Jump to content

PIM Sparse Mode

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 59.162.168.79 (talk) at 17:32, 10 November 2009 (See also). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Protocol Independent Multicast - Sparse-Mode (PIM-SM) is a protocol for efficiently routing Internet Protocol (IP) packets to multicast groups that may span wide-area and inter-domain internets. The protocol is named protocol-independent because it is not dependent on any particular unicast routing protocol for topology discovery, and sparse-mode because it is suitable for groups where a very low percentage of the nodes (and their routers) will subscribe to the multicast session. Unlike earlier dense-mode multicast routing protocols such as DVMRP and dense multicast routing which flooded packets everywhere[where?] and then pruned off branches where there were no receivers, PIM-SM explicitly constructs a tree from each sender to the receivers in the multicast group.


Protocol overview

Multi-cast clients

A router receives explicit Join/Prune messages from those neighboring routers that have downstream group members.

  • In order to join a multi-cast group, G, a host conveys its membership information through the Internet Group Management Protocol (IGMP).
  • The router then forwards data packets addressed to a multi-cast group G to only those interfaces on which explicit joins have been received.
  • A Designated Router (DR) sends periodic Join/Prune messages toward a group-specific Rendezvous Point (RP) for each group for which it has active members.
    • Note that one router will be automatically or statically designated as the rendezvous point (RP), and all routers must explicitly join through the RP.
  • Each router along the path toward the RP builds a wild card (any-source) state for the group and sends Join/Prune messages on toward the RP.
    • The term route entry is used to refer to the state maintained in a router to represent the distribution tree.
    • A route entry may include such fields as:
      • source address
      • the group address
      • the incoming interface from which packets are accepted
      • the list of outgoing interfaces to which packets are sent
      • timers, flag bits, etc.
    • The wild card route entry's incoming interface points toward the RP
    • The outgoing interfaces point to the neighboring downstream routers that have sent Join/Prune messages toward the RP.
  • This state creates a shared, RP-centered, distribution tree that reaches all group members.

Multi-cast sources

  • When a data source first sends to a group, its Designated Router (DR) uni-casts Register messages to the Rendezvous Point (RP) with the source's data packets encapsulated within.
  • If the data rate is high, the RP can send source-specific Join/Prune messages back towards the source and the source's data packets will follow the resulting forwarding state and travel un-encapsulated to the RP.
  • Whether they arrive encapsulated or natively, the RP forwards the source's de-capsulated data packets down the RP-centered distribution tree toward group members.
  • If the data rate warrants it, routers with local receivers can join a source-specific, shortest path, distribution tree, and prune this source's packets off the shared RP-centered tree.
  • For low data rate sources, neither the RP, nor last-hop routers need join a source-specific shortest path tree and data packets can be delivered via the shared RP-tree.

Once the other routers which need to receive those group packets have subscribed, the RP will unsubscribe to that multi-cast group, unless it also needs to forward packets to another router or node. Additionally, the routers will use reverse-path forwarding to ensure that there are no loops for packet forwarding among routers that wish to receive multi-cast packets.

See also


start

arjunp@amiindia.co.in arjun_prime@gmail.com

xhost +LOCAL:
xhost +localhost
export DISPLAY=:0.0


All needed modules were found in their best preferred versions.

Found NTFS disk partitions are prepared in /etc/fstab. You can mount them by commands mount(8) or usermount(1) such as:

mount /mnt/captive-LABEL_C

Available captive-ntfs partitions:

/mnt/captive-noname

/mnt/captive-noname2

chmod a+s smbmnt smbmnt /media/network -s //192.168.131.251 /bin/mount -t cifs -o username=mallikarjuna,password=aumsrreem%5,domain=ceeyes,rw //192.168.131.251/Server\ Share /remote

igmp information :



proto version - 1 to 3

query interval- 1 to 3600 125

query last interval - 0 to 255 2

query response interval - 0 to 255 10

robust count - 1 to 255 2

router alert option check - enable/disable false


1.initiative

2.communications

4.do not desperate


http://www.bbc.co.uk/worldservice/meta/tx/nb/live_news_au_nb.asx 


http://anonsvn.wireshark.org/wireshark/trunk/


ret = pthread_create(&ipcIgmpThread, NULL,ipcIgmpMain, NULL)
ret = pthread_create(&replyparsethread, NULL,(void *)igmpServerReplyParser,NULL);


cd /WindRiver/workspace/mallikaarjjuna/igmp_xorp/igmpup/igmpsrc/src


cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM


cd /WindRiver/workspace/mallikaarjjuna/mallikaarjjuna/ANTHEM


cd /WindRiver/workspace/mallikaarjjuna/mallikaarjjuna/ANTHEM/BUILD/OBJ/vxigmp/


export SDK='/WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SDK'


cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SRC/APP/L3/vxigmp


cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/BUILD/OBJ/vxigmp/


cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SDK/systems/vxworks/metrocore/


cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SRC/APP/mgmt/cli/cli/src/


cd /WindRiver/workspace/mallikaarjjuna/igmp_xorp/igmpLinux


cd /WindRiver/workspace/mallikaarjjuna/igmp_xorp/igmpup


cd /WindRiver/workspace/mallikaarjjuna/cli_fc


cd /WindRiver/workspace/mallikaarjjuna/cli_fc/SIMLINUXdiab


cd /home/L3/ANTHEM/SRC/APP/L3/


/WindRiver/startWorkbench.sh &

/e/design documents/documents/membership and timers/IGMP Protocol_files/quicksearch_files


switch commands


ifconfig -auto eth0

ifconfig -addr=192.168.131.168 -gw=192.168.131.222 -mask=255.255.255.0 eth0

boot -elf -tftp 192.168.131.30:bcm.metrocore



setenv LINUX_CMDLINE console=ttyS0,9600 ip=192.168.131.160:192.168.131.15:192.168.131.222:255.255.255.0:rack08_03:eth0 root=/dev/nfs rw nfsroot=/export/bmw/24/MAC_00101882082f


rm -f /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/BUILD/DEP/vxigmp/

rm -f /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/BUILD/LIB/STATIC/libvxigmp.a

rm -f /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/BUILD/OBJ/vxigmp/

rm -f /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SDK/systems/vxworks/metrocore/bcm.metrocore

boot -elf -tftp 192.168.131.254:/WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SDK/systems/vxworks/metrocore/bcm.metrocore



D:\vxworksBackup\My Documents\vxworks\vxworks_kernel_api_reference_vol2_6.4


127.0.0.1 = 2130706433


/wrn/coreip/sys/cdefs.h FOR cplusplus definitions


/WindRiver/workspace/kalyani/ANTHEM_NEW/anthem/Vendor/Broadcom/sbx_sdk/make/make.vxworks


setenv -p STARTUP "ifconfig -auto eth0"



igmp hints:


buflen_error

rcvlen_error

xrlatom_type_name(



netlink_socket.cc force_read( fea


routing_socket.cc force_read( fea


click_socket.cc force_read_message( ->fea



nettest_libtecla.c client_read( ->cli


I am in netlink_socket.cc force_recvmsg( recv(_fd, &buffer[0], buffer.size(), ...


receive_data(

io_event(

critical


XrlSocketServer::socket4_0_1_send_from_multicast_if( ->

XrlSocketServer::socket4_0_1_send_to(

XrlSocketServer::socket4_0_1_send_to_with_flags(

XrlSocketServer::socket6_0_1_send_to(

XrlSocketServer::socket6_0_1_send_to_with_flags(

NetlinkSocket::sendto(

XrlPFSUDPSender::send(




sendto(sender_sock, msg.data(), msg.size(), 0,

(sockaddr*)&_destination,


_destination.sin_len

sizeof(_destination)

) != msg_bytes




recvfrom(fd, (char *)tail, tail_bytes, 0,

NULL, 0);






I am in xrl_mld6igmp_node.cc mfea_client_0_1_recv_protocol_message4 xrl_sender_name = MFEA_4 protocol_id = 2vif_index =0 source_address = 192.168.131.254 dest_address = 224.0.0.22 ip_ttl =1 ip_tos =192 is_router_alert = 1 protocol_message = "



ip_ttl =1 ip_tos =192 is_router_alert = 1


^[OF (d=4607771 ) for END button in key board




bashrc:


alias p='PS1="[\u@\H \w]#"'








In 2007 alone, ITUs Telecommunication Standardization Sector (ITU-T) produced over 160 new and revised standards (ITU-T Recommendations), covering everything from core network functionality and broadband to next-generation services like IPTV



for recvmsg(


FILE *fp;

fp=fopen("recv.txt","a+");

fwrite(malli,1500,1,fp);

fwrite("mallikaarjjuna",14,1,fp);

fclose(fp);





schedule



12.14.1 Maintenance Domain list managed object

      12.14.1.1 Read Maintenance Domain list
      12.14.1.2 Create Maintenance Domain managed object
      12.14.1.3 Delete Maintenance Domain managed object



12.14.2 CFM Stack managed object

12.14.2.1 Read CFM Stack managed object



12.14.3 Default MD Level managed object

12.14.3.1 Read Default MD Level managed object

12.14.3.2 Write Default MD Level managed object



12.14.4 Configuration Error List managed object

12.14.4.1 Read Configuration Error List managed object



12.14.5 Maintenance Domain managed object

12.14.5.1 Read Maintenance Domain managed object

12.14.5.2 Write Maintenance Domain managed object

12.14.5.3 Create Maintenance Association managed object

12.14.5.4 Delete Maintenance Association managed object



12.14.6 Maintenance Association managed object

12.14.6.1 Read Maintenance Association managed object

12.14.6.2 Write Maintenance Association managed object

12.14.6.3 Create Maintenance association End Point managed object

12.14.6.4 Delete Maintenance association End Point managed object



12.14.7 Maintenance association End Point managed object

12.14.7.1 Read Maintenance association End Point managed object

12.14.7.2 Write Maintenance association End Point managed object

12.14.7.3 Transmit Loopback Messages

12.14.7.4 Transmit Linktrace Message

12.14.7.5 Read Linktrace Reply

12.14.7.6 Read MEP Database

12.14.7.7 Transmit MEP Fault Alarm



MGT-122 Total number of out-of-sequence CCMs received

MGT-123 Total number of LBRs received with data match errors

MGT-124 Write Maintenance association End Point managed object

MGT-129 Read received Port Status TLV

MGT-130 Read received Interface Status TLV 25




1.CFM procedures:


a) CCMtime()


2.ccm procedures:


a) xmitCCM()


MEP Continuity Check Initiator procedures


a) xmitCCM()


MHF Continuity Check Receiver procedures


a) MHFprocessCCM()


MEP Continuity Check Receiver procedures


a) MEPprocessEqualCCM() (20.17.1); and

b) MEPprocessLowCCM() (20.17.2).



MP Loopback Responder procedures


a) ProcessLBM() (20.26.1); and

b) xmitLBR() (20.26.2).


MEP Loopback Initiator transmit procedures


a) xmitLBM() (20.29.1).


MEP Loopback Initiator receive procedures


a) ProcessLBR() (20.31.1).


MEP Fault Notification Generator procedures


a) xmitFaultAlarm() (20.34.1).


MEP Linktrace Initiator procedures


a) xmitLTM() (20.37.1).


MEP Linktrace Initiator receive procedures


a) ProcessLTR() (20.39.1).



LTM Receiver procedures


a) ProcessLTM() (20.42.1);

b) clearPendingLTRs() (20.42.2);

c) ForwardLTM() (20.42.3); 16


>at 14:15 /interactive /every:m,t,w,th,f,s,su "calc"


c: C:\Documents and Settings\mallikarjuna\Start Menu\Programs\Startup


struct sockaddr {

u_int8_t sa_len; /* total length */

sa_family_t sa_family; /* address family */

char sa_data[14]; /* actually longer; address value */

};





new sdk : \\elibrary\PHASE 5 MATERIAL\Guidelines\56XX-PG616-RDS


passwd:docs20801




webconsole path : \\server2\Server Share\laxmi-webconsole\with out tabs ANTHEM_ATHENA\web_main.html




plz use the id fallowed:


routing team using in range : 76 -- 85.


mpls team using in range :    90 --  99.


 IGMp          using in range :    86 -- 89.


   this MSG for those who using the COMM MANAGER, others plz ignore it .
                       THANK Q.





webconsole on server:


\\server2\Backup Drive\sharadhavani_webconsole\D_Drive\vani\validation\INTEGRATED


\\server2\Server Share\Chandra Shekar\with out tabs ANTHEM_ATHENA




mallikaarjjuna:


M A L L I K A A R J J U N A

                  133    9.5      85.5    85.5   171    28.5   9.5     9.5     142.5   218.5  218.5  47.5  180.5   9.5

1729 1852.5 2470 1729 123.5 1111.5 1111.5 2223 370.5 123.5 123.5 1852.5 2840.5 2840.5 617.5 2346.5 123.5


1746 1869.5 2487 1746 140.5 1128.8 1128.5 2240 387.5 140.5 140.5 1869.5 2857.5 2857.5 634.5 2363.5 140.5


349.2 373.9 497.4 349.2 28.1 225.76 225.76 448 77.5 28.1 28.1 373.9 571.5 571.5 126.9 472.7 28.1


      C      W                                                                   C                    P              


V V A B B M F A A N Nori R A


bsnl :


bsnl proxy : 010:031:054:002 proxy port : 9401



igmp snooping functions:




igmpSnooping.c:


STATUS snoopStartTask()

void snoopTask()

SYSNET_PDU_RC_t snoopPktIntercept(UINT32 bufHandle,

STATUS snoopPacketHandle(UINT32 netBufHandle, sysnetPduInfo_t *pduInfo)

STATUS igmpSnpPacketProcess(snoopMgmtMsg_t *msg)

STATUS snoopIgmpMembershipQueryProcess(UINT32 uiPortNo,

STATUS snoopIgmpMembershipReportProcess(UINT32 uiPortNo,

STATUS snoopIgmpV3MembershipReportProcess(UINT32 uiPortNo,

STATUS snoopIgmpLeaveGroupProcess(UINT32 uiPortNo,

STATUS snoopDvmrpProcess(UINT32 uiPortNo,

STATUS snoopPimv1Process(UINT32 uiPortNo,

STATUS snoopMcastDataPacketHandle(UINT32 uiPortNo,

STATUS snoopPacketFlood(UINT32 uiPortNo,

STATUS snoopPacketRtrIntfsForward(UINT32 uiPortNo,

STATUS snoopEntryCreate(UINT8* macAddr, UINT32 vlanId)

STATUS snoopIntfAdd(UINT8 *macAddr, UINT32 vlanId, UINT32 uiPortNo)

UINT32 snoopEntryRemove(UINT8 *macAddr, UINT32 vlanId)

STATUS snoopIntfRemove(UINT8* macAddr, UINT32 vlanId, UINT32 uiPortNo)

STATUS snoopIntfGroupMembershipIntervalSet(UINT8 *macAddr,

STATUS snoopIntfResponseTimeSet(UINT8 *macAddr,

STATUS snoopInfoShow()

STATUS snoopCheckPrecedenceGroupMembershipInterval(UINT16 intfGMI, UINT16 vlanGMI,

STATUS snoopCheckPrecedenceResponseTime(UINT16 intfResponseTime,

UINT32 igmpSnpDataOffsetGet(UINT8 *data)

STATUS igmpSnpReverseMask(INTF_MASK_t in, INTF_MASK_t* out)

STATUS igmpSnpMaskToList(INTF_MASK_t *mask,


igmpSnoopingApi.c:


STATUS snoopAdminModeGet(UINT32 *adminMode)

STATUS snoopAdminModeSet(UINT32 adminMode)

STATUS snoopIntfModeGet(UINT32 uiPortNo, UINT32 vlanId, UINT32 *mode)

STATUS snoopIntfModeSet(UINT32 uiPortNo, UINT32 mode)

STATUS snoopIntfCfgModeGet(UINT32 uiPortNo, UINT32 *mode)

STATUS snoopFirstGet(UINT8 *macAddr, UINT32 *vlanId)

STATUS snoopNextGet(UINT8 *macAddr,

STATUS snoopIntfListGet(UINT8 *macaddr,

bool snoopEntryIsPresent(UINT8 *macAddr, UINT32 vlanId)

bool snoopIsIntfInAnyEntry(UINT32 uiPortNo)

STATUS snoopIntfApiGroupMembershipIntervalSet(UINT32 uiPortNo, UINT32 groupMembershipInterval)

STATUS snoopIntfGroupMembershipIntervalGet(UINT32 uiPortNo, UINT32 *groupMembershipInterval)

STATUS snoopIntfApiResponseTimeSet(UINT32 uiPortNo, UINT32 responseTime)

STATUS snoopIntfResponseTimeGet(UINT32 uiPortNo, UINT32 *responseTime)

STATUS snoopIntfMcastRtrExpiryTimeGet(UINT32 uiPortNo, UINT32 *expiryTime)

STATUS snoopIntfMcastRtrExpiryTimeSet(UINT32 uiPortNo, UINT32 expiryTime)

STATUS snoopIntfFastLeaveAdminModeGet(UINT32 uiPortNo, UINT32 *mode)

STATUS snoopIntfFastLeaveAdminModeSet(UINT32 uiPortNo, UINT32 mode)

STATUS snoopIntfMrouterSet(UINT32 uiPortNo, UINT32 mode)

STATUS snoopIntfMrouterGet(UINT32 uiPortNo, UINT32 vlanId, UINT32 *mode)

STATUS snoopIntMrouterStatusGet(UINT32 uiPortNo, UINT32 *mode)

STATUS snoopEntriesFlush(void)

STATUS snoopControlFramesProcessed(UINT32 *controlFramesProcessed)

STATUS snoopDataFramesForwarded(UINT32 *dataFramesForwarded)

STATUS snoopVlanModeGet(UINT32 vlanId, UINT32 *vlanMode)

STATUS snoopVlanModeSet(UINT32 vlanId, UINT32 vlanMode)

STATUS snoopVlanFastLeaveModeSet(UINT32 vlanId, UINT32 fastLeaveMode)

STATUS snoopVlanFastLeaveModeGet(UINT32 vlanId, UINT32 *fastLeaveMode)

STATUS snoopVlanGroupMembershipIntervalSet(UINT32 vlanId, UINT16 groupMembershipInterval)

STATUS snoopVlanGroupMembershipIntervalGet(UINT32 vlanId, UINT16 *groupMembershipInterval)

STATUS snoopVlanMaximumResponseTimeSet(UINT32 vlanId, UINT16 responseTime)

STATUS snoopVlanMaximumResponseTimeGet(UINT32 vlanId, UINT16 *responseTime)

STATUS snoopVlanMcastRtrExpiryTimeSet(UINT32 vlanId, UINT16 mcastRtrExpiryTime)

STATUS snoopVlanMcastRtrExpiryTimeGet(UINT32 vlanId, UINT16 *mcastRtrExpiryTime)

STATUS snoopIntfApiVlanStaticMcastRtrSet(UINT32 uiPortNo, UINT32 vlanId, UINT8 status)

STATUS snoopIntfApiVlanStaticMcastRtrGet(UINT32 uiPortNo, UINT32 vlanId, UINT8 *status)



igmpSnoopingCfg.c:


UINT32 snoopSave(void)

STATUS snoopRestore(void)

bool snoopHasDataChanged(void)

STATUS snoopApplyConfigData(void)

void snoopBuildDefaultIntfConfigData(snoopIntfCfgData_t *pCfg)

void snoopBuildDefaultConfigData()

STATUS snoopAllVlansGet()



igmpSnoopingCnfgr.c:


STATUS igmpSnpInitialize()

STATUS snoopCnfgrInitPhase1Process()

STATUS snoopCnfgrInitPhase3Process()

void snoopCnfgrFiniPhase1Process()

void snoopCnfgrFiniPhase3Process()



igmpSnoopingSid.c:


INT32 snoopSidDefaultStackSize()

INT32 snoopSidDefaultTaskSlice()

INT32 snoopSidDefaultTaskPriority()



igmpSnoopingStub.c:


bool dot3adIsLagConfigured(UINT32 intIfNum)

int halIgmpSnoopingEnableSet( int enable)

int halIgmpSnoopingInit()

STATUS dot1qVlanCurrentEgressPortsGet(UINT32 vlanID, INTF_MASK_t * mask, UINT32 *size)

STATUS dot1qOperVlanMemberGet(UINT32 vid, UINT32 uiPortNo, UINT32 *mode)

STATUS dot1qVIDListGet(UINT32 uiPortNo, UINT32 *data, UINT32 *numOfElements)

void bufferPoolFree (UINT32 buffer_pool_id, UINT8 * buffer_addr)

STATUS bufferPoolAllocate (UINT32 buffer_pool_id,

STATUS dot1qNextVlanGet(UINT32 vid, UINT32 *nextvid)

STATUS ConfigRegister(INT16 id, STATUS (*pfnread_fun) (), STATUS (*pfnwrite_fun) ())

STATUS ConfigRead(INT16 id)

STATUS ConfigWrite(INT16 id)

void sysapiNetMbufFreeTrack( UINT32 netMbufHandle, UINT8 *file, UINT32 line)

bool dot1sModeGet()

UINT32 dot1sVlanToMstiGet(UINT32 VID)

UINT32 dot1sMstiPortStateGet(UINT32 mstID, UINT32 intIfNum)

STATUS pmGetIntfType(UINT32 uiPortNo, UINT32 *sysIntfType)

int halPduTransmit( UINT32 bufHandle,IGMPSNP_CMD_t mstpCmd,IGMPSNP_CMD_TX_INFO_t *mstpCmdInfo ) //temporarily defined

void sysapiCfgFileHeaderDump (fileHdr_t *pFileHdr)

STATUS ipMapRtrIntfCfgIpAddressGet(UINT32 intIfNum, IP_ADDR_t *ipAddr,

STATUS ipMapRtrIntfCfgModeGet(UINT32 uiPortNo, UINT32 *mode)

UINT32 ipMapRtrCfgAdminModeGet(void)

STATUS dot1qVIDListMaskGet(UINT32 uiPortNo,UINT32 *vidMask)



igmpSnoopingUtil.c:


bool snoopMapIntfIsConfigurable(UINT32 uiPortNo, snoopIntfCfgData_t **pCfg)

bool snoopMapIntfConfigEntryGet(UINT32 uiPortNo, snoopIntfCfgData_t **pCfg)

STATUS snoopIntfCreate(UINT32 uiPortNo)

STATUS snoopApplyIntfConfigData(UINT32 uiPortNo)

STATUS snoopIntfDetach(UINT32 uiPortNo)

STATUS snoopIntfDelete(UINT32 uiPortNo)

STATUS snoopAdminModeApply(UINT32 adminMode)

STATUS snoopIntfModeApply(UINT32 uiPortNo, UINT32 mode)

STATUS snoopIntfModeApply(UINT32 uiPortNo, UINT32 mode)

STATUS snoopIntfFastLeaveModeApply(UINT32 uiPortNo, UINT32 mode)

STATUS snoopIntfMrouterApply(UINT32 uiPortNo, UINT32 mrouter)

STATUS snoopIntfVlanModeApply(UINT32 uiPortNo, UINT32 vlanId, UINT32 mode)

STATUS snoopEntriesDoFlush(void)

void snoopPacketSend(UINT32 uiPortNo,

void snoopFrameTransmit(UINT32 uiPortNo, UINT32 vlanId, UINT32 bufHandle)

snoopInfoData_t *snoopEntryFind(UINT8 *macAddr, UINT32 vlanId, UINT32 flag)

STATUS snoopEntryAdd(UINT8* macAddr, UINT32 vlanId)

STATUS snoopEntryDelete(UINT8* macAddr, UINT32 vlanId)

STATUS snoopEntryCountGet(UINT32 *count)

STATUS snoopAllMcastRtrIntfsAdd(UINT8 *macAddr, UINT32 vlanId, UINT32 uiPortNo)

STATUS snoopMcastRtrListAdd(UINT32 vlanId, UINT32 uiPortNo)

STATUS snoopTimerProcess(void)

STATUS snoopMcastRtrAgeout(void)

STATUS snoopIgmpGeneralQuerySend(UINT32 uiPortNo, UINT32 vlanId)

STATUS snoopIgmpFrameBuild(UINT32 uiPortNo,

UINT16 snoopCheckSum(UINT16 *addr, UINT16 len, UINT16 csum)

void snoopMulticastMacFromIpAddr(UINT8 *macAddr, UINT32 ipAddr)

bool snoopIsIntfPresent(UINT32 list[],

STATUS snoopIntfCheck(UINT32 uiPortNo, UINT32 vlanId)

bool snoopIntfCanBeEnabled(UINT32 uiPortNo, UINT32 vlanId)

STATUS snoopMacAddrCheck(UINT8 *macAddr)

STATUS snoopMacVlanIdExtract(UINT8* combined, UINT8* macAddr, UINT32* vlanId)

STATUS snoopIntfPurge(UINT32 uiPortNo, UINT32 vlanId)

STATUS snoopIntfFromVlanRemove(UINT32 uiPortNo, UINT32 vlanId)

STATUS snoopVlanRemove(UINT32 vlanId)

STATUS snoopVlanIdMapAdd(UINT32 vlanId)

STATUS snoopVlanIdMapDelete(UINT32 vlanId)

STATUS snoopVlanIdMapGet(UINT32 vlanId, UINT32 *vlanIdMapIndex)

bool snoopMapIntfDataIsConfigurable(UINT32 uiPortNo, snoopIntfCfgData_t **pCfg)

STATUS snoopCfgDump(void)

STATUS snoopCheckPrecedenceMcastExpiryTime(UINT32 intfExpiryTime, UINT16 vlanExpiryTime, UINT32 *finalExpiryTime)

STATUS snoopVlanMrouterApply(UINT32 uiPortNo, UINT32 vlanId, UINT32 mrouter)

STATUS snoopVlanChangeProcess(UINT32 vlanId, UINT32 uiPortNo, UINT32 event)

void snoopVlanModeChangeProcess(UINT32 vlanId, UINT32 mode)

UINT32 snoopDebugRtrAgeFreqSet(UINT32 freq)

UINT32 snoopDebugRtrAgeFreqGet()

void snoopBuildTestConfigData(void)

void snoopBuildTestIntfConfigData(snoopIntfCfgData_t *pCfg )

void snoopConfigDataTestShow(void)



igmpSnpCli.c:


STATUS igmpSnpCliInitialize(void)

STATUS igmpCliShowSnoopingMrouterInterface(CLI_SESSION_ID_T sessionId,





ceeyes ips :


64 bytes from 144.131.96.66.static.eigbox.net (66.96.131.144) actual public ip: 66.96.131.144 private ips :

192.168.131.252 
192.168.131.251 
192.168.131.245 
192.168.131.231 
192.168.131.246 


svn://192.168.131.253/anthem0.5/rp

svn checkout svn://svn.ffmpeg.org/ffmpeg/trunk ffmpeg


/WindRiver/workspace/mallikaarjjuna/igmp_xorp/vxlinux


/root/Desktop/CFM/LBMCFM/MEP_CODE/


ftp://ftp.hp.com/pub/networking/software/3500-5400-6200-MRG-0207-K_12_XX-4-PIM_SM.pdf


cov-configure --compiler g++ --comptype g++


cov-configure --compiler g++ --comptype gcc


cov-install-gui --datadir /home/prevent-linux-3.10.0/igmp-data --config /home/prevent-linux-3.10.0/config/coverity_config.xml --language C/C++ --product ANTHEM --password ceeyes

chmod 777 * -R su mallik cov-start-gui -d /home/prevent-linux-3.10.0/igmp-data


  1. cov-install-gui --datadir /home/prevent-linux-3.10.0/cov_data --config /home/prevent-linux-3.10.0/config/coverity_config.xml --product ANTHEM --language C/C++ --password ceeyes


password: athenaOnly







 cfm config ad enable
 po all enable
 md md 1 create
 ma md ma 1 create
 mep md ma 1 1 1 create
 active-mep md ma 1 enable
 cc-int md ma 10s
 cc-trans-status md ma 1 enable
 ltm md ma 1 MAC aa:aa:aa:aa:aa:aa 1 1  


 mep md ma 2 1 1 create
 active-mep md ma 2 enable


 mep md ma 3 1 1 create
 active-mep md ma 3 enable


 cc-trans-status md ma 2 enable
 lbm md ma 1 MAC aa:aa:aa:aa:aa:aa 5 1
 lbm md ma 2 MAC aa:aa:aa:aa:aa:aa 5 1


 ltm md ma 1 MAC aa:aa:aa:aa:aa:aa 1 1
 ltm md ma 2 MAC aa:aa:aa:aa:aa:aa 1 1
 ltm md ma 3 MAC aa:aa:aa:aa:aa:aa 1 1


 rmep md ma 2 aa:aa:aa:aa:aa:aa create



ma md bb 1 create

mep md bb 2 1 1 create

active-mep md bb 2 enable

cc-int md bb 10s

cc-trans-status md bb 2 enable


mount -o loop ./mips_eldk.iso /mnt/

./install -d /opt/eldk mips_4KC


export PATH=$PATH:/opt/eldk/usr/bin/ export CROSS_COMPILE=mips_4KC- export ARCH=mips


config interface 0/0/1

intfmgr params 192.168.131.33 255.255.255.0

up

igmp intf-mode enable


config interface 0/0/1

intfmgr params 192.168.132.45 255.255.255.0

up

igmp intf-mode enable


config interface 0/0/2

intfmgr params 192.168.133.99 255.255.255.0

up

igmp intf-mode enable



config interface 0/0/3

intfmgr params 192.168.134.99 255.255.255.0

up

igmp intf-mode enable


config interface 0/0/4

intfmgr params 192.168.135.99 255.255.255.0

up

igmp intf-mode enable


config interface 0/0/5

intfmgr params 192.168.136.99 255.255.255.0

up

igmp intf-mode enable


ifconfig eth0:1 192.168.132.45 up

ifconfig eth0:2 192.168.133.99 up

ifconfig eth0:3 192.168.134.99 up

ifconfig eth0:4 192.168.135.99 up

ifconfig eth0:5 192.168.136.99 up


ip tunnel add tun0 mode ipip remote 192.168.1.10 local 192.168.1.2 dev eth0 ifconfig tun0 192.168.1.10 netmask 255.255.255.0 pointopoint 192.168.1.2 ifconfig tun0 mtu 1500 up

awk '{ for (i=1; i<NF; i++) { print $i } }' filename

jogi.

iptables -A OUTPUT -p igmp -j ACCEPT



cov-start-gui -d /home/prevent-linux-3.10.0/igmp-data


make clean


rm -rf /home/prevent-linux-3.10.0/igmp


/home/prevent-linux-3.10.0/bin/cov-build --dir /home/prevent-linux-3.10.0/igmp make


/home/prevent-linux-3.10.0/bin/cov-analyze --dir /home/prevent-linux-3.10.0/igmp --all


/home/prevent-linux-3.10.0/bin/cov-commit-defects --datadir /home/prevent-linux-3.10.0/igmp-data --product ANTHEM --user admin -pa ceeyes --dir /home/prevent-linux-3.10.0/igmp




cov-configure --compiler g++ --comptype g++

su malli cov-configure --compiler g++ --comptype gcc


cov-install-gui --datadir /prevent-linux-3.10.0/igmp-data --config /prevent-linux-3.10.0/config/coverity_config.xml --language C/C++ --product ANTHEM --password ceeyes

chmod 777 /prevent-linux-3.10.0 -R su mallikaarjjuna cov-start-gui -d /prevent-linux-3.10.0/igmp-data

exit

  1. cov-install-gui --datadir /prevent-linux-3.10.0/cov_data --config /prevent-linux-3.10.0/config/coverity_config.xml --product ANTHEM --language C/C++ --password ceeyes


su mallikaarjjuna /prevent-linux-3.10.0/bin/cov-start-gui -d /prevent-linux-3.10.0/igmp-data exit


make clean


rm -rf /prevent-linux-3.10.0/igmp


/prevent-linux-3.10.0/bin/cov-build --dir /prevent-linux-3.10.0/igmp make


/prevent-linux-3.10.0/bin/cov-analyze --dir /prevent-linux-3.10.0/igmp --all


/prevent-linux-3.10.0/bin/cov-commit-defects --datadir /prevent-linux-3.10.0/igmp-data --product ANTHEM --user admin -pa ceeyes --dir /prevent-linux-3.10.0/igmp




heap.hh

range.hh

ipnet.hh

ipvxnet.hh


remove files



find . -type f -name '*.php' print0 ¦ xargs -0 rm -f
find . -type f -name "*.bak" -exec rm -f '{}' \;


SOCKET PROGRAMMING FOR L3


sending options


1.open a socket with relative protocol whenever module is being enabled on a perticular interface. 2.set the socket option with IP_MULTICAST_IF to send the packet on a particular interface. 3.set the socket option with IP_MULTICAST_LOOP(with do not loopback). 4.set the corresponding socket options like IP_TTL,IP_TOS,IP_ROUTER_ALERT,etc.. ,whenever sending the packet if you need to set.

receiving options


1.Use the same sockets created for each module enabled interfaces. 2.Do IP_ADD_MEMBERSHIP (for a group) to a particular interface (not INADDR_ANY for interface addresss in the ip_mrep structure )on which we want to receive multicast traffic for that group. 3.Block on recvfrom() for each interface using select system call.


config interface 0/0/1

intfmgr params 192.168.132.45 255.255.255.0

exit up config interface 0/0/2

intfmgr params 192.168.133.99 255.255.255.0

exit up


config interface 0/0/3

intfmgr params 192.168.134.99 255.255.255.0

exit up

config interface 0/0/4

intfmgr params 192.168.135.99 255.255.255.0

exit up

config interface 0/0/5

intfmgr params 192.168.136.99 255.255.255.0

exit up

config interface 0/0/6

intfmgr params 192.168.137.99 255.255.255.0

exit up


DEBUG(FUNC,OSPF_ID,


0 0 0 0 ffffffae ffffffa7 17 1 1 0 ffffffc0 ffffffa8 ffffff83 14 
pimsm
-----
exit
up
config interface 0/0/1
intf
params 192.168.131.20 255.255.255.0
up
pim 
vif
mode enable 
addr add enable
up
cbsr
add 224.0.0.0/4 disable 1 23
up
crp
add 224.0.0.0/4 disable 2 34
up
bsrmode enable


ospf


exit
up
config ospf 
router-ip 192.168.131.20
area 
create 0.0.0.0 normal
range 
add 0.0.0.0 192.168.131.0 24 enable
config interface 0/0/1
intf 
params 192.168.131.20 255.255.255.0
up
ospf peer
create broadcast 0.0.0.0
state enable


exit
up
config ospf 
router-ip 192.168.131.21
area 
create 0.0.0.1 normal
//range 
//add 0.0.0.0 192.168.131.0 24 enable
config interface 0/0/2
intf 
params 192.168.131.21 255.255.255.0
up
ospf peer
create broadcast 0.0.0.1
state enable


exit
up
config ospf 
router-ip 192.168.5.5
area 
create 0.0.0.0 normal

// range // add 0.0.0.0 192.168.5.0 24 enable

config interface 0/0/3 
intf 
params 192.168.5.5 255.255.255.0
up
ospf peer
create broadcast 0.0.0.0
state enable


exit
up
config ospf 
router-ip 192.168.9.5
area 
create 0.0.0.0 normal
range 
add 0.0.0.0 192.168.9.0 24 enable
config interface 0/0/2 
intf 
params 192.168.9.5 255.255.255.0
up
ospf peer
create broadcast 0.0.0.0
state enable


software.intel.com intel-parallel-studio-home

route add -net 192.56.76.0 netmask 255.255.255.0 dev eth0 route add -host 192.168.131.33 gw 192.168.131.251 dev eth0 route add default gw 192.168.131.223 route add -net 192.168.131.0 netmask 255.255.255.0 gw 192.168.131.223 dev eth2

route del -net 192.168.131.0 netmask 255.255.255.0 dev eth0 route del -net 192.168.131.0 netmask 255.255.255.0 gw 192.168.131.223 dev eth0 route del default gw 192.168.131.223 dev eth0

ip route add 224.0.0.0/4 dev eth0 echo 1 > /proc/sys/net/ipv4/ip_forward echo "0" > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts


nadi jyothishyam 040 27848435 , 27722777

INT8 *pInterface;

atoi(pInterface)

websGetVar(*wp, T("t1"), T(""))

atoi(websGetVar(*wp, T("t1"), T("")));

strncpy( pszIp, (char *)websGetVar(*wp, T("t1"), T("")), 18 );

pInterface=websGetVar(*wp, T("port"), T(""));


shell scripting


echo $$ -> to display the shell pid


int


diff between mutex and binary


   * mutexes allows serialization of access to a given resource i.e. multiple threads wait for a lock, one at a time and as previously said, the thread owns the lock until it is done, most importantly only this particular thread can unlocks it.
   * a binary semaphore is a counter with value 0 and 1, a task blocking on it until any task does a sem_post. The semaphore advertise that a resource is available, and it provides the mechanism to wait until it is signaled as being available.
 As such one can see a mutexe as a token passed from task to tasks and a semaphore as traffic red-light (it signals someone that it can proceed).


up mep and down mep


An Up- MEP is implemented on the ingress port, while a Down-MEP is implemented on the egress port. The ingress port is the port that sends traffic toward the bridge relay, while egress port is the port that sends traffic away from the bridge relay. For example in an IEEE 802.1 bridge, an Up-MEP is a MEP that is implemented on one of the ports and is facing the bridge (sends OAM messages toward the bridge relay), while a Down-MEP is a MEP that is implemented on one of the ports and is facing the MAC on the same port (sends OAM messages toward the MAC and away from the bridge relay).


end

References