SlideShare a Scribd company logo
1 of 7
Computer Networking
Group & Topic
4 MuhammadAshfaqRaza
MuhammadRashid
Aliza Rafi
What are UNICAST Routing protocol and
Multicast
Discuss Multicast Protocols types i.e.
DISTANCE VECTOR MULTICAST ROUTING
PROTOCOL (DVMRP)
CORE BASED TREES (CBT)
PROTOCOL INDEPENDENT MULTICAST_
SPARSE MODE (PIM-SM
Do
Diffrence between Unicast, Broadcast & Multicast
Data is transported over a network by three simple methods
i.e. Unicast, Broadcast, and Multicast. So let’s begin to
summarize the difference between these three:
 Unicast: from one source to one destination i.e. One-
to-One
 Broadcast: from one source to all possible
destinations i.e. One-to-All
 Multicast: from one source to multiple destinations
stating an interest in receiving the traffic i.e. One-to-
Many.
So let’s Dig Deeper into this subject
Unicast: traffic, many streams of IP packets that move across networks
flow from a single point, such as a website server, to a single endpoint
such as a client PC. This is the most common form of information
transference on networks.
Broadcast: Here, traffic streams from a single point to all possible
endpoints within reach on the network, which is generally a LAN. This is
the easiest technique to ensure traffic reaches to its destinations.
This mode is mainly utilized by television networks for video and audio
distribution. Even if the television network is a cable television (CATV)
system, the source signal reaches to all possible destinations, which is the
key reason that some channels’ content is scrambled
Multicast: In this method traffic recline between the boundaries of
unicast (one point to one destination) and broadcast (one point to all
destinations). And multicast is a “one source to many destinations” way
of traffic distribution, means that only the destinations that openly point
to their requisite to accept the data from a specific source to receive the
traffic stream.
Unicastrouting Protocol
unicast routing protocols. introduction. an internet is a combination of networks
connected by routers. when a datagram goes from a source to a destination, it will
probably pass through many routers until it reaches the router attached to the
destination network.
 intra- and inter-domain routing
today, an internet can be so large that one routing protocolcannot handle the task
of updating the routing tables of all routers. for this reason, an internet is divided
into autonomous systems. an autonomous system (as) is a group of networks and
routers under the authority of a single administration. routing inside an
autonomous system is referred to as intra-domain routing. routing between
autonomous systems is referred to as inter-domain routing. each autonomous
system can chooseone or more intradomain routing protocols to handle routing
inside the autonomous system. however, only one interdomain routing protocol
handles routing between autonomous systems.
 Multicast Routing Protocol
 The routing Algorithm used multicast routing.
 A single router in a network can be a part of
two or more different Groups.
 Spanning Tree
Minimize the Number of edges and un necessary edges are
removed in network.
 Example of Spanning Tree
 Prunning the Spanning Tree
Seprate the group of multicasting the are router
contain…and make the individual network is called
pruning the spanning tree…
 Techniques of Pruning the Spanning Tree
Algorithms used for pruning
Link State Routing
Protocol used for this technique is MOSPF
(Multicast Open shortest path first)
Distance Vector Routing
protocol used for this technique is DVMRP
(Distance vector Multicast routing protocol)
Distance Vector Multicast Routing
It’s a Adapted or Dynamic Algorithms.
Each router maintaintables called“vector”.
Each router is known best Distanceto reach
another router.
Table are Updatedor exchanging information
with neighbor's(router).
Also known as Bellman-fordalgorithms.
Distanceis basicallyconsiderby No’s of hops.
Or Delay etc…..
Example…
Step1
Step2
Step3

More Related Content

Similar to Computer networking.word

Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
guest23ccda3
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
guest23ccda3
 
Lecture W2 CN Network Types, Layered approach.pptx
Lecture W2 CN Network Types, Layered approach.pptxLecture W2 CN Network Types, Layered approach.pptx
Lecture W2 CN Network Types, Layered approach.pptx
ssuserc1e786
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
KhushbooGupta145
 

Similar to Computer networking.word (20)

Final isp
Final ispFinal isp
Final isp
 
Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
 
CCNP Route
CCNP Route CCNP Route
CCNP Route
 
Class 2
Class 2Class 2
Class 2
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
L045037278
L045037278L045037278
L045037278
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture W2 CN Network Types, Layered approach.pptx
Lecture W2 CN Network Types, Layered approach.pptxLecture W2 CN Network Types, Layered approach.pptx
Lecture W2 CN Network Types, Layered approach.pptx
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
ROUTING
ROUTINGROUTING
ROUTING
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Internet
InternetInternet
Internet
 
1658897215230.pdf
1658897215230.pdf1658897215230.pdf
1658897215230.pdf
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 

Recently uploaded

一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
Fi
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
AS
 
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
Fir
 
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
mikehavy0
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
AS
 
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
Fi
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
Fir
 
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
asdafd
 

Recently uploaded (20)

一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
 
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodie
 
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
Discovering OfficialUSA.com Your Go-To Resource.pdf
Discovering OfficialUSA.com Your Go-To Resource.pdfDiscovering OfficialUSA.com Your Go-To Resource.pdf
Discovering OfficialUSA.com Your Go-To Resource.pdf
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
 
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide HandbookTOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download NowHUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 

Computer networking.word

  • 1. Computer Networking Group & Topic 4 MuhammadAshfaqRaza MuhammadRashid Aliza Rafi What are UNICAST Routing protocol and Multicast Discuss Multicast Protocols types i.e. DISTANCE VECTOR MULTICAST ROUTING PROTOCOL (DVMRP) CORE BASED TREES (CBT) PROTOCOL INDEPENDENT MULTICAST_ SPARSE MODE (PIM-SM Do Diffrence between Unicast, Broadcast & Multicast Data is transported over a network by three simple methods i.e. Unicast, Broadcast, and Multicast. So let’s begin to summarize the difference between these three:  Unicast: from one source to one destination i.e. One- to-One  Broadcast: from one source to all possible destinations i.e. One-to-All  Multicast: from one source to multiple destinations stating an interest in receiving the traffic i.e. One-to- Many.
  • 2. So let’s Dig Deeper into this subject Unicast: traffic, many streams of IP packets that move across networks flow from a single point, such as a website server, to a single endpoint such as a client PC. This is the most common form of information transference on networks. Broadcast: Here, traffic streams from a single point to all possible endpoints within reach on the network, which is generally a LAN. This is the easiest technique to ensure traffic reaches to its destinations. This mode is mainly utilized by television networks for video and audio distribution. Even if the television network is a cable television (CATV) system, the source signal reaches to all possible destinations, which is the key reason that some channels’ content is scrambled Multicast: In this method traffic recline between the boundaries of unicast (one point to one destination) and broadcast (one point to all destinations). And multicast is a “one source to many destinations” way of traffic distribution, means that only the destinations that openly point to their requisite to accept the data from a specific source to receive the traffic stream.
  • 3. Unicastrouting Protocol unicast routing protocols. introduction. an internet is a combination of networks connected by routers. when a datagram goes from a source to a destination, it will probably pass through many routers until it reaches the router attached to the destination network.  intra- and inter-domain routing today, an internet can be so large that one routing protocolcannot handle the task of updating the routing tables of all routers. for this reason, an internet is divided into autonomous systems. an autonomous system (as) is a group of networks and routers under the authority of a single administration. routing inside an autonomous system is referred to as intra-domain routing. routing between autonomous systems is referred to as inter-domain routing. each autonomous system can chooseone or more intradomain routing protocols to handle routing inside the autonomous system. however, only one interdomain routing protocol handles routing between autonomous systems.  Multicast Routing Protocol  The routing Algorithm used multicast routing.  A single router in a network can be a part of two or more different Groups.  Spanning Tree Minimize the Number of edges and un necessary edges are removed in network.
  • 4.  Example of Spanning Tree  Prunning the Spanning Tree Seprate the group of multicasting the are router contain…and make the individual network is called pruning the spanning tree…
  • 5.  Techniques of Pruning the Spanning Tree Algorithms used for pruning Link State Routing Protocol used for this technique is MOSPF (Multicast Open shortest path first) Distance Vector Routing protocol used for this technique is DVMRP (Distance vector Multicast routing protocol)
  • 6. Distance Vector Multicast Routing It’s a Adapted or Dynamic Algorithms. Each router maintaintables called“vector”. Each router is known best Distanceto reach another router. Table are Updatedor exchanging information with neighbor's(router). Also known as Bellman-fordalgorithms. Distanceis basicallyconsiderby No’s of hops. Or Delay etc….. Example… Step1