IP Multicasting at Layer 2
|
|
|
- Stanley Gardner
- 9 years ago
- Views:
Transcription
1 IP Multicasting at Layer 2 Module , Cco Systems, Inc. 1 Copyright Cco Systems, Inc. 1
2 Agenda MAC Layer Multicast Addresses v1 v2 v1-v2 Interoperability v3 L2 Multicast Frame Switching 2000, Cco Systems, Inc. Cco.com 2 Copyright Cco Systems, Inc. 2 3
3 Layer 3 Multicast Addressing IP group addresses Class D addresses = high order bits of 1110 Special reserved group addresses: : All systems on th subnet All routers on th subnet DVMRP routers 2000, Cco Systems, Inc. Cco.com 3 IANA Reserved Addresses IANA the responsible Authority for the assignment of reserved class D addresses. Other interesting reserved addresses are: PIMv1 (ALL-ROUTERS - due to transport in v1) OSPF ALL ROUTERS (RFC1583) OSPF DESIGNATED ROUTERS (RFC1583) RIP2 Routers PIMv CISCO-RP-ANNOUNCE (Auto-RP) CISCO-RP-DISCOVERY (Auto-RP) ftp://ftp.i.edu/in-notes/iana/assignments/multicast-addresses the authoritative source for reserved multicast addresses. Additional Information "Admintratively Scoped IP Multicast", June 1997, has a good dcussion on scoped addresses. Th document available at: draft-ietf-mboned-admin-ip-space-03.txt Copyright Cco Systems, Inc. 3
4 Layer 2 Multicast Addressing IP Multicast MAC Address Mapping (FDDI and Ethernet) 5 Bits Lost Bits 28 Bits e-7f Bits 23 Bits 48 Bits 2000, Cco Systems, Inc. Cco.com 4 Ethernet & FDDI Multicast Addresses The low order bit (0x01) in the first octet indicates that th packet a Layer 2 multicast packet. Furthermore, the 0x01005e prefix has been reserved for use in mapping L3 IP multicast addresses into L2 MAC addresses. When mapping L3 to L2 addresses, the low order 23 bits of the L3 IP multicast address are mapped into the low order 23 bits of the IEEE MAC address. Notice that th results in 5 bits of information being lost. A bit of Htory It turns out that th loss of 5 bits worth of information was not originally intended. When Dr. Steve Deering was doing h seminal research on IP Multicast, he approached h advor with the need for 16 OUI s to map all 28 bits worth of Layer 3 IP Multicast address into unique Layer 2 MAC addresses. Note: An OUI (Organizationally Unique Identifier) the high 24 bits of a MAC address that assigned to an organization by the IEEE. A single OUI therefore provides 24 bits worth of unique MAC addresses to the organization. Unfortunately, at that time the IEEE charged $1000 for each OUI assigned which meant that Dr. Deering was requesting that h advor spend $16,000 so he could continue h research. Due to budget constraints, the advor agreed to purchase a single OUI for Dr. Deering. However, the advor also chose to reserve half of the MAC addresses in th OUI for other graduate research projects and granted Dr. Deering the other half. Th resulted in Dr. Deering having only 23 bits worth of MAC address space with which to map 28 bits of IP Multicast addresses. (It s too bad that it wasn t known back then how popular IP Multicast would become. If they had, Dr. Deering might have been able to pass the hat around to interested parties and collected enough money to purchase all 16 OUI s. :-) ) Copyright Cco Systems, Inc. 4
5 Layer 2 Multicast Addressing IP Multicast MAC Address Mapping (FDDI & Ethernet) Be Aware of the 32:1 Address Overlap 32 - IP Multicast Addresses Multicast MAC Address (FDDI and Ethernet) 0x0100.5E , Cco Systems, Inc. Cco.com 5 L2/L3 Multicast Address Overlap Since there are 28 bits of unique address space for an IP multicast address (32 minus the first 4 bits containing the 1110 Class D prefix) and there are only 23 bits plugged into the IEEE MAC address - there are 5 bits of overlap or = 5. 2**5 = 32 therefore there a 32:1 overlap of L3 addresses to L2 addresses - so beware several L3 addresses can map to the same L2 multicast address! For example, all of the following IP multicast addresses map to the same L2 multicast of e-0a-00-01: , , , , , , , , , , , , , , , , , , , , , , , , Copyright Cco Systems, Inc. 5
6 Layer 2 Multicast Addressing IP Multicast MAC Address Mapping (Token Ring) A Layer 3 IPmc Address Maps to a single Token Ring Functional Address or the all ones Broadcast address: 224.x.x.x 224.x.x.x c (Shown in Token Ring, non-canonical format) ff-ff ff-ff ff-ff ff-ff ff-ff Results in high levels of unwanted interrupts for non-interested Hosts 2000, Cco Systems, Inc. Cco.com 6 Token Ring MAC Addresses Because the bit order of bytes transmitted on Token-Ring are reversed, it typical to see Token Ring MAC addresses written in their non-canonical form. For example, when transposed to canonical (Ethernet) form, the 0xc MAC address in the above slide would be 0x Token Ring Functional Addresses Token Ring Functional Addresses use a format of 0xc xxxx where the last 2 octets typically has at most, a single bit set. Many of the Functional Addresses are reserved for well-known Token-Ring MAC layer functions such as Ring Error Monitor and others. A bit in the 3rd Octet used to signal that th a Functional Address. In fact, the 0x5e (canonical form) in the 3rd Octet of a normal Ethernet multicast address has a bit pattern that would confuse Token Ring end stations into thinking that the address was a Functional Address. Therefore, IP multicast address to L2 multicast address mapping cannot occur in Token Ring as it does in Ethernet. Impact on Token-Ring End Stations Mapping all multicast addresses into a single L2 address forces the the main CPU in end systems to perform filtering of wanted vs. unwanted multicast packets instead of being handled in hardware by the Token Ring NIC card. Th creates significant performance sues on Token-Ring end systems when multicasting traffic present on the ring. Th a very good reason, among many others, for users considering the Ethernet versus Token Ring debate to strongly consider Ethernet if MultiMedia Applications and IPmc being deployed or planned. Copyright Cco Systems, Inc. 6
7 Layer 2 Multicast Addressing IP Multicast MAC Address Mapping (Token Ring) Be Aware of the 268,435,200:1 Address Overlap ALL 268,435,200 - IP Multicast Addresses Multicast MAC Address (Token Ring) 0xFFFF.FFFF.FFFF RUN AWAY!!! 2000, Cco Systems, Inc. Cco.com 7 L2/L3 Multicast Address Overlap Unfortunately, all 28 significant bits of an IP multicast address (32 minus the first 4 bits) map into a single Token Ring MAC address. Th has the dasterous result of a 2**28 = 268,435,200 ambiguity! Because al L3 addresses map into the same L2 multicast address, constraint of multicast traffic at L2 impossible on Token Ring networks. A migration from Token-Ring to Ethernet should be considered by network admintrators contemplating any extensive use of IP multicast. Copyright Cco Systems, Inc. 7
8 Layer 2 Multicast Addressing Token-Ring MAC Addresses Token Ring Interfaces may be configured to use either the Functional Address or the all ones Broadcast Address interface token-ring 0 ip pim sparse ip multicast use-functional Use Functional Address 0xc interface token-ring 0 ip pim sparse Use Broadcast Address 0xffff.ffff.ffff (Default) 2000, Cco Systems, Inc. Cco.com 8 Default Configuration The default Token Ring interface configuration to use the broadcast address. Recommended Configuration If Functional Address support available on IP multicast Token Ring end systems, it recommended the Functional Address be used since th will not affect non-ip multicast users like the broadcast address will. Copyright Cco Systems, Inc. 8
9 How hosts tell routers about group membership Routers solicit group membership from directly connected hosts RFC 1112 specifies first version of RFC 2236 specifies current version of v3 enhancements Supported on UNIX systems, PCs, and MACs 2000, Cco Systems, Inc. Cco.com 9 The primary purpose of to permit hosts to communicate their desire to receive multicast traffic to the IP Multicast router(s) on the local network. Th, in turn, permits the IP Multicast router(s) to Join the specified multicast group and to begin forwarding the multicast traffic onto the network segment. The initial specification for (v1) was documented in RFC 1112, Host Extensions for IP Multicasting. Since that time, many problems and limitations with v1 have been dcovered. Th has lead to the development of the v2 specification which was ratified in November, 1997 as RFC Even before v2 had been ratified, work on the next generation of the protocol, v3, had already begun. However, the v3 specification still in the working stage and has not been implemented by any vendors. Copyright Cco Systems, Inc. 9
10 v1 RFC 1112 Host extensions for IP Multicasting Membership Queries Querier sends query messages to with ttl = 1 One router on LAN designated/elected to send queries Query interval seconds Membership Reports report sent by one host suppresses sending by others Restrict to one report per group per LAN Unsolicited reports sent by host, when it first joins the group 2000, Cco Systems, Inc. Cco.com 10 Membership Queries v1 Membership Queries are sent by the router to the All-Hosts ( ) multicast address to solicit what multicast groups have active receivers on the local network. Membership Reports v1 Membership Reports are sent by hosts whing to receive traffic for a specific multicast group. Membership Reports are sent (with a TTL of 1) to the multicast address of the group for which the hosts whes to receive traffic. Hosts either send reports asynchronously (when the wh to first join a group) or in response to Membership Queries. In the latter case, the response used to maintain the group in an active state so that traffic for the group continues to be forwarded to the network segment. Report Suppression TTL Report suppression used among group members so that all members do not have to respond to a query. Th saves CPU and bandwidth on all systems. The rule in multicast membership that as long as one member present, the group must be forwarded onto that segment. Therefore, only one member present required to keep interest in a given group so report suppression efficient. Since Membership Query and Report packets only have local significance, the TTL of these packets are always set to 1. Th also so they will not be accidentally forwarded off of the local subnet and cause confusion on other subnets. Copyright Cco Systems, Inc. 10
11 v1 Packet Format Ver Type Unused Checksum Group Address Ver: Code Version = 1 Type: 1 = Host Membership Query 2 = Host Membership Report Group Address: Multicast Group Address 2000, Cco Systems, Inc. Cco.com 11 Version the version and should be 0x1 in v1. Th field has been merged with the Type field in v2 and eliminated. Type the message type. Group 0x1 = Host Membership Query 0x2 = Host Membership Report Th field has been expanded into an 8 bit field in v2. the Multicast Group address being specified for reports. Copyright Cco Systems, Inc. 11
12 v1 Joining a Group H1 H H3 Report v1 Joining member sends report to immediately upon joining 2000, Cco Systems, Inc. Cco.com 12 Asynchronous Joins Members joining a group do not have to waited for a query to join; they send in an unsolicited report indicating their interest. Th reduces join latency for the end system joining if no other members are present. Copyright Cco Systems, Inc. 12
13 v1 General Queries H1 H2 H3 v1 General Query to Multicast Router Periodically sends General Queries to to determine memberships 2000, Cco Systems, Inc. Cco.com 13 General Queries General Queries go to the All-Hosts ( ) multicast address. One member from each group on the segment will respond with a report. General Queries are sent out periodically based on the setting of the ip igmp query-interval command. (The default setting 60 seconds.) Querier There no formal Query Router election process within v1 itself. Instead, the election process left up to the multicast routing protocol and different protocols used different mechanms. Th often results in multiple queriers on a single multi-access network. Copyright Cco Systems, Inc. 13
14 v1 Maintaining a Group X Suppressed #3 H H H3 Report #2 X Suppressed #3 v1 Query to #1 #1 Router sends periodic queries #2 One member per group per subnet reports #3 Other members suppress reports 2000, Cco Systems, Inc. Cco.com 14 Query-Response Process The router multicasts periodic v1 Membership Queries to the All-Hosts ( ) group address. Only one member per group responds with a report to a query. Th to save bandwidth on the subnet network and processing by the hosts. Th process called Response Suppression. (See below.) Response Suppression Mechanm The Report Suppression mechanm accomplhed as follows: When a host receives the Query, it starts a count-down timer for each multicast group of which it a member. The count-down timers are each initialized to a random count within a given time range. (In v1 th was a fixed range of 10 seconds. Therefore the count-down timers were randomly set to some value between 0 and 10 seconds.) When a count-down timer reaches zero, the host sends a Membership Report for the group associated with the count-down timer to notify the router that the group still active. However, if a host receives a Membership Report before its associated count-down timer reaches zero, it cancels the count-down timer associated with the multicast group, thereby suppressing its own report. In the example shown in the slide, H2 s time expired first so it responded with its Membership Report. H1 and H3 cancelled their timers associated with the group; thereby suppressing their reports. Copyright Cco Systems, Inc. 14
15 v1 Leaving a Group H1 H2 H3 v1 Query to Router sends periodic queries Hosts silently leave group Router continues sending periodic queries No Reports for group received by router Group times out 2000, Cco Systems, Inc. Cco.com 15 v1 Leaves There was no special Leave mechanm defined in Version 1 of. Instead, v1 hosts leave a group "passively" or "quietly" at any time without any notification to the router. Th not a problem if there are multiple member present because the multicast flow still must be delivered to the segment. However, when the member leaving the last member, there will be a period when the router continues to forward the multicast traffic onto the segment needlessly since there are no members left. It was up to the Query router to timeout the Group after several Query Intervals pass without a response for a Group. Th inefficient - especially if the number of groups and/or the traffic in these groups high. Copyright Cco Systems, Inc. 15
16 RFC 2236 v2 Group-specific query Router sends Group-specific queries to make sure there are no members present before stopping to forward data for the group for that subnet Leave Group message Host sends leave message if it leaves the group and the last member (reduces leave latency in comparon to v1) 2000, Cco Systems, Inc. Cco.com 16 v2 As a result of some of the limitations dcovered in v1, work was begun on v2 in an attempt to remove these limitations. Most of the changes between v1 and v2 are primarily to address the sues of Leave and Join latencies as well as address ambiguities in the original protocol specification. (v2 almost to standard status.) The following sections define some of the more significant changes. Group Specific Queries A Group Specific query was added in v2 to allow the router to only query membership in a single group instead of all groups. Th an optimized way to quickly find out if any members are left in a group without asking all groups for a report. The difference between the Group Specific query and the General Query that a General Query multicast to the All-Hosts ( ) address while a Group Specific query for Group G, multicast to the Group G multicast address. Leave Group message A Leave Group message was also added in v2. Th allows end systems to tell the router they are leaving the group which reduces the leave latency for the group on the segment when the member leaving the last member of the group. The standard loosely written on when leave group messages should and must be sent. Th an important consideration when dcussing CGMP. Copyright Cco Systems, Inc. 16
17 v2 (cont.) Querier election mechanm On multi-access networks, an Querier router elected based on lowest IP address. Only the Querier router sends Queries. Query-Interval Response Time General Queries specify Max. Response Time which inform hosts of the maximum time within which a host must respond to General Query. (Improves burstiness of the responses.) Backward compatible with v1 2000, Cco Systems, Inc. Cco.com 17 Querier Election itself now has a Querier election mechanm unlike v1. The lowest unicast IP address of the -speaking routers will be elected as the Querier. All speaker come up thinking they will be the querier but must immediately relinquh that role if a lower IP address query heard on the same segment. Query-Interval Response Time The Query-Interval Response time has also been added to control the burstiness of reports. Th value indicated in queries to convey to the membership how much time they have to respond to a query with a report. Copyright Cco Systems, Inc. 17
18 v2 Packet Format Type Max. Resp. Checksum Time Group Address Type: 0x11 = Membership Query 0x12 = Version 1 Membership Report 0x16 = Version 2 Membership Report 0x17 = Leave Group Max. Resp. Time max. time before sending a responding report in 1/10 secs. (Default = 10 secs) Group Address: Multicast Group Address ( for General Queries) 2000, Cco Systems, Inc. Cco.com 18 Type In v2, the old 4 bit Version field was merged with the old 4 bit Type field to create a new 8 bit Type field. By assigning v2 type codes 0x11 and 0x12 as the Membership Query (V1 & V2) and the V1 Membership Report respectively, backwards compatibility of v1 and v2 packet formats was maintained. Max. Response Time Th new field allows the querying router to specify exactly what the Query Interval Response Time for th Query. The value (in 1/10 seconds) used by the v2 hosts as the upper bound when randomly choosing the value of their response timers. Th helps to control the burstiness of the responses during the Query-Response interval. Group Address Th field identical to the v1 version of th field with the exception that it set to for General Queries. Copyright Cco Systems, Inc. 18
19 v2 Joining a Group H H2 H3 Report rtr-a Joining member sends report to immediately upon joining (same as v1) 2000, Cco Systems, Inc. Cco.com 19 Asynchronous Joins Members joining a group do not have to waited for a query to join; they send in an unsolicited report indicating their interest. Th reduces join latency for the end system joining if no other members are present. Copyright Cco Systems, Inc. 19
20 v2 Joining a Group H1 H2 H State in rtr-a rtr-a rtr-a>show ip igmp group Connected Group Membership Group Address Interface Uptime Expires Last Reporter Ethernet0 6d17h 00:02: , Cco Systems, Inc. Cco.com 20 State in rtr-a Group active on Ethernet 0 and Has been active on th interface for 6 days and 17 hours. It expires (and will be deleted) in 2 minutes and 31 seconds if an Host Membership report for th group not heard in that time. The last Host to report membership was (H2). Copyright Cco Systems, Inc. 20
21 v2 Querier Election H1 H2 H3 Query Non-Querier rtr-b v rtr-a Intially all routers send out a Query Query Router w/lowest IP address elected querier Other routers become Non-Queriers Querier 2000, Cco Systems, Inc. Cco.com 21 Querier Election In v1 there was no formal querying router election process in within v1 itself - it was left up to the multicast routing protocol and different protocols used different mechanms. Th would often result in multiple queriers on a single multiaccess network. With the definition of v2 a formal querying router election process was specified within the v2 protocol itself. In v2 each router on a multiaccess network will initially assume it the querier and begin sending queries. Each router will see the queries from the other v2 routers and will examine the IP address of these queries. All v2 routers will then defer to the router with the lowest IP address. In other words, the v2 router with the lowest IP address will become the querying router. Finally, if the currently elected Query Router fails to sue a query within a specified time limit, a timer in the other v2 routers will time-out and cause them to re-initiate the Query Election process. Group Specific Queries v2 also added the concept of Group Specific Queries. Th accomplhed by sending the v2 Membership Query to the Group s multicast address as opposed to sending to the All Hosts ( ) multicast address as done for v2 General Queries. Query Interval Membership queries are sent every 60 seconds (default). Copyright Cco Systems, Inc. 21
22 v2 Querier Election Determining which router the Querier rtr-a>show rtr-a>show ip ip igmp igmp interface interface e0 e0 Ethernet0 Ethernet0 up, up, line line protocol protocol up up Internet Internet address address , , subnet subnet mask mask enabled enabled on on interface interface Current Current version version 2 2 CGMP CGMP dabled dabled on on interface interface query query interval interval seconds seconds querier querier timeout timeout seconds seconds max max query query response response time time seconds seconds Inbound Inbound access access group group not not set set Multicast Multicast routing routing enabled enabled on on interface interface Multicast Multicast TTL TTL threshold threshold 0 0 Multicast Multicast designated designated router router (DR) (DR) (th (th system) system) querying querying router router (th (th system) system) Multicast Multicast groups groups joined: joined: , Cco Systems, Inc. Cco.com 22 Verifying the v2 Querier Use the show ip igmp interface command to determine which router the v2 Querier on the multiaccess network. Note that the Designated Router a different function and lted separately in the dplay above. Copyright Cco Systems, Inc. 22
23 X Suppressed v2 Maintaining a Group H H H3 Report X Suppressed Query v2 Router sends periodic queries One member per group per subnet reports Other members suppress reports 2000, Cco Systems, Inc. Cco.com 23 Query-Response Process The router multicasts periodic v1 Membership Queries to the All-Hosts ( ) group address. Only one member per group responds with a report to a query. Th to save bandwidth on the subnet network and processing by the hosts. Th process called Response Suppression. (See section below.) Response Suppression Mechanm The Report Suppression mechanm accomplhed as follows: When a host receives the Query, it starts a count-down timer for each multicast group of which it a member. The count-down timers are each initialized to a random count within a given time range. (In v1 th was a fixed range of 10 seconds. Therefore the count-down timers were randomly set to some value between 0 and 10 seconds.) When a count-down timer reaches zero, the host sends a Membership Report for the group associated with the count-down timer to notify the router that the group still active. However, if a host receives a Membership Report before its associated count-down timer reaches zero, it cancels the count-down timer associated with the multicast group, thereby suppressing its own report. In the example shown in the slide, H2 s time expired first so it responded with its Membership Report. H1 and H3 cancelled their timers associated with the group; thereby suppressing their reports. Copyright Cco Systems, Inc. 23
24 v2 Leaving a Group H1 H2 H3 rtr-a State in rtr-a before Leave rtr-a>sh ip igmp group Connected Group Membership Group Address Interface Uptime Expires Last Reporter Ethernet0 6d17h 00:02: , Cco Systems, Inc. Cco.com 24 v2 Leaves In the above example, notice that the router aware that there one or more members of group active on Ethernet0 and that Host 2 responded with a Group Membership Report for th group during the last General Query interval. (Indicated by the IP address of Host 2 in the Last Reporter field.) Copyright Cco Systems, Inc. 24
25 v2 Leaving a Group H H H3 #1 Leave to #3 Report to rtr-a H2 leaves group; sends Leave message Router sends Group specific query A remaining member host sends report Group remains active Group Specific Query to #2 2000, Cco Systems, Inc. Cco.com 25 v2 Leaves In v1, hosts would leave passively - i.e.. they do not explicitly say they are leaving - they just stop reporting. However, v2 has explicit Leave Group messages. When the v2 Query router receives a Leave Message, it responds by sending a Group Specific Query for the associated group to see if there are still other hosts whing to receive traffic for the group. Th process helps to reduce overall Leave Latency. When CGMP in use, the v2 Leave Message mechanm also helps the router to better manage the CGMP state in the switch. Th also improves the leave latency for the specific host at layer 2. (Note: Due to the wording of the current v2 draft specification, hosts may chose to NOT send Leave messages if they are not the last host to leave the group. Th can adversely affect CGMP performance.) Example : H2 and H3 are members of group #1 - H2 leaves #2 - Router sends group specific query to see if any other group members are present. #3 - H3 hasn t left yet so it responds with a Report message. Router keeps sending multicast for since there >= 1 member present Copyright Cco Systems, Inc. 25
26 v2 Leaving a Group H1 H2 H3 rtr-a State in rtr-a after H2 Leaves rtr-a>sh ip igmp group Connected Group Membership Group Address Interface Uptime Expires Last Reporter Ethernet0 6d17h 00:01: , Cco Systems, Inc. Cco.com 26 v2 Leaves At th point, the group still active. However, the router shows that Host 3 the last host to send an Group Membership Report. Copyright Cco Systems, Inc. 26
27 v2 Leaving a Group H1 H2 H3 rtr-a Leave to Last host leaves group; sends Leave message Router sends Group specific query No report received Group times out #1 Group Specific Query to #2 2000, Cco Systems, Inc. Cco.com 27 v2 Leaves Example (continued): H3 the only remaining member of group #1 - H3 leaves #2 - Router sends group specific query to see if any other group members are present. H3 was the last remaining member of the group so no Membership Report for group received and the group times out. (Th typically takes from 1-3 seconds from the time that the Leave message sent until the Group Specific Query times out and traffic stops flowing.) Copyright Cco Systems, Inc. 27
28 v2 Leaving a Group H1 H2 H3 rtr-a State in rtr-a after H3 Leaves rtr-a>show ip igmp group Connected Group Membership Group Address Interface Uptime Expires Last Reporter 2000, Cco Systems, Inc. Cco.com 28 v2 Leaves At th point, all hosts have left the group on Ethernet0. Th indicated by rtr-a above.in the output of the show ip igmp group command. Copyright Cco Systems, Inc. 28
29 v2 Response Tuning Query Query Query Resp. Interval Query Interval Query Response Interval Host Membership Reports (assuming 18 active Groups) Report suppression mechanm tends to spread Reports out over the entire Query Response Interval 2000, Cco Systems, Inc. Cco.com 29 v2 Query-Response Tuning Because random report timers are set on all hosts and report suppression in effect - the reports are randomly dtributed over the query response time interval instead of coming all at once. The query response interval specified by the querying router as a guide for the end systems to set an upper bound on the random timer they will set for a report. Copyright Cco Systems, Inc. 29
30 v2 Response Tuning Query Query Query Query Resp. Interval Query Interval Query Resp. Interval Query Interval Query Resp. Interval Query Query Query Query Resp. Interval Query Interval Query Resp. Interval Query Interval Query Resp. Interval Increasing the Query Response Interval will spread out Reports; decreasing Burstiness. 2000, Cco Systems, Inc. Cco.com 30 v2 Query Response Tuning (cont.) The advantage of increasing the Query Interval and Query Response Interval less overhead and bandwidth on the segment and less work for the routers and end systems to maintain the groups. The dadvantage for setting these intervals longer the detection of router failures in redundant multicast router environments. Th a common tradeoff in most routing protocols. Short "keepalive" intervals mean more overhead and work but allow for faster convergence in failure scenarios. Copyright Cco Systems, Inc. 30
31 v2 Response Tuning interface Ethernet 0 ip pim sparse ip igmp query-max-response-time 20 Tuning the Query Response Interval (Default = 10 secs) interface Ethernet 0 ip pim sparse ip igmp query-interval 120 Tuning the Query Interval (Default = 60 secs) 2000, Cco Systems, Inc. Cco.com 31 Query Response Tuning (cont.) Use default settings when possible. Tune with care! Copyright Cco Systems, Inc. 31
32 v2 Response Tuning Verifying v2 Response Tuning Values jabber>show jabber>show ip ip igmp igmp interface interface e0 e0 Ethernet0 Ethernet0 up, up, line line protocol protocol up up Internet Internet address address , , subnet subnet mask mask enabled enabled on on interface interface Current Current version version 2 2 CGMP CGMP dabled dabled on on interface interface query query interval interval seconds seconds querier querier timeout timeout seconds seconds max max query query response response time time seconds seconds Inbound Inbound access access group group not not set set Multicast Multicast routing routing enabled enabled on on interface interface Multicast Multicast TTL TTL threshold threshold 0 0 Multicast Multicast designated designated router router (DR) (DR) (th (th system) system) querying querying router router (th (th system) system) Multicast Multicast groups groups joined: joined: , Cco Systems, Inc. Cco.com 32 Checking Response Tuning Use the show ip igmp interface command to verify that the values are correct when you perform Response Tuning. In the above example, the Query Interval has been set to 120 seconds while the Max. Query Response Time set to 20 seconds. Copyright Cco Systems, Inc. 32
33 v1-v2 Interoperability v1 H1 v2 H2 v1 H3 v1 Report #2 Host H2: v v1 Query #1 MUST always send v1 Reports MAY suppress v2 Leaves 2000, Cco Systems, Inc. Cco.com 33 v1-v2 Interoperability v1 routers will not recognize v2 Membership Reports. Therefore, when v2 hosts are present on the same network as an v1 router (which serving as the query router), the v2 capable hosts MUST send v1 Membership Reports so the v1 router will recognize them. In addition, if the router running v1, it makes no sense for hosts to send Leave Messages. However, it will not hurt if they do. Copyright Cco Systems, Inc. 33
34 v1-v2 Interoperability v2 H1 v1 H2 v2 H Report Router A: v Router A MUST set a timer noting v1 member present for Group MUST Ignore any v2 Leaves for Group (until timer expires) 2000, Cco Systems, Inc. Cco.com 34 v1-v2 Interoperability (cont.) If the query router running v2, it must be able to recognize when v1 hosts are present since v1 hosts do not have advanced v2 query response interval awareness. Furthermore, in th situation an v2 must ignore any v2 Leave Messages since the v1 hosts present will not be able to recognize nor respond to v2 Group Specific queries. If the router were to process the Leave Message, send out an v2 Group Specific query and the only remaining host in the group was an v1 host, the group would be pruned when it should not have been. Copyright Cco Systems, Inc. 34
35 v1-v2 Interoperability H1 H2 H v2 v1 Router A: Router A Router B Must be manually configured to use v1 on th interface. 2000, Cco Systems, Inc. Cco.com 35 v1-v2 Interoperability (cont.) All routers on a network segment must run the same version of!!!! By default, IOS will run v2. If there are other v1 routers on the network segment, the Cco router MUST be manually configured to run v1. The IOS configuration command used to manually configure the version on an interface : ip igmp version 1 2 Note that in IOS versions prior to 11.1, the router would automatically attempt to ascertain the proper version of to run on an interface. Unfortunately, there are many corner cases which make th problematic and prone to error. Therefore, as of IOS version 11.1, it necessary to perform th task manually with the above command. Copyright Cco Systems, Inc. 35
36 v1-v2 Interoperability Determining which version running on an interface rtr-a>show rtr-a>show ip ip igmp igmp interface interface e0 e0 Ethernet0 Ethernet0 up, up, line line protocol protocol up up Internet Internet address address , , subnet subnet mask mask enabled enabled on on interface interface Current Current version version 2 2 CGMP CGMP dabled dabled on on interface interface query query interval interval seconds seconds querier querier timeout timeout seconds seconds max max query query response response time time seconds seconds Inbound Inbound access access group group not not set set Multicast Multicast routing routing enabled enabled on on interface interface Multicast Multicast TTL TTL threshold threshold 0 0 Multicast Multicast designated designated router router (DR) (DR) (th (th system) system) querying querying router router (th (th system) system) Multicast Multicast groups groups joined: joined: , Cco Systems, Inc. Cco.com 36 Verifying the Version on an Interface Use the show ip igmp interface command to determine which version of currently active on an interface. Th indicated by the line in the above example that says Current version 2 Copyright Cco Systems, Inc. 36
37 v3 (future) draft-ietf-idmr-igmp-v3-??.txt In design phase Enables hosts to lten only to a specified subset of the hosts sending to the group 2000, Cco Systems, Inc. Cco.com 37 v3 (future) As v2 nears ratification, the IDMR has already begun work on v3. While it very premature to speculate on the details of the enhancements to th protocol, it known that one of the goals of the IDMR to specify a mechanm in v3 to allow hosts to indicate that they only wh to receive traffic from a particular source(s) within a multicast group. Copyright Cco Systems, Inc. 37
38 v3 (future) Source = Group = R1 R2 Source = Group = H1 wants to receive from S = but not from S = With, specific sources can be pruned back - S = in th case R3 v3: Join , Leave , H1 - Member of , Cco Systems, Inc. Cco.com 38 v3 Example (future) In th example, host H1 has joined group but only whes to receive traffic from Source Using an as yet unspecified v3 mechanm, the host can inform the designated router, R3, that it only interested in multicast traffic from Source for Group Router R3 could then potentially prune th specific (S,G) traffic source. Copyright Cco Systems, Inc. 38
39 L2 Multicast Frame Switching Problem: Layer 2 Flooding of Multicast Frames Typical L2 switches treat multicast traffic as unknown or broadcast and must flood the frame to every port Static entries can sometimes be set to specify which ports should receive which group(s) of multicast traffic Dynamic configuration of these entries would cut down on user admintration 2000, Cco Systems, Inc. Cco.com PIM Multicast M 39 L2 Multicast Switching For most L2 Switches, Multicast traffic normally treated like an unknown MAC address or Broadcast frame which causes the frame to be flooded out every port within a VLAN at rates of over 1 Mbps. Th fine for unknowns and broadcasts but as we have seen earlier, IP Multicast hosts may join and be interested in only specific multicast groups. Again, on most L2 Switches, all th traffic forwarded out all ports resulting in wasted bandwidth on both the segments and on the end stations. One way around th on Catalyst Switches using the Command Line Interface to program the switch manually to associate a multicast MAC address with say ports 5,6,7 so only ports 5,6,and 7 receive the multicast traffic destined for the multicast group. Th works fine but again we know IP Multicast hosts dynamically join and leave groups using to signal to the Multicast Router. Th static way of entering the multicast information not very scaleable. Dynamic configuration of the Switches forwarding tables would be a better idea, and cut down on user admintration. Copyright Cco Systems, Inc. 39
40 L2 Multicast Frame Switching Solution 1: Snooping Switches become aware packets intercepted by the NMP or by special hardware ASICs Switch must examine contents of messages to determine which ports want what traffic membership reports leave messages Impact on switch: Must process ALL Layer 2 multicast packets Admin. load increases with multicast traffic load Requires special hardware to maintain throughput PIM 2000, Cco Systems, Inc. Cco.com 40 Solution 1: Snooping As its name implies, switch become aware and lten in on the conversations between hosts and routers. Th requires the processor in the switch to identify and intercept a copy of all packets flowing between router and hosts and vice versa. Th includes: Membership Reports Leaves If care not taken as to how Snooping implemented, a switch may have to intercept ALL layer 2 multicast packets in order to identify packets. Th can have a significant impact on the switch s performance. Proper designs require special hardware to avoid th problem. Th can directly affect the overall cost of the switch. Copyright Cco Systems, Inc. 40
41 Typical L2 Switch Architecture Router A 1 LAN Switch CPU 0 Switching Engine CAM Table MAC Address Port d0e Host , Cco Systems, Inc. Cco.com Host 2 Host 3 Host 4 ( d0e) 41 Typical Layer 2 Switch Most Layer 2 switches const of the following components: Switching Engine - Used to actually perform switching of packets from the input port to the output port(s) under the control of the Contents Addressable Memory (CAM) Table. If there no entry in the CAM Table that matches the destination MAC address, the Switching Engine will flood the packet to all ports in an attempt to insure that the packet reaches the destination. CAM Table - The information in th table used to control the operation of the Switching Engine. Each entry in th table contains a Layer 2 destination MAC address and output port(s) where packets addressed to th destination should be switched. CPU - The switch s main CPU populates the CAM Table with destination MAC addresses so that packets can be switched efficiently by the Switching Engine. The CPU learns the ports associated with a particular MAC address by watching arriving traffic sent by hosts. It then populates the CAM Table with th learned information. (Switches can typically also be instructed to populate the CAM Table with specific MAC address to port mapping information via configuration commands.) In the example shown above, the switch has learned the port (port 5) associated with Host 4 s MAC address ( d0e). Th information has been stored by the CPU in the CAM Table. Because of th CAM Table entry, packets arriving with Host 4 s MAC address as the destination are being switched by the Switching Engine to port 5 as can be seen in the drawing above. In the next few pages, we will see how th simply Layer 2 architecture might be used to implement Snooping and its potential impact on the switch. Copyright Cco Systems, Inc. 41
42 Typical L2 Switch 1st Join LAN Switch CPU 0 Router A 1 ( Snooping Enabled) Switching Engine Report CAM Table MAC Address Ports e ,1,2 Entry Added Host 1 Host , Cco Systems, Inc. Cco.com Host 3 Host 4 42 Snooping in L2 Switches In the above example, the CPU has been programmed to perform Snooping. Th requires the CPU to lten to all traffic and then add an appropriate Layer 2 multicast MAC address to the CAM Table in order to constrain the IP Multicast traffic to only those ports that require the traffic. Initially, when the first host (Host 1) joins group , there no entry in the CAM table associated with the Layer 2 MAC address equivalent to th group address. Therefore, the initial Group Membership Report sent by Host 1 flooded to all ports including the switch s CPU and the Router. Overhearing th, the CPU populates the CAM table with an entry of 0x0100.5e which the L2 MAC address equivalent of IP multicast address Additionally, th entry populated with the port associated with Host 1 (port 2) as well as the Router and the CPU ports (ports 0 and 1). The CPU port must be included in order for the Switching Engine to continue to forward any further messages addressed to th group to the CPU for processing. Copyright Cco Systems, Inc. 42
43 Typical L2 Switch 2nd Join LAN Switch CPU Router A 1 ( Snooping Enabled) Switching 0 Engine Report CAM Table MAC Address Ports e ,1,2,5 Port Added Host , Cco Systems, Inc. Cco.com Host 2 Host 3 Host 4 43 Snooping in L2 Switches Now let s assume that a second host (Host 4) also joins the group by sending an Report to group Because of the CAM Table entry for 0x0100.5e , th Report constrained to only Host 1, the router and the CPU. When the CPU receives the Report, it simply adds the port (port 5) on which Host 4 connected to the CAM Table entry. Th results in ports 0, 1, 2 and 5 being associated with the multicast MAC address 0x0100.5e Copyright Cco Systems, Inc. 43
44 Typical L2 Switch Meltdown! 1.5Mbps!!! Choke, Gasp, Wheeze!! LAN Switch CPU Router A 1 ( Snooping Enabled) Switching 0 Engine CAM Table 1.5Mbps MPEG Video MAC Address Ports e ,1,2,5 Host 1 Host 2 (MPEG Server) 2000, Cco Systems, Inc. Cco.com Host 3 Host 4 44 Snooping in L2 Switches Let us now assume that Host 1 begins transmitting a 1.5Mbps MPEG video stream to multicast group Because the destination MAC address of th stream maps to 0x0100.5e , the Switching Engine dutifully switches th traffic to Host 4, the Router and the CPU! In most cases, the switch s CPU does not have sufficient horsepower to keep up with th high rate flow of multicast traffic and switch performance can suffer. In some cases, the switch can actually fail under such loads. Summary Snooping can be (and often ) implemented in low-end, Layer-2 only switches using techniques similar to the above. While th fine for extremely low data-rate multicast flows or carefully orchestrated vendor demonstrations of their switch s Snooping feature, it generally inadequate for real-world use. Copyright Cco Systems, Inc. 44
45 L3 Aware Switch Router A LAN Switch CPU 1 ( Snooping Enabled) Switching Engine 0 (w/l3 ASICs) CAM Table MAC Address L3 Ports exx.xxxx Host 1 Processing Entry 2000, Cco Systems, Inc. Cco.com Host 2 Host 3 Host 4 45 Snooping in L3-aware Switches In order to properly implement Snooping on a switch without suffering performance degradation, it necessary to make the switch Layer 3 aware. Th typically accomplhed adding Layer 3 ASIC s to the Switching Engine in addition to extending the CAM Table so that entries may contain additional Layer 3 information that can be used to make switching decions. (In case it not obvious, th means the switch will cost more money.) In the above example, we have just such a Layer-3 aware switch that has been programmed to perform Snooping using some of the added Layer 3 capabilities in the switch s architecture. In order to accomplh th, the CPU populates the CAM Table with a special entry to capture any and all packets. There can be many ways to do th but in the example above, the CAM Table entry contains a wildcard MAC address that will match on any IP multicast address. Furthermore, the Layer 3 part of the packet must contain an protocol packet in order for the entry to match and cause the packet to be switched to the CPU Copyright Cco Systems, Inc. 45
46 L3 Aware Switch 1st Join Router A LAN Switch CPU 1 ( Snooping Enabled) 0 Switching Engine (w/l3 ASICs) CAM Table MAC Address L3 Ports exx.xxxx e ! 1,2 Report , Cco Systems, Inc. Cco.com Host 1 Host 2 Host 3 Host 4 46 Snooping in L3-aware Switches Let s assume that the first host (Host 1) now joins group and signals th by sending an Report. Th report matches on the first entry in the CAM Table and switched to the CPU. The CPU responds by forwarding the packet on to the Router (for normal processing) and then adds a second entry to the CAM table to switch group traffic to Host 1 and the Router (ports 1 and 2). Th second entry will match IFF: The packet addressed to multicast MAC address 0x0100.5e (the Layer 2 equivalent to group address ) and The packet not and packet. Copyright Cco Systems, Inc. 46
47 L3 Aware Switch 2nd Join LAN Switch CPU Router A 1 ( Snooping Enabled) 0 Switching Engine (w/l3 ASICs) Report CAM Table MAC Address L3 Ports exx.xxxx e ! 1,2, Port Added 2000, Cco Systems, Inc. Cco.com Host 1 Host 2 Host 3 Host 4 47 Snooping in L3-aware Switches Now let s assume that again Host 4 the second host to join and therefore sends an Report to Once again, the Report matches on the first entry and switched to the CPU. The CPU responds by forwarding a copy of the Report to the Router and by adding the port associated with Host 4 (port 5) to the port lt in the second CAM Table entry. Copyright Cco Systems, Inc. 47
48 L3 Aware Switch Ahhh, That s Router A more like it! 1 LAN Switch ( Snooping Enabled) Switching Engine CPU 0 (w/l3 ASICs) CAM Table MAC Address L3 Ports exx.xxxx e ! 1,2,5 1.5Mbps MPEG Video , Cco Systems, Inc. Cco.com Host 1 Host 2 Host 3 Host 4 48 Snooping in L3-aware Switches In the final step of our example, Host 1 once again starts up the 1.5Mbps MPEG video stream to group Packets in th stream will not match on the first CAM Table entry but instead will match on the second entry. Therefore, the video stream switched to only Host 4 and the Router and the CPU not burdened with th unwanted data stream. Summary In order to construct a switch that capable of Snooping without suffering a performance hit, the switch must use special Layer 3 ASIC or some similar technique. Th increases the overall cost of the switch. Copyright Cco Systems, Inc. 48
49 L2 Multicast Frame Switching Solution 2: CGMP Cco Group Multicast Protocol Runs on both the switches and the router Router sends CGMP multicast packets to the switches at a well known multicast MAC address: cdd.dddd CGMP packet contains : Type field Join or Leave MAC address of the client Multicast address of the group Switch uses CGMP packet info to add or remove an entry for a particular multicast MAC address CGMP Commands PIM 2000, Cco Systems, Inc. Cco.com 49 Solution 2: CGMP CGMP based on a client server model where the router can be considered a CGMP server and the switch taking on the client role. There are software components running on both devices, with the router translating messages into CGMP commands which are then executed on the Catalyst 5000 NMP and used to program the EARL s forwarding tables with the correct Multicast entries. Since the hosts and routers use well-known IP Multicast Addresses, the EARL can be preprogrammed to direct Control packets both to the router and the NMP. We will see the NMPs use of these control packets in a later slide. The bas of CGMP that the IP Multicast router sees all packets and therefore can inform the switch when specific hosts join or leave Multicast groups. The switch then uses th information to program it s forwarding table. When the router sees an control packet it creates a CGMP packet that contains the request type (Join or Leave), the Layer 2 Multicast MAC Address, and the actual MAC address of the client. Th packet sent to a well known address which all CGMP switches lten on. It then interpreted and the proper entries created in the switch s CAM Table to constrain the forwarding of multicast traffic for th group. Copyright Cco Systems, Inc. 49
50 CGMP Basics Report Dst MAC = e Src MAC = 0080.c7a Dst IP = Src IP = Group = /1 1/1 5/1 5/1 CGMP Join USA = 0080.c7a GDA = e (a) (b) 2000, Cco Systems, Inc. Cco.com 50 CGMP Example In th example - the client will asynchronously send an Membership Report when it wants to join the group. The Router converts th Membership Report into a CGMP Join containing: USA - Unicast Source Address GDA - Group Destination Address The CGMP Join multicast to a well-known (non-ip) multicast MAC address which the switch ltens on. Copyright Cco Systems, Inc. 50
51 CGMP Packet Format Ver Type Reserved Count GDA GDA USA USA Ver (4 bits): Only version 1 currently recognized and supported Type (4 bits): 0 = Join, 1 = Leave Reserved (2 bytes): Must be set to 0 and ignored Count (1 byte): Number of GDA/USA pairs in the packet GDA (6 bytes): Group Destination Address - IEEE MAC level canonical format USA (6 bytes): Unicast Source Address - IEEE MAC-level canonical format 2000, Cco Systems, Inc. Cco.com 51 CGMP Packet Format All CGMP packets encapsulated in SNAP frames using Cco s ORG ID (0x00000c) with an Ethertype of 2001: Mac Header Header: aa aa 03 SNAP Header c CGMP Header Most sniffers and software capture programs do not decode CGMP (have fun with the hex decodes) Copyright Cco Systems, Inc. 51
52 CGMP 1st Join Simple LAN Switch CPU 0 Router A Switching Engine 1 Report CAM Table MAC Address Ports Host 1 Host c7a , Cco Systems, Inc. Cco.com Host 3 Host 4 52 CGMP Implementation in L2 switches Because the switch relies on the Router to asst in the process of constraining IP multicast traffic at Layer 2, it can be implemented very easily in low-end, Layer2 only switches. In the above CGMP example, the first host (Host 1) joins multicast group by sending an Membership Report. Because there no matching entry in the CAM Table, the Membership Report flooded to all ports including the Router who processes the Report. Copyright Cco Systems, Inc. 52
53 CGMP 1st Join Router A Simple LAN Switch CPU 0 Switching Engine 1 CAM Table CGMP Join USA 0080.c7a GDA e MAC Address Ports e ,2 Entry Added Host 1 Host c7a , Cco Systems, Inc. Cco.com Host 3 Host 4 53 CGMP Implementation in L2 switches In addition to performing normal processing of the Membership Report, the Router also converts it into a CGMP Join message containing the MAC address of the host that sent the Report (Host 1) in the USA field and the Layer 2 MAC address equivalent of group in the GDA field. Th CGMP Join message then multicast back to the switch. When the switch receives the CGMP Join, it uses the host address in the USA field to determine the port where the Host resides. Th done by scanning the CAM table for the hosts MAC address to obtain the associated port number. (Th step not shown in the example above.) The CPU then populates its CAM Table with an entry containing the multicast MAC address from the GDA field and the port number of the host that joined along with the port numbers of any routers connected to the switch. Note: The CPU has many ways to determine which ports have routers attached. These include ltening for DVMRP Probes, PIM Hellos, and Queries. Copyright Cco Systems, Inc. 53
54 CGMP 2nd Join Simple LAN Switch CPU 0 Router A Switching Engine 1 Report CAM Table MAC Address Ports e , , Cco Systems, Inc. Cco.com Host 1 Host 2 Host 3 Host c7b CGMP Implementation in L2 switches Next, let s assume that (once again) Host 4 the second host to join group and signals th by sending an Report to Because the Report sent to group , the MAC destination address 0x0100.5e which matches on the first entry in the CAM Table shown above. Th results in the Report being sent to Host 1 and the Router. Copyright Cco Systems, Inc. 54
55 CGMP 2nd Join Router A Simple LAN Switch CPU 0 Switching Engine 1 CAM Table CGMP Join USA 0080.c7b GDA e MAC Address Ports e ,2, Port Added 2000, Cco Systems, Inc. Cco.com Host 1 Host 2 Host 3 Host c7b CGMP Implementation in L2 switches In addition to performing normal processing of the Membership Report, the Router again converts it to a CGMP Join message containing the MAC address of Host 4 in the USA field and the Layer 2 MAC address equivalent of group in the GDA field. The resulting CGMP Join message then multicast back to the switch. When the switch receives th CGMP Join, it again uses the host address in the USA field to determine the port where the Host resides. (In th case, port 5.) The CPU then adds port 5 to the port lt in the exting CAM Table entry associated with the multicast MAC address from the GDA field. Copyright Cco Systems, Inc. 55
56 CGMP No Load on Switch Router A Simple LAN Switch CPU 0 Switching Engine 1 CAM Table 1.5Mbps MPEG Video MAC Address Ports e ,2, Host 1 Host 2 Host 3 (MPEG Server) 2000, Cco Systems, Inc. Cco.com Host 4 56 CGMP Implementation in L2 switches In our final drawing of the example, Host 1 again begins sourcing its 1.5Mbps MPEG video stream to group When th stream hits the switch, it matches on the first entry in the CAM Table and switched to Host 4 and the Router. Note that because the CPU s port not included in th entry, the high-rate video stream not being sent to the CPU and hence does not impact the performance of the switch. Copyright Cco Systems, Inc. 56
57 CGMP Messages GDA USA Join/Leave Meaning Mcst MAC Client MAC Join Add USA s port to the Group Mcst MAC Client MAC Leave Delete USA s port from Group Router MAC Router MAC Join Leave Assign Port = Router Port Deassign Port = Router Port Mcst MAC Leave Leave Delete Group from CAM Delete ALL Groups from CAM 2000, Cco Systems, Inc. Cco.com 57 CGMP Messages All of these messages are sent by the router (switches do not originate CGMP messages) All of these messages are contained within a given VLAN When a JOIN sent with a non-zero GDA and a non-zero USA, th adds the switch port where USA located to the given group lt in the CAM table (normal operation after a router receives an JOIN) When a LEAVE sent with a non-zero GDA and a client s MAC address for the USA, that client s port deleted from the group (selectively delete a single client based on an leave) When a JOIN sent with a GDA of all zeros using it s own MAC address as the USA, th an advertement for the switches to detect what incoming switch ports are router ports (occurs every 60 seconds so switches can dynamically find the CGMP-speaking routers) When a LEAVE sent with an all-zeros GDA and a USA of the router s MAC, all groups and ports are deleted that are associated with that router port (the router has withdrawn it s CGMP ability) When a LEAVE sent with a non-zero GDA and an all zeros USA, th globally deletes the group in all switches (used to globally delete the group after the last member has left via state) When a LEAVE sent with all zeros in GDA and USA, all groups are deleted in all switches (occurs when CGMP dabled on the router or a clear ip cgmp executed for a given router interface/vlan) Copyright Cco Systems, Inc. 57
58 CGMP Router Commands ip cgmp Command ip cgmp proxy debug ip cgmp show ip igmp interface [int] clear ip cgmp [int] Notes Enable CGMP per (Sub) Interface Enables CGMP and DVMRP Proxy per (Sub) Interface Debugs CGMP Activity Shows if CGMP Is Enabled or Dabled Clears All CGMP Groups 2000, Cco Systems, Inc. Cco.com 58 CGMP Router Commands All you really need to know the first command for the majority of installations! Copyright Cco Systems, Inc. 58
59 CGMP Switch Commands Command set cgmp enable dable show multicast router show multicast group show cgmp stattics clear cgmp stattics Notes Globally Enable or Dable cgmp Dplays Which Ports Are Router Ports Shows which Groups Are Active Shows CGMP Stattics Clears CGMP Stattics Note: Cat5000 series switch commands shown. 2000, Cco Systems, Inc. Cco.com 59 CGMP Switch Commands All you really need to know the enable form of the first command for the majority of installations! Copyright Cco Systems, Inc. 59
60 CGMP Switch Commands Command set multi router <mod/port> clear multicast router <mod/port> set cgmp leave <en d> Notes Designates port a router port Deletes multicast router port information Enables/dables fast leave processing Note: Cat5000 series switch commands shown. 2000, Cco Systems, Inc. Cco.com 60 CGMP Switch Commands The set multi router <mod/port> command may be used to manually designate a port as having a router attached. Th might be necessary if the router connected to th port running some non-standard multicast protocol that the switch does not recognize. Copyright Cco Systems, Inc. 60
61 Summary Frame Switches snooping Switches with Layer 3 aware ASICs High-throughput performance maintained Increases cost of switches Switches without Layer 3 aware ASICs Suffer serious performance degradation CGMP Requires Cco routers and switches Can be implemented in low-cost switches 2000, Cco Systems, Inc. Cco.com 61 Summary Snooping can actually provide some performance optimizations over CGMP. However, it requires switches that are implemented with more costly Layer 3 aware ASIC s in order to avoid performance impacts. CGMP a proprietary protocol that only implemented on Cco routers and switches and does not have quite as many performance optimizations that Snooping can offer. However, it the ONLY choice if one desires to provide Layer 2 multicast traffic constraint on low-end switches such as the Cco Catalyst 1900 or other equivalent switches. Copyright Cco Systems, Inc. 61
62 Design Issue Server Location Multicast Traffic Being Dropped!!! Unnecessary Traffic!!! Catalyst 29xx Catalyst 5000 VLAN1 VLAN2 VLAN3 Catalyst 29xx Catalyst 29xx Video Server 2000, Cco Systems, Inc. Cco.com 62 Layer 2 Design Issues Server Location Snooping and CGMP do not solve all problems related to multicast traffic constrainment in Layer 2 networks. Given a typical Layer 2 switch network where a high-end central switch trunked to closet switches, unwanted traffic can still wind up flowing over inter-switch trunks. Example: In the above drawing, the Video Server located on one of the ports of the 2900 closet switches. Th server sourcing high-rate video for which there are no receivers in the LAN switching environment. However, the IP Multicast host model defined in RFC 1112 requires that th traffic flow must at all times be sent to the router. Th results in traffic flowing over the inter-switch trunk that may not be necessary. Certainly, if there are no receivers beyond the router, th traffic flow just wasting trunk bandwidth. Copyright Cco Systems, Inc. 62
63 Design Issue Server Location Multicast Traffic Still Being Dropped!!! Video Server Catalyst 5000 VLAN1 VLAN2 VLAN3 Catalyst 29xx Catalyst 29xx Catalyst 29xx Keep high B/W sources close to router 2000, Cco Systems, Inc. Cco.com 63 Layer 2 Design Issues Server Location By paying attention to th possibility in the design of the network, the impact can be reduced. In the above example, the high-rate video server has been moved as close as possible to the router. Th eliminates the possibility of unnecessary traffic flowing on the inter-switch trunks. There another way to solve th problem and that to replace the switches with routers. It only at Layer 3 that complete control of multicast flows possible. Copyright Cco Systems, Inc. 63
64 Design Issue Core Switch Video Server Router A 1.5MB MPEG Video Streams 7500 Catalyst 5000 Unnecessary Multicast Traffic!!! 2500 Router D Holy Multicast, Batman!! 3MB of unwanted data! (Choke, gasp, wheeze!) T1 WAN Router B Receiver Group Unnecessary 7500 Multicast Traffic!!! Receiver Group 2 Router C 2000, Cco Systems, Inc. Cco.com 64 Layer 2 Design Issues Core Switch Issues In the case of a core network composed of several routers on an Ethernet segment, Snooping and CGMP provide absolutely no help in the constraint of multicast traffic flows. Th because routers do not send Membership Reports for desired multicast flows. (They use PIM control messages or some other routing protocol control messages instead.) Example: Consider the network shown in the drawing above. Three campus routers are connected via 100Mbps Ethernet to a core switch. A video server connected to Router A sourcing two 1.5Mbps MPEG video multicast streams, one to Group 1 and another to Group 2. Router B has a directly connected member of Group 1 and therefore needs the 1.5Mbps Group 1 video stream. Router C has a directly connected member of Group 2 and therefore needs the 1.5Mbps Group 1 video stream. Because both Routers B & C are on the same Ethernet segment (albeit on different ports on the switch), they each receive both Group 1 & 2 video streams even though they only need one. Even worse, Router D has been connected to th core backbone Ethernet segment for the purpose of supplying remote sites with unicast connectivity and low rate multicast. (i.e. there no intention of sending MPEG video to the remote sites.) Unfortunately, the little 2500 will also receive both of the high-rate video streams for a total of 3Mbps of unwanted traffic! While the 2500 capable of fast-dropping the unwanted traffic in the fastswitching path, it still has a significant impact on the performance of the router. Copyright Cco Systems, Inc. 64
65 Design Issue Core Switch Video Server Router A 1.5MB MPEG Video Streams 7500 Catalyst Router-D T1 WAN Move WAN Router to Another VLAN Segment Inside of Catalyst 5000 Router B Receiver Group Unnecessary 7500 Multicast Traffic!!! Receiver Group 2 Router C 2000, Cco Systems, Inc. Cco.com 65 Layer 2 Design Issues Core Switch Issues While today s technology can not solve th problem (it would basically require the switch to run PIM which means it must become a router and not a switch), th problem can be address by proper network design. Solution By connecting Router D to a separate LAN segment off of Router A (th could be accomplhed using another port on Router A and a separate VLAN in the Cat5000), Router D able to prune off any unwanted traffic. Exerce 1: Why th now possible? (See answer below.) Unfortunately, we still have unwanted traffic flowing to Routers B & C. One might argue that the same solution used for Router D could be used which true. However, th would require additional Ethernet ports on Router A. The other solution would be to use multiple VLANs on the single Ethernet port on Router A. Unfortunately, th would significantly reduce the overall bandwidth available and a sub-optimal solution. Answer to Exerce 1: Because there no other router on the LAN segment, Router A able to Prune off the traffic flow without the Prune being overridden by another router on the LAN segment. Copyright Cco Systems, Inc. 65
66 Design Issue x Flooding LAN Switch CPU 0 Router A Switching Engine 1 OSPF Hello ( ) CAM Table MAC Address Ports Host 1 Router B Router C Router D 2000, Cco Systems, Inc. Cco.com 66 Layer 2 Design Issue x Flooding By default, all Cco switches flood multicast traffic addressed to x. to all ports on the switch. More specifically, any traffic addressed to 0x0100.5e00.00xx flooded. Th means that th includes not only x address but x, x, etc., etc. Th done in order to avoid problems with protocols such as OSPF, EIGRP, DVMRP, PIM and many others that make use of link-local multicast to addresses in the x range. If th was not done, problems could occur that cause the flow of traffic in these ranges to be inadvertently constrained thereby breaking these protocols. Example: Consider the OSPF LAN segment running through the above switch that has four OSPF routers plus one host. Because there no entry in the CAM Table for the MAC address equivalent of (OSPF Router Hello), the OSPF Hello messages are being flooded to all OSPF routers on the segment and OSPF adjacency being maintained. Copyright Cco Systems, Inc. 66
67 Design Issue x Flooding LAN Switch CPU 0 Router A Switching Engine 1 Report CAM Table MAC Address Ports e Entry Added Host 1 Router B Router C Router D 2000, Cco Systems, Inc. Cco.com 67 Layer 2 Design Issue x Flooding Example (cont.) Now let s assume that for some (perverse) reason, Host 1 decides to Join group and therefore sends an Membership Report for th group. (Th might be caused by a multicast application that launched with an incorrect group address in the command line or simply by a hacker whing to mess with the network.) Assuming the switch doing Snooping or CGMP and does not automatically flood traffic in th range it might respond to the Membership Report by instantiating an entry in the CAM Table to constrain the flow of multicast traffic to just Host 1. Copyright Cco Systems, Inc. 67
68 Design Issue x Flooding LAN Switch CPU 0 Router A Switching Engine 1 OSPF Hello ( ) CAM Table MAC Address Ports e Host 1 Router B Router C Router D 2000, Cco Systems, Inc. Cco.com 68 Layer 2 Design Issue x Flooding Example (cont.) As a result of blindly instantiating th CAM Table entry, further OSPF Hello traffic constrained to Host 1. Th results in OSPF adjacency being lost between all OSPF routers on th segment. Care should be taken when purchasing non-cco switches as some vendors will behave as shown in th example which can cause problems. Note: Th a hotly debated sue in the IETF that stems from the fact that the v2 spec states that with the exception of , all devices MUST join the multicast group in order to receive traffic from the group. Unfortunately, th implies that all router vendors must rewrite their exting routing protocols (such as OSPF) so that the router sends Membership Reports for such groups as All OSPF Routers, , All OSPF DR s, , All EIGRP Routers, , etc., etc. Th clearly an absurd idea as even if all vendors did rewrite their implementations to be compliant with the new spec, it would mean that the customer would have to wholesale upgrade all routers in the network in a flag day. Th might even require changing out router hardware in order to be able to run the latest code. For th reason, Cco has chosen to address th problem by having all switches flood any IP multicast traffic with a destination MAC address falling in the range of 0x0100.5e00.00xx. Th guarantees that protocols that use linklocal multicast will continue to function properly. Copyright Cco Systems, Inc. 68
69 Design Issue Address Overlap Try to Avoid Addresses that Must Be Flooded 32 - IP Multicast Addresses x x x x x x x x 1 - Multicast MAC Address 0x0100.5E00.00xx 2000, Cco Systems, Inc. Cco.com 69 Layer 2 Design Issue x Flooding Example (cont.) The implication of th requirement to flood all traffic addressed to a destination MAC address in the 0x0100.5e00.00xx range means that there a large range of Layer 3 IP multicast addresses that fall into th range as shown in the drawing above. Th problem particularly true for low-end switches that do not have the capability to differentiate between link-local traffic flows addressed to xx and traffic flows addressed to valid global multicast addresses such as xx. Copyright Cco Systems, Inc. 69
70 Design Issue Address Overlap Don t forget about 32:1 overlap when selecting group addresses 32 - IP Multicast Addresses Multicast MAC Address 0x0100.5E , Cco Systems, Inc. Cco.com 70 Layer 2 Design Issue Address Overlap Remember to fact in the overlap of Layer 3 addresses into Layer 2 addresses when selecting multicast addresses. Failure to do so can result in hosts receiving unwanted multicast traffic that the switch unable to differentiate. Copyright Cco Systems, Inc. 70
71 Summary Design Issues Pay attention to campus topology Be aware of unwanted flooding over trunks Use snooping and/or CGMP Neither can solve all L2 flooding sues To solve all problems requires multicast routing Or a more robust CGMP-like protocol (hint) x flooding Watch out for switches that don t flood x traffic Address overlap Select group addresses to avoid L2 overlap Avoid x.0.0.x group addresses when possible 2000, Cco Systems, Inc. Cco.com 71 Design Issues Summary Topology Watch your campus topology when designing you network for multicast and beware of the possibility of unwanted traffic over inter-switch trunks. Use Snooping and/or CGMP Th will help constrain multicast traffic to hosts that have requested it. Keep in mind that not all situations are covered by Snooping or CGMP and that traffic not always constrained under certain conditions x Flooding Watch out for vendor switches that do not flood multicast traffic in these ranges. Mbehaved or mconfigured hosts can cause th critical traffic to be shutoff in switches that do not flood th traffic. Address Overlap Try to select multicast addresses so that different applications don t map their multicast streams into the same L2 MAC address due to the 32:1 overlap of IP group addresses at Layer 2. Avoid *.0.0.* and * * multicast addresses when possible as these ranges are flooded by Cco switches. Copyright Cco Systems, Inc. 71
72 Multicast over ATM LANE Core BUS Source Unwanted Data!!! Member 2000, Cco Systems, Inc. Cco.com 72 Multicast over an ATM Lane Core Network The nature of ATM LANE hides the underlying ATM topology from the routers which can result in the inefficient use of bandwidth in the core. Multicast flow over ATM LANE All multicast traffic flows through the Broadcast/Unknown Server (BUS) in the multicast ELAN. Th shown in the drawing above. Each LAN Emulation Client (LEC) in the network (in th case the routers) each have a p2p VC to the BUS. Any broadcast/multicast or unknown traffic sent by the router to the BUS for dtribution to all other routers in the ELAN. The BUS has a p2mp VC that connects all the BUS device to all other routers in the network. In the above example, multicast traffic flowing from the source, through the router to the BUS via the p2p VC. From there, the BUS sends the traffic to all routers in the core ELAN vi the p2mp VC. Note that in the above example, th traffic being sent to routers that have no need for the traffic and therefore wasting bandwidth in the ATM core. Copyright Cco Systems, Inc. 72
73 Multicast over ATM LANE Core Make Sure Your BUS Device Can Handle the Maximum Expected Load! BUS 1.5Mbit MPEG Video Source Make Sure Your ATM Switches Can Replicate Cells at th Rate! Member 2000, Cco Systems, Inc. Cco.com 73 Multicast flow over ATM LANE The higher the rate of traffic being sourced, the greater the amount of bandwidth being wasted in the ATM core. Care must be take to insure that the BUS device selected can handle the total flow of multicast traffic. Care must also be take to insure that the ATM switches in the network are capable of replicating cells at the rates necessary so that traffic not lost along the p2mp VC. Copyright Cco Systems, Inc. 73
74 Multicast over ATM LANE Core Why do I have to do all the work?! ELAN 1 ELAN 2 BUS Avoid using a single device as BUS for multiple ELANs ELAN , Cco Systems, Inc. Cco.com 74 Multicast over an ATM Lane Core Network A frequently made mtake to assign the duties of the BUS device of several ELANs to a single physical device. Th can often result in an overloaded BUS device. Copyright Cco Systems, Inc. 74
75 Multicast over ATM LANE Core Design sues BUS horsepower critical Use separate BUS device per ELAN to reduce load Overloaded BUS = cell/packet loss and jitter/delay Can cause problems on multimedia conferences ATM switch cell replication rate critical Switches that replicate cells in hardware are best Add lots of bandwidth to ATM fabric Traffic will frequently be sent where it s unwanted ATM core bandwidth will be wasted P2MP VCs may be a better solution (More on that later) 2000, Cco Systems, Inc. Cco.com 75 Multicast over an ATM Design Issues Bus Horsepower Make sure that the BUS device selected has sufficient horsepower to forward the expected multicast traffic flows. Use separate physical devices for BUS devices on different ELANs ATM Switch Horsepower Make sure that the ATM switches are capable of replicating cells at the expect multicast traffic rates. Bandwidth Account for the inefficient use of ATM bandwidth when multicasting over an ATM core network. Remember that traffic often sent where it unwanted, thereby wasting bandwidth. Consider alternatives to using ATM LANE Copyright Cco Systems, Inc. 75
76 2000, Cco Systems, Inc. Cco.com 76 Copyright Cco Systems, Inc. 76
- Multicast - Types of packets
1 Types of packets - Multicast - Three types of packets can exist on an IPv4 network: Unicast A packet sent from one host to only one other host. A hub will forward a unicast out all ports. If a switch
CHAPTER. IP Multicast Configuration
CHAPTER 7 IP Multicast Configuration 258 Chapter 7 Introduction The previous chapters have discussed in great detail the methods of transmitting unicast and broadcast streams through the campus network.
IP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
Can PowerConnect Switches Be Used in IP Multicast Networks?
PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM A Dell technical white paper Version 1.1 Victor Teeter Network Solutions Engineer This document is for informational purposes
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Internet Protocol Multicast
43 CHAPTER Chapter Goals Explain IP multicast addressing. Learn the basics of Internet Group Management Protocol (IGMP). Explain how multicast in Layer 2 switching works. Define multicast distribution
CHAPTER 10 IP MULTICAST
CHAPTER 10 IP MULTICAST This chapter is about IP multicast, the network layer mechanisms in the Internet to support applications where data is sent from a sender to multiple receivers. The first section
Microsoft Network Load Balancing and Cisco Catalyst Configuration
Microsoft Network Load Balancing and Cisco Catalyst Configuration OVERVIEW... 2 UNICAST MODE... 2 MULTICAST MODE... 3 ANALYSIS... 4 CPU UTILIZATION... 4 CAPTURE PACKETS... 5 MICROSOFT READING... 6 MULTICAST
White Paper Creating a Video Matrix over IP
White Paper Creating a Video Matrix over IP As the worlds of AV and IT converge, software is rapidly becoming the new frontier of AV development. In the old days, once there was a picture on the screen
Configuration Examples. D-Link Switches L3 Features and Examples IP Multicast Routing
Configuration Examples D-Link Switches L3 Features and Examples IP Multicast Routing DVMRP + IGMP + IGMP Snooping PIM-DM + IGMP + IGMP Snooping RIP + Multicast routing Where is IGMP snooping located Multicast
Introduction to IP Multicast Routing
Introduction to IP Multicast Routing by Chuck Semeria and Tom Maufer Abstract The first part of this paper describes the benefits of multicasting, the Multicast Backbone (MBONE), Class D addressing, and
How Much Broadcast and Multicast Traffic Should I Allow in My Network?
PowerConnect Application Note #5 November 2003 How Much Broadcast and Multicast Traffic Should I Allow in My Network? This Application Note relates to the following Dell PowerConnect products: PowerConnect
Multicast for Enterprise Video Streaming
Multicast for Enterprise Video Streaming Protocols and Design Guide This document provides a network equipment neutral, technical overview of multicast protocols and a discussion of techniques and best
IP Multicast and IGMP: Hewlett-Packard Procurve Switch 4108GL Default Behavior, Address Mapping, and Reserved Addresses
IP Multicast and IGMP: Hewlett-Packard Procurve Switch 4108GL Default Behavior, Address Mapping, and Reserved Addresses This article applies to the following Hewlett-Packard Procurve Switch: 4108GL (J4865A)
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs
How To Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs Introduction In a large network where internal users cannot be trusted, it is nearly impossible to stop a host from
A Dell Technical White Paper Dell Storage Engineering
Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
Constraining IP Multicast in a Switched Ethernet Network
Constraining IP Multicast in a Switched Ethernet Network This module describes how to configure routers to use the Cisco Group Management Protocol (CGMP) in switched Ethernet networks to control multicast
Layer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Switch and Ethernet Routing Switch Engineering
Ethernet Switch and Ethernet Routing Switch Engineering > Technical Configuration Guide for Microsoft Network Load Balancing Enterprise Solutions Engineering Document Date: March 9, 2006 Document Version:
- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Multimedia Traffic Control with IP Multicast (IGMP)
4 Multimedia Traffic Control with IP Multicast (IGMP) Contents Overview...................................................... 4-3 General Operation and Features.................................. 4-4 IGMP
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
Classful IP Addressing (cont.)
Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
HP Switches Controlling Network Traffic
HP Switches Controlling Network Traffic Hewlett-Packard switches offer an array of features designed to provide increased network performance with a minimum of complication and administration. Among features
June 2006. Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2
Bridge & Switch Pietro Nicoletti Piero[at]studioreti.it Bridge-Switch-Engl - P. Nicoletti: see note pag. Copyright note These slides are protected by copyright and international treaties. The title and
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
ProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
Allen-Bradley Stratix 5700 Network Address Translation (NAT)
00:00:BC:66:0F:C7 DANGER SINK\ SOURCE SOURCE 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 00 08 01 09 02 10 03 11 04 12 05 13 06 14 07 15 COM COM 0 1 NC NC +V +V 00 08 01
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
The necessity of multicast for IPTV streaming
The necessity of multicast for IPTV streaming ARIANIT MARAJ, ADRIAN SHEHU Telecommunication Department Faculty of Information Technology, Polytechnic University of Tirana Tirana, Republic of Albania [email protected],
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
Chapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
Packet Tracer 3 Lab VLSM 2 Solution
Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
The Benefits of Layer 3 Routing at the Network Edge. Peter McNeil Product Marketing Manager L-com Global Connectivity
The Benefits of Layer 3 Routing at the Network Edge Peter McNeil Product Marketing Manager L-com Global Connectivity Abstract This white paper covers where and when to employ Layer 3 routing at the edge
Auspex Support for Cisco Fast EtherChannel TM
Auspex Support for Cisco Fast EtherChannel TM Technical Report 21 Version 1.0 March 1998 Document 300-TC049, V1.0, 980310 Auspex Systems, Inc. 2300 Central Expressway Santa Clara, California 95050-2516
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
Clustering. Configuration Guide IPSO 6.2
Clustering Configuration Guide IPSO 6.2 August 13, 2009 Contents Chapter 1 Chapter 2 Chapter 3 Overview of IP Clustering Example Cluster... 9 Cluster Management... 11 Cluster Terminology... 12 Clustering
Future Internet Technologies
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Problem: the router is a single point of failure H1 H2 H3 VLAN4 H4 VLAN4 Corporate LAN Corporate LAN R1 R2
ICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure
Ethernet (LAN switching)
Ethernet ( switching) 1 Outline Interconnection devices Bridges/ switches vs. Routers Bridges Learning Bridges Transparent bridges 2 1 Bridges/ switches Interconnect multiple, possibly with different type
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
IP SAN BEST PRACTICES
IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...
The ABCs of Spanning Tree Protocol
The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
IP Routing Configuring RIP, OSPF, BGP, and PBR
13 IP Routing Configuring RIP, OSPF, BGP, and PBR Contents Overview..................................................... 13-6 Routing Protocols.......................................... 13-6 Dynamic Routing
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
SUBNETTING SCENARIO S
SUBNETTING SCENARIO S This white paper provides several in-depth scenario s dealing with a very confusing topic, subnetting. Many networking engineers need extra practice to completely understand the intricacies
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain
Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R
VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R Executive Summary The virtual switches in ESX Server 3 support VLAN (IEEE 802.1Q) trunking. Using VLANs, you can enhance security and leverage
Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)
Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched
Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University
Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
Fiber Channel Over Ethernet (FCoE)
Fiber Channel Over Ethernet (FCoE) Using Intel Ethernet Switch Family White Paper November, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Default gateway redundancy (1) H1 DG: R1 H2 DG: R1 H3 DG: R1 R1 R2 ISP1 ISP2 Internet 3 Default gateway redundancy
LGS-2624C LGS-2816C-RPS
Lantech Communication Global, Inc. Pioneering Industrial and IP Networks White Paper Static Multicast Forwarding Central Management Switches LGS-2624C LGS-2816C-RPS Abstract: In the case of industrial
Lab - Using IOS CLI with Switch MAC Address Tables
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
LAN Performance Measurements Lab
LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for
CHAPTER 10 LAN REDUNDANCY. Scaling Networks
CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
The IP Transmission Process. V1.4: Geoff Bennett
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Configuring NETGEAR PROSAFE 8-port, 16-port and 24-port switches Supporting Power over Ethernet with Avaya Communication Manager, Avaya one-x Quick Edition G10
You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
Network performance and capacity planning: Techniques for an e-business world
IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
Redundancy and load balancing at L3 in Local. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Copyright notice This set of transparencies, hereinafter referred to as slides, is protected by copyright
Distance Vector Multicast Routing Protocol
T. Pusateri INTERNET DRAFT Juniper Networks Obsoletes: RFC 1075 August 2000 draft-ietf-idmr-dvmrp-v3-10 Expires: February 4, 2001 Distance Vector Multicast Routing Protocol Status of this Memo This document
PART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
