Ip Multicast Application; Dcscm; Introduction To Dcscm - Planet WGSW-52040 Configuration Manual

48-port 10/100/1000base-t + 4-port 100/1000x sfp managed switch
Hide thumbs Also See for WGSW-52040:
Table of Contents

Advertisement

38.1.4 IP Multicast Application

IP Multicast technology has effectively solved the problem of sending in single point and
receiving in multipoint. It has achieved the effective data transmission from a point to multiple
points, saved a great deal of network bandwidth and reduced network load. Making use of the
Multicast property of network, some new value-added operations can be supplied conveniently.
In Information Service areas such as online living broadcast, network TV, remote education,
remote medicine, real time video/audio meeting, the following applications may be supplied:
1)
Application of Multimedia and Streaming Media
2)
Data repository, finance application (stock) etc
3)
Any data distribution application of "one point to multiple points"
In the situation of more and more multimedia operations in IP network, Multicast has
tremendous market potential and Multicast operation will be generalized and popularized.

38.2 DCSCM

38.2.1 Introduction to DCSCM

DCSCM (Destination control and source control multicast) technology mainly includes three
aspects, i.e. Multicast Packet Source Controllable, Multicast User Controllable and
Service-Oriented Priority Strategy Multicast.
The Multicast Packet Source Controllable technology of Security Controllable Multicast
technology is mainly processed in the following manners:
1. On the edge switch, if source under-control multicast is configured, then only multicast
data from specified group of specified source can pass.
2. For RP switch in the core of PIM-SM, for REGISTER information out of specified
source and specified group, REGISTER_STOP is transmitted directly and table entry
is not allowed to set up. (This task is implemented in PIM-SM model).
The implement of Multicast User Controllable technology of Security Controllable Multicast
technology is based on the control over IGMP report message sent out by the user, thus the
model being controlled is IGMP snooping and IGMPmodel, of which the control logic includes
the following three, i.e. to take control based on VLAN+MAC address transmitting packets, to
take control based on IP address of transmitting packets and to take control based on the port
where messages enter, in which IGMP snooping can use the above three methods to take
control simultaneously, while since IGMP model is located at layer 3, it only takes control over
the IP address transmitting packets.
38-91

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents