UMN:CLI User Manual
SURPASS hiD 6615 S223/S323 R1.5
18 A50010-Y3-C150-2-7619
Fig. 8.38
Ring Recovery............................................................................................. 267
Fig. 8.39
Example of Stacking.................................................................................... 270
Fig. 9.1
IGMP Snooping Configuration Network ...................................................... 278
Fig. 9.2
PIM-SM Configuration Network................................................................... 278
Fig. 9.3
IGMP Snooping and PIM-SM Configuration Network ................................. 279
Fig. 9.4
IP Multicasting ............................................................................................. 290
Fig. 9.5
RPT of PIM-SM ........................................................................................... 304
Fig. 9.6
STP of PIM-SM............................................................................................ 304
Fig. 9.7
In Case Multicast Source not Directly Connected to Multicast Group ........ 313