22.07.2013 Views

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Flooding of Control Packets<br />

Many protocols perform (potentially limited) flooding<br />

of control packets, instead of data packets<br />

The control packets are used to discover routes<br />

Discovered routes are subsequently used to send<br />

data packet(s)<br />

Overhead of control packet flooding is amortized over<br />

data packets transmitted between consecutive<br />

control packet floods<br />

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!