 |
 |
 |
 |
 |
 |
 |
 |
 |
n |
Many
protocols perform (potentially limited) flooding of
|
|
|
control packets, instead of data packets
|
|
|
n |
The
control packets are used to discover routes
|
|
|
n |
Discovered
routes are subsequently used to send data
|
|
|
packet(s)
|
|
|
n |
Overhead
of control packet flooding is amortized over data
|
|
packets
transmitted between consecutive control packet
|
|
|
floods
|
|