Multicast extension to ospf, Computer Networking

Assignment Help:

MOSPF

MOSPF is multicast extension to OSPF. This protocol is extension of OSPF which is a unicast routing protocol which make MOSPF a combination of unicast and multicast protocol. MOSPF was documented in RFC1584 in the year 1994, since then no other version of the protocol has been deployed.

Rouse (2008) states "MOSPF (Multicast Open Shortest Path First) is an extension to the OSPF (Open Shortest Path First) protocol that facilitates interoperation between unicast and multicast routers."

MOSPF do not exchange any messages with neighbours for developing any multicast distribution trees. The routers employed in the network flood the information of location of all the receivers and distribution trees are calculated by MOSPF by its own. Due to this, all routers have same information so same trees will be calculated and there is no need of any designated forward mechanism or designated, assert router are required.

Advantages for MOSPF
RP are not necessary to be defined

Disadvantages of MOSPF
• Scalability is limited
• The protocol does not support SSM


Related Discussions:- Multicast extension to ospf

Timing in mpi program, MPI_Wtime ( ) returns elapsed wall-clock time in sec...

MPI_Wtime ( ) returns elapsed wall-clock time in seconds as some arbitrary point in past. Elapsed time for program segment is specified by the difference between MPI_Wtime values a

Name the factors that affect the performance of the network, Name the facto...

Name the factors that affect the performance of the network? a. Number of Users b. Type of transmission medium c. Hardware d. Software

Differentiate between fast fading and slow fading, Differentiate between Fa...

Differentiate between Fast fading and Slow fading Fast fading refers to changes in signal strength among a transmitter and receiver as the distance among the two changes by a s

ICT, state the advantages of the ICT

state the advantages of the ICT

What is authentication, Q. What is Authentication ? - Verification of s...

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Client-server , We need to design and implement a secure conference system....

We need to design and implement a secure conference system. The system will allow users to connect to a conference server and to participate in a shared conversation. The conversat

network consultant, Network Consultant, My name is Jason Long. I am th...

Network Consultant, My name is Jason Long. I am the CEO of IL Corporation. IL is an investment firm that performs financial services to many organizations. We currently have a

Determine the working of lan within a corporate network, Determine the work...

Determine the working of LAN within a corporate network It should be very clear right from the beginning that a firewall is not simply for protecting a corporate network from u

Dijkstra algorithms - network layer and routing , Dijkstra Algorithms T...

Dijkstra Algorithms To calculate its  routing  table  each router applies an algorithm  called  the dijkstra algorithm to its  state database. The dijkstra algorithm  calculate

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd