Distance vector multicast routing protocol, Computer Networking

DVMRP

• Distance vector multicast routing protocol: Distance vector multicast routing protocol are abbreviated as DVMRP. These protocols are suitable for small networks which run on multicast traffic. First version of this protocol was created in year 1988 and was used in MBONE. It is dense multicast routing protocol and employs its own distance vector algorithm for computing routes in a network. This routing algorithm supports tunnels between the protocol's routers through unicast only networks.
Rouse (2007) states "The protocol sends multicast data in the form of unicast packets that are reassembled into multicast data at the destination."

The protocol is interior gateway protocol which is based on RIP that transmits connectionless multicast data to a group of receivers on network.

QuinStreetInc states "DVMRP tunnels multicast transmission within unicast packets that are reassembled into multicast data when they arrive at their destination."

Generic routing encapsulation or IP-in-IP encapsulation is used between these tunnels. Forwarding conflicts are automatically solved by route exchange process.

Advantage of DVMRP

  1. It supports ASM and SSM
  2. Exclusion of RPs make this protocol implementation simpler
  3. It is effective for a network where receivers are distributed densely

Disadvantages of DVMRP

  1. Store per source state is needed to be stored by all routers for every source in domain
  2. This protocol is not scalable for the domains where most of the receivers are not willing to retrieve data; for example, the internet.
Posted Date: 3/7/2013 12:45:21 AM | Location : United States







Related Discussions:- Distance vector multicast routing protocol, Assignment Help, Ask Question on Distance vector multicast routing protocol, Get Answer, Expert's Help, Distance vector multicast routing protocol Discussions

Write discussion on Distance vector multicast routing protocol
Your posts are moderated
Related Questions
Q. What is Subnetting ? Subnetting IP addressing is hierarchical First reach a device through its network id (netid) Then reach the host itself using the se

Quality assurance through statistical methods is a key component in a manufacturing organization where TQM generally starts by sampling a random selection selection of th

Dotted decimal representation is a syntactic form the IP software uses to express 32-bit binary numbers when communicating with humans. Dotted decimal presents every octet in decim

i have an exam i need it to be solved

Cost Involved in Inter-Processor Communication As the data is assigned to many processors in a parallel computer while implementing a parallel algorithm, the processors might

What is the difference between CSMA/CD and CSMA/CA? CSMA/CD, or Collision Detect, retransmits data frames when a collision occurred. CSMA/CA, or Collision Avoidance, will first

The Common method for writing a program with PVM is as follows: A user writes one or more sequential programs in C, C++, or Fortran 77 having embedded PVM function (or subroutin

Can you explain the Authentication Header (AH) Protocol?


Explain the uses of Firewall in computer For Intranet developers, restricting access of unauthorised users to the Web site has been the greatest challenge. In addition to preve