Flooding (computer networking)
* If a packet can be delivered, it will (probably multiple times).
* Since flooding naturally utilizes every path through the network, it will also use the shortest path.
* This algorithm is very simple to implement.
* Flooding can be costly in terms of wasted bandwidth and, as in the case of a
Ping floodor a Denial of service attack, it can be harmful to the reliability of a computer network.
* Duplicate packets may circulate forever, unless certain precautions are taken:
** Use a hop count or a
time to livecount and include it with each packet. This value should take into account the number of nodes that a packet may have to pass through on the way to its destination.
** Have each node keep track of every packet seen and only forward each packet once.
Wikimedia Foundation. 2010.
Look at other dictionaries:
MAC flooding — In computer networking, MAC flooding is a technique employed to compromise the security of network switches.Switches maintain a list (called a CAM (Content Addressable Memory) Table) that maps individual MAC addresses on the network to the… … Wikipedia
Routing in delay tolerant networking — concerns itself with theability to transport, or route, data from a source to adestination is a fundamental ability all communication networks musthave. Delay and disruption tolerant networks(DTNs), arecharacterized by their lack of connectivity … Wikipedia
Bridging (networking) — Bridging is a forwarding technique used in packet switched computer networks. Unlike routing, bridging makes no assumptions about where in a network a particular address is located. Instead, it depends on flooding and examination of source… … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Ethernet — An 8P8C modular connector (often called RJ45) commonly used on cat 5 cables in Ethernet networks Ethernet … Wikipedia
Economic Affairs — ▪ 2006 Introduction In 2005 rising U.S. deficits, tight monetary policies, and higher oil prices triggered by hurricane damage in the Gulf of Mexico were moderating influences on the world economy and on U.S. stock markets, but some other… … Universalium
Routing — This article is about routing in networks. For other uses, see Routing (disambiguation). Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the… … Wikipedia
Dynamic Source Routing — (DSR) is a routing protocol for wireless mesh networks. It is similar to AODV in that it forms a route on demand when a transmitting computer requests one. However, it uses source routing instead of relying on the routing table at each… … Wikipedia
Stream Control Transmission Protocol — In computer networking, the Stream Control Transmission Protocol (SCTP) is a Transport Layer protocol, serving in a similar role as the popular protocols TCP and UDP. Indeed, it provides some of the same service features of both, ensuring… … Wikipedia
Avaya Unified Communications Management — Developer(s) Nortel (now Avaya) Operating system MS Windows, and Linux Type Unified Communications Configuration and Management Avaya Unified Communications Management in computer networking is the name of a collection o … Wikipedia