Multi-Instance Multicast Applications - HP A6600 Configuration Manual

Ip multicast
Hide thumbs Also See for A6600:
Table of Contents

Advertisement

Figure 10 Networking diagram for VPN
VPN B
CE b1
CE a1
VPN A
As shown in
devices in the network are as follows:
P device belongs to the public network. The CE devices belong to their respective VPNs. Each CE
device serves its own network and maintains only one set of forwarding mechanisms.
PE devices connect to the public network and the VPN networks at the same time. Each PE device
must strictly distinguish the information for different networks and must maintain a separate
forwarding mechanism for each network. On a PE device, a set of software and hardware that
serves the same network forms an instance. Multiple instances exist on a PE device at the same time,
and an instance resides on different PE devices.

Multi-instance multicast applications

With multi-instance multicast enabled, a PE can do the following:
Maintain a set of independent multicast forwarding mechanisms for each instance, including various
multicast protocols, a list of PIM neighbors, and a multicast routing table per instance. Each instance
searches its own forwarding table or routing table to forward multicast data.
Guarantee the isolation between different VPN instances.
Implement information exchange and data conversion between the public network and VPN
instances.
Multi-instance multicast is the basis of multicast over a VPN network. As shown in
multicast source in VPN A sends a multicast stream to a multicast group, of all possible receivers on the
network for that group, only those that belong to VPN A can receive the multicast stream. The multicast
data is multicast both in VPN A and in the public network.
Only one set of unified multicast service runs on a non-PE device. It is called a "public instance."
The configuration made in VPN instance view takes effect only on the VPN instance interface. An
interface that does not belong to any VPN instance is called a "public instance interface."
VPN A
CE b2
PE 1
Public network
Figure
10, VPN A and VPN B separately access the public network through PE devices. The
CE a2
CE b3
PE 2
P
PE 3
12
VPN B
CE a3
VPN A
Figure
10, when a

Advertisement

Table of Contents
loading

Table of Contents