Skip to main content

Broadcast Routing In Computer Networks

Broadcast Routing In Computer Networks

When a tool has multiple methods to achieve a destination, it always selects one path by preferring it over others. This choice method is termed routing. Routing is finished by special network devices known as routers or it may be done by means of software system processes. The software-based routers have limited practicality and limited scope.

Broadcast Routing In Computer Networks

A router is often designed with some default route. A default route tells the router wherever to forward a packet if there's no route found for a particular destination. just in case there are multiple methods existing to achieve an identical destination, the router will create a call supported by the subsequent information:
  • Hop Count
  • Bandwidth
  • Metric
  • Prefix-length
  • Delay
Routes may be statically designed or dynamically learned. 0ne route may be designed to be most well-liked over others. By default, the published packets don't seem to be routed and forwarded by the routers on any network. Routers produce broadcast domains however they may be designed to forward broadcasts in some special cases. A broadcast message is destined for all network devices.

Broadcast routing can be done in two ways

1.  A router creates a knowledge packet and so sends it to every host one by one. during this case, the router creates multiple copies of one knowledge packet with completely different destination addresses. All packets are sent as unicast however as a result if they're sent to any or all, it simulates as if the router is broadcasting.

This technique consumes innumerable information measures and the router should destination address of every node.

2. Secondly, once a router receives a packet that's to be broadcasted, it merely looks at those packets out of all interfaces. All routers are designed with the same approach.

This technique is straightforward on the router’s CPU however might cause the matter of duplicate packets received from peer routers.

Reverse path forwarding may be a technique, within which the router is aware of earlier regarding its precursor from wherever it ought to receive the published. this method is employed to observe and discard duplicates.

Popular posts from this blog

Limitations of Terzaghi Theory

Limitations of Terzaghi Theory The value of the coefficient of consolidation has been assumed to be constant.  The distance d of the drainage path cannot be measured accurately in the field. The thickness of the deposit is generally variable, and an average value has to be estimated.  There is sometimes difficulty 1n locating the drainage face, and sometimes thin previous seams that can act as good drainage faces are missed in the boring operations. The equation is based on the assumption that the consolidation is one-dimensional. In the field, the consolidation is generally 3-dimensional. The lateral drainage may have a significant effect on the time rate of consolidation. The initial consolidation and secondary consolidation have been neglected. Sometimes these form an important part of the total consolidation. In actual practice, the pressure distribution may be far from linear or uniform.

Streamer Theory of Breakdown in Gases

Streamer Theory of Breakdown in Gases According to the Townsend theory firstly, current growth occurs as a result of the ionization process only. But in practice, breakdown voltages were found to depend on the gas pressure and the geometry of the gap. Second chances time lags of the order of 10-5 s, but practically it was observed to occur at a very short time of 10-8 s. Also, the Townsend mechanism predicts a very diffused form of discharge, that actually discharges were found to be filamentary and irregular. Townsend's mechanism failed to explain all these observed phenomena and as a result, The Streamer theory was proposed. The theory predicts the development of a spark discharge directly from a single avalanche in which the space charge developed by the avalanche itself is said to transform the avalanche into a plasma steamer. In Fig 1.7, a single electron starting at the cathode by ionization builds up an avalanche that crosses the gap. The electrons in the a

Price Guard Wire Method

Price Guard Wire Method Some form of  Price Guard Wire Method  is generally used to eliminate the errors caused by leakage currents over insulation. Fig. 3.14 illustrates the operation of This Method. In fig 3.14(a), a high resistance mounted on a piece of insulating material is measured by the ammeter voltmeter method. The micro-ammeter measures the sum of the current through the resistor (IR) and the current through the leakage path around the resistor. The measured value of resistance computed from the readings indicated on the voltmeter and the microammeter, will not be a true value but will be in error.   Figure 3.14 Application of  guard  circuit for measurement of high resistance In fig, 3.14 (b), the  guard  terminal has been added to the resistance terminal block. The  guard  terminal surrounds the resistance terminal entirely and is connected to the battery side of the micro-ammeter. The leakage current IL now