40
C
HAPTER
3: U
SING
M
ULTICAST
F
ILTERING
A multicast packet is identified by the presence of a multicast group
address in the destination address field of the packet’s IP header.
Benefits of Multicast
The benefits of using IP multicast are that it:
■
Enables the simultaneous delivery of information to many receivers in
the most efficient, logical way.
■
Reduces the load on the source (for example, a server) because it does
not have to produce multiple copies of the same data.
■
Makes efficient use of network bandwidth and scales well as the
number of participants or collaborators expands.
■
Works with other IP protocols and services, such as Quality of Service
(QoS).
There are situations where a multicast approach is more logical and
efficient than a unicast approach. Application examples include distance
learning, transmitting stock quotes to brokers, and collaborative
computing.
A typical use of multicasts is in video-conferencing, where high volumes
of traffic need to be sent to several endstations simultaneously, but where
broadcasting that traffic to all endstations would seriously reduce
network performance.
Multicast Filtering
Multicast filtering is the process that ensures that endstations only receive
multicast traffic if they register to join specific multicast groups. With
multicast filtering, network devices only forward multicast traffic to the
ports that are connected to registered endstations.
Figure 8
shows how a network behaves without multicast filtering and
with multicast filtering.
Summary of Contents for 3C17203 - SuperStack 3 Switch 4400
Page 8: ...GLOSSARY INDEX ...
Page 14: ...14 ...
Page 26: ...26 CHAPTER 1 SWITCH FEATURES OVERVIEW ...
Page 44: ...44 CHAPTER 3 USING MULTICAST FILTERING ...
Page 55: ...How STP Works 55 Figure 13 STP configurations ...
Page 58: ...58 CHAPTER 4 USING RESILIENCE FEATURES ...
Page 84: ...84 CHAPTER 7 STATUS MONITORING AND STATISTICS ...
Page 92: ...92 CHAPTER 8 SETTING UP VIRTUAL LANS ...
Page 98: ...98 CHAPTER 9 USING WEBCACHE SUPPORT ...
Page 120: ...120 CHAPTER 12 POWER MANAGEMENT AND CONTROL ...
Page 122: ...122 ...
Page 126: ...126 APPENDIX A CONFIGURATION RULES ...
Page 134: ...134 APPENDIX B NETWORK CONFIGURATION EXAMPLES ...
Page 150: ...150 GLOSSARY ...