Multicast Deployment Made Easy

  • Upload
    paramc

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

  • 8/12/2019 Multicast Deployment Made Easy

    1/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.

    Page 1 of 20

    D E S I G N IMPLEMENTATION

    G

    U I D E

    Multicast Deployment Made Easy

    I P M ul t icast Planning and D eployment Gu ide

    Introduction

    Purpose

    Multicast M ade Ea sy is a comprehensive w orkbook and step-by-step planning guide for deploying IP multicast. This

    guide will ease your deployment of IP multicast and assist yo u w ith purchasing decisions. IP multicast will help you proa ctively

    manage network growth and control costs. Upgrading your network infrastructure to support IP multicast will enable your

    organization to more quickly take advantage of multicast applications and minimize their impact on your network capacity and

    response times.

    Audience

    This guide is designed to assist Internet Service Providers, Enterprise and small-to-medium b usiness netw ork engineers

    Scope

    Multicast Ma de Easy provides an o verview o f the multicast deployment planning phase and multicast ba sics, and d etails

    specific solutions fo r d eploying native multicast.

    Planning

    Traffic Characteristics

    Applications may use unicast, b road cast, o r multicast t ransmission fa cilities. When implementing multicast netw ork a pplications,

    you need to understand the transmission facilities the application uses.

    Unicast

    In unicast, a pplications can send o ne copy of each packet to each m ember of the multicast group. Unicast is simple toimplement but diffi cult to scale if the group is large. Unicast applications also require extra band w idth, because the same

    information has to be carried multiple times, even on shared links.

    Figure 1 Unicast Transmission

    Source

    Network

    MultipleUnicastStreams

    A

    B

    C

    D

    E

    T=1T=2

    T=3

    T=4

    T=5

    Unicast Transmissiongeneratesseparate copy of data to each recipient

    Requires extra bandwidth Scalability restrictions for

    large numbers of recipients

  • 8/12/2019 Multicast Deployment Made Easy

    2/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 2 of 20

    Broadcast

    Broadcast a pplications can send one copy of each packet and a ddress it to a broa dcast ad dress. Broa dcast is simpler

    to implement tha n unicast, but it is more diffi cult to route, especially over a w ide area. The netwo rk must either stop broad casts

    at the LAN bo undary (often done to prevent broa dcast storms) or send the broa dcast everywherea significa nt burden on

    netwo rk resources if only a few users w ant to receive the packets. It is nearly impossible to send broa dcast pa ckets to members of

    a m ulticast group that are not w ithin your enterprise network, such a s across the Internet. Broa dcast pa ckets must be processed

    by each host o n the netwo rk, even those not interested in the dat a, w hich places a burden on t hose hosts.

    Figure 2 Broadcast Transmission

    M ulticast

    In IP multicast, applications send one copy of a pa cket a nd a ddress it to a g roup of receivers (at the multicast address)

    that w ant to receive it rather than t o a single receiver (for exa mple, at a unicast a ddress). Multicast depends on the netw ork to

    forw ard t he packets to only those networks and ho sts that need to receive them, therefore controlling network tra ffi c and reducing

    the amount of processing that hosts have to do. M ulticast applications are not limited by doma in bounda ries but can be used

    throughout the entire Internet.

    Figure 3 Basic Multicast Service

    Source

    Network

    BroadcastStreams

    T=1

    T=2

    T=3

    T=4

    T=5

    Broadcast Transmissionforwardsdata packet to all portions of network

    Wastes bandwidth when there arefew intended recipients

    M ulticast Transmissionsendssingle multicast packet addressedto all intended recipients

    Efficient communication andtransmission

    Performance optimizations Enables truly distributed

    applications

  • 8/12/2019 Multicast Deployment Made Easy

    3/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 3 of 20

    Features of IP Multicast

    The primary diff erence betw een multicast and unicast a pplicatio ns lies in the relatio nships between sender and receiver. There are

    three general categories of multicast applications:

    O ne to many, as when a single host sends to tw o or more receivers.

    M any-to-one refers to a ny number of receivers sending da ta b ack to a (source) sender via unicast or multicast. This

    implementation of multicast deals w ith response implosion t ypically involving tw o-way request/response applications w here

    either end may generate the request.

    M any-to-many, also called N-wa y multicast, consists of any number of hosts sending to the same multicast group address, as well

    as receiving from it.

    Table 1 M ulticast application examples

    One-to-many are the most commo n multicast applications. The demand for many-to-many N-wa y is increasing w ith the

    introduction o f useful collabo ration and videoconferencing tools. Included in this category a re audio-visual distribution,

    Webcasting, caching, employee and customer training, a nnouncements, sales and ma rketing, information technology services and

    human resource information. Multicast ma kes possible effi cient tra nsfer of large dat a fi les, purchasing information, stock catalo gs

    and fi nancial ma nagement information. It also helps monitor real-time information retrieval as, for exa mple, stock price

    fluctuatio ns, sensor dat a, security systems and manufa cturing.

    For current informat ion a bout some multicast-capable a pplications a nd cont ent providers, see the Cisco Web site at http://

    www.cisco.com (ask Web Design G roup fo r URL).

    Benefits of IP Multicast

    Table 2 Benefits

    One to Many Many to One Many to Many

    Database Updates Resource Discovery Multimedia Conferencing

    Live Concerts Data Collection Synchronized Resources

    Broadcasts Auctions Concurrent Processing

    Newsfeeds Polling Collaboration

    Push media Moderated Applications Distance Learning

    Caching Chat groups

    Announcements DistributedInteractive Simulations

    Monitoring Multi-player Games

    Lectures Interactive Music Sessions

    Optimizes Internet performance

    Saves bandwidth by enhancing network efficiency in distribution of data.

    Supports distributed applications

    Enables next generation multimedia applications such as distance learning and videoconferencing on the network in a scalable,reliable and efficient manner.

    Reduces the cost to deploy applications

    Reduces the cost of network resources by conserving bandwidth and server and network processing.

    Increases productivity

    Opens new ways to work through collaboration and conferencing, saving valuable travel time and money. Multicasting alsoenables the simultaneous delivery of information to many receivers, especially beneficial for delivering news and financialinformation.

    Increases competitiveness

    Increases competitiveness by extending market reach and opening new business and revenue opportunities. It allows bothEnterprises and ISPs to offer new services that are not feasible using unicast transport.

    Eases scalability

    Scales well as the number of participants and collaborations expand and greatly reduces the load on the sending server.

    Increased application availability

    Alleviates network congestion caused by existing applications that are inefficiently transmitting to groups of recipients, thusallowing more recipients simultaneous access to the application.

  • 8/12/2019 Multicast Deployment Made Easy

    4/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 4 of 20

    Phasing

    Cisco recommends a phased implementation a pproach, as w ith any new technology introduction. Begin with low -risk,

    low -band w idth a pplications a nd establish a testbed on a selected subnet with mana gement visibility. Subsequently expand

    deployment to the campus intranet, private WAN links, and fi nally to the Internet. Unicast islands can be upgraded to native IP

    multicast as implementation progresses. It is not recommended to try to connect these islands w ith a ny kind of a tunnel. There is

    little or no cost in confi guring IP multicast on a router if there is no application t raffi c to forw ard. Therefore, once you understand

    how multicast works, it is best if you deploy it throughout your network.

    Costs

    In unicast, as yo u increase the number of clients, you linearly increase the netw ork ba ndw idth used and cost since you generate a

    separat e copy of d ata to each recipient. The extra ba ndw idth required may be in excess of some of your communication links. This

    means unicast do es not easily scale to large numbers of recipients. Broad cast transmissions forw ard dat a pa ckets to a ll portions of

    the network w asting band w idth w hen there are few intended recipients.

    Multicast t ransmission sends a single multicast packet ad dressed t o a ll recipients. It provides efficient communication and

    transmission, o ptimizes performance, a nd enables truly distributed applications.

    Example: Audio Streaming

    All clients listening to the same 8 Kbps audio

    Figure 4 Multicast Traffic Compared to Unicast Traffic

    The cost of d eploying IP multicast as a Cisco customer is minimal. Since Cisco routers and t he Cisco IO S (Internetw orkO perating System) are already running, you only need to t urn on the multicast features in your softw are. IP multicast has been

    supported in IO S by the PIM protocol since 10.2. Interdomain multicast is effi ciently supported in 11.1CC and 12.0 images. It is

    recommended that you use 12.0 and later images if you are deploying PIM f or the fi rst time. To do w nload the most current image,

    go t o the C isco C CO (Customer Connection O nline) Web page (ww w.C isco.com/cco).

    Number of Clients

    Traffic M bps

    1 20 40 60 80 100

    0

    0. 2

    0. 4

    0. 6

    0. 8 Multicast

    Unicast

  • 8/12/2019 Multicast Deployment Made Easy

    5/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 5 of 20

    Multicast is currently ava ilable across all Cisco IOS-based routing platfo rms including the follow ing:

    Cisco 1003

    Cisco 1004

    Cisco 1005

    Cisco 1600 series

    Cisco 2500 series

    Cisco 2600 series

    Cisco 2800 series

    Cisco 2900 series

    Cisco 3600 series

    Cisco 3800 series

    Cisco 4000 series (Cisco 4000, 4000-M , 4500, 4500-M , 4700, 4700-M)

    Cisco 7200 series

    Cisco 7500 series

    Cisco 12000

    Time to Deploy

    Once you have completed y our planning a nd read this guide, the time to t urn on t he commands a nd provide the service should beminimal (about 10 minutes per router). There is one global comma nd a nd o ne interface command that must be configured on each

    router. In ad dition, one router should be identified a s the rendezvous point (RP) for your netw ork, w hich requires two confi guration

    commands.

  • 8/12/2019 Multicast Deployment Made Easy

    6/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 6 of 20

    IP Multicast Fundamentals

    Deploying IP Multicast

    Figure 5 Multicast-Enabled Network

    To support IP multicast, the sending a nd receiving nod es, intermediate routers and the netwo rk infrastructure between them must

    be multicast-enabled. In deploying IP multicast as a n end-to-end solution, yo u w ill need to consider the follow ing four a reas:

    Addressing

    You must have an IP multicast ad dress to communicate w ith a group of receivers rather than a single receiver, a nd yo u must have

    a mechanism for ma pping this address onto MAC layer multicast addresses where they exist. End no de hosts must ha ve netw ork

    interface cards (NICs) that effi ciently fi lter for LAN data link layer addresses w hich are mapped ba ck to the network lay er IP

    multicast addresses.

    IP a ddress space is divided into four sections-Cla sses A, B, C and D . The first three classes are used f or unicast tra ffi c. C lass D

    add resses are reserved fo r multicast traf fi c and are alloca ted dyna mically. (See IP G roup Addressing below.)

    Dynamic Host Registration

    The end nod e host must have softw are supporting Internet G roup Ma nagement Protocol (IGM P-defined in RFC 2236) to

    communicate requests to join a multicast group and receive multicast tra ffi c. IG M P specifies how the host should inform the

    netwo rk that it is a member of a particular multicast group.

    Internetwork

    Multicast Routing

    Network Network

    Multicast Application(for example, videoconference, multicast file transfer)

    Dynamic Host Registration

    Addressing:source port and destination port, sender address(unicast)

    and multicast receiver address

    Source

    MulticastApplication

    UDPIP, IGMPTCP/IP

    Protocol Stack

    Network Driver

    Network Interface

    Receiver

    Receiver MulticastApplication

    UDPIP, IGMPTCP/IP

    Protocol Stack

    Network Driver

    Network Interface

  • 8/12/2019 Multicast Deployment Made Easy

    7/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 7 of 20

    Multicast Routing

    The netw ork must be a ble to build packet distrib ution t rees tha t a llow sources to send packets to a ll receivers. These trees ensure

    that only one copy o f a packet exists on any given netwo rk. There are several standard s for routing IP m ulticast traffi c. The

    Cisco-recommended solution is Protocol Independent M ulticast (PIM), a multicast protocol tha t can be used w ith all unicast IP

    routing protocols.

    Multicast Applications

    End node hosts must have IP multicast application softw are such as video conferencing and must be able to support IP multicast

    tra nsmission a nd reception in the TC P/IP prot oco l stack.

    IP Multicast Group Addressing

    Unlike Class A, B, and C IP a ddresses, the last 28 b its of a Cla ss D a ddress have no structure. The multicast group add ress is the

    combination of the high-order 4 bits of 1110 and t he multicast gro up ID. These are typically w ritten as dot ted-decimal numbers

    and are in the range 224.0.0.0 through 239.255.255.255. Note that the high-order bits are 1110. If the bits in the first octet a re 0,

    this yields the 224 portion of the add ress.

    The set of hosts that responds to a particular IP multicast a ddress is called a host group. A host gro up can span m ultiple

    netwo rks. Membership in a ho st group is dynamic-hosts can join and leave host groups. For a discussion of IP multicast registration,

    see the section called Internet G roup Ma nagement Protocol.

    Some multicast gro up addresses are assigned as well-know n ad dresses by the Internet Assigned Numbers Authority (IANA).

    These multicast group ad dresses are called permanent host groups and are similar in concept to t he w ell-know n TCP a nd U DP port

    numbers. Address 224.0.0.1 means all systems on this subnet, and 224.0.0.2 means all routers on this subnet. G roups in the

    range of 224.0.0.xxx are alw ays sent with a TTL of 1. G roups in the range of 224.0.1.xxx are reserved for protocol operations and

    sent wit h normal TTLs.

    Table 3 Wel l-Know n Class D Addresses

    The IANA ow ns a block o f Ethernet ad dresses that in h exad ecimal is 00:00:5e. This is the high-order 24 bits of th e Ethernet address,

    meaning that this block includes addresses in the range 00:00:5e:00:00:00 to 00:00:5e:ff:ff:ff. The IANA allocates half of this block

    for multicast a ddresses. G iven tha t the fi rst byte of any Ethernet a ddress must be 01 to specify a multicast add ress, the Ethernet

    add resses corresponding to IP multicasting a re in the ra nge 01:00:5e:00:00:00 through 01:00:5e:7f:ff:ff.

    Class D Address Purpose

    224.0.0.1 All hosts on a subnet

    224.0.0.2 All routers on a subnet

    224.0.0.4 All DVMRP routers

    224.0.0.5 All MOSPF routers

    224.0.0.9 Routing Information Protocol (RIP)-Version 2

    224.0.1.1 Network Time Protocol (NTP)

    224.0.1.2 SGI Dogfight

    224.0.1.7 Audio news

    224.0.1.11 IETF audio

    224.0.1.12 IETF video

    224.0.0.13 Protocol Independent Multicasting

  • 8/12/2019 Multicast Deployment Made Easy

    8/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 8 of 20

    This allocation a llows fo r 23 bits in the Ethernet a ddress to correspond to the IP multicast group ID . The mapping places the

    low -order 23 bits of the multicast group ID into these 23 bits of the Ethernet a ddress, a s shown in Figure 6. Because the upper fi ve

    bits of the multicast ad dress are ignored in this mapping, t he resulting add ress is not uniq ue. Thirty-tw o d ifferent multicast gro up

    IDs ma p to each Ethernet address.

    Figure 6 Multicast address mapping

    Because the mapping is not unique a nd because the interface card might receive multicast f rames in w hich the host is really not

    interested, t he device driver or IP mo dules must perform fi ltering. You should a lso consider this w hen choosing wha t multicast group

    to ha ve your application send to. For instance, 225.0.0.1 is a valid IP multicast ad dress, but its M AC layer a ddress will be the same

    as 224.0.0.1. This is also true for 224.128.0.1. If you use these addresses for your multicast application, you may have problems in

    your network.

    M ulticasting o n a single physical netw ork is simple. The sending process specifies a destinat ion IP a ddress tha t is a multicast

    address, and the device driver converts this to the corresponding Ethernet address and sends it. The receiving processes must notify

    their IP layers that they w ant to receive data grams destined fo r a given multicast add ress, and t he device driver must somehow

    enable reception of these multicast frames. This process is handled by joining a multicast group.

    When a host receives a multicast d ata gram, it must deliver a copy to all the processes that belong to that group. This is different

    from UD P w here a single process receives an incoming unicast UD P da tagra m. With multicast, multiple processes on a given host

    can belong to the same multicast group.

    Co mplications a rise w hen multicasting is extended b eyond a single physical netw ork a nd multicast packets pass through

    routers. A protocol is needed for routers to know if any hosts on a given physical netw ork belong to a given multicast group. The

    Internet Group Management Protocol handles this function.

    Internet Group Management Protocol

    The Internet G roup M ana gement Pro tocol (IGM P) is an integral part of IP. It must be implemented by all hosts w ishing to receive

    IP multicasts. IGM P is part of the IP layer and uses IP data grams (consisting of a 20-byte IP header and a n 8-byte IG RP m essage)

    to tra nsmit information a bout multicast groups. IGM P messages are specified in the IP dat agra m w ith a proto col value of 2. Figure

    7 shows the forma t of t he 8-byte IG M P message.

    Figure 7 IGMP V2 Message Format

    8-bit typeMaximumResponse

    TimeChecksum Group Address

    0 7 8 15 16 31 63

  • 8/12/2019 Multicast Deployment Made Easy

    9/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 9 of 20

    The value of the type field is OX11 for a membership query sent by a router. The type value is 0X16 for a membership report sent

    by the host and 0X17 for a leave request sent by the host. For ba ckwa rds compatibility to IG M PV1, 0X12 is reserved.

    The value of the checksum field is calculated in the same way as the ICMP checksum. The group address is a class D IP address.

    In a q uery, the group ad dress is set to 0, a nd in a report, it contains the group ad dress being reported.

    The concept of a pro cess joining a multicast group on a given host interface is fundamental t o multicasting. M embership in a

    multicast group on a given interface is dynamic (that is, it changes over time as processes join and leave the group). This means that

    end users can dy namically join multicast groups based on the applications that they execute.

    M ulticast routers use IG MP messages to keep track of group membership on each of t he netw orks that a re physically atta ched

    to th e router. The follow ing rules apply :

    A host sends an IG MP report w hen the first process joins a group. The report is sent out the same interface on which the process

    joined t he group. No te that if other processes on the same host join the same group, the host do es not send a nother report.

    In IG M P v2

    1

    a ho st w ill send an IG M P leave to the router if the host believes it w as the last one to send an IG MP host report. The

    router then sends a gro up specific q uery to the group multicast add ress so that a ny hosts that still want to receive data for t he

    group can prevent the router fro m pruning its interface.

    A multicast router sends an IGM P q uery at regular intervals to see whether any hosts still have processes belonging to any groups.

    The router sends a query out each interface. The group address in the query is 0 because the router expects one response from a

    host for every group tha t conta ins one or more members on a host.

    A host responds to an IG MP query by sending one IG MP report fo r each group that still contains at least one process. Since all

    hosts on the netwo rk listen to t he IGM P reports being sent, if one host responds for a specific group, t he others on the LAN w ill

    suppress sending the report .

    Using queries and reports, a multicast router keeps a ta ble of its interfaces that ha ve at least one ho st in a multicast group. When

    the router receives a multicast da tagra m to fo rw ard, it f orw ards the dat agra m (using the corresponding multicast O SI Layer 2

    add ress) on only those interfaces that still have hosts w ith processes belonging to tha t group. The multicast da tagra m is forw arded

    according to the Multicast routing protocol running on the router. IGMP does not determine how packets are forwarded.

    The Time to Live (TTL) field in the IP hea der of r eports and queries is set to 1. A multica st da ta gra m w ith a TTL of 0 is

    restricted to t he same host. By d efault, a multicast data gram w ith a TTL of 1 is restricted to t he same subnet. H igher TTL fi eld

    values can b e forw arded b y the router. By increasing the TTL, an application can perform an expa nding ring search for a particular

    server. The first multicast d at agr am is sent w ith a TTL of 1. If no response is received, a TTL of 2 is tried, a nd th en 3, and so on.

    In this w ay, the a pplication locates the server that is closest in terms of hops.

    The special range of addresses 224.0.0.0 through 224.0.0.255 is intended for applications that never need to multicast further

    than o ne hop. A multicast router should never forwa rd a dat agra m w ith one of these addresses as the destination, regardless of the

    TTL.

    Multicast in the Layer 2 Switching Environment

    It is clear t hat there is a w ell-defined mechanism for d istributing IP multicast tra ffi c in C isco routed environments thanks to the C lass

    D add ressing scheme, IG M P, and PIM, but this mechanism is predicated on a d istributed layer 3 framew ork. With distributed layer

    3 devices, there is a va riety o f lay er 3 mechanisms to cont rol IP multicast tra nsmissions. Simply disabling multicasting on a particular

    router interface, for example, helps to cont ain a multicast transmission. Similarly, confi guring a pa rticular router interface to only

    forw ard packets with a TTL abo ve a certain number can also help to conta in multicast transmission.

    At some point, how ever, it is inevitable that t he IP multicast traf fi c w ill traverse a la yer 2 switch, especially in campus

    environments. (See Figure 8.) And, as w e learned earlier, IP multicast tra ffi c maps to a correspond ing layer 2 multicast ad dress,

    causing the traffi c to be delivered to all ports of a layer 2 switch.

    1. In contrast, in IG MP version 1 the host do es not send a report w hen processes leave a group, even when the last process leaves a group. The host knows tha t thereare no members in a given group, so w hen it receives the next q uery, it do esnt report t o the gro up.

  • 8/12/2019 Multicast Deployment Made Easy

    10/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 10 of 20

    Consider video server A and video client B in Figure 8. The video client wants to watch a 1.5-Mbps IP multicast-based video

    feed coming fro m a corpo rat e video server. The process start s when the client sends an IG M P join message on the LAN w hich is

    received by all routers on the LAN, w hich in turn uses PIM to add this LAN t o the PIM distribution tree. IP multicast traf fic is then

    forw arded to the video client. The sw itch detects the incoming multicast traf fi c and examines the destination M AC ad dress to

    determine w hich ports to forw ard the traffi c to. Since the destination M AC ad dress is a multicast add ress and there are no entries

    in the switching tab le for w here the traffi c should go, the 1.5-M bit video feed is simply sent to all ports, clearly an inefficient strategy.

    Figure 8 IP Multicast Traffic in Layer 2 Environments

    Cisco Group Management Protocol (CGMP)

    Cisco G roup Ma nagement Protocol (CG M P) is a C isco-developed protocol that allow s Cata lyst sw itches to leverage IGM P

    informat ion on C isco routers to ma ke layer 2 forw arding d ecisions. The net result is that w ith CG MP, IP multicast traffi c is delivered

    only to those Cat alyst switch ports tha t are interested in the traffi c. All other ports that ha ve not explicitly requested the traffi c will

    not receive it.

    It is important to note here that the CGMP operation will not adversely affect layer 2 forwarding performance. Unlike other

    solutions that instruct the sw itch to snoop layer 3 information a t the port level, C G M P preserves layer 2 sw itch operation. As a

    result, the C ata lyst 5000, for example, can deliver multicast tra ffi c at one million packets per second.

    Figures 9 through 11 depict the CG M P process between a C isco 7505 router and a Ca talyst 5000 switch. This time, w hen the

    last hop router receives the IG M P join message, it records the source MAC add ress of t he sender and issues a C G MP join message

    to the C ata lyst 5000 switch. The Ca talyst 5000 switch uses the CG MP message to dyna mically build an entry in the sw itching table

    that maps the multicast tra ffi c to the switch port of the client. No w the 1.5-Mb ps video feed will be delivered only t o tho se switch

    ports that a re in the switching tab le, sparing other ports that d ont need the dat a.

    Figure 9 IP Multicast Traffic in CGMP Environments: IGMP J oin Message

  • 8/12/2019 Multicast Deployment Made Easy

    11/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 11 of 20

    Figure 10 IP Multicast Traffic in CGMP Environments: CGMP J oin Message

    Figure 11 IP Multicast Traffic in CGMP Environments: Traffic Flow after CGMP J oin

    Although the example wa s based on a single sw itch design, CG M P also w orks in cascaded-sw itched design. Co nsider the design in

    Figure 12, w hich comprises a set o f C ata lyst 5000s, a ll behind a single router interface.

    Figure 12 Cascaded Switch Architecture

    Without C G MP, multicast traffi c is flood ed to the entire layer 2-switch fa bric. The upstream router prevents the multicast tra ffi c

    from hitting the campus backbone, but do es nothing to co ntrol the traffi c in the sw itch fabric. With C G MP, how ever, the multicast

    traffi c can be controlled, not only in the Ca talyst 5000 sw itch directly connected to the router, but also in the downstream C ata lyst

    switches. Figure 13 depicts CG M P operation in a cascaded layer 2-switch fa bric.

  • 8/12/2019 Multicast Deployment Made Easy

    12/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 12 of 20

    Figure 13 CGMP in a Cascaded Switch Architecture

    It is clear t hat IP multicasting and la yer 2 switching are valua ble technologies for providing a scalab le fabric for client and server

    connectivity. How ever, w ithout any mechanism to effi ciently hand le multicast traffi c, the layer 2 sw itch has to deliver the traffi c to

    all port s. Cisco has eliminated such ineffi ciencies w ith CG M P, an industry-leading solutio n that ensures the successful deployment

    of high performance layer 2 switching a nd IP multicasting together in the enterprise.

    IGMP Snooping

    H igh performa nce switches can use anot her method to constra in the floo ding of multicast traffi c, IGM P Snooping. IGM P Snooping

    requires the LAN sw itch to examine, or snoop, some layer 3 informat ion in the IGM P packet sent from t he host to the router.

    When the switch hears an IG MP Report from a host for a particular multicast group, the sw itch adds the hosts port number to the

    associated multicast table entry. When it hears an IG MP Leave Gro up message from a host, it removes the hosts port from the table

    entry.

    On the surface, this seems like a simple solution to put into practice. However, depending on the architecture of the switch,

    implementing IGM P Snooping may be diffi cult to a ccomplish witho ut seriously degrading the performance of the switch. The CP U

    must examine every multicast frame passing through the switch just to fi nd a n occasional IG MP packet. This results in performance

    degrada tion to the switch and in extreme cases switch fa ilure. Unfo rtunately, many low -cost, Layer-2 switches that ha ve

    implemented IG M P snooping rather than C G MP suffer from this problem. The sw itch may perform IG MP Snooping just fine in a

    limited d emo environment, but w hen the buyer puts it into production netw orks with high-band w idth multicast streams, it melts

    dow n under load.

    The only viable solution to this problem is a high-performa nce sw itch designed wit h special ASICs that ca n examine the layer-3

    portion o f all multicast packets at line-rate to determine whether or not they are IG M P packets.

    Distribution Trees

    IP multicast traffi c flow s from the source to the multicast group over a distribution tree that connects all of the sources to all of the

    receivers in the group. This tree may be shared by all sources (a shared-tree), or a separate distribution tree can be built for each

    source (a source-tree). The shared-tree may b e one-w ay or b idirectiona l.

    Applications send one copy of each packet using a multicast a ddress, and the network f orw ards the packets to only tho se

    networks, LANs, that have receivers.

  • 8/12/2019 Multicast Deployment Made Easy

    13/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 13 of 20

    Source trees are construct ed w ith a single path betw een the source and every LAN tha t ha s receivers. Shared-trees are

    constructed so that all sources use a common distribution tree. Shared-trees use a single location in t he network to w hich all packets

    from a ll sources are sent a nd fro m w hich all packets are sent to all receivers.

    These trees are loop-free. Messages are replicated only when the tree branches.

    M embers of multicast groups can join or leave at a ny time, so the distribution tree must be dynamically updat ed. Branches with

    no listeners are discard ed (pruned). The type of distribut ion tree used an d the w ay multicast ro uters interact depend on t he objectives

    of the routing prot ocol, including receiver distribution, number o f sources, reliability of dat a delivery, speed of netwo rk

    convergence, shared-path o r source path, a nd if shared path, d irection of dat a fl ow.

    Tree Structure

    Distribution trees may be formed as either source-based trees or shared trees. Source-based distribution trees build an optimal

    shortest-path tree rooted at the source. Each source/group pair req uires its ow n state informa tion, so f or gro ups with a very la rge

    number of sources, or netw orks that ha ve a very large number of groups w ith a la rge number of sources in each group, the use of

    source-based trees can stress the storage capability of routers.

    Shared distribution trees are formed aro und a central router, called a rendezvous point or core, from w hich all traffi c is

    distributed regardless of t he location of the traffi c sources. The adva ntage of shared distribution trees is that they do not create lots

    of source/group sta te in the routers. The disadva nta ge is tha t the pat h from a part icular source to th e receivers may b e much longer,

    w hich may be important for d elay-sensitive applications. The rendezvous router may also be a traffi c bott leneck if there are manyhigh dat a ra te sources.

    Figure 14 Source Trees and Shared Trees

    Distribution of Receivers

    One criterion to determine w hat type of tree to use relates to w hether receivers are sparsely o r densely d istributed througho ut the

    netwo rk (for example, whether almost all of the routers in the netwo rk have group members on their directly a tta ched

    subnetw orks). If the netw ork ha s receivers or members on every subnet or t he receivers are closely spaced, t hey have a d ense

    distribution. If the receivers are on o nly a few subnets and are w idely spaced, they ha ve a sparse distribution. The number of

    receivers does not matter; the determining factor is how close the receivers are to each other and the source.

    Source

    Receiver

    Source Tree(shortestpath tree)

    Shared Treefrom RP

    Router A Router B

    Router C RP

  • 8/12/2019 Multicast Deployment Made Easy

    14/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 14 of 20

    Sparse-mode protocols use explicit join messages to set up distribution trees so that tree state is set up only on routers on the

    distribution tree and d ata packets are forw arded to only those LANs that have hosts who join the group. Sparse-mode protocols

    are thus also appropriate for large internetworks where dense-mode protocols would waste bandwidth by flooding packets to all

    parts the internetwork and then pruning back unw anted co nnections. Sparse-mode proto cols may build either shared trees or source

    trees or both types of distribution trees. Sparse-mode protocols may be best compared to a magazine subscription since the

    distribut ion t ree is never built unless a receiver joins (subscribes) to the gro up.

    Dense mode protocols build only source-distribution trees. Dense mode protocols determine the location of receivers by

    flo oding da ta t hroughout your netw ork and then explicitly pruning off bra nches that do no t have receivers therefore creating

    distribution state on every router in your netw ork. D ense mode protocols may use fewer control messages to set up state than

    sparse-mode proto cols, and they ma y be able to better guarantee delivery of dat a t o a t least some group members in the event of

    some netw ork fa ilures. Dense mode protoco ls may be compared to junk mail in that every netw ork w ill receive a copy of the data

    w hether they w ant it or not.

    IP Multicast Routing Protocols

    In addition, there are several multicast routing protocols including Protocol Independent Multicast (PIM), Core Based Trees (CBT),

    and Multicast O pen Shortest Path First (M OSPF).

    Protocol Independent Multicast (PIM)

    PIM can support bot h dense mode and sparse mode groups. Prot ocol Independent M ulticast (PIM ) can service both shared trees

    and shortest pa th trees. PIM can a lso support b i-directional trees. PIM is being enhanced to support explicit joining to w ard sources

    so that once an a lternative method of d iscovering sources is defined, PIM w ill be able to take ad vanta ge of it. PIM -SM (Sparse

    M ode) Version 2 is an IETF standa rd: R FC # 2362. PIM-DM (Dense Mo de) is an IETF draf t.

    PIM uses any unicast routing proto col to build the da ta d istribution trees. PIM is the only multicast routing proto col deployed

    on the Internet to d istribute multicast da ta na tively and not over a b andw idth-limited, tunneled topology.

    Protocol Independent Multicast-Sparse Mode (PIM-SM)

    PIM Sparse Mode can be used fo r any combination of sources and receivers, w hether densely or sparsely populated, including

    topo logies where senders and receivers are separa ted by WAN links, and/or w hen the stream o f multica st traf fi c is intermittent .

    I ndependent of unicast rou ting pr otocols

    PIM can be deployed in conjunction w ith any unicast routing protoco l.

    Explicit-join

    PIM-SM a ssumes that no hosts w ant the multicast tra ffi c unless they specifica lly ask for it. It creates a shared

    distribution tree centered on a defined rendezvous point (RP) from w hich source traffi c is relayed to the receivers. Senders first

    send the data to the RP, and the receivers last-hop router sends a join message toward the RP (explicit join).

    Scalable

    PIM-SM scales well to a netw ork of any size including those with WAN links. PIM -SM do mains can be efficiently and

    easily connected together using M BG P a nd M SDP to pro vide native multicast service over the Internet.

    Flexible

    A receivers last-hop router can sw itch fro m a PIM -SM sha red tree to a source-tree or shortest-pat h distributio n tree

    whenever conditions warrant it, thus combining the best features of explicit-join, shared-tree and source-tree protocols.

    Protocol Independent Multicast-Dense Mode (PIM-DM)

    PIM dense mode (PIM-DM ) initially floo ds all branches of the netw ork w ith dat a, then prunes branches with no multicast

    group members. PIM-DM is most effective in environments where it is likely that there will be a group member on each subnet.

    PIM -DM assumes that the multicast group members are densely distributed throughout the netwo rk and t hat ba ndw idth is

    plentiful.

    PIM-DM creates source-based shortest-path distribution trees; it ca nnot be used t o b uild a shared distribution tree.

  • 8/12/2019 Multicast Deployment Made Easy

    15/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 15 of 20

    Figure 15 PIM-Dense Mode

    Protocol Dependent Multicast Choices

    Protoco l D ependent M ulticast, in contrast to PIM, requires building routing tab les that support either distance vector (e.g., Distance

    Vector Multicast Ro uting Protoco l, DVM RP) or link-state (e.g., M ulticast Open Shortest Pa th First, M OSPF) routing algorithms.

    D istance Vector M ulticast Routing Protocol (DVM RP)

    DVMRP was the first multicast routing protocol developed. DVMRP

    must calculate and exchange its ow n RIP-like routing metrics so it canno t ta ke advant age of the enhancements and capa bilities of

    adva nced routing pro tocols such as O SPF, IS-IS and EIG RP. It is dense-mode and so must floo d da ta throughout t he netw ork and

    then prune of branches so that state for every source is created on every router in y our netw ork.

    M ulti cast O pen Short est Path Fir st (M O SPF)

    MO SPF is an extension to the O SPF unicast routing protocol. O SPF works by

    having each router in a netw ork understand a ll of the ava ilable links in the netw ork. Each O SPF router calculates routes from

    itself to all possible destinations. M OSPF w orks by including multicast informat ion in O SPF link-state ad vertisements so tha t a n

    M OSPF router learns w hich multicast groups are active on w hich LANs. M OSPF builds a distribution tree for each source/group

    pair a nd computes a tree for a ctive sources sending t o the group. The tree stat e must be recomputed w henever link state change

    occurs. If there are many sources and/or ma ny gro ups, this calculation, called the D ijkstra a lgorithm, must be recomputed fo r

    every source/group co mbina tion w hich can be very CP U intensive.

    MO SPF incorporat es the scalability benefi ts of O SPF but can only run o ver OSPF routing doma ins. It is best used w hen relatively

    few source/group pairs a re active at any given time, since all routers must build each distribution tree. It do es not w ork w ell w here

    unstable links exist. It can b e deployed gra dually since MOSPF routers can be combined in the same routing do main w ith

    non-multicast OSPF routers. It is not w idely implemented a nd d oes not support tunneling.

    O ther Protocols

    Oth er proto cols exist tha t ar e designed fo r research purpo ses, such as C ore Ba sed Trees (CBT), Simple

    M ulticast, Express Multicast, etc. CBT and Simple Multicast, a variation of C BT, support only shared trees.

    EXPR ESS supports source trees only a nd must be implemented on every ho st to initiat e construction of the dat a path. EX PRESS

    assumes that receivers will learn about receivers via some mechanism outside of the EXPRESS protocol. EXPRESS does not use

    IGMP.

    Reverse Path Forwarding (RPF)

    Reverse Path Forwarding (RPF) is an algorithm used for forwarding multicast datagrams. The algorithm works as follows:

    The packet ha s arrived on the RPF interface if a ro uter receives it on a n interface that it uses to send unicast packets to the source.

  • 8/12/2019 Multicast Deployment Made Easy

    16/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 16 of 20

    If the packet arrives on the RPF interface, the router forwa rds it out the interfaces that a re present in the outgoing interface list

    of a multicast routing table entry.

    If the packet does not a rrive on the RPF interface, the packet is silently discarded to avoid loo p-backs.

    If a PIM router has source tree state, it does the RPF check using the source IP add ress of the multicast packet. If a PIM router has

    shared t ree sta te, it uses the RPF check on th e rendezvous points (RP ) address (which is know n w hen members join the gro up).

    Sparse-mod e PIM uses the RPF loo kup function t o determine w here it needs to send Jo ins and Prun es. Shared-tree sta te joinsare sent towards the RP. Source-tree state joins are sent towards the source.

    D ense-mode D VMR P and PIM groups use only source-rooted trees and ma ke use of RP F forw arding a s described a bove.

    M OSPF do es not necessarily use RPF since it can compute bo th fo rw ard and reverse shortest path source-rooted trees by using the

    Dijkstra computation.

    Interdomain Multicast Routing

    Multicast Border Gateway Protocol

    M ulticast Border Ga tewa y Proto col (M BG P) offers a method fo r providers to distinguish w hich prefi xes they w ill use for performing

    multicast reverse path fo rw arding (RPF) checks. The RPF check is fundamental in establishing multicast forw arding trees and

    moving multicast content successfully from source to receiver(s).

    MB G P is based on R FC 2283, Multiprotocol Extensions for BG P-4. This brings along all of t he administrative machinery tha t

    providers and customers like in their inter-domain routing environment. Examples include all of the AS machinery and the tools to

    operate on it (e.g., route ma ps). Therefore, by using MBG P, a ny netw ork utilizing internal o r external BG P can apply the multiple

    policy control knobs familiar in BG P to specify routing (and therefore forw arding) policy for multicast.

    Tw o path a ttributes, MP _REACH _NLR I and M P_UNR EACH _NLR I, are introduced to yield BG P4+ as described in Internet

    D raft draf t-ietf-idr-bgp4-multiprotocol-01.txt. M BG P is a simple w ay to ca rry tw o sets of routes-one set for unicast routing and

    one set fo r multicast routing. The routes associated w ith multicast routing are used by the multicast routing prot ocols to b uild dat a

    distribution trees.

    The advant ages are that an internet can support non-congruent unicast and multicast topologies and, w hen the unicast and

    multicast topologies are congruent, can support d iffering policies. M BG P provides for scalable policy-based inter-doma in routing

    that can be used to support non-congruent unicast and multicast forw arding pat hs.

    Multicast Source Discovery Protocol

    M ulticast Source Discovery Proto col (M SDP) is a mechanism to connect PIM-SM doma ins to enable forw arding of multicast traffi c

    between doma ins while allow ing each doma in to use its own independent rendezvous points (RPs) and not rely on RPs in ot her

    domains.

    The RP in each do main establishes an M SDP peering session using a TCP connection w ith the RPs in other do mains or w ith

    border routers leading to the other doma ins. When the RP learns about a new multicast source within its ow n doma in (through the

    normal PIM register mechanism), the RP encapsulates the first data packet in a Session Advertisement (SA) and sends the SA to all

    MSDP peers. The SA is forwarded by each receiving peer using a modified RPF check, until it reaches every MSDP router in the

    internet. If the MSD P peer is an R P, a nd the R P ha s a (*,G ) entry fo r the group in the SA, the RP w ill create (S,G) state for the source

    and join to the shortest path for the source. The encapsulated packet is decapsulated a nd fo rw arded d ow n tha t RP s shared-tree.

    When the packet is received by a receivers last hop router, the last-hop may also join the shortest path to the source. The sources

    RP periodically sends SAs w hich include all sources within tha t R Ps ow n doma in.

    MSD P peers may be confi gured to cache SAs to reduce join latency w hen a new receiver joins a group w ithin the cache.

  • 8/12/2019 Multicast Deployment Made Easy

    17/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 17 of 20

    Reliable Multicast-Pragmatic General Multicast

    Reliable multicast protoco ls overcome the limitations of unreliable multicast da tagra m delivery a nd expand the use of IP multicast.

    IP multicast is based on UD P in w hich no a cknow ledgments are returned to t he sender. The sender therefore do es not know if the

    dat a it sends are being received, a nd t he receiver cannot request tha t lost o r corrupted packets be retransmitted. M ultimedia audio

    and video applications generally d o no t require reliable multicast, since these transmissions are tolerant o f a low level of loss.

    H ow ever, some multicast applicat ions require reliable delivery.

    Some elements that a re relevant to d eciding w hether reliab le multicast is applica ble include the degree of reliab ility required,

    requirements for ba ndw idth a nd fo r ord ered pa cket delivery, the burstiness of d ata , delay tolerance, timing (real-time vs.

    non-real-time), the network infrastructure (LAN, WAN, Internet, satellite, dial-up), heterogeneity of links in the distribution tree,

    router capab ilities, number of senders and size of multicast group, scalab ility, a nd gro up setup protocol.

    Cisco currently delivers Pragma tic G eneral M ulticast (PG M) as the reliable multicast solution. Implementation of PG M uses

    negative-acknow ledgments to provide a reliable multicast tra nsport for applications that require ordered, duplicate-free, multicast

    da ta d elivery fro m multiple sources to multiple receivers. PG M gua ran tees tha t a receiver in the group either receives all da ta pa ckets

    from t ransmissions and retransmissions, or is able to d etect unrecoverable da ta packet loss. PG M is specifica lly intended a s a

    w orkable solution for multicast applications w ith ba sic reliability requirements. Its central design goa l is simplicity of operation

    with due regard for scalability and network efficiency.

    Reliable multicast w ill be useful in areas w here loss is not tolerated o r w here a high-degree of fi delity is required, a s for exa mple,

    in such areas as bulk da ta transfer, inventory updates, fi nancial stock q uotes, data conferencing, hybrid broa dcasting (Whiteboard),

    softw are d istribution, push (Webserver content), da ta replication, caching, a nd distributed simulation. Reliable multicast

    applications are also freq uently deployed over satellite networks w ith terrestrial (e.g., Internet) back channels.

    Appendix A: References

    IETF Documents http://www.ietf.org

    Internet G roup Ma nagement Protocol, Version 2 (RFC 2236); W Fenner; November 1997.

    Proto col Independent Multicast Sparse Mo de (PIM-SM) Version 2 (IETF stand ard: RFC # 2362). D . Estrin, D. Farinacci, A.

    Helmy, D. Thaler, S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, L. Wei, June 1998.

    Pro toco l Independent M ulticast Dense M ode (PIM-DM ) Version 2 (IETF dra ft. htt p://w w w.ietf. org/internet-draft s/

    dra ft-ietf-pim-v2-dm-02.txt ). PIM Working G roup of th e IETF; S. Deering, D. Estrin, D . Farina cci, V. Jaco bson, A. Helmy, D.

    Meyer, L. Wei; May 1999.

    IG MP Multicast R outer D iscovery (draft-ietf-idmr-igmp-mrdisc-01.txt); S. Biswa s, B. C ain (Nortel N etwo rks); Feb. 1999 (expires

    Aug. 1999).

    MO SPF: Analysis and Experience, Informational RFC 1585, J. M oy, March 1994.

    M ulticast Source D iscovery Proto col (MSDP) (draft-farinacci-msdp-00.txt); D. Farinacci, Y. R ekhter (Cisco); P. Lothberg (Sprint);

    H . Kilmer (D igex); J. H all (UUnet); June 1998.

    PG M Reliable Transport Pro tocol Specifications (draft -speakman-pgm-spec-02.txt); T. Speakman, D. Farinacci, S. Lin, A.

    Tw eedly; Aug. 1998.

    IP M ulticast Applications: C hallenges and Solutions (draft-quinn-multicast-apps.00.txt); B. Quinn; N ov. 1998

    Cisco sites

    Product information, job opportunities, softw are images: cco.Cisco.com, or http://www.cisco.com

    Understanding IP Multicast:

    http://www.cisco.com/warp/public/732/multicast

    Customer Support Mailing List: [email protected]

    EFT/Beta Site Web Page: ftp://ftpeng.cisco.com/ipmulticast.html

    EFT/Beta Ma iling List: [email protected]

    IP Multicast Confi guration Examples:

    ftp://ftpeng.cisco.com/ipmulticast/config_examples.html

    Auto-RP guide: ftp://ftpeng.cisco.com/ftp/ipmulticast/autorp.html

  • 8/12/2019 Multicast Deployment Made Easy

    18/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 18 of 20

    More Information

    IP Multicast Initiative: http://www.ipmulticast.com

    Annual IP Multicast Summit: http://www.ipmulticast.com/events/summit99

    Ma naging IP M ulticast Traffi c: A First Look at the Issues, Tools, and C hallenges; White Paper from the IP Multicast Initiative

    (IPM I) and Sta rdust Forums for the 3rd Annual IP Multicast Summit; Feb. 1999. http://www.ipmulticast.com/events/

    summit99.whitepaper.htm

    Implementing IP Multicast in Different Netwo rk Infrastructures, An IP M ulticast Initiative White Paper; Stard ust Forums, Inc.;

    V. Johnson, M . Johnson, K . M iller; 1997. http://www.ipmulticast.com/community/whitepapers/netinfra.html

    H ow IP Multicast Works, An IP Multicast Initiative White Paper; Stardust Forums, Inc.; 1996. http://

    www.ipmulticast.com/community/whitepapers/howipmcworks.html

    Introduction to IP M ulticast Routing, An IP Multicast Initiative White Paper; Stardust Forums, Inc.; 1997. http://

    www.ipmulticast.com/community/whitepapers/backgrounder.html

    IP Multicast Deployment Guide, IP Multicast Initiative, V. Johnson, M. Johnson; N ovember 1998. http://

    www.ipmulticast.com/deployment_guide.htm

    Appendix B: Acronyms

    Acronym Meaning

    ATM

    Asynchronous Transfer Mode

    Auto-RP

    Auto-Rendezvous Point

    BGP

    Border Gateway Protocol

    BSR

    Bootstrap Router

    CBT

    Core Based Tree

    CCO

    Cisco Connection Online (www.cisco.com)

    CGMP

    Cisco Group Management Protocol

    DM

    Dense Mode

    DVMRP

    Distance Vector Multicast Routing Protocol

    EFT

    Early Feature Testing

    GRE Generic Routing Encapsulation

    IANA

    Internet Assigned Numbers Authority

    ICMP

    Internet Control Message Protocol

    ID

    Identification

    IETF

    Internet Engineering Task Force

    IGMP

    Internet Group Management Protocol

    IGRP Interior Gateway Routing Protocol

    IP Internet Protocol

    IP/TV Internet Protocol Television

    ISP Internet Service Provider

    LAN Local Area Network

    MBGP Multicast Border Gateway Protocol

  • 8/12/2019 Multicast Deployment Made Easy

    19/20

    Public

    Copyright 1999 Cisco Systems, Inc. All Rights Reserved.Page 19 of 20

    MBONE Multicast Backbone

    MOSPF Multicast Open Shortest Path First

    MRM Multicast Route Monitor

    MSDP Multicast Source Discovery Protocol

    NIC Network Interface Card

    OSI Open System Interconnection

    OSPF Open Shortest Path First

    PGM Pragmatic General Multicast

    PIM Protocol Independent Multicast

    PIMv2 PIM version 2

    Pkt Packet

    RFC Request For Comments

    RP Rendezvous Point

    RPF Reverse Path Forwarding

    RTP Routing Table Protocol

    SA (message) Session Announcement

    SM Sparse Mode

    SMS Systems Integrator and Reseller

    SVC Switched Virtual Circuit

    TCP Transport Control Protocol

    TTL Time To Live

    UDLR Unidirectional Link Routing

    UDP User Datagram Protocol

    WAN Wide Area Network

    Acronym Meaning

  • 8/12/2019 Multicast Deployment Made Easy

    20/20

    Copy right 1999 Cisco Systems, Inc. All rights reserved. Printed in the USA. Access Registrar, AccessPath, Any to Any, AtmDirector, CCDA, C CD E, CCD P, CC IE, CC NA, CC NP, CCSI, CD -PAC, the Cisco logo,

    Cisco Certified Internetwork Expert logo, CiscoLink, the C isco M anagement C onnection logo, the Cisco NetWorkslogo, t he Cisco Powered Netw ork logo, C isco Systems Capital, the Cisco Systems Capital logo,

    Cisco Systems Networking Academy, the Cisco Technologies logo, C onnectWay, Cont rolStream, Fast Step, FireRunner, Giga Stack, IG X, JumpStart , Kernel Proxy, MGX , Nat ural Netw ork Viewer, NetSonar,Network Registrar, New World, Packet, PIX , Point and C lick Internetwor king, Policy Builder, Precept, Rout eStream, Secure Script, ServiceWay, SlideCast, SM ARTnet, StreamView, The Cell, Traffi cDirector,

    T P th Vi R Vi t lSt Vi i W Vl D i t W k D i t d W k St k t d k Ch i th W W W k Li Pl d L E i th I t t

    Cisco Systems has more than 200 offices in the following countries. Addresses, phone numbers, and fax numbers are listed on the

    Cisco Connection Onli ne Web site at http://www.ci sco.com/offices.

    Argentina Australia Austria Belgium Brazil Canada Chile China Colombia Costa Rica Croatia Czech Republic Denmark Dubai, UAE

    Finland France Germany Greece Hong Kong Hungary India Indonesia Ireland Israel I taly Ja pan Korea Luxembourg Malaysia

    Mexico The Netherlands New Zealand Norway Peru Philippines Poland Portugal Puerto Rico Romania Russia Saudi Arabia Singapore

    Slovakia Slovenia South Africa Spain Sweden Switzerland Taiwan Thailand Turkey Ukraine United Kingdom United States Venezuela

    Corporate HeadquartersCisco Systems, Inc.170 West Tasma n D riveSan Jose, CA 95134-1706USAhtt p://w w w.cisco. com

    Tel: 408 526-4000800 553-NETS (6387)Fax: 408 526-4100

    European HeadquartersCisco Systems Europe s.a. r.l.Pa rc Evolic, Ba timent L1/L216 Avenue du QuebecVillebon, BP 70691961 Courtaboeuf Cedex

    Francehtt p://w w w -europ e.cisco.co mTel: 33 1 69 18 61 00Fax: 33 1 69 28 83 26

    AmericasHeadquartersCisco Systems, Inc.170 West Tasma n D riveSan Jose, CA 95134-1706USA

    htt p://w w w.cisco. comTel: 408 526-7660Fax: 408 527-0883

    Asia HeadquartersNihon Cisco Systems K.K.Fuji Building, 9t h Floor3-2-3 M aruno uchiCh iyoda -ku, Tokyo 100Japan

    htt p://w w w.cisco. comTel: 81 3 5219 6250Fax: 81 3 5219 6001