Distance vector multicast routing protocol, Computer Networking

Assignment Help:

DVMRP

• Distance vector multicast routing protocol: Distance vector multicast routing protocol are abbreviated as DVMRP. These protocols are suitable for small networks which run on multicast traffic. First version of this protocol was created in year 1988 and was used in MBONE. It is dense multicast routing protocol and employs its own distance vector algorithm for computing routes in a network. This routing algorithm supports tunnels between the protocol's routers through unicast only networks.
Rouse (2007) states "The protocol sends multicast data in the form of unicast packets that are reassembled into multicast data at the destination."

The protocol is interior gateway protocol which is based on RIP that transmits connectionless multicast data to a group of receivers on network.

QuinStreetInc states "DVMRP tunnels multicast transmission within unicast packets that are reassembled into multicast data when they arrive at their destination."

Generic routing encapsulation or IP-in-IP encapsulation is used between these tunnels. Forwarding conflicts are automatically solved by route exchange process.

Advantage of DVMRP

  1. It supports ASM and SSM
  2. Exclusion of RPs make this protocol implementation simpler
  3. It is effective for a network where receivers are distributed densely

Disadvantages of DVMRP

  1. Store per source state is needed to be stored by all routers for every source in domain
  2. This protocol is not scalable for the domains where most of the receivers are not willing to retrieve data; for example, the internet.

Related Discussions:- Distance vector multicast routing protocol

Types of redundancy checks, Types of Redundancy Checks Parity Check ...

Types of Redundancy Checks Parity Check Simple Parity Check Two Dimensional Parity Check / Longitudinal Redundancy Check (LRC) CRC (Cyclic Redundancy Check)

Explain the layer which is closer to the user, There is only an applicatio...

There is only an application layer which is closer to user and also gives many application which user directly linked.for ex:- web browser

What are the major technologies to create client application, What are the ...

What are the five major technologies that can be used to create Client/Server applications? Database Servers Groupware TP Monitors Distributed Objects Intranets.

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Prompt ''router'', Recognize the mode reflected by the following prompt 'Ro...

Recognize the mode reflected by the following prompt 'Router '? Ans) RXBoot

Networks - fundamental of network , Normal 0 false false fa...

Normal 0 false false false EN-IN X-NONE X-NONE Networks A networks  consists of two  or m

What automatic repeat request, What Automatic Repeat Request (ARQ)? Err...

What Automatic Repeat Request (ARQ)? Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in tr

Assignement, I have an asignement regarding TCP tunning and optimization. C...

I have an asignement regarding TCP tunning and optimization. Can you help?

Udp connection establishment & termination, simple introduction,defination ...

simple introduction,defination and with example & digram

Install, how to install xp via network

how to install xp via network

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd