answersLogoWhite

0


Best Answer
Algorithm:There are several variants of flooding algorithm. Most work roughly as follows:
  1. Each node acts as both a transmitter and a receiver.
  2. Each node tries to forward every message to every one of its neighbors except the source node.

This results in every message eventually being delivered to all reachable parts of the network.

Algorithms may need to be more complex than this, since, in some case, precautions have to be taken to avoid wasted duplicate deliveries and infinite loops, and to allow messages to eventually expire from the system. A variant of flooding called selective flooding partially addresses these issues by only sending packets to routers in the same direction. In selective flooding the routers don't send every incoming packet on every line but only on those lines which are going approximately in the right direction.

Advantages:

  • If a packet can be delivered, it will (probably multiple times).
  • Since flooding naturally utilizes every path through the network, it will also use the shortest path.
  • This algorithm is very simple to implement.

Problems

  • Flooding can be costly in terms of wasted bandwidth. While a message may only have one destination it has to be sent to every host. In the case of a ping flood or a denial of service attack, it can be harmful to the reliability of a Computer Network.
  • Messages can become duplicated in the network further increasing the load on the networks bandwidth as well as requiring an increase in processing complexity to disregard duplicate messages.
  • Messages can become duplicated in the network further increasing the load on the networks bandwidth as well as requiring an increase in processing complexity to disregard duplicate messages.
User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Can anyone explain flooding algorithm in networking in detail?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

Who developed an algorithm?

Here are some of the first we know of:* Babylonians, 1600 BC - factorization and square roots* Euclid, 300 BC - greatest common divisor (GCD)* Eratosthenes, 200 BC - prime numbers* Liu Hui, 263 AD - systems of linear equationsSee related link.


Can anyone explain how to work out how many gigabytes in petabyte?

There are 1,000,000 GB in one PB. 1 = byte 1,000 = kilobyte 1,000,000 = megabyte (million) 1,000,000,000 = gigabyte (billion) 1,000,000,000,000 = terabyte (trillion) 1,000,000,000,000,000 = petabyte (quadrillion)


What are2 examples of data encryption methods?

cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information (in cryptography, referred to as ciphertext). The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted).


Explain the phase an instrument is only as good as its operator?

Using instrument in the musical sense, all violins are basically the same. A body, some strings and a bow. It makes a big difference who is playing it. This can be applied to anything, bowling ball or backhoe. Most anyone can use either, but how well either is used makes a big difference.


How do you swap classes and objects without using a template function?

You cannot swap classes, you can only swap objects. An object is an instance of a class while a class is a type definition; you cannot swap type definitions. It is not possible to write your own version of the swap algorithm without using templates. You can certainly write a function to cater for a specific type of object, but then you'd need to overload it in order to cater for all possible object types, which is clearly impossible since you have no knowledge of my objects let alone anyone else's.

Related questions

What do you mean by line configuration in computer networking?

Can anyone explain what do mean by configuring files in .htaccess?


What is flash flooding?

Flash flooding is when a flood happens very quickly, with not a lot of time to warn anyone, as when a dam breaks.


What is the definition of an encryption key?

The definition of an encryption key is a way to transform information using an algorithm. By doing this, not anyone can read the transformed scripts, but only those who know the algorithm can solve the scripts.


Is Facebook a website?

Facebook is a social networking website, as it is hosted on the website and can be navigated to by anyone.


Why should i get hired as a networking manager?

I assume you have networking training and that you want to work in the field... isn't that why anyone wants to be hired in a certain field? Also - it pays well ...


Can anyone please suggest a Networking Company Name?

If you are referring to network component manufacturers, then how about:3comIntelMicrosoftRealTekCiscoNetgearBroadcom


Can anyone explain God?

Easy, nothing in it.


What other types of individuals or organizations might be looking at your social networking page?

Almost anyone can look at your social networking page: friends, bosses, political orgnaiztions, police, etc. Whether they should have the right to is another question entirely, but the truth is that once you open a social networking page, pretty much anyone who has web access and has not been specifically blocked can look at it.


How do I explain to people why I hate my dad?

Don't. As long as your dad understands why, you don't have to explain to anyone.


What is the purpose of socket.io chat app?

anyone explain ?


Can anyone expla?

Of course! What would you like me to explain?


Can anyone explain the sounds and yelling you hear in your head?

Your local Doctor will be able to help explain these sounds for you