Distance vector multicast routing protocol, Computer Networking

Assignment Help:

DVMRP

• Distance vector multicast routing protocol: Distance vector multicast routing protocol are abbreviated as DVMRP. These protocols are suitable for small networks which run on multicast traffic. First version of this protocol was created in year 1988 and was used in MBONE. It is dense multicast routing protocol and employs its own distance vector algorithm for computing routes in a network. This routing algorithm supports tunnels between the protocol's routers through unicast only networks.
Rouse (2007) states "The protocol sends multicast data in the form of unicast packets that are reassembled into multicast data at the destination."

The protocol is interior gateway protocol which is based on RIP that transmits connectionless multicast data to a group of receivers on network.

QuinStreetInc states "DVMRP tunnels multicast transmission within unicast packets that are reassembled into multicast data when they arrive at their destination."

Generic routing encapsulation or IP-in-IP encapsulation is used between these tunnels. Forwarding conflicts are automatically solved by route exchange process.

Advantage of DVMRP

  1. It supports ASM and SSM
  2. Exclusion of RPs make this protocol implementation simpler
  3. It is effective for a network where receivers are distributed densely

Disadvantages of DVMRP

  1. Store per source state is needed to be stored by all routers for every source in domain
  2. This protocol is not scalable for the domains where most of the receivers are not willing to retrieve data; for example, the internet.

Related Discussions:- Distance vector multicast routing protocol

State the disadvantages of adaptive routing process, State the Disadvantage...

State the Disadvantages of adaptive routing process  (1) The routing decision is more difficult; thus, the processing burden on network nodes enhances. (2) In most cases, ad

Error detection-- crc, Error Detection-- CRC Powerful error detecti...

Error Detection-- CRC Powerful error detection system Rather than addition, binary division is utilized A series of redundant bits called "CRC" or else "CRC remai

Recognize the command that shows the sap table, show ipx servers is the co...

show ipx servers is the command that shows the SAP table

Explain the 802.11 fhss, 802.11 FHSS Frequency-hopping spread spectrum ...

802.11 FHSS Frequency-hopping spread spectrum in a 2.4 GHz band Carrier sends on one frequency for short duration then hops to another frequency for same duration, hops agai

Show the flow characteristics, Q. Show the Flow characteristics? Flow ...

Q. Show the Flow characteristics? Flow characteristics Reliability - if lacking means that packets or ACKs are lost - more important with FTP, SMTP than with audio

How are enterprise systems different, Question : (a) How do you relate ...

Question : (a) How do you relate the subsequent terms in the context of an information system: data, information and decision-making. (b) Why do you think organisations nowa

Itc597, restore the scrambled bits to their original order

restore the scrambled bits to their original order

Process server, Using a process server (such as inetd or xinetd) to listen ...

Using a process server (such as inetd or xinetd) to listen on a set of well-popular ports and start one another server.  I said that it had much to do with overhead.  Say you set u

What are the two broad classes of middleware, Two broad classes of middlewa...

Two broad classes of middleware are a) General middleware b) Service-specific middleware.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd