White Paper
IP Networks for Broadcaster Applications
Yves Hertoghs (yhertogh@cisco.com), Distinguished Systems Engineer, Cisco
Thomas Kernen (thkernen@cisco.com), Consulting Engineer, Cisco
Steve Simlo (ssimlo@cisco.com), Consulting Engineer, Cisco
i
White Paper
Table of Contents
Introduction............................................................................................................................................................................................... 3
Overview of IP Architectures in Broadcast Environments................................................................................ 4
An Introduction to Internet Protocol..................................................................................................................................... 6
The Internet Protocol (IP) ......................................................................................................................................................... 6
The Role of Multi-Protocol Label Switching (MPLS) ........................................................................................ 7
The Role of Ethernet .................................................................................................................................................................... 8
Unicast and Multicast IP Forwarding ............................................................................................................................ 8
Unicast Routing .......................................................................................................................................................................... 8
Multicast............................................................................................................................................................................................ 9
Achieving Quality of Service and Resilience in IP and MPLS Networks ....................................11
Comparing QoS and Resiliency in Packet-Based and Circuit-Switched Networks .....11
Achieving Quality of Service Through the IP Differentiated Services Model .........................12
Connection Admission Control ......................................................................................................................................13
Comparing IP and MPLS .....................................................................................................................................................14
Transporting Contribution and Distribution Video Services over IP ....................................................14
Video Compression..................................................................................................................................................................15
Transport and Compression Schemes in IP Video Networks .............................................................15
Uncompressed Video Services ................................................................................................................................16
Frame-by-Frame Compression ................................................................................................................................16
Group-of-Pictures Compression .............................................................................................................................16
IP Video Adaptation Requirements.............................................................................................................................17
Delay .................................................................................................................................................................................................17
Jitter and Wander..................................................................................................................................................................17
Clock Synchronization ......................................................................................................................................................17
Impact of Loss on Different Video Types ...............................................................................................................18
Scheduling Applications.......................................................................................................................................................19
Convergence Mechanisms for Transporting Video over IP ........................................................................19
IP Convergence in WDM Networks.............................................................................................................................20
Bidirectional Forwarding Detection ............................................................................................................................20
Routing Protocol Enhancements ..................................................................................................................................21
Traffic Engineering .....................................................................................................................................................................21
Multicast-only Fast Re-Route (MoFRR). ...................................................................................................................21
Choosing the Right Convergence Technique...................................................................................................22
Anycast Source Redundancy ..........................................................................................................................................23
Packet Retransmission ..........................................................................................................................................................24
Conclusion..............................................................................................................................................................................................24
Table of Figures
Figure 1. Macro view of Broadcaster’s Production and Delivery Process ........................................ 4
Figure 2. Video Services Lifecycle ...................................................................................................................................... 5
Figure 3. Adapting Digital Video onto IP ......................................................................................................................... 5
Figure 4. Unicast Routing............................................................................................................................................................. 8
Figure 5. Multicast Routing ......................................................................................................................................................... 9
Figure 6. Any-Source Multicast ...........................................................................................................................................10
Figure 7. Source Specific Multicast .................................................................................................................................10
Figure 8. End-to-end delay......................................................................................................................................................17
Figure 9. MPEG-2 video GOP based compression with a slice error due to packet loss
“Source material copyright SMPTE, used with permission” ........................................................................18
Figure 10. IPoDWDM ....................................................................................................................................................................20
Figure 11. Multicast-Only Fast Re-Route .....................................................................................................................22
Figure 12. Spatial Reduncancy .............................................................................................................................................23
ii
3
White Paper
Introduction
The future of communications is here, and its name is Internet Protocol (IP). Originally
regarded as an IT-only transport technology suitable for data and email traffic, IP has
quickly become the dominant standard for all types of communications. This change
is largely due to the inherent flexibility of IP transport, its cost efficiencies, and the
ubiquitous availability of IP networks. Despite these advantages, however, until recently
broadcasters have not considered IP ready to support “mission critical” real-time video
services. While IP networks have played a role in contribution and production processes,
they typically were reserved for non-real-time applications. Today, IP network technology
has evolved, and concerns about its ability to support the stringent quality and resiliency
demands of real-time video have been addressed. As a result, IP is emerging as an
increasingly important technology for broadcasters and service providers, and IP-based
transport networks and medianets are now used by broadcasters around the globe.
The advantages of IP extend beyond operational expense (OPEX) and capital expense
(CAPEX) cost reductions. Once broadcast services can be managed within the IP domain,
broadcasters have the opportunity to transform production, post-production, contribution,
and distribution of core video and audio assets. The ability to share video assets quickly
and efficiently on a shared IP network infrastructure can unleash unprecedented
collaboration, efficiency, and agility throughout the entire broadcast value chain. (Figure
1.) This includes:
• Production: Many broadcasters still rely on production systems that are managed
as independent applications, supported by dedicated infrastructures and physical
tapes. The result is a production workflow that is fragmented and fraught with delays
and duplicated efforts. An IP environment supports an end-to-end digital workflow that
dynamically moves media through the production process, breaks down operational
silos, and supports company-wide collaboration. As a result, digital workflows can
reduce OPEX, allow editing functions to be easily shared among different teams, and
significantly reduce “time to air” – especially important for news applications.
• Contribution: The same innovative approaches that are transforming media production
can also be applied to the delivery of video between studio locations and among
broadcast partners. Highly flexible and cost-effective IP networks let broadcasters
reduce OPEX and rapidly introduce new services, such as high-definition (HD) video.
• Distribution: Distribution of national and local Digital Video Broadcast – Terrestrial
(DVB-T) services to transmitter sites can also benefit from the CAPEX and OPEX saving
of an IP-based network. And, once DVB-T services are managed within the IP domain,
they can easily be delivered over fiber, copper, or microwave networks, and within
systems encompassing all three.
• Consumption: Broadcasters need to deliver TV services to consumers over multiple
platforms and multiple screens (TV, PC, and mobile device), both in the home and
on the go. They need solutions that can accommodate diverse video formats, quality
levels, and compression standards, and deliver the highest quality for the lowest cost. IP
provides a common framework for easily adapting and distributing TV services for any
platform or device.
4
Figure 1. Macro View of Broadcast Production and Delivery Processes
All of these extraordinary capabilities are supported by the unique advantages of IPbased networks in broadcast environments. Unlike any other network type available to
broadcasters today, IP networks provide:
• An open, standards-based, widely adopted transport solution, providing reassurance for
future longevity as well as competitive pricing
• Exceptional flexibility, with near-infinite bit-rate granularity and easily adaptable routing
capabilities
• Substantial OPEX savings through the convergence of multiple services onto a common
infrastructure, with these benefits multiplying as more services are migrated to IP
This paper outlines how IP Networks can provide a viable transport solution for
broadcasters. It provides an in-depth discussion of IP transport technologies, including
the role of IP, Ethernet, Multi Protocol Label Switching (MPLS) and how they compare
to legacy transport protocols such as Synchronous Digital Hierarchy (SDH) and
Asynchronous Transfer Mode (ATM) for video transport. The paper describes the quality
and resiliency techniques that allow modern IP networks to support demanding real-time
video services and discusses IP video compression and adaptation mechanisms. Finally,
it provides an overview of techniques broadcasters can employ to ensure maximum
availability and reliability in IP-enabled broadcast networks.
Overview of IP Architectures in Broadcast Environments
The creation of content and its distribution is a multi-stage process that involves a broad
range of stakeholders, skill sets, and technologies. Video services follow a lifecycle from
initial acquisition, through the production and packaging of the content, to final playout
to the distribution network that delivers the content to viewers. (Figure 2.) Each stage
in this lifecycle has its own requirements and challenges. This paper focuses on the
contribution and primary distribution stages.
5
White Paper
Figure 2. Video Services Lifecycle
The first stage in the lifecycle is the acquisition of the video content into the IP domain.
Adapting digital video onto an IP network is achieved using either cameras with a built
in Ethernet/IP network interface card, or via a standalone IP video adaptor (sometimes
referred to as a “IP video gateway” or “IP video encoder”) as shown in Figure 3.
SD
Source
ASI
SD
Source
GbE??
ASI
SD
Source
IP Receiver
IP Video Gateway
GbE
IP Video
Gateway
GbE
D??00 DCM
Core Router
SD/HD SD/HD-SD
Source
GbE
Router
Core Network
IP/MPLS
SD Gateway
SD JPEG2000 Gateway
SD-HD JPEG2000
Gateway
SD/HD-SD
Router
GbE
SD Gateway
SD JPEG2000 Gateway
HD-SD JPEG2000
Gateway
FE
FE
HD-SD
HD
Source
SD
MPEG-2 Decoder
MPEG-2 HD Encoder
MPEG-4 AVC
HD Encoder
SD
SD
Source
ASI/IP
GbE
FE
FE
SD/HD-SD
MPEG-4 AVC Decoder
MPEG-2 SD Encoder
MPEG-4 AVC SD Encoder
Studio/Live Event
Network Management
Main Studio/
Post-production Facility
Figure 3. Adapting Digital Video onto IP
6
An Introduction to Internet Protocol
This section outlines the Internet Protocol suite. It discusses unicast and multicast
packet forwarding, as well as techniques for achieving Quality of Service (QoS) and high
availability in an IP Network. This section also explains the role of Ethernet and of MPLS in
IP networks.
The Internet Protocol (IP)
Originally, IP was designed for communication across the Internet. In recent years,
however, it has become the de facto communication protocol for all types of traffic in
private and public networks. In today’s enterprises, nearly all communication is IP based,
allowing enterprise networks to support data, voice, video, storage, and other services
on a common, standards-based infrastructure. Service Providers have also adopted
the Internet Protocol suite almost universally, allowing them to converge their various
services across a common IP-based backbone. Services such as Internet access, voice
(both private branch exchange [PBX] interconnects and Public Switched Telephone
Network [PSTN] services), business interconnect services (typically via virtual private
networks [VPNs]) and increasingly, video, are now delivered over IP networks. For all
organizations relying on IP, the common driver is the flexibility and cost savings afforded
by converging services across a common, cost-efficient, standards-based infrastructure.
IP is also becoming the preferred protocol for delivering broadcast video services.
Broadcasters are using IP transport not only in secondary distribution networks (i.e. IP
television [IPTV] over residential broadband systems), but also increasingly for Primary
Distribution and Contribution networks. While some broadcasters previously questioned
whether IP could support video services, the latest achievements in quality of service,
resilience, fast repair, switching speeds, and scalability have made IP networks reliable
enough to become a viable option for video contribution networks. Consequently,
broadcasters can now converge services and technologies over a common IP
infrastructure, and enjoy the same OPEX and CAPEX advantages that enterprises and
service providers have enjoyed for many years.
The chief characteristic of IP that distinguishes it from traditional technologies such
as ATM and SDH is that it is packet-based. With traditional “connection-oriented”
technologies, a path must be set up across the network from origin to destination before
any traffic can be sent. IP offers a fundamentally different paradigm, in which the network
itself determines the optimal path for transmitting traffic to its destination at any given
moment, and routes traffic dynamically. In the IP model, no transmission path is set up to
the destination in advance. Instead, an end station wraps data inside a packet “container,”
stamps a destination (and origin) address on it, and sends it into the network. The network
then uses the IP addresses to transport the packet to its destination through “connectionless” packet forwarding or “IP routing.” The nodes forwarding these IP packets (routers)
constantly update each other about the reachability of IP addresses and/or networks
through the use of IP routing protocols. Today’s IP routing protocols allow every router in
the network to individually build a full topology view of the IP network.
The connection-less approach of IP networks offers several advantages. First, since no
paths must be established in advance, provisioning is easier and more cost-efficient. IP
networks are also inherently resilient: since no paths are pre-established, an IP network
will always reroute around any link or router failure (assuming the network has been
designed with resilient nodes and links). This allows IP networks to survive multiple link
and node failures – something not always possible with path-protected networking
technologies such as SDH.
7
White Paper
The Role of Multi-Protocol Label Switching (MPLS)
Multi-Protocol Label Switching is a technology that builds on “Layer 3” or routing-layer
IP capabilities to simplify and improve the exchange of IP packets. In MPLS networks,
MPLS-enabled routers use IP routing protocols to exchange information with each other.
However, the information exchanged goes beyond the reachability of IP routes to include
“Layer 2” information about network links, such as bandwidth, latency, and utilization.
Routers at the edge of an MPLS network encapsulate packets with MPLS headers
containing one or more “label stack” entries. These label stack entries contain a 20-bit
value (a label), that can be used to forward packets. (Functionally, this label replaces the
IP address, which is now “hidden” within the MPLS packet.) The label points to the next
hop MPLS router. By stacking MPLS labels, network engineers can create hierarchies
inside the network, since intermediate MPLS routers will only act upon the top or outer
label. Labels further down the stack provide information for “applications” at the edge
of the network, such as an IP VPN identifier, Layer 2 tunnel ID, and more. Note that the
outer MPLS label is only specific to the link. The MPLS network swaps this outer label on
a node-by-node basis (analogous to Data Link Connection Identifiers [DLCIs] in Frame
Relay networks or Virtual Path or Virtual Circuit Identifiers [VPIs/VCIs] in ATM networks).
Traditional IP routers examine the IP headers and make individual forwarding decisions
on a hop-by-hop basis. This is essentially the way connection-less networks work. MPLS
routers perform the IP lookup only once when the packet enters the network. At that point,
the MPLS router replaces the routing information with a label, and downstream MPLS nodes
make forwarding decisions based only on this label, effectively creating a more “connectionoriented” approach. This approach offers some advantages over traditional IP routing.
MPLS allows the router performing the MPLS encapsulation to assign a label based on
more than the destination IP address of the packet (e.g. traffic class, ingress interface).
This allows for the creation of different paths across the MPLS network, even if the
ultimate IP destination is the same. The router performing the MPLS encapsulation can
assign a label based on its own identity, so the receiving router can then infer from which
router this packet came. This is impossible with traditional IP routing.
MPLS also allows engineers to force a packet to follow a given route across the network
without having to encode the desired path inside the packet. The MPLS nodes merely
forward based on the labels, but the labels can be installed for a pre-computed explicit
path. This path can also be installed with a certain amount of bandwidth assigned. Using
this technique, traffic engineering capabilities can be applied to networks running IP
protocols, making them more familiar to network administrators used to path-based,
connection-oriented networks. For example, the IP protocol Resource Reservation
Protocol – Traffic Engineering (RSVP-TE) allows bandwidth reservations to be made
across an MPLS path.
MPLS networks also allow for extra labels to be pre-established at every MPLS node
to provide a pre-established backup path for switching packets in the event of a local
link failure. This backup path is not end-to-end, but merges with the primary path at
downstream nodes. Since the trigger to switch to the backup path is a local link failure
(and does not rely on end-to-end signaling), MPLS networks can achieve switching times
of 50 milliseconds. This is often referred to as MPLS Fast Re-Route (MPLS-FRR). MPLSFRR can be applied to point-to-point label-switched paths or point-to-multipoint labelswitched paths (referred to as P2MP MPLS-TE).
8
Note that MPLS can use exactly the same per-hop QoS model as IP networks, as
explained below. However, MPLS allows network engineers to employ per-path
bandwidth reservations for certain applications, if desired.
The Role of Ethernet
Service providers worldwide are increasingly using Ethernet (often referred to as Carrier
Ethernet) in Wide Area Networks (WANs) and IP/MPLS backbones to improve costeffectiveness. In fact, Ethernet is now often used to interconnect the IP routers that make
up the backbones of the largest global networks, allowing speeds of tens of Gigabits per
second (Gbps). By using the same common Ethernet technology in network backbones
that is used inside enterprise networks, service providers have dramatically cut the cost
of delivering LAN-to-WAN interconnects and are benefiting from the economies of scale
of Ethernet technologies. Broadcasters can take advantage of Ethernet in IP-based
contribution and distribution networks to realize the same advantages.
Using Ethernet technology to interconnect IP/MPLS routers is also a relatively simple
proposition. Nothing must be provisioned to make that interconnect, as Ethernet has
its own addressing scheme using supplier-provided Ethernet addresses, and the IP
protocol automatically discovers these addresses.
Unicast and Multicast IP Forwarding
An IP router has two fundamental models for forwarding packets, unicast and multicast.
Unicast Routing
In the unicast model (Figure 4), the router looks at the destination IP address of each
packet and uses this as an index into the unicast routing table. This will point to the
outgoing interface and/or next-hop IP router to which the router must send the packet.
Destination IP
Address Next
Hop Router
Host
Router
Figure 4. Unicast Routing
9
White Paper
Multicast
In the multicast model (Figure 5), the router forwards IP packets to multiple different
destinations simultaneously. In this model, the destination address is a multicast
destination group address, or a special set of defined addresses. The network
understands which multicast group addresses to forward on specific interfaces,
depending on either static configuration or on end-stations signaling their interest in
receiving traffic. Effectively, the multicast model builds a tree-like topology across the
routers from the multicast sources to requesting receivers (referred to as a multicast
distribution tree). In order to avoid forwarding loops in multicast topologies with
redundant links, every IP router does a route lookup. This lookup references the source
IP address of the packet. If a packet arrives on an interface pointing towards the source
address, the router accepts and forwards the packet. If a packet arrives on an interface
that does not point towards the source IP address, the packet will be dropped. This
mechanism is referred to as Reverse Path Forwarding (RPF) check.
Source
IP Address
RPF Check
Receiver
Source
Receiver
Router
Receiver
Figure 5. Multicast Routing
The most popular protocol used to build multicast distribution trees is called Protocol
Independent Multicast or PIM. PIM uses the unicast routing table independent of how
that table was built (hence, the reference to protocol independence). Network engineers
can employ two types of PIM: Any-Source Multicast (ASM) and Source Specific Multicast
(SSM).
In ASM (Figure 6), the routers establish multicast trees according to destination,
independent of the source(s) of the multicast flows. ASM uses the concept of a “shared
tree,” i.e. a multicast tree that has a known root (known as the rendezvous point) in order
to forward multicast streams without regard for the source address. Each router in the
network that wants to receive multicast traffic for a certain group becomes part of the
shared tree rooted at the rendezvous point. In this model, the rendezvous point is (initially)
the only router with knowledge of individual sources and will also build trees towards
these sources when required.
10
Source 1
Rendezvous
Point (RP)
A
B
Source 2
D
C
F
E
Shared Tree
Source Tree
Receiver 1
Receiver 2
Figure 6. Any-Source Multicast
In SSM (Figure 7), the routers build multicast trees and forward packets based on both
the unicast source and the multicast destination. SSM has the advantage of better
access control, since it does not forward two separate source multicast streams via a
common shared tree, preventing traffic collisions and providing better security. This
model also simplifies multicast operations, since SSM does not need a shared tree and a
rendezvous point. SSM is very well suited to secondary distribution video services, since
this application entails the distribution of video from a few sources to many receivers.
Source
Rendezvous
Point (RP)
A
B
E
C
F
Receiver 1
Figure 7. Source-Specific Multicast
11
D
White Paper
Achieving Quality of Service and Resilience in IP and MPLS Networks
Real-time audio and video services are extremely sensitive to packet loss and delay. As
a result, any IP infrastructure operating in a broadcast environment must meet stringent
performance and availability requirements. It must provide:
• Extremely low jitter, or variation in the timing between the arrival of packets or signal
pulses (stipulated by the European Broadcasting Union, for example, as less than 10
milliseconds)
• Very low delay (typically less than 80 milliseconds)
• Extremely low (ideally zero) packet loss, since even a single dropped packet can have a
major effect on video quality
As discussed, IP and MPLS networks are inherently resilient, and the connection-less
nature of IP means that traffic will continue flowing in the event of a link or node failure.
However, IP and MPLS networks do not by default retransmit packets that may have
been lost during network reconvergence. To accomplish this, network engineers can use
higher-layer protocols to signal applications to retransmit certain lost packets, if desired.
However, retransmission often has the disadvantage of delaying or slowing down the
application, rendering it unacceptable for real-time video delivery. Fortunately, there
are techniques that network engineers can employ in IP and MPLS networks to address
packet loss during reconvergence more effectively.
One approach is to configure the application to add packets to the stream so that it
contains enough information to reassemble the stream even if some packets are lost. This
is known as Application Layer Forward Error Correction (AL-FEC1). Another approach is
sending the stream twice (either across different links and nodes or at different timeslots).
This is referred to as “Live-Live” delivery. Note that AL-FEC and Live-Live techniques are
not exclusive to IP and MPLS networks. These techniques can also apply to any transport
technology, since all technologies take time to reconverge after a link and/or node failure.
IP does offer the advantage of rerouting around individual link and/or node failures
dynamically, however, whereas SDH networks require an extra end-to-end protection
path for every configured path in the system.
Comparing QoS and Resiliency in Packet-Based and Circuit-Switched Networks
Modern IP networks are extremely responsive to link or node failure. IP networks react
to a failure by sending out updates in all directions, causing each router to recalculate
its own view of the new topology. Several years ago, failure detection was often slow (of
the order of seconds or even minutes), as it relied on a router noticing that neighbors
had “gone away.” Today, most router topologies are based on point-to-point links (often
using Ethernet), so there is no longer a need to rely on a router detecting the loss of a
neighbor. Instead, IP routers usually notice local link failures almost immediately. If a link
spans an optical Wavelength Division Multiplexing (WDM) infrastructure, modern routers
have integrated lower-level WDM signaling (known as ITU-T G.709). This allows a router
to recognize degraded links as well as totally failed links and adjust its IP forwarding
accordingly. In addition, numerous other improvements have been made at the IP
routing protocol level in recent years which make today’s networks converge within a few
hundred milliseconds for both unicast and multicast services. These improvements are
known as IP Fast Convergence. Together, these mechanisms allow modern IP networks
to meet the same stringent resiliency requirements as circuit-switched SDH and ATM
systems.
1
Application Layer FEC does not replace physical layer FEC schemes, such as those used in Digital Subscriber
Line (DSL) or optical fiber transmission systems.
12
Where IP transport differs from SDH or ATM is in the way it handles reliable quality of
service. With SDH or ATM, circuits are set up with a specific “end-to-end” bandwidth. If
there is no traffic on these circuits, the associated bandwidth on those links is unused.
Therefore, these networks are restricted to signaling (or provisioning) only as many
circuits as the links can forward, and they eliminate packet-level congestion. However,
in systems that require redundancy (such as real-time video networks), the number of
circuits that must be pre-configured can double, as that bandwidth must be reserved and
cannot be used for other applications. As a result, this model is extremely inefficient in
terms of utilization of available bandwidth.
IP networks operate within a very different paradigm. With IP, there are no circuits. IP
routers statistically multiplex different traffic flows onto links without first checking whether
this will congest the interface. For traditional IP applications, this congestion is not an issue.
Applications like web browsing, for example, handle momentary congestion quite well
by making use of the Transport Control Protocol (TCP). TCP “slows down” traffic flows in
reaction to congestion and signals the application to resend any lost segments using a
system of segment numbers and “windowing.” (The TCP “window size” is a value indicating
how much data can be sent without requiring an acknowledgment that the data has been
successfully received.) If the network has more capacity at a given moment in time (a
common occurrence given the very “bursty” nature of Internet data traffic), TCP senses this
and speeds up transmission by increasing the window size. If the amount of TCP flows on
a single link would lead to congestion due to packet buffer overruns, packet drops will alert
TCP to shrink its TCP window size, automatically lowering the rates of the individual flows
on that link. In most cases, buffer overruns should be avoided, as too many TCP packets
get dropped. Network engineers typically employ Congestion Avoidance mechanisms
such as Random Early Detection (RED) to accomplish this. RED randomly drops single
packets from TCP flows, with the probability of dropping increasing depending on buffer
utilization and (if desired) the individual flow rate. This avoids scenarios in which IP packet
discards create simultaneous congestion conditions on multiple parallel TCP flows.
Applications like voice and video that are highly sensitive to network congestion do not
use TCP, instead employing the much simpler User Datagram Protocol (UDP) to carry
packets. UDP has no segment numbers or windowing mechanism, so it cannot react
to packet loss. However, in these types of applications, it is better to drop packets than
introduce delay by waiting for a retransmission. In cases where retransmission is possible
(e.g. if the receiving end can buffer packets for a couple seconds), mechanisms like Realtime Transport Protocol (RTP) offer sequencing and retransmission capabilities for UDPbased transport. RTP is often used across “lossy” media (such as DSL access networks).
RTP can also be used to synchronize two redundant video streams and monitor the IP
transport without having to look into the IP payload where the video signal is located.
Achieving Quality of Service Through the IP Differentiated Services Model
An IP/MPLS network supports the concept of “Per-Hop Behaviors” (PHBs), which allow
network engineers to classify incoming traffic into traffic classes. IP networks can
schedule packets out of an outgoing interface in accordance with the PHB indicated
by the traffic class. This behavior is referred to as the Differentiated Services Model
(or DiffServ for short). The advantage of using PHBs is that, in the absence of a certain
high-priority traffic class, other traffic classes can re-use the configured bandwidth.
This is fundamentally different (and inherently more efficient) than circuit-switched
architectures, in which bandwidth must be “nailed up” across both the active and backup
paths. Note that DiffServ scheduling of IP packets through routers and on network links
does not introduce a significant amount of delay. Today’s implementations achieve endto-end jitter (or variations in delay) of less than 1 millisecond.
13
White Paper
One commonly employed PHB is “Expedited Forwarding” (EF), which schedules traffic
to be forwarded out of an interface as soon as it arrives at the packet scheduler for that
interface. This is a good PHB for traffic that is delay-sensitive, such as voice or video.
It also prevents congestion for that specific traffic class from occurring, as packets will
always be scheduled first. Typically, traffic matching classes conforming to this PHB must
be controlled to ensure that this PHB does not “starve out” other traffic classes.
Another common PHB is “Assured Forwarding” (AF), which defines a guaranteed
minimum bandwidth (often expressed as a percentage of the total link bandwidth) for
traffic assigned to this PHB. If a router forwards traffic conforming to the traffic class
associated with this PHB, that traffic can use at least the configured bandwidth value
(and may also burst up to line-rate if extra capacity is available). If network engineers
can control traffic in the AF PHB such that it never exceeds the configured minimum
bandwidth across the network, congestion for that class will never occur, and no packet
loss in that traffic class will occur even in the case of interface congestion.
To implement “Best Effort” services, network engineers can configure an AF PHB with
no minimum bandwidth guarantee. (The traffic class can still burst up to the available
bandwidth of the link, minus any concurrent AF and EF traffic.) Typically, no traffic control
is employed for this traffic class, as it will use whatever bandwidth is available. Therefore,
applications that can handle packet loss quite well are normally assigned to this class.
The advantage of using PHBs in an IP network (as opposed to using a circuit-switched
architecture) is that in the absence of certain traffic, other traffic classes can re-use the
configured bandwidth. Naturally, this allows for much more efficient utilization of available
bandwidth. This becomes particularly important when the network is used for a mix of
different services, such as concurrent voice, video, and data.
The following section explains how network engineers can control traffic classes
associated with EF and AF PHBs so that they are never congested. Using these
techniques, broadcasters can ensure that video networks never experience traffic loss
even under conditions of heavy link utilization.
Connection Admission Control
To protect against delay and packet loss, broadcasters must eliminate network
congestion and tightly control the amount of traffic traversing all links in the network.
Controlling how much traffic a network is forwarding at any given moment can be
accomplished through a simple policing function, in which all packets that exceed a given
rate are discarded at the ingress points of the IP network. For simple topologies and
Voice-over-IP (VoIP) applications using the EF PHB, this mechanism works quite well. In
these scenarios, the bandwidth is low, and the amount of concurrent voice calls and total
voice traffic is quite predictable.
For more demanding applications such as video, network engineers can configure the
application to “check” the network for the number of existing traffic flows that are sharing
the same traffic class conforming to a certain PHB before setting up a connection. This
technique is referred to as “Connection Admission Control” or CAC.
CAC can be performed at the application level when the application needs to model the
resources used inside the network in real time. If it seems that no more resources can be
used (i.e., the network has reached the maximum capacity set aside for this traffic class),
the application does not even attempt to set up the connection. Alternatively, a simple
scheduling application can be used to control the number of concurrent connections
occurring on a link-by-link basis. This technique is often referred to as “Off-Path CAC,” as
the application does not query the network upfront.
14
“On-Path CAC,” which queries the network before setting up a connection, offers a
more accurate admission control mechanism based on the actual capacity of the link
at a given time. However, On-Path CAC requires more intelligence within the network,
as the application uses an IP-based protocol to query the network in real time, namely
the Resource Reservation Protocol (RSVP). In the On-Path CAC model, the application
routes RSVP packets across the network and checks how much bandwidth is used in a
specific traffic class at a given moment in the current topology. The network replies to the
application with a simple yes or no answer: “yes” if resources are available to support the
connection without packet loss due to congestion, or “no” if congestion could occur.
The major advantage of On-Path CAC is that it dynamically adapts to changes in the
topology. Even in the event of a link failure, the application maintains awareness of
available capacity, and admits or denies connections accordingly. Note, however, that in
this use case, RSVP does not really “reserve” hardware resources across a given path
to the destination. Rather, it merely queries the router to check for the current utilization
of the traffic classes. The full RSVP protocol suite does allow for hardware resource
reservation hop by hop, however, this technique has proven to be unscalable in today’s
IP routing environments. As a result, IP network engineers commonly use only the CAC
capabilities of RSVP.
Comparing IP and MPLS
It can be argued that for applications that demand fast convergence, MPLS has an
advantage. MPLS allows for bandwidth reservation and traffic engineering, making it
potentially more attractive to network administrators used to this paradigm. However,
this advantage comes at a cost: introducing traffic engineering leads to more operational
overhead. The extra overhead is amplified when deploying point-to-multipoint traffic
engineered connections, as each endpoint (or “leaf”) router must be provisioned
individually. Today, improvements in IP convergence mechanisms have made it possible
to offer connectionless operations with very fast convergence times for both unicast and
multicast services. As described above, modern IP networks can meet even the most
stringent quality and resiliency demands using the DiffServ model combined with ingress
policing and/or CAC.
MPLS (as the name implies) is protocol independent, as it can tunnel IP, but also Ethernet,
ATM, Frame Relay and many other technologies. IP tunnel technologies providing similar
services have also been developed, but are not as widespread in use.
IP routing can be combined with MPLS to deliver a virtualized infrastructure, in which
multiple “IP customers” share a common MPLS backbone. This is known as IP Virtual
Private Networks (IP-VPNs). Today’s MPLS technologies allow IP-VPN services for both
unicast and multicast applications.
MPLS allows the mixing of traffic engineered and non-traffic engineered paths, which
may then be selected on a per-application or per-service basis. The following sections
elaborate on the various options and protocol choices that can be used for IP-based
“Broadcaster Services” and consider the pros and cons of each approach.
Transporting Contribution and Distribution Video Services over IP
Delivering video services over an IP network involves more than encapsulating
uncompressed or compressed video into IP packets and transporting it. It requires an
understanding of the interaction between the type of video compression in use, the
transport of the packetized video services, and the IP adapter requirements.
15
White Paper
The following sections detail the different scenarios and their respective requirements
that must be considered for the successful delivery of video services. The way in which
video is compressed (or not) has a direct impact on various system attributes, such as
link bandwidth, end-to-end delay, jitter and wander. As a result, the type of compression
employed directly affects the requirements of the video adaptors that adapt the ASI2 and
SDI3 video streams onto the IP infrastructure.
Video Compression
The main purpose of video compression is to overcome the bandwidth constraints of
the network transport infrastructure. Compression typically involves a tradeoff between
bandwidth availability, cost of transmission, and the level of quality required for the video
services at each of the different stages between capturing the content and delivering
it to the end user. The appropriate video compression (and the requirements of the
underlying network) depend on the specific application. For example, a video feed for
a live news program may demand the lowest possible latency. Typically, this means a
video feed with minimal compression and an extremely high bit rate. When broadcasting
sporting events (or when transporting video feeds among teams in a production facility),
broadcasters typically prioritize video quality above all else, requiring very high bit rates.
Video compression works by reducing the amount of data used to describe the video
frames. This can result in a reduction in visible quality compared to uncompressed
streams, but the quality can be maintained at a level that is still deemed adequate for
the specific application. Compression technologies can be classified within two main
categories:
• Acquisition and production technologies: In these scenarios, an end user can deal with
some amount of video information loss. The computer-based systems in use at earlier
stages in the production and distribution chain, however, require substantially more
information to allow for the creation, editing, and production of video content. Often,
video streams in this part of the broadcast process (i.e., contribution) are uncompressed
or lightly compressed.
• Transmission technologies: Networks that deliver video for viewing by an end user,
such as secondary distribution networks, are often highly compressed. Typically, they
depend on the capabilities of the human vision system (HVS) to recover from this level
of compression (and the associated quality loss) and compensate for it.
Transport and Compression Schemes in IP Video Networks
There are three main schemes for transporting video services across an IP network:
• Uncompressed
• Frame-by-frame compressed
• Group-of-Pictures compressed
The following sections describe each scheme in detail.
2
ASI: Asynchronous Serial Interface
3
SDI: Serial Digital Interface
16
Uncompressed Video Services
The ideal scenario for any broadcaster is to be able to transport all streams
uncompressed whenever possible. This is because uncompressed transmission
eliminates any video quality degradation or delays introduced by cascading and
concatenation of compression and decompression cycles along the transmission path.
Delivering uncompressed video is not always possible, however, due to the extreme
bandwidth demands of video services – especially HD video.
Standard-Definition (SD) sources operate at a raw bit rate of 270 Megabits per second
(Mbps)4, and so easily fit on a Gigabit Ethernet transport. Such a service usually contains
a video source, one or multiple (up to 16) embedded audio channels, and additional
ancillary data.
In an IP video network, adaptors simply encapsulate the uncompressed structured video
data into IP packets. Such networks may also use error correction mechanisms at the
IP layer (such as AL-FEC). Uncompressed video is often used in high-end contribution
services, such as sports contribution, if the bandwidth is available.
Frame-by-Frame Compression
In today’s modern network infrastructures, in which Gigabit Ethernet (GE) prevails, HD
sources typically must be compressed to overcome the fact that they operate natively
at 1.485 Gbps, dual 1.485 Gbps, or 2.970 Gbps5. In frame-by-frame compression
schemes, each video frame (or field) is individually compressed and self-contained.
As a result, decompressing the video stream does not require any information from
previous or subsequent frames. In this compression scheme, data streams are typically
encapsulated within a wrapper (such as Material Exchange Format, or MXF) in order to
include all of the required information, including metadata from the ancillary data that is
part of the service. The streams are transmitted over RTP6.
Frame-by-frame compression is commonly used in contribution networks for
applications that require low delay for interactivity. For these applications, the level of
compression and encoding/decoding cycles (known as “generations”) must be kept to a
minimum in order to reduce artifacts. Examples of frame-by-frame compression codecs
include JPEG2000 and MPEG-4 AVC (H.264) when operating in I-frame-only mode.
Group-of-Pictures Compression
Group-of-Pictures (GOP) compression is based on the concept of encoding a key or “anchor”
frame at the beginning of a group of pictures. All subsequent frames that are part of the GOP
are then derived from that key frame (or from other frames that are part of that group).
A service containing the video, audio, and ancillary data steams is typically multiplexed
within an MPEG-2 Transport Stream. The service is built up either as a single-program
or multiple-program stream. With GOP compression, the quality degradation that results
from any data loss depends on which set of data within the stream was lost during an
outage. The data loss may have an impact for the length of the GOP (or even longer),
depending on the video codec, GOP length, and other encoding settings in use.
GOP compression is commonly used in broadcast distribution networks, which typically
cannot accommodate either uncompressed or frame-by-frame compressed services
due to bandwidth constraints. Examples of GOP compression codecs are MPEG-2 and
MPEG-4 AVC (H.264).
17
4
As defined in SMPTE 259M/ITU BT.656
5
As per SMPTE 292M, SMPTE 372M, and SMPTE 424M respectively
6
The most common codec in use today is JPEG2000, but others such as H.264/AVC-I, Dirac Pro or DNxHD
(SMPTE VC-3) may also be used.
White Paper
IP Video Adaptation Requirements
IP video adaptors take in ASI or SDI signals and adapt them to IP. Adaptors act as either
transmitters (also known as encoders) or receivers (also known as decoders). To deliver
high-quality video services, receivers must be able to compensate for any variations
introduced by the network or inherited from the payload (i.e., as a result of compression or
the encapsulating and de-encapsulating of the video information inside the IP packets). IP
infrastructures must account for:
• Delay
• Jitter and wander
• Clock synchronization
The following sections describe each factor in detail.
Delay
The end-to-end delay in an IP video system is the sum of multiple individual elements
(Figure 8):
• The encoding delay depends on the compression settings and the generation of ALFEC (if applied).
• The queuing delay is introduced by the network components buffering the Ethernet
frames to avoid packet loss and through prioritization. (As explained previously, a
properly engineered and DiffServ-compliant IP network can ensure minimal delays.)
• The serialization delay is caused by any packet network component that is storing a frame
and sending it to line. Serialization delays in modern high-speed networks are very low (i.e.
on a 10-GE link, a 1500-byte frame serialization delay would be around 1-2μs per hop).
• The transmission delay is caused by link distance and, in the case of optical
transmission, introduces approximately 1 millisecond delay per 100-150 kilometers.
End2End Delay
Network Delay
Encoding
Delay
Source
SDI/ASI
Queuing Serializ.
Delay Delay
Transmission Delay
(1 ms/100km)
Adapter/Enc
Buffer/Framestore/
Decoding Delay
Adapter/Dec
SDI/ASI
Figure 8. End-to-End Delay
Note that the overall delay introduced by the IP/MPLS network, is typically very low. In
short, with a properly engineered IP network, the delay budget is influenced mainly by the
use of encoding/decoding, compression, and AL-FEC.
Jitter and Wander
Network-introduced jitter and wander have no direct impact on the video services
transported but do need to be compensated for in the receiver buffer at the IP layer. However,
properly engineered DiffServ IP networks are known to deliver jitter of less than 1 millisecond.
Clock Synchronization
In order to compensate for video jitter and wander, the receiver clock must be
synchronized with the source clock. This can be accomplished using an external
reference clock (or “master clock”) or by deriving the clock from the received signal.
IP networks therefore require a buffer to compensate for the jitter and the use of a
framestore for accurate video frame/field signal phasing.
18
Impact of Loss on Different Video Types
The primary concern for video services is packet loss. Loss can be attributed to four
primary causes:
• Excess delay
• Congestion
• Physical errors
• Network convergence events
Loss due to excess delays introduced by the network can be prevented by a properly
designed and capacity-planned DiffServ IP network. Congestion in video services can
also be avoided through the use of IP DiffServ-based QoS, together with Off-Path or
On-Path CAC. As today’s IP transport networks typically make use of high-quality cabling
(fiber) for backbone connections, physical errors are usually not a problem. This means that
controlling network convergence is the chief mechanism for reducing loss in video networks.
In the event of loss due to network convergence, the impact depends on the
compression scheme employed, as follows:
• Uncompressed video: In the case of a data loss from which the service cannot recover,
the receiving IP video adapter will drop the corrupted video line and insert the missing
line from the previous field or frame for the time of the network convergence event. In
most cases this is imperceptible to the receiver/viewer.
• Frame-by-frame compressed video: In the case of data loss that cannot be recovered,
the IP video adapter will discard the corrupted frame and reinsert the previous one to
compensate for the loss. Loss may be perceivable to the receiver for the duration of the
event.
• GOP-based compression: When using GOP-based compression, a network
convergence event that lasts only tens of microseconds can affect video quality up to
the GOP size, and possibly beyond. This effect can be on the order of seconds with
some encoding profiles, as highlighted in Figure 9.
Figure 9. MPEG-2 Video GOP-Based Compression with a Slice Error Due to Packet Loss*
*Source material copyright SMPTE, used with permission
19
White Paper
Scheduling Applications
Broadcast services are either permanent (24/7) or Occasional Use (OU), and are
therefore setup for a given period of time. In order to prevent resource shortages while
running these real-time services, broadcaster networks historically run on dedicated
infrastructures that are set up so that all services have to be accounted for by ‘booking’
the required capacity and endpoints. Booking operators can use tools ranging from
spreadsheets to graphical applications that incorporate all the endpoints and network
nodes may be used.
Graphical-based scheduling applications allow booking operators to provision services
without having to understand the details of IP technology, node, and endpoint settings.
They also ensure that other bookings do not interfere with new requests or solicit
resources already in use. Once the booking operator submits the configurations, the
scheduling application pushes them toward all required devices (encoder/decoder
endpoints, network nodes, QoS settings), via an automated process. This prevents
configuration errors and allows for the use of pre-validated service templates.
These graphical applications are considered “off-path,” since they interact with the
network elements from a remote location that is not in line with the transmission path. “Onpath” scheduling occurs when the source signals to the network its intent to transmit data,
and requires a bandwidth reservation between the endpoints. (On-Path CAC is discussed
in more detail in the “Achieving Quality of Service and Resilience in IP Networks” section
of this document.) Note that scheduling applications can still employ On-Path CAC
protocols on the network nodes.
Convergence Mechanisms for Transporting Video over IP
IP networks are fundamentally “connectionless” in nature, as described previously. In
simple terms, packets are delivered into “the cloud” at one point in the network. Using
the destination address of the packet, the network then makes a series of “hop-by-hop”
forwarding decisions regarding where to send the packet. When the packet arrives at a
router directly attached to the device referenced by the destination address, the packet
is delivered. In many cases, an IP application does not care which specific path the packet
follows through the network.
The emergence of MPLS has ushered in the advent of Traffic Engineering, allowing
network engineers to define a specific path so that the network always forwards certain
flows a certain way. This mechanism is employed mainly in environments in which the
traffic rate of specific flows is relatively high compared to the bandwidth available. In such
environments, bandwidth “hotspots” can occur. Traffic Engineering allows these hotspots
to be avoided by steering high-rate flows around them.
In IP networks, “convergence” refers to the process whereby all routers agree on optimal
routes through a network. When a network event (such as a link or node failure) changes
the status quo, the routers send update messages, which in turn cause the routing
algorithms to recalculate a new topology. When all routers agree on a new topology, the
network is said to have converged. Minimizing network convergence times is the most
important component in controlling loss in an IP Video network.
Modern IP routers use a separate control-plane and forwarding-plane. As a result, the
router supports tasks associated with network convergence separately from packetforwarding, and handles each more efficiently. Today, IP networks can converge within a
few hundred milliseconds. The routers detect link failures almost immediately and feed
this information back into the routing protocol subsystem. As a result, modern IP networks
can maximize network availability and minimize loss to support real-time video services.
20
The following sections discuss the various mechanisms available to ensure that an
IP-enabled broadcaster network can achieve maximum availability and reliability. They
examine methods for ensuring that networks maintain service in the event of various
outages, including various link recovery mechanisms, and source redundancy and
stream redundancy schemes.
IP Convergence in WDM Networks
As discussed previously, modern IP routers can incorporate WDM technologies that
allow for convergence of a degraded network interface even before the interface has
failed completely. This technology is referred to as IP-over-Dense Wavelength Division
Multiplexing, or IPoDWDM. (Figure 10.)
FEC
WDM
Working path
Router
WDM
port
with G.
709
FEC
BER
FEC limit
Optical Impairments
Router Has No Visibility Into
Optical Transport Network
WDM
Protected
Hitless switch
Corrected Bits
Transponder
Protected
path
LOF
Corrected Bits
Router
port
with
SR
optics
Switchover
lost data
BER
Working
path
FEC limit
Protection
trigger
Optical Impairments
Higher Resiliency Than
Transponder-Based Networks
Figure 10. IPoDWDM
IPoDWDM is based on the integration of DWDM transponder capabilities into a port of
an IP router. With this integration, the router can monitor for errors at the optical layer
and trigger a switch to a protected path before any data loss is incurred. (See the right
side of Figure 10.) Contrast this model with the non-integrated approach of conventional
platforms shown on the left. In this model, the router initiates a switch to a protected path
only when it detects a “Loss of Framing” (LOF) at the optical layer. Naturally, this advanced
convergence capability can greatly enhance service availability.
Bidirectional Forwarding Detection
When two routers are not directly connected (e.g. when they are interconnected by an
Ethernet switch), network engineers can employ alternate mechanisms to ensure that
the network rapidly detects and adapts to topology changes. Technologies such as
Bidirectional Forwarding Detection (BFD) can signal routing protocols in response to any
discontinuity between two routers.
The advantage of BFD is that it is used only as a means of measuring continuity between
two routers across a Layer-2 path. That means that protocols running between the
routers do not have to rely on their individual timers, but can reference the BFD state
instead.
21
White Paper
Routing Protocol Enhancements
Modern IP networks employ routing protocol enhancements that ensure extremely fast
convergence after link failures. For example, network engineers can configure specific
IP network addresses with higher priority. As a result, the routing tables converge first for
these addresses (e.g. prioritizing the convergence of the video source or video adaptors,
or converging the “important” IP addresses in a network). All of these enhancements are
referred to as IP Fast Convergence (IP FC), and often do not require extra network-wide
engineering. On today’s high-end routers, unicast routing can often converge in less than
200 milliseconds, and multicast routing can converge in less than 500 milliseconds for
more than 800 concurrent multicast groups.
Traffic Engineering
Another feature of modern IP networks is the ability to create specific paths through the
network for specific flows. Technologies such as MPLS allow network engineers to build
specific paths through an IP core and to carefully steer specific flows onto those paths.
With MPLS TE, it is possible to always ensure that the more bandwidth-intensive (or
higher-demanding) application streams receive the best possible service from the IP
network.
Using MPLS TE, network engineers can also create a highly available backup scenario
by providing a backup tunnel to protect against the failure of a specific network link. This
technique is called MPLS TE Fast Re-Route, as described previously. By ensuring that the
backup tunnel always follows a different path (excluding the link being protected), MPLS
TE FRR ensures that when a link fails, the protected streams are automatically routed via
the specified alternate path. Typically, MPLS TE FRR can reroute around a failure in less
than 50 milliseconds.
Multicast-only Fast Re-Route (MoFRR).
A further enhancement for providing highly available multicast services is Multicast-only
Fast Re-Route (MoFRR). The name of the technique is somewhat misleading, in that it
implies some connection with (or dependency on) MPLS TE FRR techniques. In fact,
MoFRR does not requirement an underlying MPLS infrastructure and delivers resilient
service in both pure IP and MPLS environments. Figure 11 shows the MoFRR approach.
22
S
A
Alt Data Path
R
B
Data Path
Alt Path
Join Path
C
D
R
Figure 11. Multicast-Only Fast Re-Route
The MoFRR case shown in Figure 11 involves a receiver (R) that is connected to a source
(S) via a router (D), which has more than one available path to that source (S). In a standard
PIM environment, the router attached to the receiver would choose one of the upstream
paths for the stream in question. If a failure occurred on the active path, the router would
detect a change and begin sending multicast “join” requests via the alternate path to
begin receiving the stream from the new path. In the traditional multicast model, some
amount of time would always elapse between the loss of the active stream on the primary
path and the recovery via the alternate path.
With MoFRR, the network avoids the delay incurred in waiting for the backup path to be
built by always maintaining the backup path and always receiving the alternate stream
(via B), alongside the active stream (via C). The router with two paths available therefore
always receives two streams, and simply discards one of those streams as long as the
primary path is available. Obviously, MoFRR incurs more network bandwidth and requires
more processing power on the router to make the discard decisions. However, the model
does achieve a hitless switchover to the standby in the event of the loss of the primary path.
Choosing the Right Convergence Technique
The appropriate convergence technique for a given application depends on the amount
of loss that application can handle. Note, however, that achieving minimum loss often
leads to extra complexity and its associated costs. Some applications, such as those that
are compressed using GOP, always have a finite chance of losing important information
inside the packet streams, regardless of the underlying convergence technique (i.e.
whether an MPEG I-frame is lost during a 50-millisecond or 200-millisecond outage, the
visual outcome is the same.) For uncompressed (or frame-by-frame compression), the
video loss is proportional to the time it takes the network to converge.
23
White Paper
The only way to achieve a lossless experience during a network convergence event is to
add redundancy at the application level. This is accomplished either through adding extra
information to the IP stream (using AL-FEC), or by sending the stream twice (referred to
as Live-Live, or spatial redundancy, as discussed previously). More specifically, the spatial
redundancy technique sends the stream t