovery Protocol (MSDP) and the Multicast Border Gateway Protocol (MBGP). MSDP is to communicate multicast source information among ASs, while MBGP is to propagate multicast routing information among ASs.

For the SSM model, multicast routes are not divided into inter-domain routes and intra-domain routes. Because receivers are aware of the position of the multicast source, dedicated multicast forwarding paths are established through PIM-SM for multicast transmission.

II. Layer 2 Multicast Protocols

Layer 2 multicast protocols include IGMP Snooping and multicast VLAN. Figure 1-6 shows where they work in the network.

Figure 1-6 Positions of Layer 2 multicast protocols

1)         IGMP Snooping

IGMP Snooping is a multicast constraining mechanism running on Layer 2 devices. By listening to and analyzing IGMP messages exchanged between hosts and Layer 3 multicast devices, IGMP Snooping manages and controls multicast groups, thus effectively suppressing flooding of multicast data in Layer 2 networks.

2)         Multicast VLAN

In the traditional multicast-on-demand mode, when users in different VLANs on a Layer 2 device need multicast information, the upstream Layer 3 device needs to deliver a separate copy of the multicast data to each VLAN on the Layer 2 device. With the multicast VLAN feature enabled on the Layer 2 device, the Layer 3 device needs to send only one copy of multicast data to the multicast VLAN on the Layer 2 device. This avoids waste of network bandwidth and extra burden on the Layer 3 device.

1.3  RPF Mechanism for IP Multicast Packets

To ensure that multicast packets reach a router along the shortest path, the multicast router must check the receiving interface of multicast packets depending on the unicast routing table or a unicast routing table independently provided for multicast. This check mechanism is the basis for most multicast routing protocols to perform multicast forwarding, and is known as Reverse Path Forwarding (RPF) check. A multicast router uses the source address of a received multicast packet to query the unicast routing table or the independent multicast routing table to determine that the receiving interface is on the shortest path from the receiving station to the source. If a source tree is used, the source address is the address of the source host sending the multicast packet. If a shared tree is used, the source address is the RP address of the shared tree. A multicast packet arriving at the router will be forwarded according to the multicast forwarding entry if it passes the RPF check, or else, it will be discarded.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网