当前位置:网站首页>Sorting out the knowledge points of multicast and broadcasting
Sorting out the knowledge points of multicast and broadcasting
2022-07-06 04:50:00 【Laplacian】
List of articles
The role of multicast
Advantages of multicast :
- Deliver packets to multiple destination addresses
- The client requests the server , But there is no need to know the server address , It is suitable for scenarios where the client knows little about the network environment , A typical application is DHCP
- Reduce the cost of broadcasting , The broadcast will be sent to all hosts in the LAN , Along the protocol stack, it will not return until the transport layer finds that there is no process on the destination port ICMP Error message , It costs a lot , After using multicast instead , Unrelated hosts , This message is discarded on the network interface , It reduces the overhead of subsequent protocol stacks
The disadvantages of multicast :
- It's more complicated to implement
Anysource multicast and source specific multicast
- Anysource multicast ASM
Anysource multicast means that the receiver of multicast does not pay attention to the address of the sender , Just send it , I accept both .
- Source specific multicast SSM
The receiver is sensitive to the identity of the sender , Only messages sent by the sender in the specified list , Only the receiving party receives . Nowadays, source specific multicast is used more
Multicast address and MAC Mapping between addresses
Corresponding to the broadcast address MAC The fixed address is all f, Multicast address also has its corresponding MAC Address , Just this address is not fixed , It has something to do with multicast address .
IPv4 Multicast and MAC Address mapping
step :
- MAC The address is 48 position , Before sharing 24 position +1 Transposition + after 23 position
- front 24 The fixed position is 01:00:5e
- after 23 Bit after the multicast address 23 position
Because the multicast address range is 224.0.0.0-239.255.255.255, Altogether 228 An address ,MAC The address is only taken after 23 position , So every 25=32 Multiple multicast IP Address , Share a multicast MAC Address
IPv6 Multicast and MAC Address mapping
step :
- MAC Before the address 16 Bit fixation 33:33
- MAC After the address 32 Position fetching IPv6 After multicast address 32 position
because IPv6 Before multicast address 16 Bit fixation , after 112 Bits can be arbitrary , So there is 2^80 Network layer addresses share a link layer address .
View the multicast group corresponding to the network port
Linux Use the following command to view the multicast group corresponding to the network port :
[[email protected] ~]# netstat -gn
IPv6/IPv4 Group Memberships
Interface RefCnt Group
--------------- ------ ---------------------
lo 1 224.0.0.1
enp175s0f0 1 224.0.0.1
virbr1 1 224.0.0.1
224.0.0.1 It is a multicast address added to all network ports of all hosts by default , That means , Message with destination address of this address , Will be received by this network port . You can see , This address can ping through .
The host filters the multicast address
After the multicast message passes through the switch , Will be sent by flooding VLAN Every host inside . The host further filters the multicast packets .
The first is the filtering of the mesh port : By default, the network interface will receive MAC Messages and broadcast messages whose address is the address of this network interface , The situation of receiving multicast messages at the network interface is different , There are two ways to implement mesh filtering :
- Maintain the multicast address corresponding to the multicast address of interest to the host on the network interface HASH value , When the destination address of the message is in these HASH Among values , Just give the message to the protocol stack , Otherwise, discard
- Maintain a multicast table on the network interface , When the destination address of the message is in this table , Just give the message to the protocol stack .
NIC After filtering the multicast address , The message enters the protocol stack , The protocol stack will further filter the message .
边栏推荐
- Crazy God said redis notes
- Orm-f & Q object
- 关于imx8mp的es8316的芯片调试
- 组播和广播的知识点梳理
- [detailed steps of FreeRTOS shift value for the first time]
- Vulnerability discovery - vulnerability probe type utilization and repair of web applications
- How to estimate the population with samples? (mean, variance, standard deviation)
- 内核判断i2c地址上是否挂载外设
- 关于Unity Inspector上的一些常用技巧,一般用于编辑器扩展或者其他
- Pagoda configuration mongodb
猜你喜欢
Selection of slow motion function
MPLS experiment
你需要知道的 TCP 三次握手
Sqlserver query results are not displayed in tabular form. How to modify them
Pagoda configuration mongodb
The IPO of mesk Electronics was terminated: Henan assets, which was once intended to raise 800 million yuan, was a shareholder
Unity screen coordinates ugui coordinates world coordinates conversion between three coordinate systems
ORM aggregate query and native database operation
Basic explanation of turtle module - draw curve
The underlying structure of five data types in redis
随机推荐
Leetcode 186 Flip the word II in the string (2022.07.05)
Dry goods collection | Vulkan game engine video tutorial
几种RS485隔离通讯的方案介绍
Lagrange polynomial
EditorUtility.SetDirty在Untiy中的作用以及应用
Visio draw fan
It is also a small summary in learning
ISP learning (2)
win10电脑系统里的视频不显示缩略图
树莓派3.5寸屏幕白屏显示连接
Redis - redis in action - redis actual combat - actual combat Chapter 1 - SMS login function based on redis - redis + token shared session application - with code
[Yu Yue education] reference materials of complex variable function and integral transformation of Northwestern Polytechnic University
Fuzzy -- basic application method of AFL
[05-1, 05-02, 05-03] network protocol
Request (request object) and response (response object)
SharedPreferences source code analysis
Summary of redis AOF and RDB knowledge points
canal同步mysql数据变化到kafka(centos部署)
【Try to Hack】john哈希破解工具
驱动开发——HelloWDM驱动