PIM-SM, part 2

So this is the 2nd part on how PIM-SM operates. Last time I showed how the initial RPT (shared tree) was constructed, and how data would flow from the source to the receiver.

This time, I want to show you how the optimization technique in SM actually works.

Lets start out with how our traffic flow looked like after the shared tree was constructured:

CCIE  PIM-SM