Friday, October 18, 2019

Factors and criteria that determine which brand of mobile phones will Essay

Factors and criteria that determine which brand of mobile phones will top today and which brand will peak after that - Essay Example Consequently data is sent to a single multicast address which can then be received by any IP device2. Protocol Independent Multicast (PIM) contains multicast routing protocols for IP networking. These are primarily responsible to carry many-to-many and one-to-many data distribution with the help of internet, WAN or LAN. PIM is based upon different routing protocols along with its topology3. For instance, it includes Routing Information Protocol, Intermediate System to Intermediate System, Open Shortest Path First and the Border Gateway Protocol. Following are the four important types of Protocol Independent Multicast: Multicast routers work on the basis of distribution trees which are responsible to direct the path for IP multicast traffic. It is built in the form of a network infrastructure which facilitates in the traffic delivery. The Distribution trees are built in two different types i.e. source trees and shared trees. These trees do not have any loops because the data transformation is only between the source and receiver without any disruption8. The  source distribution tree is also called the shortest-path tree. It is built using small straddling tree which is responsible to transmit data using the shortest path from source to the recipients. Each of the individual sources which are transmitting data to a particular group gives rise to another tree note. In significantly large IP Networks this leads to an extravagant quantity of trees in a single network. This incompetency is actually important for multicast distribution trees. Here, all the multicast groups are attached with a shared root irrespective of the main source. This shared root is commonly called as the rendezvous point (RP). The shared tree are also unidirectional i.e. the traffic is received at RP directly from the source. This received data is then transferred to the every single receiver but there are also certain exceptions where this rule does

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.