KeyWEn.com  
 
 
 
Source Routing       Article     History   Tree Map
  Encyclopedia of Keywords > Dsr > Source Routing   Michael Charnine

Keywords and Sections
ROUTING PARADIGM
SOURCE ROUTING BIT
MEDIUM ACCESS CONTROL SUBLAYER
SOURCE ROUTING IDENTIFIER
NEXT-GENERATION APPN
ABILITY
ROUTING INFORMATION
TYPES
REASON
PRESENT INVENTION
SIMILARLY
PATH
LAN
NODES
PROBLEM
PARAMETER
INTERNET
ADDRESSES
NETWORK ADDRESSES
TYPE
INFORMATION
ADDRESS
STATIC ROUTING
UNIX MACHINES
NETWORK
FRAME TYPE
OPTIONS
OPTION
FIREWALL
DATAGRAM
BRIDGES
BRIDGE
PROTOCOL
NETBEUI
PACKETS
SPOOFING
TOKEN
ROUTER
ROUTE
ROUTERS
ROUTING
PACKET
DSR
SOURCE ROUTING
Review of Short Phrases and Links

    This Review contains major "Source Routing"- related terms, short phrases and links grouped together in the form of Encyclopedia article. Please click on Move Up to move good phrases up.

Definitions Submit/More Info Add a definition

  1. Source Routing is a type of routing used by bridges.
  2. Source routing was designed to allow individuals the ability to specify the route that a packet should take through a network. (Web site) Move Up
  3. Source routing is useful when the default route that a connection will take fails or is suboptimal for some reason, or for network diagnostic purposes. (Web site) Move Up
  4. Source routing is almost obsolete now, and the majority of routers filter out source routed packets. Move Up
  5. Source routing is only supported for Token Ring networks. (Web site) Move Up

Routing Paradigm Submit/More Info Add phrase and link

  1. Note that some policies cannot be supported by the "hop-by-hop" routing paradigm and thus require techniques such as source routing to enforce. (Web site)

Source Routing Bit Move Up Add phrase and link

  1. The identification within each packet is done by examining the routing field and source routing bit within the MAC layer header. (Web site)

Medium Access Control Sublayer Move Up Add phrase and link

  1. In Token Ring environments, source routing at the medium access control sublayer is a major routing method.

Source Routing Identifier Move Up Add phrase and link

  1. On the other hand, if the source routing identifier does exist, source routing is used, block 78. (Web site)

Next-Generation Appn Move Up Add phrase and link

  1. Compare with APPN+. See also APPC. APPN+ Next-generation APPN that replaces the label-swapping routing algorithm with source routing. (Web site)
  2. Next-generation APPN that replaces the label-swapping routing algorithm with source routing. Move Up

Ability Move Up Add phrase and link

  1. The ability to use loose source routing to see the reverse route could be pretty handy.

Routing Information Move Up Add phrase and link

  1. This bridge looks for the routing information inside each packet associated with source routing. (Web site)

Types Move Up Add phrase and link

  1. Some types of source routing (for example, Token Ring) are handled by the medium access control sublayer.

Reason Move Up Add phrase and link

  1. For this reason, you should always disable source routing on the firewall router with the no ip source-route command. (Web site)

Present Invention Move Up Add phrase and link

  1. When using source routing with bridging devices interconnecting remote LANs, the following method is performed according to the present invention. (Web site)

Similarly Move Up Add phrase and link

  1. Similarly, 20] describes the use of source routing to solve the host mobility problem.
  2. Similarly, the SDR component provides mechanisms for the source routing domain to be notified of failures along previously-installed active routes. (Web site) Move Up

Path Move Up Add phrase and link

  1. The Source Routing function allows the originator to specify the path a generated PDU must take.

Lan Move Up Add phrase and link

  1. A bridging device that uses the present invention identifies within each packet of data transmitted over the LAN the usage of the source routing field. (Web site)

Nodes Move Up Add phrase and link

  1. Similarly, nodes 30, 32 connected to LAN 4, nodes 34, 36, 38 connected to LAN 6, and nodes 40, 42, 44 connected to LAN 8 are source routing nodes. (Web site)

Problem Move Up Add phrase and link

  1. This problem is particularly serious whenever some nodes on a LAN use source routing and some nodes on the same LAN use transparent routing. (Web site)
  2. To correct this problem, use transparent source routing or transparent bridging. (Web site) Move Up

Parameter Move Up Add phrase and link

  1. Setting this parameter to 0 causes all IP broadcasts to be sent without source routing. (Web site)

Internet Move Up Add phrase and link

  1. We can only discourage source routing of any kind within the Internet, as unnecessary and undesirable. (Web site)

Addresses Move Up Add phrase and link

  1. Section 8.5), and strict source routing (similar to loose source routing but here only the addresses in the list can be traversed.

Network Addresses Move Up Add phrase and link

  1. PROPOSED SOLUTION Our solution is based on 1) extending the interpretation of network addresses to include "virtual" nets, and 2) use of source routing. (Web site)

Type Move Up Add phrase and link

  1. This type of bridge allows for the easy connection of both source routing and non-source routing networks. (Web site)
  2. The first octet of the parameter value is a type code, indicating Complete Source Routing (binary 0000 0001) or partial source routing (binary 0000 0000). (Web site) Move Up

Information Move Up Add phrase and link

  1. When the list of hosts is present, it is source routing information and indicates that the mail must be relayed to the first host on the list. (Web site)
  2. If the source routing identifier is a logical 1, then the packet of information has a source routing field and uses the source routing method. (Web site) Move Up
  3. For more information about source routing, see the ip-param.txt document. Move Up

Address Move Up Add phrase and link

  1. However, with this form of source routing the PDU may take any path necessary to arrive at the next address in the list.
  2. Note: If an address uses source routing, it can send and receive traffic through the firewall router. (Web site) Move Up

Static Routing Move Up Add phrase and link

  1. It clearly defines commonly used terminology such as static routing, store-and-forward routing, source routing and others. (Web site)

Unix Machines Move Up Add phrase and link

  1. Still, there is substantial use of Linux and Unix machines, running open source routing code, for routing research and selected other applications.

Network Move Up Add phrase and link

  1. A network using a fiber data distributed interface (FDDI) for network communications cannot use NBF for source routing. (Web site)

Frame Type Move Up Add phrase and link

  1. IPX IPX test Examines the network's IPX configuration, including Frame Type, Network ID, RouterMTU and whether packet burst or source routing are enabled.

Options Move Up Add phrase and link

  1. The types of options supported by these fields typically include source routing, priority and security-specific information. (Web site)
  2. We've described the following IP options: record route (Section 7.3), time-stamp (Section 7.4), strict and loose source routing (Section 8.5). Move Up

Option Move Up Add phrase and link

  1. The option is specified by including source routing information in the Target structure.
  2. An aspect of this invention is the use of an IP feature known as a Loose Source Record Routing, or Loose Source Routing (LSR) option. (Web site) Move Up

Firewall Move Up Add phrase and link

  1. If a firewall or gateway reverses the source routing information when sending packets back, you can sniff traffic at one of the hops you defined. (Web site)

Datagram Move Up Add phrase and link

  1. Section 7.4), loose source routing (specifying a list of IP addresses that must be traversed by the datagram.
  2. Triggers on receipt of an IP datagram in which the IP option list for the datagram includes option 2 (Strict Source Routing). Move Up

Bridges Move Up Add phrase and link

  1. The source routing bridges add additional routing information to the frame and send it to all other rings to which the bridge is connected. (Web site)
  2. Transparent bridges are used for Ethernet, whereas source routing bridges are used for token ring networks. (Web site) Move Up

Bridge Move Up Add phrase and link

  1. Another type of bridge is called a source routing bridge. (Web site)
  2. In addition, the bridge provides source routing over multiple wide area channels to those nodes which use source routing. (Web site) Move Up
  3. The second routing method is source routing, in which a bridge or brouter looks at the source routing field of the datagram. (Web site) Move Up

Protocol Move Up Add phrase and link

  1. The LAN numbers are used by the bridges to identify LANs in a source routing protocol. (Web site)
  2. However, we opt against further discussion of such a protocol because there is less to gain by using source routing without also using a link state scheme. (Web site) Move Up
  3. The DSR (Dynamic Source Routing) protocol is used to provide communication routes among the devices. Move Up

Netbeui Move Up Add phrase and link

  1. However, NetBEUI uses IBM Token Ring source routing to perform network layer functions. (Web site)

Packets Move Up Add phrase and link

  1. Source routing: Most firewalls will discard source routed packets, but it can be tried anyway. (Web site)
  2. A source routing attack can be defeated by simply discarding all packets that contain the source route option. (Web site) Move Up

Spoofing Move Up Add phrase and link

  1. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing.
  2. Disabling source routing at all routers can also help prevent spoofing. Move Up
  3. It means that the firewall examines the states of all internet connections, looking for the telltale signs of hacking, such as source routing or IP spoofing. (Web site) Move Up

Token Move Up Add phrase and link

  1. The IEEE 802.5 Committee has defined a different approach to bridging for use on the Token Ring, called Source Routing. (Web site)
  2. Bridge Number A 4 bit number identifying the bridge on the token ring, as defined in the IEEE 802.5 Source Routing Specification. (Web site) Move Up
  3. From a Token Ring LAN, PIR looks like a Source Routing bridge; in an Ethernet environment, PIR appears as a Transparent bridge. Move Up

Router Move Up Add phrase and link

  1. With strict source routing, the next intermediate destination must be directly reachable (it must be a neighbor on an interface of the router).
  2. You tried to use source routing, but the router is configured to block source-routed packets. Move Up
  3. Note: Disabling source routing at the router does not protect you from this attack, but it is still good security practice to follow. (Web site) Move Up

Route Move Up Add phrase and link

  1. In a source routing attack, the source station specifies the route that a packet should take as it crosses the Internet. (Web site)
  2. Consequently, it is possible for a source routing domain to compute a route that is not operational at route installation time. (Web site) Move Up

Routers Move Up Add phrase and link

  1. Whichever method is used, Routing Tables or Source Routing, a network map is developed for the routers.
  2. Older versions of mrouted tunnel using IP source routing, which puts a heavy load on some types of routers. (Web site) Move Up
  3. The first type is loose source routing, in which the IP address of the next router can be one or more routers away (multiple hops). (Web site) Move Up

Routing Move Up Add phrase and link

  1. NetBEUI uses Token Ring source routing as its only method of routing.
  2. It can use Token Ring source routing as its only method of routing. (Web site) Move Up
  3. NBF can provide a simple form of routing known as Token Ring source routing, and it can only be implemented on Token Ring networks. (Web site) Move Up

Packet Move Up Add phrase and link

  1. To accomplish source routing, the routed packets contain the address of each device the packet will traverse.
  2. It then decides which routing service to provide to this packet, namely, source routing or transparent routing. (Web site) Move Up
  3. Loose source routing allows the packet to use any number of intermediate gateways to reach the next address in the route. (Web site) Move Up

Dsr Move Up Add phrase and link

  1. To avoid using source routing, DSR optionally defines a flow id option that allows packets to be forwarded on a hop-by-hop basis.
  2. DSR uses source routing which is regarded as one of the main feature of this scheme. Move Up
  3. DSR is a source routing protocol where the route is in each packet. (Web site) Move Up

Source Routing Move Up Add phrase and link

  1. IP source routing The practice of specifying the list of router interfaces corresponding to the path through an IP internetwork that a packet must travel.
  2. By default, the stack transmits ARP queries without source routing first and retries with source routing enabled if no reply is received. Move Up
  3. For a firewall, source routing is noteworthy, since an attacker can generate traffic claiming to be from a system "inside" the firewall. Move Up

Categories Submit/More Info

  1. Dsr
  2. Information Technology > Computers > Internet > Routing Move Up
  3. Token Move Up
  4. Network Id Move Up
  5. Spoofing Move Up
  6. Books about "Source Routing" in Amazon.com

Continue: More Keywords - - - - - - - - - - Submit/More Info

Book: Keywen Category Structure


  Short phrases about "Source Routing"
  Originally created: August 01, 2010.
  Links checked: May 25, 2013.
  Please send us comments and questions by this Online Form
  Click on Submit/More Info to submit a phrase/keyword and to see more info.
  Please click on Move Up to move good phrases up.
0.0135 sec. a=1..