Beruflich Dokumente
Kultur Dokumente
Stefan Kollar
Consulting System Engineer, CCIE #10668 skollar@cisco.com
Presentation_ID
Cisco Confidential
Agenda
1. 2. 3. 4. 5. 6. Introduction Architectural overview IP multicast primer (SSM) Transit Transport Design options Wholesale / content distribution Resiliency
Source redundancy, protected pseudowires,
fast convergence, FRR, live-live, MoFRR
7.
Path selection
ECMP, multi topologies, RSVP-TE P2MP
2
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Introduction
IPTV and IP Multicast
3
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
2. IP multicast sources:
Encoder, Transrater, Groomer, Ad-Splicer,
3. IP multicast receivers:
Transcoder, Groomer, Ad-Splicer, eQAM, STB
4
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Deployment Strategy
Overview, Recommendation
1. Network
Add IP multicast service to your network (for any application) Choose transport methods based on SLA and operational requirements/preferences
Native IP multicast, MPLS, L2, mix
2. IPTV services
Start with traditional broadcast TV Investigate extending IPTV and add other (IP multicast) services
More RoI on network layer investment
5
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Architectural Overview
6
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Service Interface
Multicast traffic
The network
Signaling
Signaling
Multicast traffic
Network Plane
7
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Signaling
2.
IP multicast
Allow to attach service plane devices (sourcing, receiving) anywhere global, national, regional, local. Start/stop sending traffic dynamically, best utilize bandwidth only when needed. One network technology usable for all services (IPTV, MVPN, )
Different transport options for different services possible
3.
Service Interface
How network & service operator infrastructure interacts with each other
8
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
IP Multicast Primer
9
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
2. multicast services
How end-devices can use IP multicast Of interest to network and service operator ASM, SSM (and protocols IGMP/MLD) Service operator just need to add SLA requirements!
10
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
IP Multicast Services
1. ASM: Any Source Multicast (1990, rfc1112)
The traditional IP multicast service (collaborative) Sources send packets to multicast groups Receivers join to (G) groups, receive from any source
IP Multicast Services
1. ASM
12
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Between routers
PIM-SSM == subset of PIM-SM for SSM (nothing new!)
IGMPv3 proxy routing / (snooping) on HAG, L2 access Simple point to multipoint tree building == (S,G) SPTs only
2.
Transition support
SSM-mapping, (URD, IGMPv3lite)
13
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
External Network
Eg: Content provider
Video encoder/ multiplexer First hop router
Core
Distribution / regional
Dis. Edge Rtr
Aggregation
PE-AGG
Access
BB type specific
Home Net
Home Gateway STB
?
Content injection: External, national, regional, local PIM-SSM (S,G) joins IGMPv3 (S,G) membership
Headend
Opt. Source Redundancy
Presentation_ID
Transit Transport
Design Options
15
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transport Architecture
Overview 1. Common deployments: Native PIM-SSM or MVPN
Native, GRE IP Multicast
Overview
Elements of Transport Architecture for Tree Building
1. 2. 3. 4. C(ustomer)-tree building protocols
IPTV: IGMPv3 / PIM-SSM
Content Source
P2
PE2
CE2
Tailend LSRs =
CE2
PE1
2009 Cisco Systems, Inc. All rights reserved.
P1 P4
Cisco Confidential
Downstream PEs
PE3
CE3
Receiver
17
Combinations with L3 on PE
Current Widely Deployed
1. Native IP multicast (IPv4/IPv6)
IPv4/IPv6 PIM-SSM in core User side = core tree: No PE-PE signaling required. RPF-Vector for BGP free core
2. MVPN(-GRE)
Carries traffic across RFC2547 compatible L3 VPN. With aggregation IPv4 PIM-SSM/SM/Bidir in core (IPv4) RFC2547 BGP ; GRE encap/decap on PE PE-PE signaling required
I-PMSI = Default-MDT ; SI-PMSI = Data-MDT
18
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
IPv4 IPv6
MC Pkt L20
PE-2
CE-2
MC Pkt
Receiver
IPv4 IPv6
PE-1
MC Pkt
L100
CE-1 MC Pkt
P-4
Pop
MPLS Core
MC Pkt L30
Content Source
Push Swap
MC Pkt PE-3
IPv4 IPv6
CE-3
Receiver
19
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
3. mLDP MVPN
Exactly like MVPN signaling Just replaces PIM-SSM+GRE with mLDP MP2MP mLDP replaces Bidir-PIM (MP2MP) Default-MDT
20
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
mLDP Signaling
With Native and Direct-MDT
mLDP Label Mapping: FEC = S+ G+RD+ Root Label=(20)
PIM-V4 Join: VRF IPTV Source= 10.10.10.1 Group = 232.0.0.1 PIM-V4 JOIN: VRF IPTV Source= 10.10.10.1 Group = 232.0.0.1
IPv4 CE-2
VRF IPTV Receiver
IPv4
CE-1 PE-1 P-4
PE-2
Content Source
VRF IPTV
MPLS Core
PE-3
Receiver
21
mLDP Signaling
Summary
1. Best of PIM + MPLS
Receiver side originated explicit joins scalable trees PIM-SSM = mLDP P2MP, Bidir-PIM ~= mLDP MP2MP RPF-vector implicit (mLDP root)
2.
Best of LDP
Neighbor discovery, graceful restart, share unicast TCP session No interaction with unicast label assignment (ships in the night)
3. 4.
No hop-by-hop RP config (AutoRP, BSR, static) needed) No asserts, other data-triggered events
22
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
IPv4
MPLS Core
PE-1 P-4 PE-2
Receiver
IPv4
CE-1
Content Source
PE-3
IPv4
CE-3
Label merge ! Assign same upstream label For all branches of a tree
Cisco Confidential
Receiver
23
P2MP RSVP-TE
Summary
1. RSVP-TE P2P LSP
Path explicitly (hop-by-hop) built by headend LSR towards tailend LSR RSVP PATH messages answered by RESV message
2.
3.
24
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Combinations with L3 on PE
With RSVP-TE P2MP (Possible Futures)
1. RSVP-TE P2MP static / native
Core trees statically provisioned on Headend-PE:
Set of tailend-PE
25
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
2.
Locality:
Affects convergence/reoptimization speed: PIM/mLDP: Failure in network affects only router in region (eg: in pink region). RSVP: impact headend and all affected midpoint and tailends for RSVP-TE reoptimization. Join/leave of members affect only routers up to first router on the tree in mLDP/PIM. Will affect headend and all midpoints in RSVP-TE P2MP.
Rcv
Rcv
Rcv
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
26
Rcv
Rcv
Rcv
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
27
Virtualization Considerations
Internet/Walled-Garden or L3VPN ?
1. L3VPN (MVPN) developed as multicast component of (unicast/RFC2547) L3VPN
Primarily for Enterprise VPN services
Usable for IPTV as well (with MVPN-GRE or MVPN-mLDP)
2.
Why ?
Core - operator policy for all services (VPN, IPTV, Internet, ) Edge - wholesale considerations (VPN per wholesaler)
Service separation considerations (service per VPN)
3.
28
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
L2VPN Considerations
1. L2 preferred by non-IP communities
IP address transparency (unicast only issue) PE invisible = customer free to choose protocols independent of provider
Not true if PE uses PIM/IGMP snooping!
3. Recommended directions:
Most simple: one mLDP MP2MP LSP per L2VPN (broadcast) Not to use IGMP/PIM snooping on L2VPN-PE!
Unless customer is provider (eg: broadband edge design)
29
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
MVPN-GRE
Also many years deployed (Cisco/rosen specification).
Recommended for IPTV when VRF-isolation necessary !
3.
mLDP
Recommended Evolution for MPLS networks for all IP multicast transit:
Native (m4PE/m6PE)
Direct-MDT/MVPN-mLDP (IPv4/IPv6)
4.
RSVP-TE P2MP
Strength in TE elements (ERO/CSPF + protection) Recommended for limited scale, explicit engineered designs, eg: IPTV contribution networks.
30
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Resiliency
31
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Source Redundancy
With SSM
1. Receivers explicitly join to (S,G) Group AND Source 2. What to do if source fails ? 3. Initially ok: join to two sources (S1,G), (S2,G)
Supported by transition solutions like SSM mapping
Double state in network (convergence speed)
32
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Source Redundancy
With SSM
1. L2: Redundant sources in same L2 LAN
No interaction with network required Application must ensure only one source active at any time. Recommended/good for collocated sources.
L2 source redundancy
Src1 Src2
R1
R3 can RPF to either R1 or R2 and receive traffic from either source
RPF
R2
2.
R3
L3 source redundancy
Src1 Src2
R1
Announce Redundant IP address When source Is sending
RPF
R2
R3
33
Presentation_ID
Cisco Confidential
Source Redundancy
L2/L3 Issue
1. When not use L2 Src redundancy on WAN
Consider Src1/Src2 in different WAN locations with L3 network. Can create L2 connectivity between them.
Eg: EoMPLS R1 <-> R2
Src1
Src2
Does this help to avoid redundant IP source address signaling ? Yes, but R1
EoMPLS
R2
2.
Problem:
L2 and L3 topologies overlap
traffic may flow multiple times over same physical link. Traffic
L3 RPF can not know which edge router (R1, R2) on LAN is closest router toward active source
That is exactly what the announcement of the redundant IP source address would provide !
RPF
R3
Presentation_ID
Cisco Confidential
Source Redundancy
Anycast/Prioritycast Policies 1. Policies
Anycast: clients connect to the closest
instance of redundant IP address
Rcvr 1
Rcvr 2
35
Source Redundancy
Explicit Signaling Benefits 1. Subsecond failover possible 2. Represent program channel as single (S,G)
SSM: single tree, no signaling, ASM: no RPT/SPT
4. No vendor proprietary source sync proto required 5. Per program, not only per-source-device failover
Use different source address per program
36
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protected Pseudowires
Classic pseudowire 1. R1/R2 provide pseudowire for R3/R4 accepting/delivering packets from/to physical interface. R1 R3 Pseudowire over LDP MPLS R2 R4
Protected pseudowire 1. Provide sub 50msec link protection for packets of pseudowire (or any other MPLS packets) by configuring RSVP-TE LSP with FRR backup tunnel R1 R3
R4
Terminated(Routed) pseudowire 1. R1/R2 terminate pseudowire on internal port instead of physical interface. Can bridge (VLAN) or route from/to
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
R2
37
Presentation_ID
R5
R1
R2 Access
R3 Access
Access
1. 2.
Consider aggregation network (R-R6). L2 (bridged) or L3 (routed) Configure L2 or L3 multicast to not use physical links between R1-R6, but terminated pseudowires (one-hop). Sub 50 link protection against link failures in ring!
Problem: as long as outage persists, traffic will flow duplicate on links
38
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
3.
Presentation_ID
2. IP multicast
All failures / recoveries / topology changes corrected by re-converging the trees. Same interruption for all causes !!! Re-convergence time is sum of:
Failure detection time (only for failure cases) Unicast routing re-convergence time ~ #Multicast-trees PIM re-convergence time
Possible
~ minimum of 400 msec initial ~ 500 ... 4000 trees convergence/sec (perf)
2. 3.
40
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
(classic) FRR
mLDP Link Protection
Rcvr1 L7 R1 L3
R2 L1 s0
R3 L5
S(ource)
php L4 L1 L1
L1: IIF = s0 L2 L1 R5
R4
1. 2.
L5 L1
L3 L1
R6
Presentation_ID
Cisco Confidential
R1 Rcvr2
R2
R3
R4
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
R5
R6
42
cFRR
PIM/mLDP Make Before Break
1. S(ource) 2. 3. Cost: 10 Cost: 12 4. Receive RPF change from unicast Send joins to A Wait for right time to go to 4.
Until upstream is forwarding traffic
Change RPF to A
Send prunes to B
5.
Should only do Make-before-Break when old path (B) is known to still forward traffic after 1.
Path via B failed but protected Path to A better, recovered Not: path via B fails, unprotected
Make before Break could cause more interruption than Break before Make !
R(eceiver)
43
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Source Or stream
Src
splicer
Protection Domain
2.
3.
Live-live service:
receive/deliver two copies, splice/join on customer side. Limited to customers whose app/equip. can support this
4.
Receiver Or stream
joiner
Rcv
44
Presentation_ID
Cisco Confidential
Basic MoFRR
ECMP, IGP Upstream
1. Join within network device (router) by switching which received copy to forward.
Switch is not zero loss but (close to) 50msec
Src RH
Protection Domain
2.
R1 MoFRR operations
Expect two RPF paths (from IGP/BGP)
ECMP
Naturally disjoint
RU1 RU2
3.
R1 Rcv
R1b
45
U-turn attachment
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
eQAM
eQAM
Redundant Encoder/Multiplexer
Rcvr Rcvr
Small metric
Infinite/large metric
2. ARQ - Retransmissions
Done eg: with Cisco VQE unicast retransmissions
Candidate large bursts of retransmissions
3. Live-live exception
47
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
RSVP-TE P2P
Workarounds
1. Without improvements (classical FRR or other), IP multicast can not benefit from RSVP-TE P2P tunnels
P2P tunnels break multicast without workarounds:
48
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
2. Polarizing == predictable
(consistent across network), IOS only
ip multicast multipath s-g-hash basic
3. Non-polarizing
IOS and XR (XR default & only option, no config) ip multicast multipath s-g-hash next-hop-based
49
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
2.
Predictability:
With algorithm known, group addresses G of (S,G) can be assigned by operator such that traffic is well split across multiple hops (link bundles)
Workaround, not recommended for highly utilized links (> 85% ?)
Non-polarizing Good
Bad ?
Link Overload?
4 2
5
Never Used
6 3
4 2
6 3 1
1
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
50
3. 4.
51
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
52
Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential