Table of Contents

 1     Scope          
 2     References
        2.1     Identical Recommendations | International Standards
        2.2     Additional references
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Overview   
        6.1     Overview of basic RMCP-2       
        6.2     Overview of secure RMCP-2   
        6.3     Types of RMCP-2 messages    
 7     Protocol operation for basic RMCP-2             
        7.1     Session manager's operation  
        7.2     Multicast agent's operation     
 8     Protocol operation for secure RMCP-2          
        8.1     Session manager's operation  
        8.2     Multicast agent's operation     
 9     RMCP-2 message format    
        9.1     Common format of RMCP-2 message 
        9.2     Control data format    
        9.3     RMCP-2 messages       
        9.4     RMCP-2 controls          
10     Parameters              
       10.1     Identifications used in RMCP-2             
       10.2     Code values used in RMCP-2 
       10.3     Code values for sub-control types      
       10.4     Code values used in control   
       10.5     Code values related to the security policy for a secure RMCP-2             
       10.6     Timer related parameters       
       10.7     Data profile used in RMCP-2  
Annex A – Membership authentication mechanism    
        A.1     Overview        
        A.2     Authentication procedure       
Annex B – Method for sharing session information among multiple SM domains    
        B.1     Overview        
        B.2     Session information sharing between SMs      
        B.3     Supporting session subscription in RMCP-2 between multiple SMs       
        B.4     Supporting a session leave in RMCP-2 between multiple SMs 
        B.5     Other operations of the RMA in RMCP-2 between multiple SMs           
        B.6     RMCP-2 messages for sharing session information between SMs         
Annex C – Tree configuration rules    
        C.1     Bootstrapping rule      
        C.2     HMA selection rule     
        C.3     CMA acceptance rule 
        C.4     Parent decision rule   
        C.5     Tree improvement rule            
        C.6     PMA's expulsion rule 
Annex D – Real-time data delivery scheme    
        D.1     Overview        
        D.2     Data delivery scheme using IP-IP tunnel mechanism   
        D.3     Data delivery scheme using a non-encapsulation scheme         
Annex E – Reliable data delivery scheme    
        E.1     Overview        
        E.2     Issues for a reliable data delivery scheme         
        E.3     Operation       
        E.4     Service data unit (SDU) format              
        E.5     Data profile    
Annex F – RMCP-2 API    
        F.1     Overview        
        F.2     RMCP-2 API functions
Annex G – RMCP-2 service scenario    
Annex H – Bibliography