![]() ![]() This behaviour works well for broadcast packets that are intended toīe seen or processed by all connected nodes. Of this rule at every switch in the network will make the packetĪccessible to all nodes connected to the network. The spanning tree algorithm ensures that the application Interfaces that are in the forwarding state in accordance with When processing a packet whoseĭestination MAC address is a multicast address, the switch willįorward a copy of the packet into each of the remaining network The operation of a switch with respect to multicast 'bridged', or as is more commonly used today, switched between LAN The IEEE bridge standard specifies how LAN packets are AdditionalĪreas of relevance, such as link layer topology changes andĮthernet-specific encapsulation issues, are also considered. These are based on best current practices for IGMPv2, withįurther considerations for IGMPv3- and MLDv2-snooping. Protocol (IGMP) and Multicast Listener Discovery (MLD) snooping This memo describes the recommendations for Internet Group Management Distribution of thisĬopyright (C) The Internet Society (2006). Not specify an Internet standard of any kind. This memo provides information for the Internet community. ![]() Request for Comments: 4541 Thrane & ThraneĬonsiderations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping Switches ![]() RFC 4541: Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping Switches Įrrata Exist Network Working Group M. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |