If i have IGMP snooping on my main switches but a user has added an 8-port mini switch from future shop somewhere on my network will that kill the multicast, even if there are no multicast clients connected to it?
It shouldn't do; a benefit of having IGMP snooping support in your backbone switches (although of course it's benefiical all the way to the endpoints) is that they filter the multicast traffic such that if a switch port isn't actively subscribed to a group it doesn't see any of the traffic at all.
So, as long as the consumer-grade switch is on a central switch port that is being filtered upstream, it can't cause any trouble - there won't be any offered load of GhostCast traffic impinging on the switch, and no back-flow effects. And indeed, it should normally be fine even if it does get involved in a multicast session.
Consumer-grade switches (and unmanaged office switches) do vary a lot in terms of how well or how badly they handle multicast traffic hitting them. The biggest issue with them generally comes from adapting between speeds, because Ethernet today isn't the same as the Ethernet of yore.
In 10Mbps Ethernet, the cable (the "ether" in the name) was a shared resource which the nodes had a protocol for sharing - CSMA/CD, carrier-sense multiple access with collision detection. With the introduction of twisted-pair cables, intially passive "hubs" were used to emulate the single shared cable, but switching meant that every cable became electrically independent and so collisions became a thing of the past. When 100Mbps Ethernet was introduced, collision-detection was deprecated but still supported, but when the 1Gbps Ethernet was introduced, all of the collision mechanisms in 10Mbps ethernet were gone and an entirely different approach to controlling flow between multiple levels of switch was standardised.
This causes complications when switches adapt speeds; from 1Gbps down to 100Mbps is fine, but going all the way down to 10Mbps gets strange because not only is there a 100:1 speed difference, the entire model of how the network works is different.
This matters because what many machines do when doing into low-power modes for being woken up by the network is to negotiate a very low Ethernet link speed. This is where things get hard.
If you have a consumer-grade switch at the edge of your network, it will treat multicast as broadcast. That's fine, nothing bad happens. But if that switch also has a port which is running at low speed, you can have a 1Gbps incoming traffic flow hit a 10Mbps port. And because it's a consumer-grade device, almost anything can happen - it could choose to just discard the traffic hitting that port in which case all will be fine, or it could choose to discard almost the *entire* incoming 1Gbps flow completely, effectively bringing down the active 1Gbps ports connected to it to only receive data at a 10Mbps rate.
And this then means that the central Ghost server tries to adapt to that; an essential part of Ghost's multicast being robust is adapting to the different speeds of the different machines.
Now, one of the things we were actively discussing adding to Ghost in the 2008 timeframe was changing it so that GhostCast could have a lower bound on speed; if a node tried to go slower than a minimum speed due to an effect like the one above, it would get kicked out of the multicast session (and ideally, the session would split into a completely parallel one so the node on a faulty switch could still complete). However, at the time Symantec had mostly disinvested from Ghost, so we were considering this for 3.0 but hadn't had the resources to attempt an experimental implementation until we'd finished the main GSS 3.0 features, and then in 2009 GSS development was cancelled and the development team laid off anyway.
In principle Symantec could still add support for this, but part of the management thinking in leaving the Ghost business to rot was that Deployment Solution would be replacing Ghost Solution Suite, and as Deployment Solution doesn't have the capability to use traditional GhostCast (actually it could have, using an unreleased tool I wrote, but the folks on the DS side didn't really care that much) it likely won't be addressed unless and until the DS customer base calls it out as a priority.
Will wireless access points affect the multicast transmission?
That's a slightly trickier question, because there's even more variability in equipment on the wireless side. The big thing is that access points still run awfully slowly, with transmission being higher-latency as well as outright slower in raw throughput than wired networks. But on the other hand even consumer-grade wireless equipment functions more like a managed router on the wireless side rather than a switch, so whether the really pathological behaviour of some consumer-grade switches emerges there is ... well, harder to say in principle.
Even an old WRT54G I have here at home running stock 2005 firmware has some multicast support, including the ability to block multicast outright from the wired to the wireless side; the only issue I'm aware of there is as with the wired networks, speed adaptation - with there being a much wider variability in actual transmission speed on the wireless side (and variation in a/b/g/n devices around), multicast on wireless is not all that friendly to Ghost-type protocols so my intuition would be configure them just to not carry multicast traffic from the wired side.
Is there a way to test my network for multicast ability to make sure that is the issue?
Not easily. The problem with multicast is that often due to things like IGMP snooping, casual tests will pass - until the switches time out their IGMP group membership and shut off ports. And problems caused by the combination of consumer-grade switches and machines going into low-power states have the annoying property that whether someone somewhere has their laptop lid open or closed at any moment can affect this.
Basically, diagnosing these kinds of network problems is best done by a combination of traffic analysis using packet captures with a tool like Wireshark and the old Mk. I eyeball (a lot of problems really do show up clearly even in the blinkenlights on the switches once you know what you are looking at). One advantage you have is in learning how things *should* look, since you've got sites which are working which provide you a baseline, not just for the GhostCast traffic but for the kind of supervisory chatter (IGMP query frames and the like) that needs to be going on in a healthy network.
[ While I personally don't mind helping folks out with looking at GhostCast traffic samples, we're in talks to have my current project - a rather different approach to Ghost for deployment and backup, including on the network side - acquired by a vendor, which will make things a bit more complicated for me. ]