answersLogoWhite

0

Algorithm:There are several variants of flooding algorithm. Most work roughly as follows:
  1. Each node acts as both a transmitter and a receiver.
  2. Each node tries to forward every message to every one of its neighbors except the source node.

This results in every message eventually being delivered to all reachable parts of the network.

Algorithms may need to be more complex than this, since, in some case, precautions have to be taken to avoid wasted duplicate deliveries and infinite loops, and to allow messages to eventually expire from the system. A variant of flooding called selective flooding partially addresses these issues by only sending packets to routers in the same direction. In selective flooding the routers don't send every incoming packet on every line but only on those lines which are going approximately in the right direction.

Advantages:

  • If a packet can be delivered, it will (probably multiple times).
  • Since flooding naturally utilizes every path through the network, it will also use the shortest path.
  • This algorithm is very simple to implement.

Problems

  • Flooding can be costly in terms of wasted bandwidth. While a message may only have one destination it has to be sent to every host. In the case of a ping flood or a denial of service attack, it can be harmful to the reliability of a Computer Network.
  • Messages can become duplicated in the network further increasing the load on the networks bandwidth as well as requiring an increase in processing complexity to disregard duplicate messages.
  • Messages can become duplicated in the network further increasing the load on the networks bandwidth as well as requiring an increase in processing complexity to disregard duplicate messages.
User Avatar

Wiki User

13y ago

What else can I help you with?

Continue Learning about Engineering

Who developed an algorithm?

Here are some of the first we know of:* Babylonians, 1600 BC - factorization and square roots* Euclid, 300 BC - greatest common divisor (GCD)* Eratosthenes, 200 BC - prime numbers* Liu Hui, 263 AD - systems of linear equationsSee related link.


What is the msot common type of cryptographic algorithm?

The most common type of cryptographic algorithm is symmetric encryption, where the same key is used for both encryption and decryption. Popular symmetric algorithms include AES (Advanced Encryption Standard) and DES (Data Encryption Standard). These algorithms are widely used due to their efficiency and speed in processing large amounts of data. However, they require a secure method for key distribution, as anyone with the key can decrypt the data.


Can anyone explain how to work out how many gigabytes in petabyte?

There are 1,000,000 GB in one PB. 1 = byte 1,000 = kilobyte 1,000,000 = megabyte (million) 1,000,000,000 = gigabyte (billion) 1,000,000,000,000 = terabyte (trillion) 1,000,000,000,000,000 = petabyte (quadrillion)


What are2 examples of data encryption methods?

cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information (in cryptography, referred to as ciphertext). The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted).


Explain the phase an instrument is only as good as its operator?

Using instrument in the musical sense, all violins are basically the same. A body, some strings and a bow. It makes a big difference who is playing it. This can be applied to anything, bowling ball or backhoe. Most anyone can use either, but how well either is used makes a big difference.

Related Questions

What do you mean by line configuration in computer networking?

Can anyone explain what do mean by configuring files in .htaccess?


What is flash flooding?

Flash flooding is when a flood happens very quickly, with not a lot of time to warn anyone, as when a dam breaks.


What is the definition of an encryption key?

The definition of an encryption key is a way to transform information using an algorithm. By doing this, not anyone can read the transformed scripts, but only those who know the algorithm can solve the scripts.


Is Facebook a website?

Facebook is a social networking website, as it is hosted on the website and can be navigated to by anyone.


Why should i get hired as a networking manager?

I assume you have networking training and that you want to work in the field... isn't that why anyone wants to be hired in a certain field? Also - it pays well ...


Can anyone please suggest a Networking Company Name?

If you are referring to network component manufacturers, then how about:3comIntelMicrosoftRealTekCiscoNetgearBroadcom


Can anyone explain God?

Easy, nothing in it.


How do I explain to people why I hate my dad?

Don't. As long as your dad understands why, you don't have to explain to anyone.


What other types of individuals or organizations might be looking at your social networking page?

Almost anyone can look at your social networking page: friends, bosses, political orgnaiztions, police, etc. Whether they should have the right to is another question entirely, but the truth is that once you open a social networking page, pretty much anyone who has web access and has not been specifically blocked can look at it.


Can anyone expla?

Of course! What would you like me to explain?


What is the purpose of socket.io chat app?

anyone explain ?


Can anyone explain the sounds and yelling you hear in your head?

Your local Doctor will be able to help explain these sounds for you