So this is the 2nd part on how PIM-SM operates. Last time I showed how the initial RPT (shared tree) was constructed, and how data would flow from the source to the receiver.
This time, I want to show you how the optimization technique in SM actually works.
Lets start out with how our traffic flow looked like after the shared tree was constructured: