Professional Documents
Culture Documents
Video Over IP
Video Over IP
Video Over IP
p
over IP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Video Transport over IP
Market Overview
2
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Video Service Providers
Taxonomy & Characteristics
Video
Stream
Bandwidth
Studio to Studio; Broadcaster
to Broadcaster
Uncompressed, Lossless Content owner to provider
Very High bit-rate stream: SD Compressed Provider to subscriber i.e.
(270Mbps), HD (1.5-3Gbps) Cable TV & IPTV
Low/moderate bit-rate
bit rate stream
P-to-P and P2MP ~ same as secondary dist Compressed
(unicast and multicast) Low bit-rate stream: SD (3-
P-to-P and P2MP
P2MP MPLS technology (unicast and multicast) 4Mbps mpeg2, 2-3Mbps
mpeg4), HD (16-20Mbps
e.g. Broadcasters, Studios MPLS & IP technology mpeg2, 8-10Mpbs mpeg4)
e.g. Contribution providers, P-to-P for VOD (unicast) &
US national cable backbones P2MP for IPTV (multicast)
MPLS & IP technology
e.g. Service Providers
Contribution
Primary
Distribution Secondary
Distribution
# of end points
3
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Video Service Providers
Mapping to Broadcast Industry
• Increasing demand for
localised content
Contribution • Service Control & Broadcast
Primary Quality gaining prominence
Distribution • Increasing scale to end-
Studio
Studio
customer
Final Common core network
Studio
requirements & designs
IP/MPLS
Core
Secondary
IP/MPLS
IP/MPLS Distribution
Mobile Core
Core
Studio
Fixed
Studio
IP/MPLS
IP/MPLS
Core Home
Core Network
Access
DCM
N t
Network
k
Super VOD
Head End content
(x2) distributing
to scale
DCM
VOD VOD VOD
International DCM / VQE
National Super
& National Local
Content Head End Content Head End VSO Home
Content
Insertion (x2) Insertion (x10s) (x100s) x millions
Insertion 4
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Video Transport:
Primary Technology challenges
1. Basic transport
H
How to shift
hif the
h packets
k … IP or MPLS
MPLS, native
i or VPN?
Type of provider impacts transport requirements
5
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Video Transport over IP
6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
50,000 Feet Architecture
IPTV and Multicast
IPTV “Services
Services Plane”
Plane IP multicast
Service gateway
IP multicast Receive/process/send
source Eg: Ad-Splicer, Dserver, Transrater,… IP multicast
receiver
Signalling
Signaling
Signaling
Service Interface
2. IP multicast
Allow to attach service plane devices (sourcing, receiving) anywhere – global, national,
regional, local. Start/stop sending traffic dynamically, best utilize bandwidth only when
needed.
One network technology usable for all services (IPTV
(IPTV, MVPN
MVPN, …))
Different transport options for different services possible
Enable network operator not to provision/worry about individual programming.
3. Service Interface
How network & service operator infrastructure interacts with each other
SLA of IP multicast traffic sent/received, Signaling used
8
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transport Architecture Elements
C t t
Content
Source P2 PE2 CE2
Tailend LSRs =
CE2 PE1 P1 Downstream PEs
10
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transport architecture
Overview
1.Common current deployments: Native PIM-SSM or
MVPN
2.Emerging / Future alternatives:
Support for MPLS multicast (LSM)
( )
P2MP / MP2MP label switched delivery trees
mLDP (P2MP, MP2MP), RSVP-TE P2MP
Put traffic into a VPN context
As a method of service isolation / multiplexing
L2 vs.
vs L3 on PE nodes
To “integrate” better into an L2 service model
Redefine PE-PE
PE PE signaling for MVPN
11
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
MPLS traffic forwarding
“Pop”
PE-1 P-4
CE-1 MC Pkt
MPLS Core
Content
Source MC Pkt L30
MC Pkt
“Push” PE-3
IPv4
“Swap” IP 6
IPv6
CE-3
Note: Deployment timelines are dependent on the platform Receiver
12
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
mLDP signaling Note: Deployment timelines are
with native and Direct
Direct-MDT
MDT dependent on the platform
IPv4 PE-2
PE 2
MPLS
Core
PE-1 P-4
CE-1
Content
Source RESV Label = 100 Static IGMP/PIM join
Source= 10.10.10.1
RESV Label = 100 PATH P4, PE2 PE-3 Group = 232.0.0.1
On interface to CE
RESV Label = 30 IPv4
2.Locality:
Affects convergence/reoptimization speed:
PIM/mLDP:
PIM/ LDP F Failure
il iin network
k affects
ff only
l router iin
region (eg: in pink region).
RSVP: impact headend and all affected midpoint and
tailends for RSVP-TE reoptimization.
R
Rcv
Join/leave of members affect only routers up to first
router on the tree in mLDP/PIM. Will affect headend Rcv
and all midpoints in RSVP-TE P2MP. Rcv 15
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
RSVP-TE P2MP benefits over PIM/mLDP
Examples
1.Sub 50 msec protection ? Src
Also feasible for PIM/mLDP
Headend
H d d
2.Load-split traffic across alternative LSR
paths (ECMP or not)
PIM/mLDP
PIM/ LDP tree
t follows
f ll shortest
h t t path,
th “dense”
“d ”
receiver population == dense use of links
RSVP-TE P2MP ERO trees (RED/PINK) under
control of headend LSR.
CSPF load split based on available bandwidth.
“Steiner tree” CSPF modifications possible
Transport
Opt.
Opt O ti
Options IGMP:
{Limits} IGMPv3 IGMPv3 IGMPv3 IGMPv3 IGMPv3
Source
{Static-fwd} snooping snooping snooping proxy routing SSM
Redundancy
PIM-SSM
19
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
IGMP Snooping vs. PIM Routing?
20
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
IGMP Snooping vs. PIM Routing?
L3 Multicast provides excellent monitoring
QAM
Link
Failure
Node
Failure
Anycast Concept
• native 1:1 stream protection
• simple,
simple fast and automatic
Encoders
• exists in L3 MC only
TV Headend
DCM • no RPF check in L2 MC
22
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Layer 2 Multicast – is complicated
QAM
Link
Failure
PIM
Assert
Missing
Hellos
X
Encoders
DCM
TV Headend 23
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Layer 2 Multicast – chained VPLS?
Node
Failure
QAM QAM
VPLS
VPLS VPLS
Link
Li k
Failure
Assert
VPLS
No Hello VPLS
Encoders
TV Headend
DCM Discontiguous Subnets!!! 24
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Layer 3 Multicast – IETF PIM SSM
Node
Failure
QAM QAM
A/ IP Routing
g
• connection-less convergence
• works automatically
• possible using simple IP Routing
Link B/ MPLS FRR
Failure • connection-oriented
• manual pre-provisioning
•ppossible using
g Routed Pseudowire
Source
Failure
Encoders
DCM
TV Headend 25
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
MPLS FRR for IPmc – Routed PW
QAM QAM
Encoders
DCM
TV Headend 26
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
(Aggregation) networks
Why L3 and not L2 ((‘snooping’)
snooping )
PIM joins
History (ATM-DSLAM)
2. “Switched Digital
g Video”
Static
P
Allow oversubscription of PE-
PE-AGG
AGG/DSLAM link
3 “Real
3. Real Multicast
Multicast” DSLAM
dynamic tree building full path
P joins
IGMP joins
IGMP joins
Home
Gateway
IGMP
28
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Video Transport over IP
Resiliency options
29
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Video SLA Requirements
1. Throughput
Addressed through capacity planning and QOS (i.e. Diffserv)
2
2. Delay/Jitter
Delay variation absorbed by jitter buffer at STB
Desire to minimise jitter buffer to improve responsivity (reduce channel change
time)
Controlled with QOS (i.e. Diffserv) – core contribution to delay variation is
insignificant compared to other factors
Diffserv is mature technology and premium transport service is known to offer ~
<1msec jitter end-to-end
3. Loss – controlling loss in the main challenge
4. Service Availability
The proportion of time for which the specified throughput is available within the
bounds of the defined delay and loss - a compound of the other networks
and network availability
30
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
MPEG – Impact of Packet Loss
1200
1000
Duration of impairrment (ms)
SD-low -w orst
200
1. Jason Greengrass, John Evans and Ali C. Begen, "Not all packets are equal, part I:
streaming video coding and SLA requirements," IEEE Internet Comput., vol. 13/1, pp. 70-75,
Jan./Feb. 2009
2. Jason Greengrass, John Evans and Ali C. Begen, "Not all packets are equal, part II: the
impact of network packet loss on video quality," IEEE Internet Comput., vol. 13/2, pp. 74-82,
Mar./Apr. 2009
31
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Video SLA Requirements:
Managing
g g Loss
Range of viable 1. A number of technological
engineering options approaches to achieve required
may vary by type of SLA
xity
video distribution,
Cost and
d
Complex
Viable-
ential Over-
Engineering Required
Pote
E
32
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
How to compare different approaches
1. Can compare different 1. An idealised solution …
approaches in terms of:
Is lossless in the failure of all
Lossless or lossy SHE and core network
element failures
Requires that only the basic
Bandwidth usage in network MPEG stream be provisioned
working and failure cases on working case and failure
case p
paths
Delay impact on transported Adds negligible overall delay to
stream the transported stream
Primary
Stream
Video Video
Source Receivers
Rerouted
R t d
Core Primary Edge
Distribution Stream Distribution
(DCM) (DCM)
Presentation_ID
8 Is not hitless – will result in a visible artifact to the end users
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
35
IPoDWDM Proactive Protection
1
1. IP / optical
ti l integration
i t ti enables
bl theth capability
bilit tto id
identify
tif ddegraded
d d lilink
k
using optical data (per-FEC BER) and start protection (i.e. by signaling
to the IGP) before traffic starts failing, achieving hitless protection in
many cases
LOF Near-hitless
SR switch
port on WDM
BER
BER
router port on
router
FEC
Corrected bits
T
Trans-
ponder
FEC Protection
trigger
WDM WDM
Primary
Stream
Video Video
Source Receivers
Rerouted
R t d
Core Primary Edge
Distribution Stream Distribution
(DCM) (DCM)
= Source
5. MPLS TE and MTR are options in topologies
that do not support MoFRR
39
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Application-level approaches for recovering
from p
packet loss
1. Forward Error Correction (FEC)
FEC adds redundancy y to the transmitted data to allow the
receiver to detect and correct errors (within some bound)
without the need to resend any data
40
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Spatial (Path) Diversity
((a.k.a “live / live”))
Primary
Stream
Video Video
Source Receivers
Core Edge
Distribution
Distribution Primary (DCM)
(DCM) Stream
1. Two streams are sent over diverse network paths between the sender and
receiver
2. Spatial
p diversity
y
3 Supports hitless recovery from loss due to core network failures with packet
by packet stream merge functions (e.g. DCM)
3 Lower overall bandwidth consumed in failure case compared to FEC
3 Introduces no delay if the paths have equal propagation delays
! May require network-level techniques to ensure spatial diversity: MoFRR,
MPLS TE, MTR – required techniques depend upon topology 41
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network-level technologies for engineering redundant
paths to support spatial redundancy
2. MPLS TE
Requires MPLS TE – additional cost and complexity
Possible option in topologies that do not support MoFRR
3 Multi
3. Multi-topology
topology routing (MTR)
Requires MTR – additional cost and complexity
Possible option in topologies that do not support MoFRR
42
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dual plane networks
Standard customer
Standard customer CE site B
CE site A
MoFRR customer
MoFRR customer CE site B
CE site A
MoFRR MoFRR
43
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Source Redundancy
Anycast/Prioritycast policies
Src A Src B
primary secondary
10.2.3.4/32 10.2.3.4/31
• Policies
Anycast: clients connect to the closest
instance of redundant IP address
P i it
Prioritycast
t: clients connect to the highest-
priority instance of the redundant IP address
1. Also used in other places
Eg: PIM-SM, Bidir-PIM RP redundancy, DNS
2. Policy simply determined by routing
announcement and routing config
Anycast well understood
Prioritycast: engineer metrics of announcements
or use different prefix length. Rcvr 1 Rcvr 2
Example: prioritycast with
44
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Prefixlength annuncement
Video Transport over IP
Video Monitoring
45
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Video Transport Monitoring
1. Need techniques to isolate where and what video
packets are being dropped in the network
2. Multi-pronged approach
Active video transport monitoring: IPTV SLA
Passive per flow video transport monitoring: Vidmon
Video quality monitoring: Trap and clone
Overarching video service management solution: VAMS
46
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Passive per flow video transport monitoring: MDI
Vidmon
1. Embedded router technique (MDI) to isolate where and what
video packets are being dropped in the network on a per-flow
basis
2. Discriminates between problems at the source boundary, at the
edge boundary, within the network
3. Complements IPSLA functionality
4. Focuses on loss monitoring
5. Scales to 100’s of flows
6. Leverages MDI, a well-known industry metric: RFC4445
47
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Passive per flow video transport monitoring: MDI
Vidmon – Example
p #1
Access Service
MDI and Receivers
MDI
MDI(CTV)
0:0
MDI(CTV)
MDI 0:0
Access Service
Video MDI and Receivers
MDI(CTV)
Source 0:0
MDI MDI(CTV)
MDI (CiscoTV, CRS1) = DF: MLR 0:0
• Delayy Factor (DF):
( ) a measurement at MDI(CTV) Access Service
router CRS1 of the accumulated jitter for 00
0:0 MDI
flow “CiscoTV”
and Receivers
• Media Loss Rate (MLR): a measurement
at router CRS1 of the accumulated loss for MDI(CTV)
flow “CiscoTV” -50:0.1
T&C
Access Service
Video and Receivers
S
Source
Access Service
T&C
and Receivers
Correlation
Cisco Multicast
Manager
ANA
Features
MySQL Traps • Dynamic visualization
VNE Servers
of Video
Metrics
Collection • C stom Service
Custom Se ice Views Vie s
Polling/Traps
Polling/Traps
• Root-cause Analysis
• Integration
Commands
with other OSS/BSS
solutions
Data Sources
• Proactive Video Transport
Monitoring
• Data collection from probes Linksys/SA
IP NG Network • Multicast data collectionHome
Router
Benefits
CRS 1
CRS-1 CRS-1 CRS 1
CRS-1 •
4500 or Reduces
7600 Mean Time to Repair
7600 SA QAM
Router Router Router 7600 (MTTR)
Series
• Enhanced Video Quality of
IP/MPLS IP/MPLS IP/MPLS
Experience
• Proactive Video Transport
Monitoring
CRS-1 CRS-1 7600 7600 7600 or •4500 orIncreased
7600 Operational Efficiency
DSLAM
Router Router CRS Series SA STB or
DVR
50
© 2008 Cisco Systems, Inc. Regional
Backbone Network
Presentation_ID Network
All rights reserved. Cisco Confidential Aggr / Div Network Access/Hub Home
Video Transport over IP
Summary
51
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Transit technologies for IPTV
Summary / recommendations
1.Native PIM-SSM + RPF-Vector
Most simple, most widely deployed, resilient solution.
2.MVPN-GRE
Also many years deployed (Cisco/rosen specification).
Recommended for IPTV when VRF-isolation necessary !
3.mLDP
Recommended Evolution for MPLS networks for all IP multicast transit:
‘Native’ (m4PE/m6PE)
‘Direct-MDT/MVPN-mLDP’ (IPv4/IPv6)
4 RSVP TE P2MP
4.RSVP-TE
Strength in TE elements (ERO/CSPF + protection)
Recommended for limited scale, explicit engineered designs,
eg: IPTV contribution networks
networks.
52
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Resilience
Summary y
1. Determine what resilience you need for IPTV and other services
Expectations
p are shifting
g with more experience
p of operators
p
2. Multicast Fast Convergence only end-to-end ubiquitous layer 3
resilience. Well optimized, but architecturally limited
Subsec
3. Sub 50 msec link protection alone (DPT rings, protected
pseudowires) is not a full L3 solution
4. Optimizations at L3:
RSVP-TE P2MP: FRR
PIM/mLDP: Make-before-break, Full (IP)-FRR, MoFRR, Live-Live
5 Applications:
5.
Do not only ask what the network can do for you, …
but ask what you can do for the network
FEC, ARQ, live-live (QoS marking, pacing, …)
53
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco Networkers
25-28. januar 2010.
Barselona
R i t jt se
Registrujte
54
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential