The cast term here signifies some data(stream of packets) is being transmitted to the recipient(s) from client(s) side over the communication channel that helps them to communicate. Let’s see some of the “cast” concepts that are prevailing in the computer networks field.
1. Unicast –
This type of information transfer is useful when there is a participation of single sender and single recipient. So, in short, you can term it as a one-to-one transmission. For example, a device having IP address 10.1.2.0 in a network wants to send the traffic stream(data packets) to the device with IP address 18.104.22.168 in the other network, then unicast comes into the picture. This is the most common form of data transfer over the networks.
2. Broadcast –
Broadcasting transfer (one-to-all) techniques can be classified into two types :
- Limited Broadcasting –
Suppose you have to send stream of packets to all the devices over the network that you reside, this broadcasting comes handy. For this to achieve, it will append 255.255.255.255 (all the 32 bits of IP address set to 1) called as Limited Broadcast Address in the destination address of the datagram (packet) header which is reserved for information transfer to all the recipients from a single client (sender) over the network.
- Direct Broadcasting –
This is useful when a device in one network wants to transfer packet stream to all the devices over the other network. This is achieved by translating all the Host ID part bits of the destination address to 1, referred as Direct Broadcast Address in the datagram header for information transfer.
This mode is mainly utilized by television networks for video and audio distribution.
One important protocol of this class in Computer Networks is Address Resolution Protocol (ARP) that is used for resolving IP address into physical address which is necessary for underlying communication.
3. Multicast –
In multicasting, one/more senders and one/more recipients participate in data transfer traffic. In this method traffic recline between the boundaries of unicast (one-to-one) and broadcast (one-to-all). Multicast lets server’s direct single copies of data streams that are then simulated and routed to hosts that request it. IP multicast requires support of some other protocols like IGMP (Internet Group Management Protocol), Multicast routing for its working. Also in Classful IP addressing Class D is reserved for multicast groups.
Questions Corner –
Practicing the following questions will help you test your knowledge. It is highly recommended that you practice them.
This article is contributed by Vivek Reddy. If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Unicast and Multicast
- Difference between Broadcast and Multicast
- Difference between Unicast and Broadcast
- Collision Domain and Broadcast Domain in Computer Network
- Program to find Class, Broadcast and Network addresses
- Unicast Routing - Link State Routing
- Basic Network Attacks in Computer Network
- Difference between Storage Area Network (SAN) and Network Attached Storage (NAS)
- Difference between Next Generation Network and Traditional Network
- Difference between Software Defined Network and Traditional Network
- Local Broadcast and Loopback Address
- Difference Between Computer Network and Data Communication
- What is Limited Broadcast Address?
- Differences between Wireless Adhoc Network and Wireless Sensor Network
- Differences between Computer Architecture and Computer Organization
- Packet Switching and Delays in Computer Network
- Computer Network | AAA (Authentication, Authorization and Accounting)
- Computer Network | Quality of Service and Multimedia
- Computer Network | Leaky bucket algorithm
- HMAC Algorithm in Computer Network
Improved By : iamrohitjangid21