336
C
HAPTER
13: IP M
ULTICAST
R
OUTING
A multicast router is required at each end of the tunnel. At each tunnel
entrance, the router encapsulates the IP multicast packets in standard IP
unicast packets — that is, it puts them in a format that the unicast routers
can understand. When these packets reach the end of the tunnel, the
router strips the encapsulation away and returns the packet to its native
IP multicast format.
Supporting Protocol in Your System
Your system uses the Distance-Vector Multicast Routing Protocol (DVMRP)
to form IP multicast tunnels. Specific aspects of tunnel configuration are
described later in this chapter.
IP Multicast Filtering
When a router discovers that at least one IP multicast group member
resides on a directly attached subnetwork, it forwards group traffic on
that interface until it determines that group members no longer require
the traffic. If multiple ports are configured in an interface, a router sends
copies of the group traffic to all ports, even if only one port of those ports
leads to group members. This is because the multicast routing protocol
does not track
exactly
where group members reside on that interface.
The ability to filter IP multicast traffic on ports within a routing interface
that do not lead to group members is highly desirable (although it is not
required in the IP multicast standard) because it allows you to further
optimize the LAN environment. Through targeted filtering, a router can
conserve even more network bandwidth and minimize unnecessary
interruptions to endstation CPUs.
It is also important to have a similar IP multicast filtering capability in
Layer 2 devices. Your 3Com options include the CoreBuilder
®
9400
switch, CoreBuilder 9000 Layer 2 modules, SuperStack
®
II Switch 3900,
and SuperStack II Switch 9300.
Supporting Protocol in Your System
To track which ports in an interface require IP multicast group traffic, your
system supports the Internet Group Management Protocol (IGMP)
version 1 and version 2. IGMP covers two main functions: querying and
snooping. These are explained later in this chapter.
Содержание CoreBuilder 3500
Страница 44: ...44 CHAPTER 2 MANAGEMENT ACCESS ...
Страница 58: ...58 CHAPTER 3 SYSTEM PARAMETERS ...
Страница 86: ...86 CHAPTER 5 ETHERNET ...
Страница 112: ...112 CHAPTER 6 FIBER DISTRIBUTED DATA INTERFACE FDDI ...
Страница 208: ...208 CHAPTER 9 VIRTUAL LANS ...
Страница 256: ...256 CHAPTER 10 PACKET FILTERING ...
Страница 330: ...330 CHAPTER 12 VIRTUAL ROUTER REDUNDANCY PROTOCOL VRRP ...
Страница 356: ...356 CHAPTER 13 IP MULTICAST ROUTING ...
Страница 418: ...418 CHAPTER 14 OPEN SHORTEST PATH FIRST OSPF ...
Страница 519: ...RSVP 519 Figure 94 Sample RSVP Configuration Source station End stations Routers ...
Страница 566: ...566 CHAPTER 18 DEVICE MONITORING ...
Страница 572: ...572 APPENDIX A TECHNICAL SUPPORT ...
Страница 592: ...592 INDEX ...