PIM Sparse Mode
This article needs additional citations for verification. (July 2007) |
Protocol Independent Multicast - Sparse-Mode (PIM-SM) is a protocol for efficiently routing Internet Protocol (IP) packets to multicast groups that may span wide-area and inter-domain internets. The protocol is named protocol-independent because it is not dependent on any particular unicast routing protocol for topology discovery, and sparse-mode because it is suitable for groups where a very low percentage of the nodes (and their routers) will subscribe to the multicast session. Unlike earlier dense-mode multicast routing protocols such as DVMRP and dense multicast routing which flooded packets everywhere[where?] and then pruned off branches where there were no receivers, PIM-SM explicitly constructs a tree from each sender to the receivers in the multicast group.
Protocol overview
Multi-cast clients
A router receives explicit Join/Prune messages from those neighboring routers that have downstream group members.
- In order to join a multi-cast group, G, a host conveys its membership information through the Internet Group Management Protocol (IGMP).
- The router then forwards data packets addressed to a multi-cast group G to only those interfaces on which explicit joins have been received.
- A Designated Router (DR) sends periodic Join/Prune messages toward a group-specific Rendezvous Point (RP) for each group for which it has active members.
- Note that one router will be automatically or statically designated as the rendezvous point (RP), and all routers must explicitly join through the RP.
- Each router along the path toward the RP builds a wild card (any-source) state for the group and sends Join/Prune messages on toward the RP.
- The term route entry is used to refer to the state maintained in a router to represent the distribution tree.
- A route entry may include such fields as:
- source address
- the group address
- the incoming interface from which packets are accepted
- the list of outgoing interfaces to which packets are sent
- timers, flag bits, etc.
- The wild card route entry's incoming interface points toward the RP
- The outgoing interfaces point to the neighboring downstream routers that have sent Join/Prune messages toward the RP.
- This state creates a shared, RP-centered, distribution tree that reaches all group members.
Multi-cast sources
- When a data source first sends to a group, its Designated Router (DR) uni-casts Register messages to the Rendezvous Point (RP) with the source's data packets encapsulated within.
- If the data rate is high, the RP can send source-specific Join/Prune messages back towards the source and the source's data packets will follow the resulting forwarding state and travel un-encapsulated to the RP.
- Whether they arrive encapsulated or natively, the RP forwards the source's de-capsulated data packets down the RP-centered distribution tree toward group members.
- If the data rate warrants it, routers with local receivers can join a source-specific, shortest path, distribution tree, and prune this source's packets off the shared RP-centered tree.
- For low data rate sources, neither the RP, nor last-hop routers need join a source-specific shortest path tree and data packets can be delivered via the shared RP-tree.
Once the other routers which need to receive those group packets have subscribed, the RP will unsubscribe to that multi-cast group, unless it also needs to forward packets to another router or node. Additionally, the routers will use reverse-path forwarding to ensure that there are no loops for packet forwarding among routers that wish to receive multi-cast packets.
See also
start
arjunp@amiindia.co.in arjun_prime@gmail.com
xhost +LOCAL: xhost +localhost export DISPLAY=:0.0
All needed modules were found in their best preferred versions.
Found NTFS disk partitions are prepared in /etc/fstab. You can mount them by commands mount(8) or usermount(1) such as:
mount /mnt/captive-LABEL_C
Available captive-ntfs partitions:
/mnt/captive-noname
/mnt/captive-noname2
chmod a+s smbmnt smbmnt /media/network -s //192.168.131.251 /bin/mount -t cifs -o username=mallikarjuna,password=aumsrreem%5,domain=ceeyes,rw //192.168.131.251/Server\ Share /remote
igmp information :
proto version - 1 to 3
query interval- 1 to 3600 125
query last interval - 0 to 255 2
query response interval - 0 to 255 10
robust count - 1 to 255 2
router alert option check - enable/disable false
1.initiative
2.communications
4.do not desperate
http://www.bbc.co.uk/worldservice/meta/tx/nb/live_news_au_nb.asx
http://anonsvn.wireshark.org/wireshark/trunk/
ret = pthread_create(&ipcIgmpThread, NULL,ipcIgmpMain, NULL)
ret = pthread_create(&replyparsethread, NULL,(void *)igmpServerReplyParser,NULL);
cd /WindRiver/workspace/mallikaarjjuna/igmp_xorp/igmpup/igmpsrc/src
cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM
cd /WindRiver/workspace/mallikaarjjuna/mallikaarjjuna/ANTHEM
cd /WindRiver/workspace/mallikaarjjuna/mallikaarjjuna/ANTHEM/BUILD/OBJ/vxigmp/
export SDK='/WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SDK'
cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SRC/APP/L3/vxigmp
cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/BUILD/OBJ/vxigmp/
cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SDK/systems/vxworks/metrocore/
cd /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SRC/APP/mgmt/cli/cli/src/
cd /WindRiver/workspace/mallikaarjjuna/igmp_xorp/igmpLinux
cd /WindRiver/workspace/mallikaarjjuna/igmp_xorp/igmpup
cd /WindRiver/workspace/mallikaarjjuna/cli_fc
cd /WindRiver/workspace/mallikaarjjuna/cli_fc/SIMLINUXdiab
cd /home/L3/ANTHEM/SRC/APP/L3/
/WindRiver/startWorkbench.sh &
/e/design documents/documents/membership and timers/IGMP Protocol_files/quicksearch_files
switch commands
ifconfig -auto eth0
ifconfig -addr=192.168.131.168 -gw=192.168.131.222 -mask=255.255.255.0 eth0
boot -elf -tftp 192.168.131.30:bcm.metrocore
setenv LINUX_CMDLINE console=ttyS0,9600 ip=192.168.131.160:192.168.131.15:192.168.131.222:255.255.255.0:rack08_03:eth0 root=/dev/nfs rw nfsroot=/export/bmw/24/MAC_00101882082f
rm -f /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/BUILD/DEP/vxigmp/
rm -f /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/BUILD/LIB/STATIC/libvxigmp.a
rm -f /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/BUILD/OBJ/vxigmp/
rm -f /WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SDK/systems/vxworks/metrocore/bcm.metrocore
boot -elf -tftp 192.168.131.254:/WindRiver/workspace/mallikaarjjuna/L3/ANTHEM/SDK/systems/vxworks/metrocore/bcm.metrocore
D:\vxworksBackup\My Documents\vxworks\vxworks_kernel_api_reference_vol2_6.4
127.0.0.1 = 2130706433
/wrn/coreip/sys/cdefs.h FOR cplusplus definitions
/WindRiver/workspace/kalyani/ANTHEM_NEW/anthem/Vendor/Broadcom/sbx_sdk/make/make.vxworks
setenv -p STARTUP "ifconfig -auto eth0"
igmp hints:
buflen_error
rcvlen_error
xrlatom_type_name(
netlink_socket.cc force_read( fea
routing_socket.cc force_read( fea
click_socket.cc force_read_message( ->fea
nettest_libtecla.c client_read( ->cli
I am in netlink_socket.cc force_recvmsg( recv(_fd, &buffer[0], buffer.size(), ...
receive_data(
io_event(
critical
XrlSocketServer::socket4_0_1_send_from_multicast_if( ->
XrlSocketServer::socket4_0_1_send_to(
XrlSocketServer::socket4_0_1_send_to_with_flags(
XrlSocketServer::socket6_0_1_send_to(
XrlSocketServer::socket6_0_1_send_to_with_flags(
NetlinkSocket::sendto(
XrlPFSUDPSender::send(
- sendto(sender_sock, msg.data(), msg.size(), 0,
(sockaddr*)&_destination,
_destination.sin_len
sizeof(_destination)
) != msg_bytes
- recvfrom(fd, (char *)tail, tail_bytes, 0,
NULL, 0);
I am in xrl_mld6igmp_node.cc mfea_client_0_1_recv_protocol_message4 xrl_sender_name = MFEA_4 protocol_id = 2vif_index =0 source_address = 192.168.131.254 dest_address = 224.0.0.22 ip_ttl =1 ip_tos =192 is_router_alert = 1 protocol_message = "
ip_ttl =1 ip_tos =192 is_router_alert = 1
^[OF (d=4607771 ) for END button in key board
bashrc:
alias p='PS1="[\u@\H \w]#"'
In 2007 alone, ITUs Telecommunication Standardization Sector (ITU-T) produced over 160 new and revised standards (ITU-T Recommendations), covering everything from core network functionality and broadband to next-generation services like IPTV
for recvmsg(
FILE *fp;
fp=fopen("recv.txt","a+");
fwrite(malli,1500,1,fp);
fwrite("mallikaarjjuna",14,1,fp);
fclose(fp);
schedule
12.14.1 Maintenance Domain list managed object
12.14.1.1 Read Maintenance Domain list
12.14.1.2 Create Maintenance Domain managed object
12.14.1.3 Delete Maintenance Domain managed object
12.14.2 CFM Stack managed object
12.14.2.1 Read CFM Stack managed object
12.14.3 Default MD Level managed object
12.14.3.1 Read Default MD Level managed object
12.14.3.2 Write Default MD Level managed object
12.14.4 Configuration Error List managed object
12.14.4.1 Read Configuration Error List managed object
12.14.5 Maintenance Domain managed object
12.14.5.1 Read Maintenance Domain managed object
12.14.5.2 Write Maintenance Domain managed object
12.14.5.3 Create Maintenance Association managed object
12.14.5.4 Delete Maintenance Association managed object
12.14.6 Maintenance Association managed object
12.14.6.1 Read Maintenance Association managed object
12.14.6.2 Write Maintenance Association managed object
12.14.6.3 Create Maintenance association End Point managed object
12.14.6.4 Delete Maintenance association End Point managed object
12.14.7 Maintenance association End Point managed object
12.14.7.1 Read Maintenance association End Point managed object
12.14.7.2 Write Maintenance association End Point managed object
12.14.7.3 Transmit Loopback Messages
12.14.7.4 Transmit Linktrace Message
12.14.7.5 Read Linktrace Reply
12.14.7.6 Read MEP Database
12.14.7.7 Transmit MEP Fault Alarm
MGT-122 Total number of out-of-sequence CCMs received
MGT-123 Total number of LBRs received with data match errors
MGT-124 Write Maintenance association End Point managed object
MGT-129 Read received Port Status TLV
MGT-130 Read received Interface Status TLV 25
1.CFM procedures:
a) CCMtime()
2.ccm procedures:
a) xmitCCM()
MEP Continuity Check Initiator procedures
a) xmitCCM()
MHF Continuity Check Receiver procedures
a) MHFprocessCCM()
MEP Continuity Check Receiver procedures
a) MEPprocessEqualCCM() (20.17.1); and
b) MEPprocessLowCCM() (20.17.2).
MP Loopback Responder procedures
a) ProcessLBM() (20.26.1); and
b) xmitLBR() (20.26.2).
MEP Loopback Initiator transmit procedures
a) xmitLBM() (20.29.1).
MEP Loopback Initiator receive procedures
a) ProcessLBR() (20.31.1).
MEP Fault Notification Generator procedures
a) xmitFaultAlarm() (20.34.1).
MEP Linktrace Initiator procedures
a) xmitLTM() (20.37.1).
MEP Linktrace Initiator receive procedures
a) ProcessLTR() (20.39.1).
LTM Receiver procedures
a) ProcessLTM() (20.42.1);
b) clearPendingLTRs() (20.42.2);
c) ForwardLTM() (20.42.3); 16
>at 14:15 /interactive /every:m,t,w,th,f,s,su "calc"
c: C:\Documents and Settings\mallikarjuna\Start Menu\Programs\Startup
struct sockaddr {
u_int8_t sa_len; /* total length */
sa_family_t sa_family; /* address family */
char sa_data[14]; /* actually longer; address value */
};
new sdk : \\elibrary\PHASE 5 MATERIAL\Guidelines\56XX-PG616-RDS
passwd:docs20801
webconsole path : \\server2\Server Share\laxmi-webconsole\with out tabs ANTHEM_ATHENA\web_main.html
plz use the id fallowed:
routing team using in range : 76 -- 85.
mpls team using in range : 90 -- 99.
IGMp using in range : 86 -- 89.
this MSG for those who using the COMM MANAGER, others plz ignore it .
THANK Q.
webconsole on server:
\\server2\Backup Drive\sharadhavani_webconsole\D_Drive\vani\validation\INTEGRATED
\\server2\Server Share\Chandra Shekar\with out tabs ANTHEM_ATHENA
mallikaarjjuna:
M A L L I K A A R J J U N A
133 9.5 85.5 85.5 171 28.5 9.5 9.5 142.5 218.5 218.5 47.5 180.5 9.5
1729 1852.5 2470 1729 123.5 1111.5 1111.5 2223 370.5 123.5 123.5 1852.5 2840.5 2840.5 617.5 2346.5 123.5
1746 1869.5 2487 1746 140.5 1128.8 1128.5 2240 387.5 140.5 140.5 1869.5 2857.5 2857.5 634.5 2363.5 140.5
349.2 373.9 497.4 349.2 28.1 225.76 225.76 448 77.5 28.1 28.1 373.9 571.5 571.5 126.9 472.7 28.1
C W C P
V V A B B M F A A N Nori R A
bsnl :
bsnl proxy : 010:031:054:002 proxy port : 9401
igmp snooping functions:
igmpSnooping.c:
STATUS snoopStartTask()
void snoopTask()
SYSNET_PDU_RC_t snoopPktIntercept(UINT32 bufHandle,
STATUS snoopPacketHandle(UINT32 netBufHandle, sysnetPduInfo_t *pduInfo)
STATUS igmpSnpPacketProcess(snoopMgmtMsg_t *msg)
STATUS snoopIgmpMembershipQueryProcess(UINT32 uiPortNo,
STATUS snoopIgmpMembershipReportProcess(UINT32 uiPortNo,
STATUS snoopIgmpV3MembershipReportProcess(UINT32 uiPortNo,
STATUS snoopIgmpLeaveGroupProcess(UINT32 uiPortNo,
STATUS snoopDvmrpProcess(UINT32 uiPortNo,
STATUS snoopPimv1Process(UINT32 uiPortNo,
STATUS snoopMcastDataPacketHandle(UINT32 uiPortNo,
STATUS snoopPacketFlood(UINT32 uiPortNo,
STATUS snoopPacketRtrIntfsForward(UINT32 uiPortNo,
STATUS snoopEntryCreate(UINT8* macAddr, UINT32 vlanId)
STATUS snoopIntfAdd(UINT8 *macAddr, UINT32 vlanId, UINT32 uiPortNo)
UINT32 snoopEntryRemove(UINT8 *macAddr, UINT32 vlanId)
STATUS snoopIntfRemove(UINT8* macAddr, UINT32 vlanId, UINT32 uiPortNo)
STATUS snoopIntfGroupMembershipIntervalSet(UINT8 *macAddr,
STATUS snoopIntfResponseTimeSet(UINT8 *macAddr,
STATUS snoopInfoShow()
STATUS snoopCheckPrecedenceGroupMembershipInterval(UINT16 intfGMI, UINT16 vlanGMI,
STATUS snoopCheckPrecedenceResponseTime(UINT16 intfResponseTime,
UINT32 igmpSnpDataOffsetGet(UINT8 *data)
STATUS igmpSnpReverseMask(INTF_MASK_t in, INTF_MASK_t* out)
STATUS igmpSnpMaskToList(INTF_MASK_t *mask,
igmpSnoopingApi.c:
STATUS snoopAdminModeGet(UINT32 *adminMode)
STATUS snoopAdminModeSet(UINT32 adminMode)
STATUS snoopIntfModeGet(UINT32 uiPortNo, UINT32 vlanId, UINT32 *mode)
STATUS snoopIntfModeSet(UINT32 uiPortNo, UINT32 mode)
STATUS snoopIntfCfgModeGet(UINT32 uiPortNo, UINT32 *mode)
STATUS snoopFirstGet(UINT8 *macAddr, UINT32 *vlanId)
STATUS snoopNextGet(UINT8 *macAddr,
STATUS snoopIntfListGet(UINT8 *macaddr,
bool snoopEntryIsPresent(UINT8 *macAddr, UINT32 vlanId)
bool snoopIsIntfInAnyEntry(UINT32 uiPortNo)
STATUS snoopIntfApiGroupMembershipIntervalSet(UINT32 uiPortNo, UINT32 groupMembershipInterval)
STATUS snoopIntfGroupMembershipIntervalGet(UINT32 uiPortNo, UINT32 *groupMembershipInterval)
STATUS snoopIntfApiResponseTimeSet(UINT32 uiPortNo, UINT32 responseTime)
STATUS snoopIntfResponseTimeGet(UINT32 uiPortNo, UINT32 *responseTime)
STATUS snoopIntfMcastRtrExpiryTimeGet(UINT32 uiPortNo, UINT32 *expiryTime)
STATUS snoopIntfMcastRtrExpiryTimeSet(UINT32 uiPortNo, UINT32 expiryTime)
STATUS snoopIntfFastLeaveAdminModeGet(UINT32 uiPortNo, UINT32 *mode)
STATUS snoopIntfFastLeaveAdminModeSet(UINT32 uiPortNo, UINT32 mode)
STATUS snoopIntfMrouterSet(UINT32 uiPortNo, UINT32 mode)
STATUS snoopIntfMrouterGet(UINT32 uiPortNo, UINT32 vlanId, UINT32 *mode)
STATUS snoopIntMrouterStatusGet(UINT32 uiPortNo, UINT32 *mode)
STATUS snoopEntriesFlush(void)
STATUS snoopControlFramesProcessed(UINT32 *controlFramesProcessed)
STATUS snoopDataFramesForwarded(UINT32 *dataFramesForwarded)
STATUS snoopVlanModeGet(UINT32 vlanId, UINT32 *vlanMode)
STATUS snoopVlanModeSet(UINT32 vlanId, UINT32 vlanMode)
STATUS snoopVlanFastLeaveModeSet(UINT32 vlanId, UINT32 fastLeaveMode)
STATUS snoopVlanFastLeaveModeGet(UINT32 vlanId, UINT32 *fastLeaveMode)
STATUS snoopVlanGroupMembershipIntervalSet(UINT32 vlanId, UINT16 groupMembershipInterval)
STATUS snoopVlanGroupMembershipIntervalGet(UINT32 vlanId, UINT16 *groupMembershipInterval)
STATUS snoopVlanMaximumResponseTimeSet(UINT32 vlanId, UINT16 responseTime)
STATUS snoopVlanMaximumResponseTimeGet(UINT32 vlanId, UINT16 *responseTime)
STATUS snoopVlanMcastRtrExpiryTimeSet(UINT32 vlanId, UINT16 mcastRtrExpiryTime)
STATUS snoopVlanMcastRtrExpiryTimeGet(UINT32 vlanId, UINT16 *mcastRtrExpiryTime)
STATUS snoopIntfApiVlanStaticMcastRtrSet(UINT32 uiPortNo, UINT32 vlanId, UINT8 status)
STATUS snoopIntfApiVlanStaticMcastRtrGet(UINT32 uiPortNo, UINT32 vlanId, UINT8 *status)
igmpSnoopingCfg.c:
UINT32 snoopSave(void)
STATUS snoopRestore(void)
bool snoopHasDataChanged(void)
STATUS snoopApplyConfigData(void)
void snoopBuildDefaultIntfConfigData(snoopIntfCfgData_t *pCfg)
void snoopBuildDefaultConfigData()
STATUS snoopAllVlansGet()
igmpSnoopingCnfgr.c:
STATUS igmpSnpInitialize()
STATUS snoopCnfgrInitPhase1Process()
STATUS snoopCnfgrInitPhase3Process()
void snoopCnfgrFiniPhase1Process()
void snoopCnfgrFiniPhase3Process()
igmpSnoopingSid.c:
INT32 snoopSidDefaultStackSize()
INT32 snoopSidDefaultTaskSlice()
INT32 snoopSidDefaultTaskPriority()
igmpSnoopingStub.c:
bool dot3adIsLagConfigured(UINT32 intIfNum)
int halIgmpSnoopingEnableSet( int enable)
int halIgmpSnoopingInit()
STATUS dot1qVlanCurrentEgressPortsGet(UINT32 vlanID, INTF_MASK_t * mask, UINT32 *size)
STATUS dot1qOperVlanMemberGet(UINT32 vid, UINT32 uiPortNo, UINT32 *mode)
STATUS dot1qVIDListGet(UINT32 uiPortNo, UINT32 *data, UINT32 *numOfElements)
void bufferPoolFree (UINT32 buffer_pool_id, UINT8 * buffer_addr)
STATUS bufferPoolAllocate (UINT32 buffer_pool_id,
STATUS dot1qNextVlanGet(UINT32 vid, UINT32 *nextvid)
STATUS ConfigRegister(INT16 id, STATUS (*pfnread_fun) (), STATUS (*pfnwrite_fun) ())
STATUS ConfigRead(INT16 id)
STATUS ConfigWrite(INT16 id)
void sysapiNetMbufFreeTrack( UINT32 netMbufHandle, UINT8 *file, UINT32 line)
bool dot1sModeGet()
UINT32 dot1sVlanToMstiGet(UINT32 VID)
UINT32 dot1sMstiPortStateGet(UINT32 mstID, UINT32 intIfNum)
STATUS pmGetIntfType(UINT32 uiPortNo, UINT32 *sysIntfType)
int halPduTransmit( UINT32 bufHandle,IGMPSNP_CMD_t mstpCmd,IGMPSNP_CMD_TX_INFO_t *mstpCmdInfo ) //temporarily defined
void sysapiCfgFileHeaderDump (fileHdr_t *pFileHdr)
STATUS ipMapRtrIntfCfgIpAddressGet(UINT32 intIfNum, IP_ADDR_t *ipAddr,
STATUS ipMapRtrIntfCfgModeGet(UINT32 uiPortNo, UINT32 *mode)
UINT32 ipMapRtrCfgAdminModeGet(void)
STATUS dot1qVIDListMaskGet(UINT32 uiPortNo,UINT32 *vidMask)
igmpSnoopingUtil.c:
bool snoopMapIntfIsConfigurable(UINT32 uiPortNo, snoopIntfCfgData_t **pCfg)
bool snoopMapIntfConfigEntryGet(UINT32 uiPortNo, snoopIntfCfgData_t **pCfg)
STATUS snoopIntfCreate(UINT32 uiPortNo)
STATUS snoopApplyIntfConfigData(UINT32 uiPortNo)
STATUS snoopIntfDetach(UINT32 uiPortNo)
STATUS snoopIntfDelete(UINT32 uiPortNo)
STATUS snoopAdminModeApply(UINT32 adminMode)
STATUS snoopIntfModeApply(UINT32 uiPortNo, UINT32 mode)
STATUS snoopIntfModeApply(UINT32 uiPortNo, UINT32 mode)
STATUS snoopIntfFastLeaveModeApply(UINT32 uiPortNo, UINT32 mode)
STATUS snoopIntfMrouterApply(UINT32 uiPortNo, UINT32 mrouter)
STATUS snoopIntfVlanModeApply(UINT32 uiPortNo, UINT32 vlanId, UINT32 mode)
STATUS snoopEntriesDoFlush(void)
void snoopPacketSend(UINT32 uiPortNo,
void snoopFrameTransmit(UINT32 uiPortNo, UINT32 vlanId, UINT32 bufHandle)
snoopInfoData_t *snoopEntryFind(UINT8 *macAddr, UINT32 vlanId, UINT32 flag)
STATUS snoopEntryAdd(UINT8* macAddr, UINT32 vlanId)
STATUS snoopEntryDelete(UINT8* macAddr, UINT32 vlanId)
STATUS snoopEntryCountGet(UINT32 *count)
STATUS snoopAllMcastRtrIntfsAdd(UINT8 *macAddr, UINT32 vlanId, UINT32 uiPortNo)
STATUS snoopMcastRtrListAdd(UINT32 vlanId, UINT32 uiPortNo)
STATUS snoopTimerProcess(void)
STATUS snoopMcastRtrAgeout(void)
STATUS snoopIgmpGeneralQuerySend(UINT32 uiPortNo, UINT32 vlanId)
STATUS snoopIgmpFrameBuild(UINT32 uiPortNo,
UINT16 snoopCheckSum(UINT16 *addr, UINT16 len, UINT16 csum)
void snoopMulticastMacFromIpAddr(UINT8 *macAddr, UINT32 ipAddr)
bool snoopIsIntfPresent(UINT32 list[],
STATUS snoopIntfCheck(UINT32 uiPortNo, UINT32 vlanId)
bool snoopIntfCanBeEnabled(UINT32 uiPortNo, UINT32 vlanId)
STATUS snoopMacAddrCheck(UINT8 *macAddr)
STATUS snoopMacVlanIdExtract(UINT8* combined, UINT8* macAddr, UINT32* vlanId)
STATUS snoopIntfPurge(UINT32 uiPortNo, UINT32 vlanId)
STATUS snoopIntfFromVlanRemove(UINT32 uiPortNo, UINT32 vlanId)
STATUS snoopVlanRemove(UINT32 vlanId)
STATUS snoopVlanIdMapAdd(UINT32 vlanId)
STATUS snoopVlanIdMapDelete(UINT32 vlanId)
STATUS snoopVlanIdMapGet(UINT32 vlanId, UINT32 *vlanIdMapIndex)
bool snoopMapIntfDataIsConfigurable(UINT32 uiPortNo, snoopIntfCfgData_t **pCfg)
STATUS snoopCfgDump(void)
STATUS snoopCheckPrecedenceMcastExpiryTime(UINT32 intfExpiryTime, UINT16 vlanExpiryTime, UINT32 *finalExpiryTime)
STATUS snoopVlanMrouterApply(UINT32 uiPortNo, UINT32 vlanId, UINT32 mrouter)
STATUS snoopVlanChangeProcess(UINT32 vlanId, UINT32 uiPortNo, UINT32 event)
void snoopVlanModeChangeProcess(UINT32 vlanId, UINT32 mode)
UINT32 snoopDebugRtrAgeFreqSet(UINT32 freq)
UINT32 snoopDebugRtrAgeFreqGet()
void snoopBuildTestConfigData(void)
void snoopBuildTestIntfConfigData(snoopIntfCfgData_t *pCfg )
void snoopConfigDataTestShow(void)
igmpSnpCli.c:
STATUS igmpSnpCliInitialize(void)
STATUS igmpCliShowSnoopingMrouterInterface(CLI_SESSION_ID_T sessionId,
ceeyes ips :
64 bytes from 144.131.96.66.static.eigbox.net (66.96.131.144) actual public ip: 66.96.131.144 private ips :
192.168.131.252 192.168.131.251 192.168.131.245 192.168.131.231 192.168.131.246
svn://192.168.131.253/anthem0.5/rp
svn checkout svn://svn.ffmpeg.org/ffmpeg/trunk ffmpeg
/WindRiver/workspace/mallikaarjjuna/igmp_xorp/vxlinux
/root/Desktop/CFM/LBMCFM/MEP_CODE/
ftp://ftp.hp.com/pub/networking/software/3500-5400-6200-MRG-0207-K_12_XX-4-PIM_SM.pdf
cov-configure --compiler g++ --comptype g++
cov-configure --compiler g++ --comptype gcc
cov-install-gui --datadir /home/prevent-linux-3.10.0/igmp-data --config /home/prevent-linux-3.10.0/config/coverity_config.xml --language C/C++ --product ANTHEM --password ceeyes
chmod 777 * -R su mallik cov-start-gui -d /home/prevent-linux-3.10.0/igmp-data
- cov-install-gui --datadir /home/prevent-linux-3.10.0/cov_data --config /home/prevent-linux-3.10.0/config/coverity_config.xml --product ANTHEM --language C/C++ --password ceeyes
password: athenaOnly
cfm config ad enable
po all enable
md md 1 create
ma md ma 1 create
mep md ma 1 1 1 create
active-mep md ma 1 enable
cc-int md ma 10s
cc-trans-status md ma 1 enable
ltm md ma 1 MAC aa:aa:aa:aa:aa:aa 1 1
mep md ma 2 1 1 create
active-mep md ma 2 enable
mep md ma 3 1 1 create
active-mep md ma 3 enable
cc-trans-status md ma 2 enable
lbm md ma 1 MAC aa:aa:aa:aa:aa:aa 5 1
lbm md ma 2 MAC aa:aa:aa:aa:aa:aa 5 1
ltm md ma 1 MAC aa:aa:aa:aa:aa:aa 1 1
ltm md ma 2 MAC aa:aa:aa:aa:aa:aa 1 1
ltm md ma 3 MAC aa:aa:aa:aa:aa:aa 1 1
rmep md ma 2 aa:aa:aa:aa:aa:aa create
ma md bb 1 create
mep md bb 2 1 1 create
active-mep md bb 2 enable
cc-int md bb 10s
cc-trans-status md bb 2 enable
mount -o loop ./mips_eldk.iso /mnt/
./install -d /opt/eldk mips_4KC
export PATH=$PATH:/opt/eldk/usr/bin/
export CROSS_COMPILE=mips_4KC-
export ARCH=mips
config interface 0/0/1
intfmgr params 192.168.131.33 255.255.255.0
up
igmp intf-mode enable
config interface 0/0/1
intfmgr params 192.168.132.45 255.255.255.0
up
igmp intf-mode enable
config interface 0/0/2
intfmgr params 192.168.133.99 255.255.255.0
up
igmp intf-mode enable
config interface 0/0/3
intfmgr params 192.168.134.99 255.255.255.0
up
igmp intf-mode enable
config interface 0/0/4
intfmgr params 192.168.135.99 255.255.255.0
up
igmp intf-mode enable
config interface 0/0/5
intfmgr params 192.168.136.99 255.255.255.0
up
igmp intf-mode enable
ifconfig eth0:1 192.168.132.45 up
ifconfig eth0:2 192.168.133.99 up
ifconfig eth0:3 192.168.134.99 up
ifconfig eth0:4 192.168.135.99 up
ifconfig eth0:5 192.168.136.99 up
ip tunnel add tun0 mode ipip remote 192.168.1.10 local 192.168.1.2 dev eth0
ifconfig tun0 192.168.1.10 netmask 255.255.255.0 pointopoint 192.168.1.2
ifconfig tun0 mtu 1500 up
awk '{ for (i=1; i<NF; i++) { print $i } }' filename
jogi.
iptables -A OUTPUT -p igmp -j ACCEPT
cov-start-gui -d /home/prevent-linux-3.10.0/igmp-data
make clean
rm -rf /home/prevent-linux-3.10.0/igmp
/home/prevent-linux-3.10.0/bin/cov-build --dir /home/prevent-linux-3.10.0/igmp make
/home/prevent-linux-3.10.0/bin/cov-analyze --dir /home/prevent-linux-3.10.0/igmp --all
/home/prevent-linux-3.10.0/bin/cov-commit-defects --datadir /home/prevent-linux-3.10.0/igmp-data --product ANTHEM --user admin -pa ceeyes --dir /home/prevent-linux-3.10.0/igmp
cov-configure --compiler g++ --comptype g++
su malli cov-configure --compiler g++ --comptype gcc
cov-install-gui --datadir /prevent-linux-3.10.0/igmp-data --config /prevent-linux-3.10.0/config/coverity_config.xml --language C/C++ --product ANTHEM --password ceeyes
chmod 777 /prevent-linux-3.10.0 -R su mallikaarjjuna cov-start-gui -d /prevent-linux-3.10.0/igmp-data
exit
- cov-install-gui --datadir /prevent-linux-3.10.0/cov_data --config /prevent-linux-3.10.0/config/coverity_config.xml --product ANTHEM --language C/C++ --password ceeyes
su mallikaarjjuna /prevent-linux-3.10.0/bin/cov-start-gui -d /prevent-linux-3.10.0/igmp-data exit
make clean
rm -rf /prevent-linux-3.10.0/igmp
/prevent-linux-3.10.0/bin/cov-build --dir /prevent-linux-3.10.0/igmp make
/prevent-linux-3.10.0/bin/cov-analyze --dir /prevent-linux-3.10.0/igmp --all
/prevent-linux-3.10.0/bin/cov-commit-defects --datadir /prevent-linux-3.10.0/igmp-data --product ANTHEM --user admin -pa ceeyes --dir /prevent-linux-3.10.0/igmp
heap.hh
range.hh
ipnet.hh
ipvxnet.hh
remove files
find . -type f -name '*.php' print0 ¦ xargs -0 rm -f
find . -type f -name "*.bak" -exec rm -f '{}' \;
SOCKET PROGRAMMING FOR L3
sending options
1.open a socket with relative protocol whenever module is being enabled on a perticular interface. 2.set the socket option with IP_MULTICAST_IF to send the packet on a particular interface. 3.set the socket option with IP_MULTICAST_LOOP(with do not loopback). 4.set the corresponding socket options like IP_TTL,IP_TOS,IP_ROUTER_ALERT,etc.. ,whenever sending the packet if you need to set.
receiving options
1.Use the same sockets created for each module enabled interfaces. 2.Do IP_ADD_MEMBERSHIP (for a group) to a particular interface (not INADDR_ANY for interface addresss in the ip_mrep structure )on which we want to receive multicast traffic for that group. 3.Block on recvfrom() for each interface using select system call.
config interface 0/0/1
intfmgr params 192.168.132.45 255.255.255.0
exit up config interface 0/0/2
intfmgr params 192.168.133.99 255.255.255.0
exit up
config interface 0/0/3
intfmgr params 192.168.134.99 255.255.255.0
exit up
config interface 0/0/4
intfmgr params 192.168.135.99 255.255.255.0
exit up
config interface 0/0/5
intfmgr params 192.168.136.99 255.255.255.0
exit up
config interface 0/0/6
intfmgr params 192.168.137.99 255.255.255.0
exit up
DEBUG(FUNC,OSPF_ID,
0 0 0 0 ffffffae ffffffa7 17 1 1 0 ffffffc0 ffffffa8 ffffff83 14
pimsm -----
exit up config interface 0/0/1 intf params 192.168.131.20 255.255.255.0 up pim vif mode enable addr add enable up cbsr add 224.0.0.0/4 disable 1 23 up crp add 224.0.0.0/4 disable 2 34 up bsrmode enable
ospf
exit up config ospf router-ip 192.168.131.20 area create 0.0.0.0 normal range add 0.0.0.0 192.168.131.0 24 enable config interface 0/0/1 intf params 192.168.131.20 255.255.255.0 up ospf peer create broadcast 0.0.0.0 state enable
exit up config ospf router-ip 192.168.131.21 area create 0.0.0.1 normal //range //add 0.0.0.0 192.168.131.0 24 enable config interface 0/0/2 intf params 192.168.131.21 255.255.255.0 up ospf peer create broadcast 0.0.0.1 state enable
exit up config ospf router-ip 192.168.5.5 area create 0.0.0.0 normal
// range // add 0.0.0.0 192.168.5.0 24 enable
config interface 0/0/3 intf params 192.168.5.5 255.255.255.0 up ospf peer create broadcast 0.0.0.0 state enable
exit up config ospf router-ip 192.168.9.5 area create 0.0.0.0 normal range add 0.0.0.0 192.168.9.0 24 enable config interface 0/0/2 intf params 192.168.9.5 255.255.255.0 up ospf peer create broadcast 0.0.0.0 state enable
software.intel.com
intel-parallel-studio-home
route add -net 192.56.76.0 netmask 255.255.255.0 dev eth0 route add -host 192.168.131.33 gw 192.168.131.251 dev eth0 route add default gw 192.168.131.223 route add -net 192.168.131.0 netmask 255.255.255.0 gw 192.168.131.223 dev eth2
route del -net 192.168.131.0 netmask 255.255.255.0 dev eth0 route del -net 192.168.131.0 netmask 255.255.255.0 gw 192.168.131.223 dev eth0 route del default gw 192.168.131.223 dev eth0
ip route add 224.0.0.0/4 dev eth0 echo 1 > /proc/sys/net/ipv4/ip_forward echo "0" > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
nadi jyothishyam
040 27848435 , 27722777
INT8 *pInterface;
atoi(pInterface)
websGetVar(*wp, T("t1"), T(""))
atoi(websGetVar(*wp, T("t1"), T("")));
strncpy( pszIp, (char *)websGetVar(*wp, T("t1"), T("")), 18 );
pInterface=websGetVar(*wp, T("port"), T(""));
shell scripting
echo $$ -> to display the shell pid
int
diff between mutex and binary
* mutexes allows serialization of access to a given resource i.e. multiple threads wait for a lock, one at a time and as previously said, the thread owns the lock until it is done, most importantly only this particular thread can unlocks it. * a binary semaphore is a counter with value 0 and 1, a task blocking on it until any task does a sem_post. The semaphore advertise that a resource is available, and it provides the mechanism to wait until it is signaled as being available.
As such one can see a mutexe as a token passed from task to tasks and a semaphore as traffic red-light (it signals someone that it can proceed).
up mep and down mep
An Up- MEP is implemented on the ingress port, while a Down-MEP is implemented on the egress port. The ingress port is the port that sends traffic toward the bridge relay, while egress port is the port that sends traffic away from the bridge relay. For example in an IEEE 802.1 bridge, an Up-MEP is a MEP that is implemented on one of the ports and is facing the bridge (sends OAM messages toward the bridge relay), while a Down-MEP is a MEP that is implemented on one of the ports and is facing the MAC on the same port (sends OAM messages toward the MAC and away from the bridge relay).
end