You are on page 1of 61

Mo

re Re so ur ce s: ht tp :/ /l ea rn

Le

ar

ni

ng

in g. hu

aw ei .c om /e

Course Name

N-1

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-2

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-3

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-4

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-5

MSDP provides connections between multiple PIM-SM domains, and thus enable these domains to learn multicast source (S, G) information with each other through SA messages. The RP in every PIM-SM domain can establish one or multiple MSDP peer relations, which adopt TCP as the transmission protocol with the port number of 639. When a recipient in PIM-SM domain is interested in a certain multicast stream (S, G), build the SPT by using the same way as described in PIM-SM. Note: MSDP can establish MSDP peer relations among any protocols besides in PIM-SM. This slide only introduces the application in PIM-SM.

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-6

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-7

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

The SA message mainly contains the following fields: Source address of the data source. Group address of the data source sends to. IP address of the RP.

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-8

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

The Source Active (SA) Message: RPs periodically originate SA messages for sources that are active in their local domain. These SA messages are sent to all active MSDP peers. If the MSDP peer receives the SA from a non-RPF peer towards the originating RP, it will drop the message. Otherwise, it forwards the message to all its MSDP peers (except the one from which it received the SA message). Stub domains (i.e. domains with only a single MSDP connection) do not have to perform this RPF check since there is only a single entrance/exit. A MSDP speaker MUST cache SA messages. Caching allows pacing of MSDP messages as well as reducing join latency for new receivers of a group G at an originating RP which has existing MSDP (S,G) state.

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-9

A MSDP speaker MUST cache SA messages. Caching allows pacing of MSDP messages as well as reducing join latency for new receivers of a group G at an originating RP which has existing MSDP (S,G) state. In addition, caching greatly aids in diagnosis and debugging of various problems.

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-10

1.

2.

3.

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

4.

When sending a packet to a recipient in the domain where the peer RP is located, the peer RP sends a PIM-SM Join packet to the multicast source at the same time. Note: The peer RP does not send any packet to the RP in the domain where the multicast source is located.

Re

After receiving the packet, RP generates an SA packet and sends it to MSDP peers (that is, the RPs in other PIM-SM domains). Every SA packet contains the IP address of multicast source, the address of multicast group, and the address of the RP generating the packet. As long as the multicast source sends data, the RP periodically sends SA packets.

so

ur

ce

The RP decapsulates the packet and forwards it downward to all the members of the domain along the shared tree. The domain members can choose whether to switch to the source tree. Here in above are all the typical operation procedures of PIM-SM.

s:

ht

A specified PIM-SM router (usually the one nearest to the local source) encapsulates the data sent from multicast source in a Register packet and sends the packet to the RP in domain.

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-11

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

The RP in PIM-SM Domain C sends a group join packet (S,G) to the multicast source, applying for joining the SPT.

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-12

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

After the reverse forwarding path is established, the source sends data directly to the RP in PIM-SM Domain C, and then the RP starts forwarding data.

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-13

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

Group members of domain c may choose whether to switch to the SPT, because the group members have known the IP address of the multicast source. This procedure is the same with that of PIM-SM.

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-14

Data forwarding path after the adding of SPT.

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-15

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-16

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

MSDP RPF check compares the RP address in an SA message with the MSDP peer receiving the SA message.

so

RPF check is performed for packet forwarding, and generally compares the source address of the packet with the interface receiving packet. MSDP RPF check

ur

ce

What are the differences between MSDP RPF rules and ordinary RPF rules? RPF check

s:

ht

What are the functions of MSDP RPF check? The RPF check of peers ensures that the SA messages can be forwarded to other MSDP peers.

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-17

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

MSDP RPF rules: The peer of MSDP is RP. The MSDP peer is the next hop of EBGP on the peer RPF routing. The RPF routing of peer is learned through the DV/PV routing protocol. The MSDP peer is the declarer of the RPF route of peer, that is, the next hop of IGP on the peer RPF routing. The MSDP peer is located on the AS, which is the closest one to the optimal path in the direction oriented to the RP. Note: In the case of several such paths, compare the IP address values of the peers. The larger the value, the higher the priority. The MSDP peer is configured to static RPF peer.

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-18

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-19

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-20

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-21

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-22

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-23

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

Principles of Mesh-Group: The SA message received from a group member is not forwarded to other group members. The SA message received from a non-group member is forwarded to all the group members and the MSDP peer after it passes the MSDP RPF check.

ce

s:

The entire network group of MSDP reduces the flooding of SA messages in one domain. All the connections of multiple MSDP Speakers in a domain can be configured in one entire network group. Note: Members of the entire network group do not forward SA messages to the members of other groups. Therefore, members of the entire network group should all be fully connected to ensure that the SA messages can be sent to all the MSDP peers.

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-24

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-25

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-26

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-27

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

1 2 3 01234567890123456789012345678901 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | Value .... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Type (8 bits) Describes the format of the Value field. Length (16 bits) Length of Type, Length, and Value fields in octets. Minimum length required is 4 octets, except for Keepalive messages. The maximum TLV length is 9192. Value (variable length) Format is based on the Type value. See below. The length of the value field is Length field minus 3. All reserved fields in the Value field MUST be transmitted as zeros and ignored on receipt.

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-28

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

Code Type =================================================== 1 IPv4 Source-Active 2 IPv4 Source-Active Request 3 IPv4 Source-Active Response 4 KeepAlive 5 Reserved (Previously: Notification)

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-29

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-30

Mo

0 1 2 3 01234567890123456789012345678901 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 1 | x+y | Entry Count | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RP Address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved | Sprefix Len | \ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ \ | Group Address | )z +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / | Source Address |/ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Type IPv4 Source-Active TLV is type 1. Length x Is the length of the control information in the message. x is 8 octets (for the first two 32-bit quantities) plus 12 times Entry Count octets.

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

The maximum size SA message that can be sent is 9192 octets. The 9192 octet size does not include the TCP, IP, layer-2 headers.

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-32

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

The length of the message is 3 octets which encompasses the one octet Type field and the two octet Length field.

so

ur

A KeepAlive TLV is sent to an MSDP peer if and only if there were no MSDP messages sent to the peer within [KeepAlive-Period] seconds. This message is necessary to keep the MSDP connection alive. 0 1 2 3 01234567890123456789012345678901 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 4 | 3 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-33

Mo

Events E1) Enable MSDP peering with P E2) Own IP address < P's IP address E3) Own IP address > P's IP address E4) TCP established (active side) E5) TCP established (passive side) E6) ConnectRetry timer expired E7) Disable MSDP peering with P (e.g., when one's own address is changed) E8) Hold Timer expired E9) MSDP TLV format error detected E10) Any other error detected

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

An MSDP peer starts in the DISABLED state. MSDP peers establish peering sessions according to the following state machine:

ur

ce

MSDP uses TCP as its transport protocol. In a peering relationship, one MSDP peer listens for new TCP connections on the well-known port 639. The other side makes an active connect to this port. The peer with the higher IP address will listen. This connection establishment algorithm avoids call collision. Therefore, there is no need for a call collision procedure. It should be noted, however, that the disadvantage of this approach is that the startup time depends completely upon the active side and its connect retry timer; the passive side cannot cause the connection to be established.

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-35

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-36

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-37

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-38

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-39

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-40

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-41

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-42

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-43

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-44

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-45

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-46

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-47

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-48

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-49

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-50

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-51

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-52

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-53

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-54

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-55

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-56

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-57

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-58

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-59

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-60

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Course Name

N-61

Mo

re

Le

ar

ni

Confidential Information of Huawei. No Spreading Without Permission

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g. hu

aw ei .c om /e

Mo

re Re so ur ce s: ht tp :/ /l ea rn

Le

ar

ni

ng

in g. hu

aw ei .c om /e

You might also like