IP Multicast for Entertainment Video Cisco Days – Raleigh, NC Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Agenda Video System Elements Edge Reliant System Design (Example Topology) Multicast Overview Multicast Design Metrics Managing IP Multicast (CMM & VOS) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Video System Elements System Elements and Resiliency Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 Video System Elements Encoding STB Decoding Digital Content QAM Modulation MPTS Muxing SPTS Muxing Encryption Encryption Transport Network Transport Network DPI Ad Splicing Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 Design Dependencies The design efficiency of the entertainment network is largely dependent on the IP Multicast capabilities of the components in the system. We should consider those capabilities categorically: Video Sources (single or redundant) Digital Simulcast (MPTS) Switched Digital (SPTS) DPI (Both MPEG-2 Transport Types) Edge Receivers (network intelligent or not) QAM Modulators Decoders Nodes and Links (functionality required is based on source/edge) Transport Equipment Routers and Interfaces Forwarding Protocols Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 Resiliency Options Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 Single Video Source Leveraging a single video source into a High-Availability design requires some method of replication that may not establish uniqueness of the video streams. Non-Optimal Optical splitting will create duplicate traffic that uses the same multicast addresses Forced multicast forwarding into transport paths increases video flow replication and transport demand Optimal Sophisticated source devices that replicate video traffic as uniquely addressable source streams Intelligent Edge devices dynamically select video traffic to minimize bandwidth and replication Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 Secondary/Backup Video Source Layer-2 forwarding using VLAN’s with Any Source Multicast (ASM), or classic multicast Layer-3 forwarding of adjacent system content using ASM multicast IP addressing Layer-3 forwarding of adjacent system content using Anycast multicast IP addressing Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 Video Edge Considerations IGMP support (or the lack of it) is the largest factor driving network design Non-IGMP compliant devices create design constraints that impact bandwidth demand and network device efficiencies Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 Video Edge Dependency Ultimately Drives Topology Decisions An Evolving Distribution Network : L2 IGMPv2/SSM Mapping End-2-End IGMPv3/SSM Variations in consistency between Edge Gear products’ support of IGMP vs Promiscuity constrain your design options Promiscuous devices have the ability to receive single source duplication that uses identical IPmc addressing (like Anycast) But - limits scalability in a VLAN (to 1 GE) IGMP Snooping is required to protect video edge devices from oversubscription Requires VLAN isolation for promiscuous devices which factors up the multicast replication at the edge router and the increases transport bandwidth IGMP capable devices allow the total network to scale better Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 Edge Reliant Systems Migrating to Efficient IP Multicast Systems Design Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 Distribution Options Layer-2 and Layer-3 networks have distinct scalability differences Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 Layer-2 Multicast Fundamentals Layer-2 Networks propagating Multicast in a broadcast fashion Resiliency is achieved through explicit packet duplication Video Edge equipment vendors have different multicast capabilities today, which may impose a “transport tax” in the form of multiple VLAN’s for different applications 802.1q P2P links to create segregated traffic One VLAN for each 1G of redundant traffic – approx. 240 channel ceiling Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 Single Source Example Single Router, Single Ring/Link Transport Source devices feed a unique multicast to a single router, using “isolated” Layer-2 trunks for redundant distribution to remote locations 802.1q Trunk SVI 10 Static-group Output result is identical multicast groups - edge must support duplicate addressing scheme. Statistical Multiplexers (Works for promiscuous receivers.) Static-group SVI 20 802.1q Trunk VLAN path terminates at the “last hop” in the ring so that no loop exists. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14 Single Source Example Dual Routers, Single Ring Transport Source devices feed a unique multicast shared between two routers, with redundant distribution to remote locations using “isolated” Layer2 trunks SVI 10 802.1q Trunk Static-group Statistical Multiplexers Output result is identical multicast groups - edge must support duplicate addressing scheme. This link supports bridging of all source multicasts (Works for promiscuous receivers.) Static-group SVI 20 802.1q Trunk VLAN path terminates at the “last hop” in the ring so that no loop exists. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15 Layer-3 IP Multicast Fundamentals Layer-3 networks propagate IP Multicast using dynamic traffic selection Intra-Regional Backup and/or Redundancy of video sources leverage the bandwidth efficiency of IP Multicast Edge network segments have greater flexibility, when supporting multi-vendor implementations using Layer-3 addressing and forwarding Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16 Single Source Example Dual Router, Single Ring Transport Source devices feed a unique multicast propagated between two routers using two separate OSPF routing instances. Remote routers see both instances for resiliency. OSPF 10 Static Groups Statistical Multiplexers This link supports routing of all source multicasts Output result is identical multicast groups - edge must support duplicate addressing scheme. (Works for promiscuous receivers.) OSPF 20 Static Groups Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17 Dual Logical IPmc Topologies on Single Network for High Availability Resiliency Can provide different subsets of the network for different classes of traffic Can share links to reduce cost Can share nodes to reduce cost Vs. Virtual Routers or similar “virtual network”: No need for subnet encapsulation for multiple topologies Vs. RSVP-TE P2MP Easier DIffserv type approach (not fixed on per flow/tree) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18 Dual Multicast Topologies for HA Resiliency STBs HFC Redundant Encoder/Multiplexer Redundant Decoder / Ad-Inserter/.. Send traffic twice to different multicast groups (eg: green = 232.1.8.1, red = 232.1.8.2) Use logical path separation in network to pass red/green across different paths Note: dual topologies just one solution Receivers receive both copies. No single network failure will cause any service interruption Same bandwidth allocation needed as in traditional SONET rings, but solution even better: 0 loss instead of 50 msec. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19 Dual Multicast Topologies for High Availability Resiliency Rcvr Rcvr IGP costs different in each Topology Rcvr Rcvr Redundant Encoder/Multiplexer Unicast traffic flows in the opposite directions Rcvr Small metric Rcvr Large metric Topology sharing of links: Large Small metric Particular useful in rings. Two topologies also useful for unicast (eg: VoD load splitting) Requires unidirectionally “weighted” link metric to force opposing reachability Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20 Dual Source Example Dual Router, Single Physical Transport Multiple unique sources feed two routers which support two separate OSPF forwarding instances. Remote routers see both instances for resiliency. OSPF 10 Static or IGMPvX Primary Source Output result is unique multicast groups and unique source IP addresses. This link supports routing of all source multicasts (Works for promiscuous receivers.) OSPF 20 Static or IGMPvX Backup Source IGMPv3 and SSM function nicely in this design if supported by the Edge Device. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21 Phased Resilient Network Implementation Example Build the Foundation and Grow As Needed Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22 Edge Reliant Design – Phase 1 Leverage Logical Network Subsets QAM Library VoD Propagation Streaming VoD Server QAM Simulcast Source QAM RGB Mux Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential CATV 23 Edge Reliant Design – Phase 2 Introduce Node Resiliency QAM Library VoD Propagation Streaming VoD Server QAM Simulcast Source QAM RGB Mux Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential CATV 24 Edge Reliant Design – Phase 3 Introduce physical layer resiliancy Library VoD Propagation Streaming VoD Server QAM CATV Simulcast Source OSPF weighted low QAM Primary Simulcast Secondary Simulcast Primary VoD Prop RGB Mux CATV Secondary VoD Prop Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25 Edge Reliant – Phase 4 Introduce Non-stop Forwarding Network Nodes 7600 Simulcast Source B Streaming VoD Server Library VoD Prop QAM CATV CRS-1 Simulcast Source A OSPF weighted low QAM Primary Simulcast RGB Secondary Simulcast Mux Primary VoD Prop CATV Secondary VoD Prop Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26 7609 Design Strengths Converged Services on redundant 7600’s Service Separation through dedicated interfaces, simplified operational requirements Efficient distribution of multicast traffic via IP routing Deterministic traffic path based on known routing cost Multiple redundancy options available per service Predictable and manageable scaling per service Wide range of L2 & L3 VPN commercial services available Utilizes a best practice design and features widely deployed in the field today (experience to draw upon. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27 Dual-Homed Edge Devices Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28 Time Warner San Antonio – “DVT” (10GEx4) HUB 6300 HUB 6200 HUB 6700 HUB 6600 HUB 5200 HUB 6400 HUB 6100 HUB 6800 HUB 6500 HUB 5100 HE/HUB 6000 HUB 5300 HUB 1400 HE/HUB 5000 HUB 1300 HUB 3000 HUB 1000 (THUB) (THUB) HUB 3100 HUB 2000 (THUB) HUB 2200 HUB 2100 HUB 2500 HUB 2300 HUB 1100 HUB 1200 HUB 3400 HUB 2400 HUB 2300 HUB 2200 HSD DVT METROE Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential C&C 29 BMR1200 San Antonio – Hardware Installed Real Time Encoders Multicast Sources BroadBus DFC Based 6704 links at all THUB Locations BroadBus Catalyst 4948 BMR1200 Ad, Splice and Clamping 7600 7600 7600 HE/HUB 6000 HE/HUB 5000 CFC Based Line Cards for 10GE and 1GE output to Sub-Rings 7600 HUB 3000 (THUB) 7600 7600 7600 HUB 1000 (THUB) HUB 2000 (THUB) 7600 7600 7600 Catalyst 4948 RGB1 HUB 2100 RGB2 GQAM BME50 RF Plant Analog/ Digital RF SuperTrunk to DHUBs BME50 Catalyst 4948-GE HUB 2300 HUB 2200 Simulcast / SDV GE Path VOD 10GE Path Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10GEx4 Transport Links 30 Multicast Overview Highlighting the Fundamentals Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31 IP Multicast Business Drivers The Problem: Inefficient Multipoint Techniques Multiple Unicasts Broadcast Raleigh Raleigh ??? Columbia Columbia ??? ??? ??? ??? Three copies of the same packet are transmitted Presentation_ID ??? © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential The entire network receives one packet even if there are only a few receivers 32 IP Multicast Business Drivers The Solution: Multicast Multicast Group • Multicast Transmission: Source sends a single multicast packet addressed to a multicast group number. • Intelligent networking devices then dynamically build efficient paths and deliver packets to all recipients who have joined that multicast group. •Introduces a new class of IP addresses: Class D = 224.0.0.0 239.255.255.255 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33 IP Multicast Business Drivers Distribution Times Point-to-point vs. Multicast Point-to-Point Transfers at 512 kbps Files Size 100 Servers 1000 Servers 5000 Servers 1 MB 25 Minutes 4.3 Hours 22 Hours 100 MB 43 Hours 434 Hours 2170 Hours 300 MB 130 Hours 1302 Hours 6510 Hours Multicast Transfers at 512 kbps Files Size Presentation_ID 100 Servers 1000 Servers 5000 Servers 1 MB 16 Seconds 16 Seconds 16 Seconds 100 MB 26 Minutes 26 Minutes 26 Minutes 300 MB 78 Minutes 78 Minutes 78 Minutes © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34 Multicast Design Metrics Protocols That Are Critical For Success Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35 Key IP Multicast Protocols Protocol Independent Multicast (PIM) Defines the method of propagation of multicast traffic Internet Group Management Protocol (IGMP) Defines how receivers and sources establish and discontinue membership relationships Internet Gateway Protocol (IGP) Used by PIM to ensure that optimal paths are used to deliver services, and prevent routing loops Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36 Step 1 – Enabling IPmc in the Network Node IP Multicast traffic support is not usually enabled by default on most Layer-3 network devices. There are commands for global support on the router, and at the interface level (or SVI) that: Enable multicast traffic on the platform… Configure the appropriate multicast routing protocols and multicast client support settings based on the receiving devices downstream from the node. NOTE: Most applications require a configuration tuning to bring performance and security in alignment with network policies. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37 Step 2 – Multicast Routing Protocols Protocol Independent Multicast (PIM) PIM is the industry standard family of routing protocols used to establish a logical “domain” of IPmc peers Network Nodes become PIM peers when connected interfaces are configured with a similar PIM protocol mode PIM peers share information about IPmc traffic sources, and direct traffic to active receivers (IPmc requestors) according to the PIM mode PIM operational modes are dense, sparse or sparse-dense Dense mode floods (pushes) all IPmc traffic into domain interfaces until pruning stops the flooding. Sparse mode forwards (pulls) an IPmc group into domain interfaces only if requested. Sparse-mode requires devices called a “Rendezvous Point” to coordinate source device awareness in the PIM domain The Layer-3 routing protocol (IGP) of the network is used to establish the path which the IPmc traffic will take between the IPmc source and requestor There is a potential for a non-synchronized condition where PIM tries to build a IPmc tree through an ideal IGP path that may not be PIM enabled (uRPF). Be sure to enable your shortest path for PIM NOTE: The mode you select is dependent on the default behavior you require for your application and its resiliency requirements Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38 Step 2 (cont.) – Sparse vs. Dense Perspective While browsing the CISCO-IPMROUTE-MIB.my file I happened across a succinct description, that offered another view when comparing sparse mode to dense mode: “In sparse-mode, packets are forwarded only out interfaces that have been joined. In dense-mode, they are forwarded out all interfaces that have not been pruned." Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39 Step 3 – Internet Group Management Protocol IGMP “Joining” is the common term used to describe a host system that requests to become a member of an IPmc group – it is said that the host will “join a group” The membership request is dynamic when the host uses the IGMP protocol to make the request IGMPv1 and IGMPv2 are said to be non-source-specific requests as they only able to request membership by the IPmc group identity - commonly called a (*,G) request, or join dense or sparse mode are commonly used IGMPv3 specifies the exact source IP address and IPmc group address – commonly called an (S,G) request, or join Source Specific Multicast (SSM) implementations require IGMPv3 support on the requestor or by proxy at the first hop router via SSM-Mapping SSM uses sparse-dense mode only, and does not require rendezvous point configuration in the PIM domain Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40 Protocol Independent Multicast How Multicast Moves Over IP Networks Multicast Routing, IGMP Evolution, and the Impact on Your Network Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41 What is PIM? Protocol Independent Multicast (PIM): A Multicast routing protocol that define the rules used to forward multicast traffic throughout the IP network. Network nodes (interfaces or links) are explicitly configured as participants in PIM There are multiple PIM operating modes, each with specific operational benefits PIM is dependent upon the underlying unicast routing protocols for specific reachability. A multicast enabled network is commonly referred to as a “PIM domain”. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42 Classic Multicast Any-Source Multicast (ASM) ASM: Classic IP Multicast service (rfc1112, ~1990) Sources send IP multicast packets to a IP multicast group Receivers “join an IP multicast group” Network node will deliver packets sent by any source to an IP multicast group to all receivers that have joined the IP multicast group. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43 ASM Multicast Routing Modes Dense Mode (DM): A traffic “push” mode that actively attempts to send multicast data to all potential receivers in the PIM domain (flooding), and relies upon their self-pruning (removal from group) to achieve desired distribution. Sparse Mode (SM) RFC 2362: A traffic “pull” mode that relies upon an explicit joining method (IGMP) before attempting to send multicast data to requestors of a multicast group. Source Specific Multicast: A mode used where receivers have the ability to directly request multicast groups from a specific source. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44 SM Multicast Components Rendezvous Point (RP): The multicast router that is the root of the PIM-SM shared multicast distribution tree. This router knows about all the multicast sources in the PIM domain. Designated Router (DR): The router in a PIM-SM tree that forwards Join/Prune messages upstream to the RP in response to IGMP membership info it receives from IGMP hosts. Shared Tree: Efficiently built (temporary) distribution path from the central RP to all DRs who have directly attached members of a particular multicast group. Ensures that there are no unnecessary duplication of the multicast data within network, but may result in suboptimal routing between source and receivers. Source Tree: A multicast distribution path that directly connects the sources and receivers DRs (or the RP) to obtain the shortest path through the network. Results in most efficient routing of data between source and receivers, but may result in unnecessary data duplication throughout network if built by anyone other then the RP. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45 Multicast Domain Multicast Routing: PIM-SM Segment A Segment B RP Multicast Source X DR RP Multicast Source Y ISP B ISP A DR PIM-SM DR Protocol Independent Multicast Dense mode Sparse mode -Uses “push” model -Traffic flooded throughout network -Pruned back where it is unwanted -Flood-and-prune behavior (every 3 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. -Uses “pull” model -Traffic sent only to where it is requested -Explicit join behavior minutes) Cisco Confidential 46 SSM and Anycast SSM: Source Specific Multicast (~2000) Source(s) still send IP multicast to IP multicast group address – but refered to as an “(S,G) channel” Receivers subscribe to (S,G) channel by indicating to the network not only IP multicast group it wants but also the specific source Network will deliver packets on a per-channel basis only Anycast “Redundant IP address” for source-redundancy: Primary target for SSM: “Single-Source” TV/Audio/Data ”broadcast” applications Using a single IP address on multiple sources for redundancy, the network dynamically announces closest source via Unicast Routing. But why SSM, is ASM not good enough or better ? ASM is simpler to deploy – no RP’s or DR’s needed resulting in simpler configurations Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47 Reasons To Use SSM Complexity of protocol operations required for SM PIM-SM (Shared trees, shortest path trees, RPT/SPT switchover)/MSDP, RP announcement (AutoRP/BSR), RP placement, RP redundancy Operating PIM-SM over core networks complicated Bandwidth reservation (RSVP, per group ? Per source ?), Link/Node Protection with PIM-SM are all more complex Scalability, Speed of protocol operations (convergence) Operations for both SPT and RPT needed – and their interaction DoS attacks by unwanted sources Receivers can ignore packets, but network resources can only be protected by extensive network source access control == network level application control. Address Allocation Try to get “global scope” IPv4 multicast address (GLOB, …) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48 IP Multicast Routing Summary SSM is a key enhancement to IP multicast Better (manageable / scalable) multicast service delivery SSM may not replace ASM in all applications Many-source applications Source-discovery with IP multicast ASM and SSM can coexist Recent means of improvement / simplification of ASM Easier protocols for ASM Bidir-PIM (intradomain only today) Easier RP-redundancy (PIM-Anycast-RP, Prioritycast) IPv6 multicast (address allocation, embedded-RP) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49 IGMP Managing Multicast Propagation IGMP Evolution, and the Impact on Your Network Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50 IGMP Versions • Version 1, specified in [RFC-1112], was the first widely-deployed version and the first version to become an Internet Standard. • Version 2, specified in [RFC-2236], added support for "low leave latency", that is, a reduction in the time it takes for a multicast router to learn that there are no longer any members of a particular group present on an attached network. • Version 3 adds support for "source filtering", that is, the ability for a system to report interest in receiving packets *only* from specific source addresses, or from *all but* specific source addresses, sent to a particular multicast address. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51 IGMP v1 - Behavior router IGMP routing update IGMP routing update 30 sec router router LAN 2 LAN 1 Group member Presentation_ID IGMP query IGMP report Group member © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential IGMP report LAN 3 IGMP query Group member 52 IGMP v1 - Pruning router router router router router Group Member Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. IGMP query Group Member Cisco Confidential router Group Member 53 IGMP v2 - enhancements IGMP v2 introduces a procedure for the election of the router querier for each LAN. In the version 1 this was done by different routing policies. Group-Specific Query – Added to permit queries form a router to a specific group and not to all-host address in the subnet (224.0.0.1). Leave-Group – for a reduction in the time it takes for a multicast router to learn that there are no longer any members of a particular group present on an attached network. Sent to all-routers (224.0.0.2) When a router receives the Leave-Group message, it uses the GroupSpecific Query to verify if the sender was the last one in the group. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54 IGMP v2 - Pruning router router router IGMP Leave router router Group Member Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Specific IGMPGroup Leave query Group Member Cisco Confidential router Group Member 55 IGMP v3 - features MUST be interoperable with v1 and v2 Source-filtering Only from a source All but a source Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56 IGMP v3 - The protocol (for group members) Action on Reception of a Query Therefore, the system must be able to maintain the following state: • A timer per interface for scheduling responses to General Queries. • A per-group and interface timer for scheduling responses to GroupSpecific and Group-and-SourceSpecific Queries. router IGMP report Wait for random interval IGMP query • A per-group and interface list of sources to be reported in the response to a Group-and-SourceSpecific Query. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57 IGMP v3 - The protocol (for multicast routers) Conditions for IGMP Queries • Periodic request for membership Multicast routers send General Queries periodically to request group membership information from an attached network. These queries are used to build and refresh the group membership state of systems on attached networks. Systems respond to these queries by reporting their group membership state (and their desired set of sources) with Current-State Group Records in IGMPv3 Membership Reports. IGMP Request router Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58 IP Multicast Video Channel Relationships Channel Identities Change During Delivery Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59 IPmc Flow Relationships Video Transport Systems generally contain components that manipulate source video streams for a number of reasons… Statistical Multiplexing (building MPEG-2 MPTS’s) Digital Program Insertion (ad-insertion) Encryption or DRM IPmc group addressing will change as video programs flow from their original sources through these components to consumers. Awareness of those flow relationships are critical for successful service management. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60 Geographic Relationships Encoders Mux-Demux Ad Insertion Encryption QAM, Decoder Sources Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Transport Cisco Confidential Edge 62 Possible IPmc Flow Stages Satellite Receivers Encoders Multifunction devices Mux / Demux Presentation_ID Ad Insertion Ad Insertion Ad Insertion Encryption Encryption Encryption Edge QAM Edge QAM Edge QAM Zone 1 Zone 2 Zone 3 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63 Control Multicasts (Out-Of-Band) Emergency Alert Service (EAS) BootLoaders (best way?) Conditional Management Hub-Specific Programming NAT’d Multicasts Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64 Video Program Path Changes Over Time SD Source HD Source Mobile DPI DRM P-Key PC Set Top Program Migration Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65 Managing IP Multicast Cisco Multicast Manager Video Operations Solution Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66 The issue How do you proactively or reactively monitor or diagnose a specific video service or video stream(s) given the following: 4 Different Video Service Types (TWC single market example) Broadcast Simulcast VoD Switched Mapped into two different MPEG Multiplex Streams MPTS SPTS Which map into two different IP address service paths Unicast Multicast Which map across one of three different major GE network architectures Resilient Rings GE Optical Muxponded Backhaul Transport network aggregates to 10G (aka muxponded), across GE IP Switched Backhaul IP Switch aggregates to 10G, backhauled across a 10G transport network) Across massive geography (TWC nationwide example) 2 NOCs 7 RDCs 41 Head Ends 20 hubs average per Head End 850 Hubs And are applied in massive scale (TWC example) Broadcast (80 channels = <500Mb multicast *per hub* average) Simulcast (80 channels = <500Mb multicast *per hub* average) VoD (1-12 streams per channel = 5Gb unicast *per hub* average) Switched (80 analog + 120 digital channels = 1.5G multicast *per hub* average) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67 Case In Point 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 Simulcast, HSD, CommSrv, & VoD 2 x 7609 2 x 7609 10GE Rings (6 λ) Simulcast, HSD, CommSrv, 2 x 7609 & VoD 10GE Rings (7 λ) 2 x 7609 2 x 7609 2 x 7609 2 x 7609 Carrollton 2 x 7609 Simulcast, HSD, CommSrv, VoD* 10GE Rings (10 λ) (*VoD for Plano comes directly from Dallas HE) 2 x 7609 Grapevine 2 x 7609 2 x 7609 2 x 7609 2 x 7609 7609 7609 Plano 7609 7609 2 x 7609 20 bp G 30 G bps s CORE RING (14 λ) 3 x 7609 2 x 7609 Dallas HE 30 Gbps Arlington 2 x 7609 2 x 7609 Internet bps 20 G Thornton 7609 7609 2 x 7609 2 x 7609 2 x 7609 7609 Simulcast, HSD, CommSrv, & VoD 10GE Rings (7 λ) 2 x 7609 7609 Simulcast, HSD, CommSrv, & VoD 10GE Rings (6 λ) 2 x 7609 Simulcast, HSD, CommSrv, 2 x 7609 & VoD 10GE Rings (6 λ) 2 x 7609 2 x 7609 2 x 7609 HSD 10 GE Shared Commercial 10 GE Shared VoD 10 GE Rings 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 2 x 7609 Simulcast Ring-A Simulcast Ring-B Existing 7609 Router 7609 Edge Router CRS-1 Core Router Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68 Network Impact on Quality Network Headend Home IP Packet Jitter IP Packet Delay Poor Video Good Video Dropped IP Packets blocky effect, locking effect, freeze frame, frame skipping… Problems Caused by: IP packet jitter – rate overruns and underruns Dropped IP packets Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69 Popular Perceptions The only thing an IP network can do to affect the quality of IPTV is loss The perceptual quality of the video is the same at the STB as it is at the headend if there is no loss within the network. Cumulative IP jitter may impact video quality, depending on the receiver buffer size, and it is a leading indicator of loss Network latency does not impact video quality per se, although it can cause a shift in view time Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70 Media Delivery Index (MDI) An indicator of cumulative jitter and packet loss MDI = Delay Factor : Media Loss Rate Delay Factor (DF) = The amount of buffer required to transport the jittered packets in the network without loss per sample period DF is proportional to the delay introduced in the system due to the network buffering. Media Loss Rate (MLR) = The total media packets lost per sample period. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71 Media Delivery Index An Example MDI Measurement MDI Measurement Delay factor is Good Delay factor is not good Media Loss is Good Media Loss is not good For 3.5MB/s Expected delay DF: 2.81 Expected DF was 2.81 Network Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73