====== IGMP Snooping / Forwarding Behaviour ======
===== Port states =====
* mrouter (router port)
* subscriber (port belongs to established multicast group)
* none
===== Forwarding cases (igmp snooping enabled on vlan) =====
* multicast traffic received on "none" port
* if no mrouter present, flood to all ports
* otherwise flood to mrouter ports
* igmp received on "none" port
* if no mrouter present, ignore frame (no group is created)
* otherwise
* creates multicast group
* forwards to mrouter ports only
* port becomes "subscriber"
* multicast traffic received on "mrouter" port
* send to established group members only
* igmp received on "mrouter" port
* creates multicast group
* forwards to mrouter ports only
===== Other notes =====
* if igmp snooping is disabled, multicast traffic is flooded to all ports in vlan, regardless of frame nature (i.e. it is igmp or not); static multicast fdb entries are ignored;
* mrouters can be statically configured while igmp snooping is disabled on vlan, but they are ignored until igmp snooping is enabled; when igmp snooping is enabled, the rules listed above apply;
* mrouters are not activated until: interface is up AND interface has access to mrouter vlan (either access mode vlan or trunk allowed vlan)
When changing access vlan, with mrouter already configured (in new vlan):
5w0d: IGMPSN: mgt: Vlan 15, port Fa0/5 port_id 7 in non-fwd mode
5w0d: IGMPSN: mgt: received pmvlan_linkchange down event on vlan 15
5w0d: IGMPSN: Adding router port Fa0/5 to all GCEs in Vlan 18
5w0d: L2MM: added rport Fa0/5 on Vlan 18
5w0d: %SYS-5-CONFIG_I: Configured from console by vty0 (10.0.0.2)
====== Implementation Approach ======
Analyzing the forwarding cases, it turns out that when incoming packets are forwarded to more than one port at the same time, they are forwarded to either all ports in a specific igmp group or all mrouter ports (but not a mix of the two). In other words, depending on the igmp snooping logic, either an igmp group or a list of mrouter ports is sufficient to determine which ports to forward to.
===== Forwarding to ports in an igmp group =====
* igmp group membership is stored as special fdb entry
* is_static field in struct net_switch_fdb_entry is change to a bitwise field:
* b0 tells if entry is dynamic or static
* b1 tells if entry is regular fdb entry or igmp membership entry
* for igmp membership entries, a b0 value corresponding to "static" means user-configured group membership
* all igmp membership entries have a virtual MAC address formed as 01-00 plus the group address (4 bytes)
* when flooding to all ports in a group, the following actions are taken:
* first the virtual mac corresponding to the packet destination is build;
* the fdb bucket corresponding to the virtual mac is determined;
* the fdb bucket is walked to determine the ports to forward to:
* virtual mac must be equal (between fdb entry and packet)
* vlan must be equal (between fdb entry and packet)
* igmp group listing is done only on the slow path (upon user request) by walking the entire fdb and building the igmp group list:
* the kernel module is asked for a list of all igmp membership fdb entries (with the ability to filter by a specific group and/or vlan);
* userspace code walks the fdb entry list and builds a (temporary) list of groups and, for each group, a list of member ports
The following changes need to be made to existing code:
* fdb queries from userspace need to filter out igmp membership entries;
* standard (non-multicast) packet fdb lookup needs to ignore igmp membership entries;
===== Forwarding to mrouter ports =====
Whether a port is mrouter or not is a function of the port and vlan. In other words, mrouter can be stored as a flag (bit) depending on the port and vlan. Since vlan number is limited and relatively small (4096), mrouter information can be stored as a per-port vlan-indexed bitmap. The data structure would be similar to vlan membership for trunk ports.
Flooding to all mrouter ports in a specific vlan becomes very simple:
* use the VDB to iterate through all ports in the required vlan;
* for each port check if it's mrouter in the required vlan;
Algorithm can be easily cloned from sw_flood().
====== CLI Commands ======
**exec#**
sh ip igmp snooping [vlan x]
sh ip igmp snooping groups [vlan x] [dynamic|user] [count] etc
sh ip igmp snooping mrouter [vlan x]
**config#**
[no] ip igmp snooping vlan x mrouter interface y
[no] ip igmp snooping vlan x static a.b.c.d interface y
====== Useful links ======
* [[http://tools.ietf.org/html/rfc4541|RFC 4541 - Considerations for IGMP and MLD Snooping Switches]]
* [[http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_25_see/configuration/guide/swigmp.html|Configuring IGMP Snooping and MVR (Catalyst 3560)]]
* [[http://technet.microsoft.com/en-us/library/cc957928.aspx|Mapping IP Multicast to MAC-Layer Multicast]]
* [[http://www.columbia.edu/~alan/igmp/|Some experiments with IGMP snooping behavior of a couple of switches]]
* [[http://www.advenage.com/topics/change-IGMP-version-on-debian-linux.php|Changing IGMP version on Debian Linux Systems]]