Multicast on the LAN

advertisement
1
Multicast on the LAN
Engineering Workshops
2
Multicast Addressing at Layer 2
• An IPv4 multicast address is 32 bits, of which the first 4
bits are always the same, leaving 28 bits.
• A MAC multicast address is 48 bits, of which the first 24
bits are always the same. One of the remaining bits is
reserved, leaving 23 bits.
• So, one multicast MAC address maps to 32 multicast IP
addresses.
Engineering Workshops
T
]
]
V ]
]
V \]
DA
=
T
T
T
V T
V T
V X<
T
V T
V TU
W
>
$
,
*
(
*+)
'
$
&
%
#$
" !
S
=
JK
=
=
F
GL
HI= G
EDC
?
AB
=
@?>
<
<
<
;<
P
K
M
R
Q
NM
O
[
[
K
?A
J
K
JK
Z
YF
,
7!
)
$#
9:
"!
8
(
+*)
$
#$
!
$!
*)
#
+65
"
(
*4
$
$
(
#
* (
'
01
23
0 %
1
$
/
*
.-
-
3
Ethernet Multicast Addressing
Engineering Workshops
4
IGMP
• Internet Group Management Protocol - how hosts tell routers about
group membership
• Routers also solicit group membership from directly connected hosts
• RFC 1112 specifies version 1 of IGMP
– Supported on Windows 95
• RFC 2236 specifies version 2 of IGMP
– Supported on latest service pack for Windows, newer Windows
releases, and most UNIX systems
• RFC 3376 specifies version 3 of IGMP
– Provides source include-list capabilities (SSM!)
– Included in Linux kernel 2.5 and later
– See http://videolab.uoregon.edu/projects.html
Engineering Workshops
5
IGMPv2
• Router:
– sends Membership Query messages to All Hosts (224.0.0.1)
• query-interval = 125 secs default
– router with lowest IP address is Querier (rest non-queriers)
– If lower-IP address query heard, back off to non-querier state
• Other Querier Present Interval default: (robust-count x
query-interval) + (0.5 x query-response-interval) = 255 secs
– listens for reports (whether querier or not) and adds group to
membership list for that interface
• query-response-interval = 10 secs default
– timeout (Group member interval) default:
• (robust-count x query-interval) + (1 x query-responseinterval) = 260 sec
– robust-count - provides fine-tuning to allow for expected packet
loss on a subnet. Default = 2 (tunable from 2-10)
Engineering Workshops
6
IGMPv2
• Host:
– sends Membership Report messages to groups
it is a member of
• waits 0-10 sec (default)
• Hosts listen to other host reports
• Only 1 host responds
– sends unsolicited Membership Reports (i.e., Join
Messages) to group address (e.g. 224.10.8.5)
– sends Leave messages to All Routers (224.0.0.2)
– reports group membership ONLY – no sources. Only
the existence of local group members is reported, not
the actual members themselves
Engineering Workshops
10
Soft State
• Say I set up an active Multicast group, say by issuing a
membership report. What happens if my computer goes
down and never directly leaves the group ?
• This is fixed with “Soft State”
– Everything has a timer, and if not periodically
reinitiated the timer will expire and the state will be
removed.
– So there is no danger of some rogue group lasting
forever.
Engineering Workshops
12
IGMPv3 Enhancements
• Group-Source Report message is defined. Enables
hosts to specify which senders it can receive or not
receive data from.
• Group-Source Leave message is defined. Enables
host to specify the specific IP addresses of a
(source,group) that it wishes to leave.
Engineering Workshops
13
Switches and Snooping
• IGMP host reports (Joins) tell the router to start
sending multicast traffic to the LAN, since one or
more hosts on the LAN are members of the group.
• In a conventional shared broadcast LAN using
switches that have no multicast smarts, the traffic
is sent to all hosts.
• With multiple high bandwidth multicast sources
(e.g. video at 5 Mbps), this does not scale beyond
approximately one source.
• There are a few techniques used to deal with this...
Engineering Workshops
14
IGMP Snooping
• Implemented by several vendors. Support for IGMPv2
is common; support for IGMPv3 is rare, but becoming
more common.
• What happens at the MAC layer:
– IGMP snoopers add a bridge table entry for each
multicast group destination address (GDA) to each
switch port that has the interested member's unicast
source address (USA) already on it. (Remember that
there are likely to be dumb hubs downstream of
switches, so more than one USA can be on a single port.)
– When an IGMP Leave is received, the GDA entries are
pruned.
Engineering Workshops
15
Why IGMP snooping is
harder than it looks
• The IGMP membership reports have to be captured
from each host and suppressed to other hosts to
prevent the others from going into idle-member state;
every interested host has to be spoofed into thinking it
is the only member of the group, so that it actively
sends membership reports. The IGMP snooper then
forwards one of these membership reports up to the
router (or makes up a fake membership report for
itself).
Engineering Workshops
Why IGMP snooping is
harder than it looks, continued
• Since multiple USAs can be on a port (via dumb hub),
the switch has to actually do the IGMP membership
query/timeout before pruning a port.
• Since membership reports are sent to the same GDA as
the (possibly high-bandwidth) multicast traffic, there is
a potential for heavy loading of the switch CPU, unless
you use more expensive ASICs that can separate the
IGMP protocol messages from general traffic and route
only the IGMP messages to the CPU.
• The switch has to know which is the multicast router
port. It does this by snooping for IGMP queries.
Engineering Workshops
16
17
CGMP
• The proprietary Cisco Group Management Protocol
puts the bulk of the Layer 3 logic in Layer 3 devices
rather than cramming it into Layer 2 devices like
IGMP snooping does.
• The router sends CGMP Joins and Leaves to the
switch, specifying the USA and GDA.
• On receipt of an IGMP Membership Report, the router
sends the switch a CGMP Join.
• On receipt of an IGMP Leave, the router sends the
switch a CGMP Leave.
• IGMP membership reports still have to be suppressed
so that hosts don't go into idle-member state.
• CGMP functioning is not well documented. Interactions
with IGMPv3 are unclear.
Engineering Workshops
18
PIM Snooping and RGMP
• For Layer 2 networks with routers but no hosts
(transit LANs).
• PIM, not IGMP, is spoken among routers, so IGMP
snooping does not work in this case.
• PIM snooping and the Cisco-proprietary Router
Group Management Protocol (RGMP) are used by
the Layer 2 switch to send only the multicast flows
that the router needs to the router's port. These
work analogously to IGMP snooping (smarts in the
switch) and CGMP (smarts in the router).
• PIM snooping is still mostly experimental. Some
Foundry Networks switches support it.
Engineering Workshops
19
Problems with Multicast on the LAN
• In general, multicast on the LAN is not as well
understood as multicast on the WAN.
• Switch behaviors are not standardized.
• Problems with switches:
– when snooping is enabled, they may drop
packets that shouldn’t be dropped.
– even without snooping, sometimes they step
outside their bailiwick, trying to do non-Layer-2
tasks.
Engineering Workshops
20
Case Study
A few months ago I converted all our interfaces over to
IGMP Version 3. Then I started getting complaints from
our lab/classroom support group that Norton Ghost was
failing for them. It would hang after about 3 minutes. So
far the fix, without understanding why it works, has been
to revert the interfaces to IGMP version 2. The switches
downstream from these interfaces are running CGMP and
CGMP LEAVE (which is actually a form of IGMP
snooping/spoofing for IGMP Leaves sent to 224.0.0.2). I
suspect that the fact that these switches are actually
looking at IGMP packets may have something to do with
the problem that reverting to v2 fixed...
— Alan Crosswell
Engineering Workshops
21
Case Study
This author traveled to Los Alamos, New Mexico to help
debug a multicast problem that had everyone stumped.
Everyone was assuming the only known router on the
subnet was also acting as the multicast gateway.
Unfortunately, this wasn’t the case. A nominally Layer
2 switch on the subnet was accidentally configured with
PIM active, and won the PIM Designated Router
election. Of course, this Layer 2 switch had no upstream
to anywhere.
— Bill Nickless
Engineering Workshops
One Approach to
Multicast on the LAN
• Avoid snooping, as it causes more problems than it
solves.
• Keep subnets small. A smaller subnet is less likely
to have people joining several different multicast
groups, traffic for each of which is sent to the entire
subnet.
• If at all possible, use routers, not switches or
bridges.
• If you have to use switches, try to at least buy them
all from the same vendor, so you won’t have
inconsistent behavior as well as unexpected
behavior.
Engineering Workshops
22
23
Another Approach to
Multicast on the LAN
• The previous approach reflects gigaPoP/WAN bias.
• On a campus, it just isn't possible to use routers
everywhere.
• Switches and snooping may be evils, but they are
necessary evils. Learn to cope with them.
http://www.cisco.com/warp/public/473/22.html
is a good place to start.
Engineering Workshops
24
Lab 1: Multicast on the LAN
Engineering Workshops
25
SSM
Engineering Workshops
26
PIM-SM
• SM stands for “Sparse Mode.”
– RFC 2362 and draft-ietf-pim-sm-v2-new-06.txt
– There is also a Dense Mode, but we don’t
recommend using it.
– Cisco has a proprietary “Sparse-Dense” mode
which is used for RP discovery.
• PIM-SM allows for both RPTs and SPTs.
• There are two ways to use PIM-SM…
Engineering Workshops
27
ASM and SSM
• ASM: Any-Source Multicast. Traditional multicast – data
and joins are forwarded to an RP.
– All routers in a PIM domain must have RP mapping.
– When load exceeds threshold, forwarding switches to an
SPT. The default threshold is one packet; in this case,
the sole purpose of the RPT is to learn which sources
are active. (With IGMPv2, the receiver can only specify
the group, not specific sources.)
– State increases (not everywhere) as number of sources
and number of groups increase.
– SPT state is refreshed when data is forwarded and with
Join/Prune control messages.
• SSM: Source-Specific Multicast. PIM-SM without RPs –
instead, the source is learned out-of-band, and the SPT is
built directly to it.
Engineering Workshops
28
SSM
• Source-Specific Multicast (SSM) is a subset of ASM,
so
– SSM concepts apply directly to ASM, but
– SSM is a lot simpler than ASM.
For these reasons, we cover SSM first in this
workshop.
• 232 / 8 is assigned to SSM as an address space. Other
address ranges can also be set up for SSM — this is
primarily a function of the receiving network.
• Source activity and IP addresses are assumed
known.
• IGMPv3 allows for “Include” lists of (S,G) pairs.
Engineering Workshops
29
SSM
• SSM - draft-ietf-ssm-arch-01.txt
– 232/8 – IANA assigned
– No RPTs
– Guarantees ONE source on any delivery tree
• Content security – no unwanted sources
– Reduced protocol dependence – more later...
– Solves address allocation issues for inter-domain one-to-many
• tree address is 64 bits – S,G
– Host must learn source address out-of-band (e.g, from a web page)
– Host-to-router join request specifies source as well as group
• requires IGMPv3 for include-source list
– SSM behavior in 232/8 by default
• Configurable to expand range
Engineering Workshops
30
SSM in Action
• Each (S,G) pair listed in the IGMPv3
include list generates a (S,G) Join directly
towards the source.
• That’s it. It’s very simple. All you need to
implement is :
– Edge routers need IGMPv3
– Interior routers need filters to prevent RP
(*,G) Joins & other RP state for the SSM
address block
Engineering Workshops
31
SSM Group Addresses
• 232 / 8 is assigned to SSM as an address space.
– You don’t have to ask, you can just pick one and
use it.
• How can this be ?
– Note that all joins are unique as long as the
combination of S and G are unique. Not only can
one source support multiple groups, but if there
are two sources using the same group address,
everything works just fine.
Engineering Workshops
34
Lab 2: SSM
Engineering Workshops
Download