Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
IP Multicasting
Many applications transmit the same data at one time to multiple receivers Broadcasts of Radio or Video Videoconferencing Shared Applications A network must have mechanisms to support such applications in an efficient manner Applications with multiple receivers
Multicasting Multicast communications refers to one-to-many communications.  IP Multicasting refers to the implementation of multicast communication in the Internet Multicast is driven by receivers: Receivers indicate interest in  receiving data Unicast Broadcast Multicast
Multicast Groups The set of receivers for a multicast transmission is called a  multicast group A multicast group is identified by a  multicast address A user that wants to receive multicast transmissions  joins  the corresponding multicast group, and becomes a  member  of that group After a user joins, the network builds the necessary routing paths so that the user receives the data sent to the multicast group
Multicasting over a Packet Network Without support for multicast at the network layer: Multiple copies of the same message is transmitted on the same link
Multicasting over a Packet Network With support for multicast at the network layer: Requires a set of mechanisms:  (1) Packet forwarding can send multiple  copies of same packet (2) Multicast routing algorithm which builds  a spanning tree (dynamically)
Semantics of IP Multicast Multicast groups are identified by IP addresses in the range 224.0.0.0 - 239.255.255.255 (class D address) Every host ( more precisely:  interface) can join and leave a multicast group dynamically no access control Every IP datagram send to a multicast group is transmitted to all members of the group no security, no “floor control” Sender does not need to be a member of the group The IP Multicast service is unreliable
The IP Protocol Stack IP Multicasting only supports UDP as higher layer  There is no multicast TCP ! Network Interface User Layer IP IP Multicast UDP TCP Socket Layer Stream Sockets Datagram Sockets Multicast Sockets
IP Multicasting There are three essential components of the IP Multicast service: IP Multicast Addressing IP Group Management  Multicast Routing
Multicast Addressing All Class D addresses are multicast addresses: Multicast addresses are dynamically assigned. An IP datagram sent to a multicast address is forwarded to everyone who has joined  the multicast group If an application is terminated, the multicast address is (implicitly) released.
Types of Multicast addresses The range of addresses between 224.0.0.0 and 224.0.0.255, inclusive, is reserved for the use of routing protocols and other low-level topology discovery or maintenance protocols Multicast routers should not forward any multicast datagram with destination addresses in this range. Examples of special and reserved Class D addresses, e.g,
Multicast Address Translation In Ethernet MAC addresses, a multicast address is identified by setting the lowest bit of the “most left byte” Not all Ethernet cards can filter multicast addresses in hardware -  Then:  Filtering is done in  software by device driver.
Multicast Address Mapping
IGMP The  Internet Group Management Protocol (IGMP)  is a simple protocol for the support of IP multicast. IGMP is defined in RFC 1112. IGMP operates on a physical network (e.g., single Ethernet Segment. IGMP is used by multicast routers to keep track of membership in a multicast group. Support for: Joining a multicast group Query membership Send membership reports
A host sends an  IGMP report  when it joins a multicast group (Note: multiple processes on a host can join. A report is sent only for the first process). No report is sent when a process leaves a group A multicast router regularly multicasts an  IGMP query  to all  hosts (group address is set to zero). A host responds to an IGMP query with an  IGMP report . Multicast router keeps a table on the multicast groups that have joined hosts. The router only forwards a packet, if there is a host still joined. Note: Router does not keep track which host is joined. IGMP Protocol
IGMP Packet Format IGMP messages are only 8 bytes long  Type: 1 = sent by router, 2 = sent by host
IGMP Protocol
IGMP Protocol
Networks with multiple multicast routers Only one router responds to IGMP queries ( Querier )  Router with smallest IP address becomes the querier on a network.  One router forwards multicast packets to the network ( Forwarder ) .
Multicast Routing Protocols Goal:  Build a spanning tree between all members of a multicast group
Multicast Routing protocols Source based tree DVMRP Reverse path forwarding (RPF) Reverse path Broadcasting (RPB) Reverse path multicasting (RPM) MOSP Core based Tree (CBT) PIM ( Protocol Independent Multicast) PIM-DM PIM-SM
Objectives Every member should receive only one copy Non members should not receive a copy There should be no loops Source to destination must be shortest path
Multicast routing as a graph problem Problem : Embed a tree such that all multicast group members are connected by the tree
Multicast routing as a graph problem Problem : Embed a tree such that all multicast group members are connected by the tree  Solution 1:  Shortest Path Tree or source-based tree   Build a tree that minimizes the path cost from the source to each receiver Good tree if there is a single sender If there are multiple senders, need one tree per sender  Easy to compute
Multicast routing as a graph problem Problem : Embed a tree such that all multicast group members are connected by the tree  Solution 2:  Minimum-Cost Tree  Build a tree that   minimizes the total cost of the edges  Good solution if there are multiple senders Very expensive to compute (not practical for more than 30 nodes)
Multicast routing in practice Routing Protocols implement one of two approaches: Source Based Tree:  Essentially implements Solution 1.  Builds one shortest path tree for each sender Tree is built from receiver to the sender     reverse shortest path / reverse path forwarding Core-based Tree:   Build a single distribution tree that is shared by all senders Does not use Solution 2 (because it is too expensive) Selects one router as a “core” (also called “rendezvous point”) All receivers build a shortest path to the core     reverse shortest path / reverse path  forwarding
Multicast Routing table Routing table entries for source-based trees and for core-based trees are different Source-based tree : (Source, Group) or (S, G) entry.  Core-based tree:   (*, G) entry.  I1, I3 I2 G2 * I2, I3 I1 G1 S1 Outgoing  interface list Incoming interface (RPF interface) Multicast group Source IP  address
Multicast routing in practice Routing algorithms in practice implement one of two approaches: Source Based Tree Tree:  Establish a reverse path to the source Core-based Tree:   Establish a reverse path to the core router
Reverse Path Forwarding (RPF) RPF builds a shortest path tree in a distributed fashion by taking advantage of the unicast routing tables.   Main concept:  Given the address of the root of the tree (e.g., the sending host), a router selects as its upstream neighbor in the tree the router which is the next-hop neighbor for forwarding unicast packets to the root. This concept leads to a  reverse shortest  path  from any router to the sending host.  The union of reverse shortest paths builds  a  reverse shortest path tree .  RPF Forwarding: Forward a packet  only if it is receives  from an RPF neighbor
Building a source-based tree Set routing tables according to RPF forwarding Flood-and-Prune
Building a source-based tree Set routing tables according to RPF forwarding Flood-and-Prune Flood=  Forward packets that arrive on RPF interface on all non-RPF interfaces
Building a source-based tree Set routing tables according to RPF forwarding Flood-and-Prune Flood=  Forward packets  on all non-RPF interfaces Receiver drops packets  not received on  RPF interface
Building a source-based tree Set routing tables according to RPF forwarding Flood-and-Prune Prune=  Send a prune message when a packet is received on a non-RPF interface or when there are no receivers downstream Prune message disables  routing table entry
Pruning Prune message  temporarily disables a routing table entry Effect : Removes a link from the multicast tree  No multicast messages are sent on a pruned link Prune message is sent in response to a multicast packet Question: Why is routing table only temporarily disabled? Who sends prune messages? A router with no group members in its local network and no connection to other routers (sent on RPF interface) A router with no group members in its local network which has received a prune message on all non-RPF interfaces (sent on RPF interface) A router with group members which has received a packet from a non-RPF neighbor (to non-RPF neighbor)
Building a source-based tree When a receiver joins, one needs to re-activate a pruned routing table entry Grafting Sending a Graft message disables  prune, and re-activates routing table entry.
Alternative method for building a source-based tree This only works if the receiver knows the source Explicit-Join Receiver sends a Join message to RPF neighbor Join message creates (S,G) routing table entry Join message is passed  on
Building a core-based tree One route is the  core Receiver sends a Join message to RPF neighbor with respect to core Join message creates  (*, G) routing table  entry
Building a core-based tree Source sends data to the core  Core forwards data according to routing table entry
Multicast routing protocols in the Internet Distance Vector Multicast Routing Protocol (DVMRP):  First multicast routing protocol Implements flood-and-prune Multicast Open Shortest Path First (MOSPF): Multicast extensions to OSPF. Each router calculates a shortest-path tree based on link state database Not widely used Core Based Tree (CBT): First core-based tree routing protocol Protocol Independent Multicast (PIM): Runs in two modes: PIM Dense Mode (PIM-DM) and PIM Sparse Mode (PIM-SM).  PIM-DM builds source-based trees using flood-and-prune  PIM-SM  builds core-based trees as well as source-based trees with explicit joins.
PIM Messages (PIM version 2) Encapsulated in IP datagrams with protocol number 103.  PIM messages can be sent as unicast or multicast packet  224.0.0.13 is reserved as the  ALL-PIM-Routers  group  8 Candidate-RP-Advertisement   7 Graft-Ack  6 Graft   5 Assert  4 Bootstrap   3 Join/Prune  2 Register-Stop  1 Register   0 Hello PIM-SM PIM-DM Type PIM-DM messages
PIM-DM: PIM Dense Mode PIM-DM implements flood-and-prune Orange packet: Multicast packet (=Data) Blue packet:  PIM message
PIM-SM: PIM Sparse Mode Core is called rendezvous-point  (RP) Receivers know RP (statically configured or dynamically elected) When receiver joins, a Join message is sent to RP on RPF.
PIM-SM: PIM Sparse Mode Host H3 joins: Join message is only forwarded until the first router that is part of the core-based tree.
PIM-SM: Data transmission Source sends multicast packet to RP Packet is attached to an RP Register message When packet reaches RP, it is forwarded in the tree Also: RP sends a Join message on reverse path to S1
PIM-SM: Data transmission When Join messages reaches R1, it sends a native multicast packet to the RP (in addition to the packet attached to the register message)
PIM-SM: Data transmission When RP receives native multicast packet it sends a register stop message to R1. This message stops the transmission of register messages from R1.
PIM-SM: Switching to source-based tree When data to receivers exceeds a threshold, routers switch to a source-based tree This is done by sending an explicit join message to the source There may be duplicate packets being sent for some time
PIM-SM: Switching to source-based tree When data arrives from source (as opposed to RP), a Prune message is sent to the RPT Now: data is forwarded only along the shortest-path tree

More Related Content

What's hot

Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
MULTICAST BY SAIKIRAN PANJALA
MULTICAST BY SAIKIRAN PANJALAMULTICAST BY SAIKIRAN PANJALA
MULTICAST BY SAIKIRAN PANJALA
Saikiran Panjala
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
Gunasekara Reddy
 
5. icmp
5. icmp5. icmp
5. icmp
Swati Arora
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Subhajit Sahu
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
anuragjagetiya
 
Domain name system
Domain name systemDomain name system
Domain name system
Siddique Ibrahim
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Sparsh Samir
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
Harish Chand
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
Rahul Hada
 
Icmp
IcmpIcmp
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
Mohsin Ali
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
selvakumar_b1985
 

What's hot (20)

Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
MULTICAST BY SAIKIRAN PANJALA
MULTICAST BY SAIKIRAN PANJALAMULTICAST BY SAIKIRAN PANJALA
MULTICAST BY SAIKIRAN PANJALA
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
 
5. icmp
5. icmp5. icmp
5. icmp
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Icmp
IcmpIcmp
Icmp
 
Data link layer
Data link layer Data link layer
Data link layer
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 

Viewers also liked

Ppt multicast routing
Ppt multicast routingPpt multicast routing
Ppt multicast routing
reena aggarwal
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
Ip multicast
Ip multicastIp multicast
Ip multicast
Ashutosh Pateriya
 
Multicast
MulticastMulticast
Multicast
Sagar Surve
 
Ch14
Ch14Ch14
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
Rumesh Hapuarachchi
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
Pradeep Kumar TS
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
Online
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
Bhagyashri Dhoke
 
IP multicast
IP multicastIP multicast
IP multicast
Aqique Kazi
 
Ipmulticasting
IpmulticastingIpmulticasting
Ipmulticasting
Sachith Walpita
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
CAVC
 
IP Multicasting
IP MulticastingIP Multicasting
I Pv6 Addressing
I Pv6 AddressingI Pv6 Addressing
I Pv6 Addressing
Ram Dutt Shukla
 
IP Multicasting - An Overview
IP Multicasting - An OverviewIP Multicasting - An Overview
IP Multicasting - An Overview
h_marvin
 
IP Multicast Explained
IP Multicast ExplainedIP Multicast Explained
IP Multicast Explained
Metaswitch NTD
 
IP Multicast Routing
IP Multicast RoutingIP Multicast Routing
IP Multicast Routing
Pedro De Almeida
 
Shttp
ShttpShttp
Basics of signals data communication
Basics of signals data communicationBasics of signals data communication
Basics of signals data communication
Syed Bilal Zaidi
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
 

Viewers also liked (20)

Ppt multicast routing
Ppt multicast routingPpt multicast routing
Ppt multicast routing
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
 
Ip multicast
Ip multicastIp multicast
Ip multicast
 
Multicast
MulticastMulticast
Multicast
 
Ch14
Ch14Ch14
Ch14
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
IP multicast
IP multicastIP multicast
IP multicast
 
Ipmulticasting
IpmulticastingIpmulticasting
Ipmulticasting
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
I Pv6 Addressing
I Pv6 AddressingI Pv6 Addressing
I Pv6 Addressing
 
IP Multicasting - An Overview
IP Multicasting - An OverviewIP Multicasting - An Overview
IP Multicasting - An Overview
 
IP Multicast Explained
IP Multicast ExplainedIP Multicast Explained
IP Multicast Explained
 
IP Multicast Routing
IP Multicast RoutingIP Multicast Routing
IP Multicast Routing
 
Shttp
ShttpShttp
Shttp
 
Basics of signals data communication
Basics of signals data communicationBasics of signals data communication
Basics of signals data communication
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 

Similar to Multicast Routing Protocols

Raj Jain The Ohio State University
Raj Jain The Ohio State UniversityRaj Jain The Ohio State University
Raj Jain The Ohio State University
Videoguy
 
jpl-multicast.ppt
jpl-multicast.pptjpl-multicast.ppt
jpl-multicast.ppt
RicckySingh
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
Iffat Anjum
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
Routing in Multicast Communication
Routing in Multicast CommunicationRouting in Multicast Communication
Routing in Multicast Communication
Sahil Jain
 
Multicast routing protocols
Multicast routing protocolsMulticast routing protocols
Multicast routing protocols
KanwalBloach
 
NetSim Technology Library- Advanced Routing
NetSim Technology Library- Advanced RoutingNetSim Technology Library- Advanced Routing
NetSim Technology Library- Advanced Routing
Vishal Sharma
 
Solving QoS multicast routing problem using aco algorithm
Solving QoS multicast routing problem using aco algorithm Solving QoS multicast routing problem using aco algorithm
Solving QoS multicast routing problem using aco algorithm
Abdullaziz Tagawy
 
Multicast in computer Architecture
Multicast in computer ArchitectureMulticast in computer Architecture
Multicast in computer Architecture
Dinesh Kumar
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
pbrinda
 
Raj Jain The Ohio State University
Raj Jain The Ohio State UniversityRaj Jain The Ohio State University
Raj Jain The Ohio State University
Videoguy
 
internetworking operation
internetworking operationinternetworking operation
internetworking operation
Srinivasa Rao
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
niran10
 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks
Sasank Chaitanya
 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networks
Reliance Comm
 
Mod5
Mod5Mod5
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
SolWeje
 
Network Layer Protocol.pptx
Network Layer Protocol.pptxNetwork Layer Protocol.pptx
Network Layer Protocol.pptx
SeekayAlaisKaruppaia
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
Santosh Kulkarni
 
6.Routing
6.Routing6.Routing
6.Routing
phanleson
 

Similar to Multicast Routing Protocols (20)

Raj Jain The Ohio State University
Raj Jain The Ohio State UniversityRaj Jain The Ohio State University
Raj Jain The Ohio State University
 
jpl-multicast.ppt
jpl-multicast.pptjpl-multicast.ppt
jpl-multicast.ppt
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Routing in Multicast Communication
Routing in Multicast CommunicationRouting in Multicast Communication
Routing in Multicast Communication
 
Multicast routing protocols
Multicast routing protocolsMulticast routing protocols
Multicast routing protocols
 
NetSim Technology Library- Advanced Routing
NetSim Technology Library- Advanced RoutingNetSim Technology Library- Advanced Routing
NetSim Technology Library- Advanced Routing
 
Solving QoS multicast routing problem using aco algorithm
Solving QoS multicast routing problem using aco algorithm Solving QoS multicast routing problem using aco algorithm
Solving QoS multicast routing problem using aco algorithm
 
Multicast in computer Architecture
Multicast in computer ArchitectureMulticast in computer Architecture
Multicast in computer Architecture
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
 
Raj Jain The Ohio State University
Raj Jain The Ohio State UniversityRaj Jain The Ohio State University
Raj Jain The Ohio State University
 
internetworking operation
internetworking operationinternetworking operation
internetworking operation
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks
 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networks
 
Mod5
Mod5Mod5
Mod5
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
Network Layer Protocol.pptx
Network Layer Protocol.pptxNetwork Layer Protocol.pptx
Network Layer Protocol.pptx
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
6.Routing
6.Routing6.Routing
6.Routing
 

More from Ram Dutt Shukla

Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
Ram Dutt Shukla
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
Ram Dutt Shukla
 
Web Security
Web SecurityWeb Security
Web Security
Ram Dutt Shukla
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
Ram Dutt Shukla
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
Ram Dutt Shukla
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
Ram Dutt Shukla
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
Ram Dutt Shukla
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
Ram Dutt Shukla
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
Ram Dutt Shukla
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow Control
Ram Dutt Shukla
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
Ram Dutt Shukla
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
Ram Dutt Shukla
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
Ram Dutt Shukla
 
T Tcp
T TcpT Tcp
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
Ram Dutt Shukla
 
Igmp
IgmpIgmp
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
Ram Dutt Shukla
 
Mld
MldMld
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
Ram Dutt Shukla
 
Address Resolution Protocol
Address Resolution ProtocolAddress Resolution Protocol
Address Resolution Protocol
Ram Dutt Shukla
 

More from Ram Dutt Shukla (20)

Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Web Security
Web SecurityWeb Security
Web Security
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow Control
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
T Tcp
T TcpT Tcp
T Tcp
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Igmp
IgmpIgmp
Igmp
 
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
Mld
MldMld
Mld
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
Address Resolution Protocol
Address Resolution ProtocolAddress Resolution Protocol
Address Resolution Protocol
 

Recently uploaded

一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
uuuot
 
Hire a private investigator to get cell phone records
Hire a private investigator to get cell phone recordsHire a private investigator to get cell phone records
Hire a private investigator to get cell phone records
HackersList
 
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
anupriti
 
How to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory ModelHow to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory Model
ScyllaDB
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
anupriti
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
What's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdfWhat's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdf
SeasiaInfotech2
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design ApproachesKnowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Earley Information Science
 
Interaction Latency: Square's User-Centric Mobile Performance Metric
Interaction Latency: Square's User-Centric Mobile Performance MetricInteraction Latency: Square's User-Centric Mobile Performance Metric
Interaction Latency: Square's User-Centric Mobile Performance Metric
ScyllaDB
 
Performance Budgets for the Real World by Tammy Everts
Performance Budgets for the Real World by Tammy EvertsPerformance Budgets for the Real World by Tammy Everts
Performance Budgets for the Real World by Tammy Everts
ScyllaDB
 
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecGDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
James Anderson
 
How Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global ScaleHow Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global Scale
ScyllaDB
 
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
Edge AI and Vision Alliance
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 

Recently uploaded (20)

一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
 
Hire a private investigator to get cell phone records
Hire a private investigator to get cell phone recordsHire a private investigator to get cell phone records
Hire a private investigator to get cell phone records
 
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
 
How to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory ModelHow to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory Model
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
What's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdfWhat's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdf
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design ApproachesKnowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
 
Interaction Latency: Square's User-Centric Mobile Performance Metric
Interaction Latency: Square's User-Centric Mobile Performance MetricInteraction Latency: Square's User-Centric Mobile Performance Metric
Interaction Latency: Square's User-Centric Mobile Performance Metric
 
Performance Budgets for the Real World by Tammy Everts
Performance Budgets for the Real World by Tammy EvertsPerformance Budgets for the Real World by Tammy Everts
Performance Budgets for the Real World by Tammy Everts
 
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecGDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
 
How Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global ScaleHow Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global Scale
 
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 

Multicast Routing Protocols

  • 2. Many applications transmit the same data at one time to multiple receivers Broadcasts of Radio or Video Videoconferencing Shared Applications A network must have mechanisms to support such applications in an efficient manner Applications with multiple receivers
  • 3. Multicasting Multicast communications refers to one-to-many communications. IP Multicasting refers to the implementation of multicast communication in the Internet Multicast is driven by receivers: Receivers indicate interest in receiving data Unicast Broadcast Multicast
  • 4. Multicast Groups The set of receivers for a multicast transmission is called a multicast group A multicast group is identified by a multicast address A user that wants to receive multicast transmissions joins the corresponding multicast group, and becomes a member of that group After a user joins, the network builds the necessary routing paths so that the user receives the data sent to the multicast group
  • 5. Multicasting over a Packet Network Without support for multicast at the network layer: Multiple copies of the same message is transmitted on the same link
  • 6. Multicasting over a Packet Network With support for multicast at the network layer: Requires a set of mechanisms: (1) Packet forwarding can send multiple copies of same packet (2) Multicast routing algorithm which builds a spanning tree (dynamically)
  • 7. Semantics of IP Multicast Multicast groups are identified by IP addresses in the range 224.0.0.0 - 239.255.255.255 (class D address) Every host ( more precisely: interface) can join and leave a multicast group dynamically no access control Every IP datagram send to a multicast group is transmitted to all members of the group no security, no “floor control” Sender does not need to be a member of the group The IP Multicast service is unreliable
  • 8. The IP Protocol Stack IP Multicasting only supports UDP as higher layer There is no multicast TCP ! Network Interface User Layer IP IP Multicast UDP TCP Socket Layer Stream Sockets Datagram Sockets Multicast Sockets
  • 9. IP Multicasting There are three essential components of the IP Multicast service: IP Multicast Addressing IP Group Management Multicast Routing
  • 10. Multicast Addressing All Class D addresses are multicast addresses: Multicast addresses are dynamically assigned. An IP datagram sent to a multicast address is forwarded to everyone who has joined the multicast group If an application is terminated, the multicast address is (implicitly) released.
  • 11. Types of Multicast addresses The range of addresses between 224.0.0.0 and 224.0.0.255, inclusive, is reserved for the use of routing protocols and other low-level topology discovery or maintenance protocols Multicast routers should not forward any multicast datagram with destination addresses in this range. Examples of special and reserved Class D addresses, e.g,
  • 12. Multicast Address Translation In Ethernet MAC addresses, a multicast address is identified by setting the lowest bit of the “most left byte” Not all Ethernet cards can filter multicast addresses in hardware - Then: Filtering is done in software by device driver.
  • 14. IGMP The Internet Group Management Protocol (IGMP) is a simple protocol for the support of IP multicast. IGMP is defined in RFC 1112. IGMP operates on a physical network (e.g., single Ethernet Segment. IGMP is used by multicast routers to keep track of membership in a multicast group. Support for: Joining a multicast group Query membership Send membership reports
  • 15. A host sends an IGMP report when it joins a multicast group (Note: multiple processes on a host can join. A report is sent only for the first process). No report is sent when a process leaves a group A multicast router regularly multicasts an IGMP query to all hosts (group address is set to zero). A host responds to an IGMP query with an IGMP report . Multicast router keeps a table on the multicast groups that have joined hosts. The router only forwards a packet, if there is a host still joined. Note: Router does not keep track which host is joined. IGMP Protocol
  • 16. IGMP Packet Format IGMP messages are only 8 bytes long Type: 1 = sent by router, 2 = sent by host
  • 19. Networks with multiple multicast routers Only one router responds to IGMP queries ( Querier ) Router with smallest IP address becomes the querier on a network. One router forwards multicast packets to the network ( Forwarder ) .
  • 20. Multicast Routing Protocols Goal: Build a spanning tree between all members of a multicast group
  • 21. Multicast Routing protocols Source based tree DVMRP Reverse path forwarding (RPF) Reverse path Broadcasting (RPB) Reverse path multicasting (RPM) MOSP Core based Tree (CBT) PIM ( Protocol Independent Multicast) PIM-DM PIM-SM
  • 22. Objectives Every member should receive only one copy Non members should not receive a copy There should be no loops Source to destination must be shortest path
  • 23. Multicast routing as a graph problem Problem : Embed a tree such that all multicast group members are connected by the tree
  • 24. Multicast routing as a graph problem Problem : Embed a tree such that all multicast group members are connected by the tree Solution 1: Shortest Path Tree or source-based tree Build a tree that minimizes the path cost from the source to each receiver Good tree if there is a single sender If there are multiple senders, need one tree per sender Easy to compute
  • 25. Multicast routing as a graph problem Problem : Embed a tree such that all multicast group members are connected by the tree Solution 2: Minimum-Cost Tree Build a tree that minimizes the total cost of the edges Good solution if there are multiple senders Very expensive to compute (not practical for more than 30 nodes)
  • 26. Multicast routing in practice Routing Protocols implement one of two approaches: Source Based Tree: Essentially implements Solution 1. Builds one shortest path tree for each sender Tree is built from receiver to the sender  reverse shortest path / reverse path forwarding Core-based Tree: Build a single distribution tree that is shared by all senders Does not use Solution 2 (because it is too expensive) Selects one router as a “core” (also called “rendezvous point”) All receivers build a shortest path to the core  reverse shortest path / reverse path forwarding
  • 27. Multicast Routing table Routing table entries for source-based trees and for core-based trees are different Source-based tree : (Source, Group) or (S, G) entry. Core-based tree: (*, G) entry. I1, I3 I2 G2 * I2, I3 I1 G1 S1 Outgoing interface list Incoming interface (RPF interface) Multicast group Source IP address
  • 28. Multicast routing in practice Routing algorithms in practice implement one of two approaches: Source Based Tree Tree: Establish a reverse path to the source Core-based Tree: Establish a reverse path to the core router
  • 29. Reverse Path Forwarding (RPF) RPF builds a shortest path tree in a distributed fashion by taking advantage of the unicast routing tables. Main concept: Given the address of the root of the tree (e.g., the sending host), a router selects as its upstream neighbor in the tree the router which is the next-hop neighbor for forwarding unicast packets to the root. This concept leads to a reverse shortest path from any router to the sending host. The union of reverse shortest paths builds a reverse shortest path tree . RPF Forwarding: Forward a packet only if it is receives from an RPF neighbor
  • 30. Building a source-based tree Set routing tables according to RPF forwarding Flood-and-Prune
  • 31. Building a source-based tree Set routing tables according to RPF forwarding Flood-and-Prune Flood= Forward packets that arrive on RPF interface on all non-RPF interfaces
  • 32. Building a source-based tree Set routing tables according to RPF forwarding Flood-and-Prune Flood= Forward packets on all non-RPF interfaces Receiver drops packets not received on RPF interface
  • 33. Building a source-based tree Set routing tables according to RPF forwarding Flood-and-Prune Prune= Send a prune message when a packet is received on a non-RPF interface or when there are no receivers downstream Prune message disables routing table entry
  • 34. Pruning Prune message temporarily disables a routing table entry Effect : Removes a link from the multicast tree No multicast messages are sent on a pruned link Prune message is sent in response to a multicast packet Question: Why is routing table only temporarily disabled? Who sends prune messages? A router with no group members in its local network and no connection to other routers (sent on RPF interface) A router with no group members in its local network which has received a prune message on all non-RPF interfaces (sent on RPF interface) A router with group members which has received a packet from a non-RPF neighbor (to non-RPF neighbor)
  • 35. Building a source-based tree When a receiver joins, one needs to re-activate a pruned routing table entry Grafting Sending a Graft message disables prune, and re-activates routing table entry.
  • 36. Alternative method for building a source-based tree This only works if the receiver knows the source Explicit-Join Receiver sends a Join message to RPF neighbor Join message creates (S,G) routing table entry Join message is passed on
  • 37. Building a core-based tree One route is the core Receiver sends a Join message to RPF neighbor with respect to core Join message creates (*, G) routing table entry
  • 38. Building a core-based tree Source sends data to the core Core forwards data according to routing table entry
  • 39. Multicast routing protocols in the Internet Distance Vector Multicast Routing Protocol (DVMRP): First multicast routing protocol Implements flood-and-prune Multicast Open Shortest Path First (MOSPF): Multicast extensions to OSPF. Each router calculates a shortest-path tree based on link state database Not widely used Core Based Tree (CBT): First core-based tree routing protocol Protocol Independent Multicast (PIM): Runs in two modes: PIM Dense Mode (PIM-DM) and PIM Sparse Mode (PIM-SM). PIM-DM builds source-based trees using flood-and-prune PIM-SM builds core-based trees as well as source-based trees with explicit joins.
  • 40. PIM Messages (PIM version 2) Encapsulated in IP datagrams with protocol number 103. PIM messages can be sent as unicast or multicast packet 224.0.0.13 is reserved as the ALL-PIM-Routers group  8 Candidate-RP-Advertisement  7 Graft-Ack  6 Graft   5 Assert  4 Bootstrap   3 Join/Prune  2 Register-Stop  1 Register   0 Hello PIM-SM PIM-DM Type PIM-DM messages
  • 41. PIM-DM: PIM Dense Mode PIM-DM implements flood-and-prune Orange packet: Multicast packet (=Data) Blue packet: PIM message
  • 42. PIM-SM: PIM Sparse Mode Core is called rendezvous-point (RP) Receivers know RP (statically configured or dynamically elected) When receiver joins, a Join message is sent to RP on RPF.
  • 43. PIM-SM: PIM Sparse Mode Host H3 joins: Join message is only forwarded until the first router that is part of the core-based tree.
  • 44. PIM-SM: Data transmission Source sends multicast packet to RP Packet is attached to an RP Register message When packet reaches RP, it is forwarded in the tree Also: RP sends a Join message on reverse path to S1
  • 45. PIM-SM: Data transmission When Join messages reaches R1, it sends a native multicast packet to the RP (in addition to the packet attached to the register message)
  • 46. PIM-SM: Data transmission When RP receives native multicast packet it sends a register stop message to R1. This message stops the transmission of register messages from R1.
  • 47. PIM-SM: Switching to source-based tree When data to receivers exceeds a threshold, routers switch to a source-based tree This is done by sending an explicit join message to the source There may be duplicate packets being sent for some time
  • 48. PIM-SM: Switching to source-based tree When data arrives from source (as opposed to RP), a Prune message is sent to the RPT Now: data is forwarded only along the shortest-path tree