What is IGMP snooping?

Snooping the

protocol management of Internet groups (IGMP) sounds like an invasion of privacy or a type of hacker attack, but in fact it is an important function in multimedia broadcasting. The aim of IGMP Snooping is to reduce the use of broadband and memory and help sending a strong restriction of the amount of receivers they see broadcasting. Without IGMP Snooping, every computer connected to a computer that broadcasts would receive a video and sound, which could put huge pressure on the server. Using this Snooping technique, hacker can cause a rejection of the service (DOS). It may not be anything for a small network, but for larger networks it means that a huge number of computers can refer to broadcasting. When so many computers listen to the current, a huge amount of memory and video is needed to maintain AU. This will lead to reduced quality, poor transmission and possibly transmission failure. The network administrator can set this and the transmission memory needs are significantly reduced. This is because receivers and computers receiving inYS, rather than a broadcasting computer and its associated network, manipulate the needs of memory.

If the host wants to connect to the current, the manager will have to give the host access. After adding, the address of the Internet protocol (IP) of the network appears to identify the network. This identification helps because if the network attempts to attack or if something goes wrong, the administrator can reject another approach. If the host leaves, the IP address will be removed from the ZSEZNAM until the administrator re -provided access.

Hacker can use IGMP snooping technique with an attack on the disk operating system (DOS) operating system. DOS attack allows computer resources not available, which means that network service can no longer be used. The network profession does it most often. Using IGMP will hacker send countless current connections and the administrator would consider it impossible to sort real requirements from FALEšné. If snooping is set to allow any connection, then all network memory would eat numerous requirements.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?