𝔖 Scriptorium
✦   LIBER   ✦

📁

Deploying Next Generation Multicast-enabled Applications: Label Switched Multicast for MPLS VPNs, VPLS, and Wholesale Ethernet

✍ Scribed by Vinod Joseph, Srinivas Mulugu


Publisher
Morgan Kaufmann
Year
2011
Tongue
English
Leaves
549
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpoint. Financial organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. The introduction of 4G and beyond makes this technology even more indispensible since mobile operators need an efficient mechanism to deliver repetitive content to many a handset, and multicast is the answer. This is the first book to distill information on this topic from disparate sources. It is written by one of the early implementers, and is the go-to reference for deploying the Next Generation model. This book proves a real benefit to networking professionals from service providers, enterprises, the vendor community, and anyone else who wants to understand this fast emerging and popular scheme of deployment from a vendor-neutral standpoint.

  • Offers contextualized case studies for illustrating deployment of the Next Generation Multicast technology
  • Provides the background necessary to understand current generation multi-play applications and their service requirements
  • Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy

✦ Table of Contents


Front-matter
......Page 2
Copyright
......Page 4
Praise for Deploying Next Generation Multicast-enabled Applications......Page 5
Acknowledgements......Page 8
1.1.1 Overview of IP Multicast......Page 9
1.1.2.1 Layer 3 Multicast Addressing......Page 12
1.1.2.2 GLOP Multicast Block......Page 14
1.1.2.3 Layer 2 Multicast Addressing......Page 15
1.1.3.3 IGMP Fast-Leave Processing......Page 18
1.1.3.6 Static IGMP Joins......Page 19
1.1.4.1 PIM Dense Mode......Page 20
1.1.4.2 PIM Sparse Mode......Page 22
1.1.4.4 PIM Source Specific Multicast......Page 24
1.1.4.4.1 Private Source Specific Mapping—Administratively Scoped......Page 26
1.1.4.5 Bidirectional PIM......Page 28
1.1.4.6.2 RP Placement......Page 29
1.1.4.7.2 MSDP Application in Anycast RP......Page 30
1.1.5.2 IP Mroute Limit......Page 32
1.1.5.3 Bandwidth-Based Multicast CAC......Page 33
1.1.5.3.2 Case Study 1......Page 34
1.1.5.3.3 Case Study 2......Page 36
1.2 Guidelines On Addresses Allocations......Page 38
1.3 Conclusion......Page 39
2.2.1.1 Network Components......Page 40
2.2.1.1.2 Provider Edge Routers......Page 41
2.2.1.2.1 Sample Network Topology......Page 42
2.2.1.2.4 Data Flow......Page 43
2.2.1.4 Challenges and Solutions......Page 45
2.2.1.4.1 The VPN-IPv4 Address Family......Page 46
2.2.1.4.2 Multiprotocol BGP Extensions......Page 47
2.2.1.5.1 Multiple Forwarding Tables......Page 48
2.2.1.5.3 Operational Model......Page 49
2.2.1.6.2 Hub-and-Spoke VPN Topology......Page 50
2.2.1.8 Conserving Backbone B/W and PE Router Packet Processing Resources......Page 52
2.2.1.9 Case Study......Page 53
2.2.1.9.1 Generic Configuration for PE1......Page 54
2.2.1.10 Distribution of VPN Routing Information......Page 55
2.2.1.10.3 Router PE2......Page 56
2.2.1.10.5 Ingress PE to Egress PE Route Distribution Across the Backbone......Page 58
2.2.1.10.8 Egress PE Router to CE Route Distribution......Page 59
2.2.1.10.9 Forwarding Customer VPN Traffic Across the BGP/MPLS Backbone......Page 62
2.2.1.10.11 Actual VPN Forwarding Based on the Case Study......Page 63
2.2.1.11 Summary......Page 66
2.2.2 Multicast VPNs......Page 67
2.2.2.2 Multicast Distribution Trees......Page 68
2.2.2.3 Default MDT......Page 69
2.2.2.4 Data MDT......Page 73
2.2.2.5 Multicast Tunnel Interface......Page 74
2.2.2.6 RPF......Page 77
2.2.2.8 ASM Mode Using Only Default MDT—Static RP......Page 78
2.2.2.9 PE1 Router Configuration......Page 79
2.2.2.12 P Router Configuration......Page 80
2.2.2.14 CE2 Router Configuration......Page 84
2.2.2.15 PE1 Router Outputs......Page 85
2.2.2.16 PE2 Router Outputs......Page 87
2.2.2.18 ASM Mode Using Only Default- and Data MDTs—Static RP......Page 89
2.2.2.20 Data MDT Criteria—To Only Include Bandwidth Rate......Page 91
2.2.2.21 PE2 Router Configuration......Page 93
2.2.2.23 PE3 Router Configuration......Page 95
2.2.2.25 PE2 Router Outputs......Page 97
2.2.2.27 An Important Note on PIM-SM in Conjunction with MVPNs......Page 98
2.2.2.29 PE2 Router Configuration......Page 100
2.2.2.31 ASM Mode—Inter-Provider Multicast VPNs......Page 101
2.2.2.32 PE1 Router Configuration......Page 103
2.2.2.34 CE1 Router Configuration......Page 104
2.2.2.35 PE2 Router Configuration......Page 105
2.2.2.37 CE2 Router Configuration......Page 106
2.2.2.39 Verifying the Outputs on PE1......Page 107
2.2.2.40 Verifying the Outputs on P1......Page 109
2.2.2.42 Verifying the Outputs on PE2......Page 110
2.2.2.44 SSM Mode—Using BGP-Based MDT Subaddress Family Identifier Information......Page 112
2.2.2.47 CE and Provider Router Configurations......Page 113
2.2.2.48 Verifying the Outputs on PE1......Page 117
2.2.2.50 SSM Mode—Using BGP-Based MDT-SAFI for Inter-AS MVPN Deployments......Page 121
2.2.2.52 BGP Connector Attribute......Page 123
2.2.2.53 PIM RPF Vector......Page 126
2.2.2.53.1 BGP Free Core......Page 127
2.2.2.53.2 MPLS VPN Inter-AS......Page 129
2.2.2.54 PIM RPF Vector Operation......Page 131
2.2.2.55 Configurations and the Example Environment......Page 132
2.2.2.58 BGP MDT Update......Page 135
2.2.2.60 Default MDT with PIM Vector......Page 137
2.2.2.60.1 A Closer Look from P-200......Page 139
2.2.2.60.2 A Closer Look from ASBR-200......Page 140
2.2.2.60.4 A Closer Look from PE-300......Page 142
2.2.2.61 Data MDT with PIM Vector......Page 145
2.2.2.62 PE-200 Configuration Template......Page 147
2.2.2.63 P-200 Configuration Template......Page 149
2.2.2.64 ASBR-200 Configuration Template......Page 150
2.2.2.65 CE-200 Configuration Template......Page 151
2.2.2.66 PE-300 Configuration Template......Page 152
2.2.2.67 P-300 Configuration Template......Page 154
2.2.2.68 ASBR-300 Configuration Template......Page 155
2.2.2.69 CE-300 Configuration Template......Page 157
2.3 Summary......Page 158
3.1.1 Draft-Rosen Limitations......Page 159
3.2 Next-Generation Multicast VPNS......Page 160
3.2.1 Terminology......Page 161
3.3 NG-MVPN Control Plane......Page 162
3.3.2 Provider Multicast Service Interface......Page 163
3.3.3.1 BGP Type 1 AD Routes......Page 165
3.3.3.3 BGP Type 5 Source Active Routes......Page 166
3.3.3.4 BGP Type 6 and Type 7 Routes......Page 167
3.3.3.5 Customer Multicast Routing Information and Route Targets......Page 171
3.3.3.6 Putting the Building Blocks into Perspective......Page 175
3.4.1 Point-to-Multipoint LSPs......Page 177
3.4.3 RSVP-TE Provider Tunnels......Page 178
3.4.3.1 Inclusive Tunnel P2MP LSP Setup......Page 179
3.4.3.1.1 Label Allocation in RSVP-TE P2MP LSPs......Page 187
3.4.3.2.1 Configurations......Page 189
3.4.3.2.3 Validations at the Ingress PE Router—PE1......Page 196
3.4.3.2.4 Validations at the Egress PE Router—PE2......Page 203
3.4.3.2.5 Validations at the Egress PE Router—PE3......Page 208
3.4.3.3 Case Study for an RSVP-TE-Based P2MP LSP—S-PMSI Setup......Page 212
3.4.3.3.1 S-PMSI Configuration Using a C-Source and C-Group Pair......Page 213
3.4.3.3.3 Validations at the Ingress PE Router—PE1......Page 214
3.4.3.3.4 Validations at the Egress PE Router—PE2......Page 218
3.4.3.3.5 Validations at the Egress PE Router—PE3......Page 226
3.4.3.3.6 S-PMSI Configuration Using a C-Source and C-Group with Traffic Threshold......Page 230
3.4.3.3.7 S-PMSI Configuration Using Wild Cards......Page 232
3.4.3.3.8 Validations at the Ingress PE Router—PE1......Page 235
3.4.3.3.9 Validations at the Egress PE Router—PE2......Page 242
3.4.3.3.10 Validations at the Egress PE Router—PE3......Page 249
3.4.4 MLDP Provider Tunnels......Page 254
3.4.4.1 Configurations......Page 256
3.4.5 PIM-SSM Provider Tunnels......Page 259
3.4.5.1 Configurations......Page 260
3.4.5.1.1 Validation of the Control Plane Prior to Traffic Generation......Page 264
3.4.5.1.2 Validation of the Control and Data Plane after Traffic Generation on PE1......Page 265
3.4.5.1.3 Validation of the Control and Data Plane after Traffic Generation on PE2......Page 268
3.4.5.1.4 Validation of the Control and Data Plane after Traffic Generation on PE3......Page 269
3.4.5.2 Case Study for a PIM-SSM-Based Data Plane—S-PMSI Setup......Page 271
3.4.5.2.1 Configurations......Page 272
3.4.5.2.2 Validations on PE1......Page 273
3.4.5.2.3 Validations on PE2......Page 275
3.4.5.2.4 Validations on PE3......Page 277
3.4.6 PIM-SM Provider Tunnels......Page 279
3.4.6.1 Configurations on the PE Routers......Page 280
3.4.6.2 Validations on the PE1......Page 285
3.4.6.3 Validations on PE2......Page 287
3.4.6.4 Validations on PE3......Page 288
3.4.7.1 Step 1: Check the Existing Draft-Rosen Infrastructure......Page 290
3.4.7.2 Step 2: Enable the NG-MVPN Control and Forwarding Plane in the MVPN......Page 292
3.4.7.3 Step 3: Enable BGP Support for the NG-MVPN Address Family......Page 296
3.4.8 NG-MVPN Extranets......Page 301
3.4.9 Provider Router Configuration......Page 306
3.4.10 NG-MVPN—IPv6......Page 307
3.4.11 Internet Multicast Using Next-Gen BGP Control Plane......Page 311
3.4.12 Considerations for Deploying Broadcast Video/IPTV......Page 314
3.4.13 Vendor Support for the NG-MVPN Framework......Page 315
3.5 Summary......Page 316
4.2 Beginning of NG-MVPN Support on ALU......Page 317
4.2.2 PE Global Configuration......Page 318
4.2.3 PE VPRN (VPN) Configuration......Page 322
4.2.4 S-PMSI Configuration......Page 323
4.5 Next-Gen MVPN Using RSVP-TE P2MP LSP as the P-Tunnel......Page 326
4.6 Summary......Page 327
5.1.1 Terminology......Page 328
5.2.1.1 MLDP in the Context of Next-Generation MVPNs......Page 329
5.2.1.2 MLDP Topology......Page 330
5.2.2.1 Multicast FEC Element Encoding......Page 331
5.2.2.1.2 Opaque Value......Page 332
5.2.2.2 In-Band Signaling Operation......Page 334
5.2.2.3 Out-of-Band (Overlay) Signaling Operation......Page 335
5.2.2.4 MLDP Signaling Comparison......Page 336
5.2.3.1.1 Tree Creation......Page 337
5.2.3.1.2 Multicast Forwarding......Page 338
5.2.4 Multipoint-to-Multipoint LSPs......Page 339
5.2.4.1.2 Upstream Path Creation......Page 340
5.2.4.1.3 Downstream and Upstream State Entries......Page 342
5.2.4.1.4 Merging States and Multicast Forwarding......Page 343
5.2.5.2 MP2MP Root Node Redundancy......Page 345
5.2.5.2.1 M2MP Anycast Root Node Redundancy......Page 346
5.2.6 LSP Virtual Interfaces......Page 348
5.2.7.2.1 [no] mpls MLDP......Page 349
5.2.7.2.4 [no] ip(v6) multicast mpls MLDP range acl......Page 351
5.2.7.2.10 [no] mdt Preference [pim] [MLDP]......Page 352
5.2.7.3.2 debug mpls MLDP generic......Page 353
5.3 MLDP Configuration Examples......Page 354
5.3.1 Reference Network......Page 355
5.3.3 MLDP Capabilities......Page 356
5.3.4 MLDP Database......Page 357
5.3.5.1 Scenario......Page 358
5.3.5.3 PIM Free Core......Page 359
5.3.5.4 LDP Peers......Page 360
5.3.5.5 P2MP LSP Creation......Page 361
5.3.5.6 In-Band Signaling of SSM Multicast State......Page 362
5.3.5.8 MLDP Database Entry—PE-West......Page 363
5.3.5.11 Label Forwarding Entries......Page 364
5.3.6 Multicast VPN Application......Page 365
5.3.6.1.1 Scenario......Page 366
5.3.6.1.4 LSP Upstream......Page 367
5.3.6.1.6 PIM Adjacencies......Page 370
5.3.6.1.7 MLDP Database Entry—PE-East......Page 371
5.3.6.1.8 Label Forwarding Entry—P-Central (Root 1)......Page 372
5.3.6.2.1 Scenario......Page 374
5.3.6.2.2 Configuration......Page 375
5.3.6.2.4 LSP-VIF Adjacencies—PE-West......Page 376
5.3.6.2.5 MLDP Database Entries......Page 377
5.3.6.3 Label Forwarding Entries......Page 378
5.3.6.4.2 Configuration......Page 379
5.3.6.4.3 P2MP LSP Creation......Page 380
5.3.6.4.5 VRF mRoute—PE-East Egress......Page 381
5.3.6.4.6 VRF mRoute—PE-West Ingress......Page 382
5.3.6.4.7 MLDP Database Entry—PE-West Ingress......Page 383
5.3.6.5.1 Configuration......Page 384
5.4 Summary......Page 385
6.1 Introduction......Page 386
6.2 IPTV Standards......Page 387
6.2.1 ITU-T......Page 388
6.3 NGN Reference Architecture......Page 389
6.3.1 Network Interface Definitions......Page 390
6.3.2 Services, Transport, and Management Functions......Page 391
6.4 IPTV Reference Architecture Framework......Page 392
6.5.1 xDSL in the Access......Page 394
6.5.4 SSM and IGMPv3: Initial Join in IPTV Network......Page 397
6.5.5 SSM and IGMPv3: Channel Zap......Page 398
6.6 Network Design Considerations for IPTV......Page 399
6.6.1 Bandwidth Requirement for IPTV......Page 401
6.6.2 IPv4 Address Usage Guidelines......Page 402
6.6.3 GLOP Addressing......Page 403
6.6.4 IPv6 Multicast Address Allocation......Page 404
6.6.5.2 Dedicated VLAN per Subscriber......Page 405
6.6.6 QoS and QoE......Page 406
6.6.6.1 QoS......Page 407
6.6.6.3 Channel Zap Time......Page 408
6.6.6.4.2 Media Loss Rate......Page 409
6.6.7.2 Payload Corruption......Page 410
6.7 Conclusion......Page 411
7.2 Virtual Private Lan Service Aka VPLS......Page 412
7.2.1.1 BGP-VPLS Control Plane......Page 416
7.2.1.3 LDP-VPLS and BGP-VPLS Forwarding Plane......Page 419
7.2.1.4 Autodiscovery for LDP-VPLS......Page 421
7.2.1.5 Autodiscovery for LDP-VPLS—Implementation Details......Page 425
7.2.2 Characteristics of LDP VPLS......Page 429
7.2.3.1 Full-Mesh VPLS......Page 432
7.2.3.2 Mixed FEC128 and FEC129 Configurations......Page 436
7.2.3.3 H-VPLS Configurations......Page 441
7.2.3.4 Hub-and Spoke-VPLS Configurations......Page 448
7.2.5.1 Scaling the VPLS Network......Page 455
7.2.5.2 Case Study—Connecting LDP and BGP VPLS Metro Domains......Page 459
7.2.6 Multicast Traffic in VPLS......Page 467
7.2.6.1 Selective Trees for Multicast in VPLS......Page 470
7.2.7.1 Background......Page 471
7.2.7.2 Delivering Broadband Services......Page 472
7.2.7.3 Subscriber Management......Page 473
7.2.7.4 IPTV......Page 474
7.2.7.5 IPTV Locations/Placement......Page 475
7.2.7.7 Broadband Network Overview......Page 476
7.2.7.9 MSAN......Page 478
7.2.7.10 VLAN Architectures for IPTV......Page 479
7.2.7.11 Customer VLANs and Ethernet Aggregation......Page 480
7.2.7.14 VLAN and IGMP Interactions......Page 481
7.3 Summary......Page 482
8.2 Multimedia Broadcast Multicast Service......Page 483
8.3 DVB-H......Page 487
8.4 Multicast Listener Discovery Version 2 (MLDv2)......Page 488
8.5.1 Receiver Mobility......Page 489
8.5.2 Source Mobility......Page 491
8.6 Conclusion......Page 492
9.1 Future Enhancements......Page 493
9.2 Conclusion......Page 496
References......Page 497
Subject Index......Page 499


📜 SIMILAR VOLUMES


Deploying Next Generation Multicast-enab
✍ Vinod Joseph, Srinivas Mulugu 📂 Library 📅 2011 🏛 Morgan Kaufmann 🌐 English

The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpo

Deploying Next Generation Multicast-enab
✍ Vinod Joseph, Srinivas Mulugu 📂 Library 📅 2011 🏛 Morgan Kaufmann 🌐 English

The growth, scale, and prominence of video applications over the years have placed emphasis on the most scalable and efficient way to deliver multi-play content (voice, video and data) to the end user. Multicast is the most effective and efficient carrier of video applications from a network standpo

Scalable Multicasting over Next-Generati
✍ Xiaohua Tian, Yu Cheng (auth.) 📂 Library 📅 2013 🏛 Springer-Verlag New York 🌐 English

<p><p>Next-generation Internet providers face high expectations, as contemporary users worldwide expect high-quality multimedia functionality in a landscape of ever-expanding network applications. This volume explores the critical research issue of turning today’s greatly enhanced hardware capacity

Scalable Multicasting over Next-Generati
✍ Xiaohua Tian, Yu Cheng (auth.) 📂 Library 📅 2013 🏛 Springer-Verlag New York 🌐 English

<p><p>Next-generation Internet providers face high expectations, as contemporary users worldwide expect high-quality multimedia functionality in a landscape of ever-expanding network applications. This volume explores the critical research issue of turning today’s greatly enhanced hardware capacity

Networks and Services: Carrier Ethernet,
✍ Mehmet Toy(auth.), T. Russell Hsing, Vincent K. N. Lau(eds.) 📂 Library 📅 2012 🌐 English

<p>This book provides a comprehensive understanding of current and debated future networking technologies. It gives insight into building end-to-end networks and services with Carrier Ethernet, PBT, MPLS-TP, and VPLS while also shedding light on the pros and cons of these technologies for service pr

Multiactivity in Social Interaction: Bey
✍ Pentti Haddington (ed.), Tiina Keisanen (ed.), Lorenza Mondada (ed.), Maurice Ne 📂 Library 📅 2014 🏛 John Benjamins 🌐 English

Doing more than one thing at the same time – a phenomenon that is often called ‘multitasking’ – is characteristic to many situations in everyday and professional life. Although we all experience it, its real time features remain understudied. <i>Multiactivity in Social Interaction: Beyond multitaski