Multicast extension to ospf, Computer Networking

MOSPF

MOSPF is multicast extension to OSPF. This protocol is extension of OSPF which is a unicast routing protocol which make MOSPF a combination of unicast and multicast protocol. MOSPF was documented in RFC1584 in the year 1994, since then no other version of the protocol has been deployed.

Rouse (2008) states "MOSPF (Multicast Open Shortest Path First) is an extension to the OSPF (Open Shortest Path First) protocol that facilitates interoperation between unicast and multicast routers."

MOSPF do not exchange any messages with neighbours for developing any multicast distribution trees. The routers employed in the network flood the information of location of all the receivers and distribution trees are calculated by MOSPF by its own. Due to this, all routers have same information so same trees will be calculated and there is no need of any designated forward mechanism or designated, assert router are required.

Advantages for MOSPF
RP are not necessary to be defined

Disadvantages of MOSPF
• Scalability is limited
• The protocol does not support SSM

Posted Date: 3/7/2013 12:46:31 AM | Location : United States







Related Discussions:- Multicast extension to ospf, Assignment Help, Ask Question on Multicast extension to ospf, Get Answer, Expert's Help, Multicast extension to ospf Discussions

Write discussion on Multicast extension to ospf
Your posts are moderated
Related Questions
MAC address called Physical address Because it's not changeable

Normally, we think of communications science as dealing with the contemporaneous exchange of information among distant parties. Though, many of the same techniques employed in data

Destination unreachable Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

What are TP-Lite and TP-Heavy Monitors? TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy is TP Monitors which handles the Client/S

Consider a subnet with subnet prefix 101.101.101/24  a)  If you subdivide the subnet into four equal size subnets, what are their prefixes? Give all four prefixes in the form a.

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Virtual private network The virtual  private  networks takes the  user data  encrypts them and sends them  to their  destination over  the internet. the sender  and the receiv

Difference between synchronous tdm and statistical tdm

Next hop to receiver does not relay on source of packet. This phenomenon is known 'Source Independence'. It has various benefits. It gives efficient and fast routing. Packet switch

hi. this is 700 words assignment..how much charges will be for this..?