Professional Documents
Culture Documents
Implementations
Another use of multicast within campus and commercial networks is for file
distribution, particularly to deliver operating system images and updates to
remote hosts. The key advantage of multicast boot images over unicasting boot
images is significantly lower network bandwidth usage.
IP multicast has also seen deployment within the financial sector for
applications such as stock tickers and hoot-n-holler systems.
While IP multicast has seen some success in each of these areas, IP multicast
is not widely deployed and is generally not available as a service for the
average end user.[citation needed] There are at least two primary factors for the
lack of widespread deployment, both somewhat related to the other. On the
one hand, forwarding multicast traffic, particularly for two-way
communication, requires a great deal of protocol complexity.[citation needed] On the
other hand, there are a number of additional operational concerns in being able
to run a multicast network successfully, largely stemming from the complexity
of a widely-deployed implementation, not the least of which is the enabling of
additional avenues of failure, particularly from denial-of-service attacks. Many
of these issues are covered in further detail below.
RFC 3170 (IP Multicast Applications: Challenges & Solutions) provides an
overview of deployment issues.
Addressing
There are four forms of IP addressing, each with its own unique properties.
Most of the existing application protocols that use multicast run on top of the
User Datagram Protocol (UDP). In many applications, the Real-time Transport
Protocol (RTP) is used for framing of multimedia content over multicast; the
Resource Reservation Protocol (RSVP) may be used for bandwidth reservation
in a network supporting multicast distribution.
A number of errors can happen if packets intended for unicast are accidentally
sent to a multicast address; in particular, sending ICMP packets to a multicast
address has been used in the context of DoS attacks as a way of achieving
packet amplification.
There are a number of current general assignment strategies, these are only
some of them. For general information with pointers to other documents, see
RFC 3171.
The 224.0.0.0/24 block is for local subnetwork multicast only. Datagrams sent
to these destinations should never be forwarded by a router.
Much of the remaining address space within 224/8 has either been assigned to
a handful of disparate applications and uses over the years or is simply IANA
reserved. This /8 block is sometimes referred to disparagingly as the
multicast swamp.[citation needed]
Routing
Each host (and in fact each application on the host) that wants to be a
receiving member of a multicast group (i.e. receive data corresponding to a
particular multicast address) must use the Internet Group Management
Protocol (IGMP) to join. Adjacent routers also use this protocol to
communicate.
For IPv6 Multicast addresses, the Ethernet MAC is derived by the four low-
order octets OR'ed with the MAC 33:33:00:00:00:00, so for example the IPv6
address FF02:DEAD:BEEF::1:3 would map to the Ethernet MAC address
33:33:00:01:00:03
There are switches that listen to IGMP traffic and maintain a state table of
which network systems are subscribed to a given multicast group. This table is
then used to forward traffic destined to a given group only to a limited set of
hosts (ports). This is done through the use of IGMP snooping.
Reliable multicast
IP multicast protocols