draft-ietf-pim-bidir-07.txt   draft-ietf-pim-bidir-08.txt 
Internet Engineering Task Force PIM WG Internet Engineering Task Force PIM WG
INTERNET-DRAFT Mark Handley/UCL INTERNET-DRAFT Mark Handley/UCL
draft-ietf-pim-bidir-07.txt Isidor Kouvelas/Cisco draft-ietf-pim-bidir-08.txt Isidor Kouvelas/Cisco
Tony Speakman/Cisco Tony Speakman/Cisco
Lorenzo Vicisano/Cisco Lorenzo Vicisano/Cisco
18 July 2004 22 October 2005
Expires: January 2005 Expires: April 2006
Bi-directional Protocol Independent Multicast (BIDIR-PIM) Bi-directional Protocol Independent Multicast (BIDIR-PIM)
Status of this Document Status of this Document
This document is an Internet-Draft and is in full conformance with all By submitting this Internet-Draft, each author represents that any
provisions of Section 10 of RFC2026. applicable patent or other IPR claims of which he or she is aware have
been or will be disclosed, and any of which he or she becomes aware will
be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Internet-Drafts are working documents of the Internet Engineering Task
Force (IETF), its areas, and its working groups. Note that other groups Force (IETF), its areas, and its working groups. Note that other groups
may also distribute working documents as Internet-Drafts. may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference material time. It is inappropriate to use Internet-Drafts as reference material
or to cite them other than as "work in progress." or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This document is a product of the IETF PIM WG. Comments should be This document is a product of the IETF PIM WG. Comments should be
addressed to the authors, or the WG's mailing list at pim@ietf.org. addressed to the authors, or the mailing list at pim@ietf.org.
Abstract Abstract
This document discusses Bi-directional PIM, a variant of PIM This document discusses Bi-directional PIM, a variant of PIM
Sparse-Mode that builds bi-directional shared trees connecting Sparse-Mode that builds bi-directional shared trees connecting
multicast sources and receivers. Bi-directional trees are multicast sources and receivers. Bi-directional trees are
built using a fail-safe Designated Forwarder (DF) election built using a fail-safe Designated Forwarder (DF) election
mechanism operating on each link of a multicast topology. mechanism operating on each link of a multicast topology.
With the assistance of the DF, multicast data is natively With the assistance of the DF, multicast data is natively
forwarded from sources to the Rendezvous-Point and hence along forwarded from sources to the Rendezvous-Point and hence along
skipping to change at page 4, line 16 skipping to change at page 4, line 16
5.2. Non-cryptographic Authentication Mechanisms. . . . . 41 5.2. Non-cryptographic Authentication Mechanisms. . . . . 41
5.2.1. Basic Access Control. . . . . . . . . . . . . . . 41 5.2.1. Basic Access Control. . . . . . . . . . . . . . . 41
5.3. Authentication Using IPsec . . . . . . . . . . . . . 41 5.3. Authentication Using IPsec . . . . . . . . . . . . . 41
5.4. Denial of Service Attacks. . . . . . . . . . . . . . 41 5.4. Denial of Service Attacks. . . . . . . . . . . . . . 41
6. Change history. . . . . . . . . . . . . . . . . . . . . 42 6. Change history. . . . . . . . . . . . . . . . . . . . . 42
7. Acknowledgments . . . . . . . . . . . . . . . . . . . . 42 7. Acknowledgments . . . . . . . . . . . . . . . . . . . . 42
8. Authors' Addresses. . . . . . . . . . . . . . . . . . . 42 8. Authors' Addresses. . . . . . . . . . . . . . . . . . . 42
9. Normative References. . . . . . . . . . . . . . . . . . 43 9. Normative References. . . . . . . . . . . . . . . . . . 43
10. Informative References . . . . . . . . . . . . . . . . 43 10. Informative References . . . . . . . . . . . . . . . . 43
11. Index. . . . . . . . . . . . . . . . . . . . . . . . . 45 11. Index. . . . . . . . . . . . . . . . . . . . . . . . . 45
12. Full Copyright Statement . . . . . . . . . . . . . . . 46
List of Figures List of Figures
Figure 1. Downstream group per-interface state- Figure 1. Downstream group per-interface state-
machine. . . . . . . . . . . . . . . . . . . . . . . . . . 16 machine. . . . . . . . . . . . . . . . . . . . . 16
Figure 3. Designated Forwarder election state- Figure 3. Designated Forwarder election state-
machine. . . . . . . . . . . . . . . . . . . . . . . . . . 29 machine. . . . . . . . . . . . . . . . . . . . . 29
1. Introduction 1. Introduction
This document specifies Bi-directional PIM (BIDIR-PIM), a variant of PIM This document specifies Bi-directional PIM (BIDIR-PIM), a variant of PIM
Sparse-Mode (PIM-SM) [4] that builds bi-directional shared trees Sparse-Mode (PIM-SM) [4] that builds bi-directional shared trees
connecting multicast sources and receivers. connecting multicast sources and receivers.
PIM-SM constructs uni-directional shared trees that are used to forward PIM-SM constructs uni-directional shared trees that are used to forward
data from senders to receivers of a multicast group. PIM-SM also allows data from senders to receivers of a multicast group. PIM-SM also allows
the construction of source specific trees, but this capability is not the construction of source specific trees, but this capability is not
skipping to change at line 1856 skipping to change at page 46, line 4
pim_include(G) . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 pim_include(G) . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
PPT(G,I) . . . . . . . . . . . . . . . . . . . . . . . . . . . .11,16,35 PPT(G,I) . . . . . . . . . . . . . . . . . . . . . . . . . . . .11,16,35
RPA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 RPA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
RPF_interface(RPA) . . . . . . . . . . . . . . . . . . . . . . . . 12,14 RPF_interface(RPA) . . . . . . . . . . . . . . . . . . . . . . . . 12,14
RPL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 RPL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
TIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 TIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
t_override . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20,35 t_override . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20,35
t_periodic . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20,35 t_periodic . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20,35
t_suppressed . . . . . . . . . . . . . . . . . . . . . . . . . . . 20,35 t_suppressed . . . . . . . . . . . . . . . . . . . . . . . . . . . 20,35
Upstream . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Upstream . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in this
document or the extent to which any license under such rights might or
might not be available; nor does it represent that it has made any
independent effort to identify any such rights. Information on the
procedures with respect to rights in RFC documents can be found in BCP
78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an attempt
made to obtain a general license or permission for the use of such
proprietary rights by implementers or users of this specification can be
obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary rights
that may cover technology that may be required to implement this
standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
12. Full Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject to
the rights, licenses and restrictions contained in BCP 78, and except as
set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR
IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
 End of changes. 8 change blocks. 
8 lines changed or deleted 11 lines changed or added

This html diff was produced by rfcdiff 1.27, available from http://www.levkowetz.com/ietf/tools/rfcdiff/