Learn programming for Free and how to develop and write computer programs and IT applications. Get Free knowledge, information, references, and resources about computers now. Many Free training courses,tutorials, books, training guides, tips, articles, and helps are available to you.
Subscribe to our Free semimonthly Newsletter to Get the Latest & Best FREE Computer IT Training! - You'll stay current with all the New Free Computer Training and Education sites we discover - Subscribe now because you'll have access to these great new sites a month before our web site visitors do, and with each issue you'll receive our 2 non-public links containing 97 Pages of Free Training with over 10,000 Free IT training and tutorial resources. Plus, you'll receive our new 21 chapter e-book "Understanding Computer Security" for Free!
If you would like a Free Copy of our current IT Education & Training Newsletter without subscribing: Make us your homepage! (IE only)
Intelinfo.com's Web Forum
Web Forum for Computer Education, Training & Tutorial Resources
Please use this web-based forum discussion board to ask beginning and advanced technical questions and make comments. We hope some people can answer and help those in need. Anything relating to computers is appropriate. You may post html in this forum.
Flooding is a simple routing algorithm in which every incoming packet is sent through every outgoing link.
Flooding is used in bridging and in systems such as Usenet and peer-to-peer file sharing and as part of some routing protocols, including OSPF, DVMRP, and those used in ad-hoc wireless networks.
Advantages
If a packet can be delivered, it will (probably multiple times).
Since flooding naturally utilizes every path through the network, it will also use the shortest path.
This algorithm is very simple to implement.[citation needed]
[edit]Problems
Flooding can be costly in terms of wasted bandwidth. While a message may only have one destination it has to be sent to every host. In the case of a ping flood or a denial of service attack, it can be harmful to the reliability of a computer network.
Messages can become duplicated in the network further increasing the load on the networks bandwidth as well as requiring an increase in processing complexity to disregard duplicate messages.
Duplicate packets may circulate forever, unless certain precautions are taken:
Use a hop count or a time to live count and include it with each packet. This value should take into account the number of nodes that a packet may have to pass through on the way to its destination.
Have each node keep track of every packet seen and only forward each packet once
Enforce a network topology
http://www.emdadblog.com