Multicasting, Computer Networking


The answer to above problem is multicasting. It is the normal form of broadcasting. It acts like broadcasting however it does not broadcast frames automatically to the CPU.

The interface hardware is programmed in advance to receive some frames that have multicast address as the destination address. If an application needs to receive some frames then it program the interface hardware to receive an additional set of addresses.

The interface hardware frame then starts accepting three kinds of frames:

  • Multicast frames
  • Broadcast frames
  • The frames that are distend to the station itself.


 We take an example of computers executing an audio program. We see that they may accept audio frames if the interface are programmed to received them and the other devices that are not running that audio programs will not waste sources


Posted Date: 10/27/2012 8:34:35 AM | Location : United States

Related Discussions:- Multicasting, Assignment Help, Ask Question on Multicasting, Get Answer, Expert's Help, Multicasting Discussions

Write discussion on Multicasting
Your posts are moderated
Related Questions
Define the term Socks- Network security As it is well known, each type of network security protects data at a different layer of the OSI model. Built-in at each layer lies the

There are two logical addressing :- a) Datalink is physical (hardware) addressing. b) Network is logical (software) addressing.

Hardware requirement for an intranet To setup a WAN, one would need to have some type of communication between different sites. National ISDN, Very Small Aperture Terminal (VSA

Q. Show the Drawbacks of Go-back-N? Drawbacks of Go-back- N - Inefficient - Every out of order received packets are discarded (receiver side is simplified) - This

What are reasons behind using layered protocols  Reasons for using layered protocols, using them leads to breaking up design problem into smaller more manageable pieces and lay

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o