18
M
ULTICAST
P
ROTOCOL
This chapter includes information on the following:
■
IP Multicast Overview
■
IGMP Snooping
■
Common Multicast Configuration
■
Internet Group Management Protocol (IGMP)
■
PIM-DM Overview
■
PIM-SM Overview
IP Multicast Overview
The Switch 5500-EI supports all of the multicast protocols listed in this manual;
however, the Switch 5500-SI only supports the IGMP Snooping protocol.
Many transmission methods can be used when the destination (including data, voice
and video) is the secondary use of the network. If the multicast method is used you
should establish an independent data transmission path for each user. The broadcast
mode can be used if you intend to send the information to all users on the network.
In either case, the end users will receive the information. For example, if the same
information is required by 200 users on the network, the traditional solution is to
send the information 200 times in unicast mode. In the broadcast mode, the data is
broadcast over the entire network. However, both of the methods waste bandwidth
resources. In addition, the broadcast mode cannot ensure information security.
IP multicast technology solves this problem. The multicast source sends the
information only once. Multicast routing protocols establish tree-type routing for
multicast packets. The information being sent will be replicated and distributed as far
as possible (see Figure 78). Therefore, the information can be correctly sent, with high
efficiency, to each user.
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...