Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Types  





2 Algorithms  



2.1  Selective flooding  







3 Advantages  





4 Disadvantages  





5 Examples  





6 See also  





7 References  














Flooding (computer networking)






فارسی
Hausa

 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Flooding algorithm
Flooding algorithm with ACK messages

Flooding is used in computer network routing algorithms in which every incoming packet is sent through every outgoing link except the one it arrived on.[1]

Flooding is used in bridging and in systems such as Usenet and peer-to-peer file sharing and as part of some routing protocols, including OSPF, DVMRP, and those used in ad-hoc wireless networks (WANETs).[2]

Types[edit]

There are generally two types of flooding available, uncontrolled flooding and controlled flooding.[citation needed]

Inuncontrolled flooding each node unconditionally distributes packets to each of its neighbors. Without conditional logic to prevent indefinite recirculation of the same packet, broadcast storms are a hazard.

Controlled flooding has its own two algorithms to make it reliable, SNCF (Sequence Number Controlled Flooding) and RPF (reverse-path forwarding). In SNCF, the node attaches its own address and sequence number to the packet, since every node has a memory of addresses and sequence numbers. If it receives a packet in memory, it drops it immediately while in RPF, the node will only send the packet forward. If it is received from the next node, it sends it back to the sender.

Algorithms[edit]

There are several variants of flooding algorithms. Most work roughly as follows:

  1. Each node acts as both a transmitter and a receiver.
  2. Each node tries to forward every message to every one of its neighbors except the source node.

This results in every message eventually being delivered to all reachable parts of the network.

Algorithms may need to be more complex than this, since, in some case, precautions have to be taken to avoid wasted duplicate deliveries and infinite loops, and to allow messages to eventually expire from the system.

Selective flooding[edit]

A variant of flooding called selective flooding partially addresses these issues by only sending packets to routers in the same direction. In selective flooding, the routers don't send every incoming packet on every line but only on those lines which are going approximately in the right direction.

Advantages[edit]

The advantages of this method are that it is very simple to implement,[citation needed] if a packet can be delivered then it will (probably multiple times), and since flooding naturally utilizes every path through the network it will also use the shortest path.

Disadvantages[edit]

Flooding can be costly in terms of wasted bandwidth. While a message may only have one destination it has to be sent to every host. In the case of a ping flood or a denial of service attack, it can be harmful to the reliability of a computer network.

Messages can become duplicated in the network further increasing the load on the network as well as requiring an increase in processing complexity to disregard duplicate messages. Duplicate packets may circulate forever, unless certain precautions are taken:

Examples[edit]

InOpen Shortest Path First (OSPF), flooding is used for transferring updates to the topology (LSAs).

In low data rate communications, flooding can achieve fast and robust data communications in dedicated protocols such as VEmesh,[3] which operates in the Sub-1 GHz frequency band and Bluetooth mesh networking, which operates in the 2.4 GHz frequency band. Both these protocols serve as underlying technologies in the Digital Addressable Lighting Interface in use in professional and commercial lighting control.

See also[edit]

References[edit]

  1. ^ Tanenbaum, Andrew S.; Wetherall, David J. (March 23, 2010). Computer Networks (5th ed.). Pearson Education. pp. 368–370. ISBN 978-0-13-212695-3.
  • ^ Rahman, Ashikur; Olesinski, Wlodek; Gburzynski, Pawel (2004). "Controlled Flooding in Wireless Ad-hoc Networks" (PDF). International Workshop on Wireless Ad-Hoc Networks. Edmonton, Alberta, Canada: University of Alberta, Department of Computing Science. Archived (PDF) from the original on February 10, 2017. Retrieved October 15, 2015.
  • ^ virtual-extension.com

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Flooding_(computer_networking)&oldid=1177685305"

    Categories: 
    Routing algorithms
    Flooding algorithms
    Hidden categories: 
    Articles with short description
    Short description matches Wikidata
    Use American English from March 2019
    All Wikipedia articles written in American English
    Use mdy dates from March 2019
    Articles needing additional references from October 2015
    All articles needing additional references
    All articles with unsourced statements
    Articles with unsourced statements from August 2019
    Articles with unsourced statements from January 2012
     



    This page was last edited on 28 September 2023, at 22:56 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki