2015
DOI: 10.17487/rfc7582
|View full text |Cite
|
Sign up to set email alerts
|

Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels

Abstract: A set of prior RFCs specify procedures for supporting multicast in BGP/MPLS IP VPNs. These procedures allow customer multicast data to travel across a service provider's backbone network through a set of multicast tunnels. The tunnels are advertised in certain BGP multicast auto-discovery routes, by means of a BGP attribute known as the "Provider Multicast Service Interface (PMSI) Tunnel" attribute. Encodings have been defined that allow the PMSI Tunnel attribute to identify bidirectional (multipoint-to-multip… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…There are other RFCs that update [RFC6625] and that modify the rules for finding a "match for reception". See, e.g., [RFC7582] and [RFC7900]. When applying those modified rules, it is REQUIRED to ignore any S-PMSI A-D route that has no PTA, or whose PTA specifies "no tunnel information present".…”
Section: Match For Tracking Vs Match For Receptionmentioning
confidence: 99%
“…There are other RFCs that update [RFC6625] and that modify the rules for finding a "match for reception". See, e.g., [RFC7582] and [RFC7900]. When applying those modified rules, it is REQUIRED to ignore any S-PMSI A-D route that has no PTA, or whose PTA specifies "no tunnel information present".…”
Section: Match For Tracking Vs Match For Receptionmentioning
confidence: 99%
“…N-Meander [19]; security and privacy: securing IP connections [18], establishing Virtual Private Networks [17], etc.). Moreover, tunnels can be nested to achieve several goals.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…Typically, a tunnel is a subpath starting with an encapsulation and ending with the corresponding decapsulation. Tunnels are very useful for achieving several goals in networking (e.g., interoperability: connecting IPv6 networks across IPv4 ones [33]; security and privacy: securing IP connections [30], establishing Virtual Private Networks [29], etc.). Moreover, tunnels can be nested to achieve several goals.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…Finally, section 7 examines a modified ignition criterion that accounts for the increase in expansion PdV work due to the presence of 3D ρr perturbations and loss-of-confinement in thin regions of the shell. The modified criterion is based on requiring the first and second derivative of hotspot temperature to be positive at minimum volume [13], when the PdV work term in expansion starts to be a drain on the alpha heating. This can be evaluated analytically from the equations for hotspot heating at minimum volume and is equivalent to requiring a higher temperature (~5.5 keV) for NIF implosions.…”
Section: Overviewmentioning
confidence: 99%