What is the routing of the source?

Source routing is a technique used in computer networks that allows the user to direct network data packets to a specific target. Depending on how it is used, packets may be given a specific path to execute or general instructions that allow some automatic network routing to manage part of the way. Although it is very useful technique, it is also very susceptible to abuse, allowing potential security violations.

Most routing are performed by crowds of devices known as routers that make up many networks that contain the Internet. These devices are programmed with protocols that allow them to learn about their neighbors, and then decide on the best possible paths that are to be driven from one computer to another. Routing of the source on the other hand uses some optional Internet protocol functions (IP) that removes rigger decisions and puts it in the hands of the user or source C whatmpuna.

There are two possible modifications to the source routing that a computer can make in a data packet when it goes to the network: strict or free. With the strict definitions of the source is the exact path that the packet should be, from one router to another, entered before the packet sometimes leaves the source computer. However, the routing of a free source gives a packet to several specific routers and allows other routers to decide along the way. This is useful, for example, if sending a packet via the local network router to the gate router and then to a specific address. Local network routers may be omitted, but the gateway and other routers can be entered.

The ability to use the routing source is useful for different purposes of testing and solving problems. One such purpose is a similar teaching of neighboring streets, with the network discovered by monitoring the Packets route from one router to another. Can also be useful for discovery whereThere are potential narrow sites in the network, and Internet service providers (ISP) often use them to ensure that unnecessary data traffic does not try to use their main network spine. The method is also used for dangerous purposes, allowing the attacker to access private computer computers by pretending to be a computer in this private network.

Since wireless networks have become popular, other techniques referred to as the dynamic routing of the Source (DSR) have been designed to use the routing of the source to discover the wireless network. The trick was created because, as it is known that network nodes come and often leave certain types of wireless networks, those that are referred to as ad-hoc networks, computers needed a new way to quickly discover routes around the network. In this way, the route from the source computer through the network is discovered while running, instead of continuing the node, flooding the network with updated information when the nodes come and leave.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?