15
M
ULTICAST
O
VERVIEW
Multicast Overview
With development of networks on the Internet, more and more interaction
services such as data, voice, and video services are running on the networks. In
addition, highly bandwidth- and time-critical services, such as e-commerce, Web
conference, online auction, video on demand (VoD), and tele-education have
come into being. These services have higher requirements for information security,
legal use of paid services, and network bandwidth.
In the network, packets are sent in three modes: unicast, broadcast and multicast.
The following sections describe and compare data interaction processes in unicast,
broadcast, and multicast.
Information
Transmission in the
Unicast Mode
In unicast, the system establishes a separate data transmission channel for each
user requiring this information, and sends a separate copy of the information to
the user, as shown in Figure 55:
Figure 55
Information transmission in the unicast mode
Assume that Hosts B, D and E need this information. The source server establishes
transmission channels for the devices of these users respectively. As the
transmitted traffic over the network is in direct proportion to the number of users
that receive this information, when a large number of users need this information,
Source
Server
Receiver
Receiver
Receiver
Host A
Host B
Host C
Host D
Host E
Packets for Host B
Packets for Host D
Packets for Host E
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...