Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security

mycnis.weebly.com
from mycnis.weebly.com More from this publisher
22.07.2013 Views

Route Discovery in CEDAR When a node S wants to send packets to destination D Node S informs its dominator core node B Node B finds a route in the core network to the core node E which is the dominator for destination D This is done by means of a DSR-like route discovery (but somewhat optimized) process among the core nodes Core nodes on the above route then build a route from S to D using locally available link state information Route from S to D may or may not include core nodes 154

H G B CEDAR: Core Maintenance A C E S J K A core node D F 155

Route Discovery in CEDAR<br />

When a node S wants to send packets to destination D<br />

Node S informs its dominator core node B<br />

Node B finds a route in the core network to the core<br />

node E which is the dominator for destination D<br />

This is done by means of a DSR-like route discovery (but<br />

somewhat optimized) process among the core nodes<br />

Core nodes on the above route then build a route<br />

from S to D using locally available link state<br />

information<br />

Route from S to D may or may not include core<br />

nodes<br />

154

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!