Routing TCPIP, Vol. II, (CCIE Professional Development) by Jeff Doyle Jennifer DeHaven Carroll & Jennifer DeHaven Carroll
Author:Jeff Doyle,Jennifer DeHaven Carroll & Jennifer DeHaven Carroll
Language: eng
Format: epub
Publisher: Pearson Education Limited (US titles)
Published: 2003-03-15T05:00:00+00:00
Figure 5-54 A Source-Based Tree Might Be Preferable to the Shared Tree in This Internetwork
Unlike CBT, PIM-SM supports both shared and source-based trees, which is the primary reason it is presently the multicast routing protocol of choice in most modern internetworks.
PIM-SM is described in RFC 2362.13
PIM-SM Basics
PIM-SM uses seven PIMv2 messages:
• Hello
• Bootstrap
• Candidate-RP-Advertisement
• Join/Prune
• Assert
• Register
• Register-Stop
Notice that three of the messages (Hello, Join/Prune, and Assert) also are used by PIM-DM. There are four messages unique to PIM-SM, just as there are two messages (Graft and Graft-Ack) used only by PIM-DM.
Several functions are common to PIM-SM and PIM-DM:
• Neighbor discovery through exchange of Hello messages
• Recalculation of the RPF interface when the unicast routing table changes
• Election of a designated router on multiaccess networks
• The use of Prune Overrides on multiaccess networks
• Use of Assert messages to elect a designated forwarder on multiaccess networks
These functions are all described in the PIM-DM section and so are not described again here.
Unlike PIM-DM, PIM-SM uses explicit joins, making the creation of both shared and source-based multicast trees more efficient.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25287)
Hello! Python by Anthony Briggs(24338)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23432)
Kotlin in Action by Dmitry Jemerov(22511)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21975)
Dependency Injection in .NET by Mark Seemann(21845)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20711)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19523)
Grails in Action by Glen Smith Peter Ledbrook(18605)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17033)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13690)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11853)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9199)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8360)