Knowledge

Routing

Source đź“ť

456:
advertised as destination addresses and path descriptions to reach those destinations. The path, expressed in terms of the domains (or confederations) traversed so far, is carried in a special path attribute that records the sequence of routing domains through which the reachability information has passed. A route is defined as a pairing between a destination and the attributes of the path to that destination, thus the name, path-vector routing; The routers receive a vector that contains paths to a set of destinations.
361:.) Each node, on a regular basis, sends to each neighbor node its own current assessment of the total cost to get to all the destinations it knows of. The neighboring nodes examine this information and compare it to what they already know; anything that represents an improvement on what they already have, they insert in their own table. Over time, all the nodes in the network discover the best next hop and total cost for all destinations. 594:
increase throughput. A popular path selection objective is to reduce the average completion times of traffic flows and the total network bandwidth consumption. Recently, a path selection metric was proposed that computes the total number of bytes scheduled on the edges per path as selection metric. An empirical analysis of several path selection metrics, including this new proposal, has been made available.
712:
primarily to BGP's lack of a mechanism to directly optimize for latency, rather than to selfish routing policies. It was also suggested that, were an appropriate mechanism in place, ISPs would be willing to cooperate to reduce latency rather than use hot-potato routing. Such a mechanism was later published by the same authors, first for the case of two ISPs and then for the global case.
188: 174: 744:, routing techniques can be used that aim to optimize global and network-wide performance metrics. This has been used by large internet companies that operate many data centers in different geographical locations attached using private optical links, examples of which include Microsoft's Global WAN, Facebook's Express Backbone, and Google's B4. 202: 160: 455:
The path-vector routing algorithm is similar to the distance vector algorithm in the sense that each border router advertises the destinations it can reach to its neighboring router. However, instead of advertising networks in terms of a destination and the distance to that destination, networks are
131:
are structured and that similar addresses imply proximity within the network. Structured addresses allow a single routing table entry to represent the route to a group of devices. In large networks, structured addressing (routing, in the narrow sense) outperforms unstructured addressing (bridging).
593:
Depending on the application for which path selection is performed, different metrics can be used. For example, for web requests one can use minimum latency paths to minimize web page load time, or for bulk data transfers one can choose the least utilized path to balance load across the network and
585:
A few routing algorithms do not use a deterministic algorithm to find the best link for a packet to get from its original source to its final destination. Instead, to avoid congestion hot spots in packet systems, a few algorithms use a randomized algorithm—Valiant's paradigm—that routes a path to a
975:
To eliminate network hot spots, ... a two phase routing algorithm. This involves every packet being first sent to a randomly chosen intermediate destination; from the intermediate destination it is forwarded to its final destination. This algorithm, referred to as Universal Routing, is designed to
747:
Global performance metrics to optimize include maximizing network utilization, minimizing traffic flow completion times, maximizing the traffic delivered prior to specific deadlines and reducing the completion times of flows. Work on the later over private WAN discusses modeling routing as a graph
640:
protocol that produces a sequence of ASs through which packets flow. Each AS may have multiple paths, offered by neighboring ASs, from which to choose. These routing decisions often correlate with business relationships with these neighboring ASs, which may be unrelated to path quality or latency.
451:
The speaker node creates a routing table and advertises it to neighboring speaker nodes in neighboring autonomous systems. The idea is the same as distance vector routing except that only speaker nodes in each autonomous system can communicate with each other. The speaker node advertises the path,
383:
of the network is the fundamental data used for each node. To produce its map, each node floods the entire network with information about the other nodes it can connect to. Each node then independently assembles this information into a map. Using this map, each router independently determines the
548:
In some small systems, a single central device decides ahead of time the complete path of every packet. In some other small systems, whichever edge device injects a packet into the network decides ahead of time the complete path of that particular packet. In either case, the route-planning device
364:
When a network node goes down, any nodes that used it as their next hop discard the entry and convey the updated routing information to all adjacent nodes, which in turn repeat the process. Eventually, all the nodes in the network receive the updates and discover new paths to all the destinations
641:
Second, once an AS-level path has been selected, there are often multiple corresponding router-level paths to choose from. This is due, in part, because two ISPs may be connected through multiple connections. In choosing the single router-level path, it is common practice for each ISP to employ
602:
In some networks, routing is complicated by the fact that no single entity is responsible for selecting paths; instead, multiple entities are involved in selecting paths or even parts of a single path. Complications or inefficiency can result if these entities choose paths to optimize their own
415:
is the optimized Link State Routing Protocol (OLSR). OLSR is proactive; it uses Hello and Topology Control (TC) messages to discover and disseminate link-state information through the mobile ad hoc network. Using Hello messages, each node discovers 2-hop neighbor information and elects a set of
711:
A 2003 measurement study of Internet routes found that, between pairs of neighboring ISPs, more than 30% of paths have inflated latency due to hot-potato routing, with 5% of paths being delayed by at least 12 ms. Inflation due to AS-level path selection, while substantial, was attributed
569:
In large systems, there are so many connections between devices, and those connections change so frequently, that it is infeasible for any one device to even know how all the devices are connected to each other, much less calculate a complete path through them. Such systems generally use
273:
association where datagrams are routed to any single member of a group of potential receivers that are all identified by the same destination address. The routing algorithm selects the single receiver from the group based on which is the nearest according to some distance or cost
396:
rooted at the current node, such that the path through the tree from the root to any other node is the least-cost path to that node. This tree then serves to construct the routing table, which specifies the best next hop to get from the current node to any other node.
446:
Path-vector routing is used for inter-domain routing. It is similar to distance vector routing. Path-vector routing assumes that one node (there can be many) in each autonomous system acts on behalf of the entire autonomous system. This node is called the
442:
routing. Distance vector routing is subject to instability if there are more than a few hops in the domain. Link state routing needs significant resources to calculate routing tables. It also creates heavy traffic due to flooding.
702:
Additionally, a similar routing challenge can be observed in cellular networks, where different packets are destined for various endpoints, and each link exhibits varying spectral efficiency. In this context, the selection of the
561:
by setting up a path once for the first packet between some source and some destination; later packets between that same source and that same destination continue to follow the same path without recalculating until the circuit
707:
path involves considering latency and packet error rate. To address this, multiple independent entities, one for each base station, play a crucial role in path selection while striving to optimize overall network performance.
556:
In high-speed systems, there are so many packets transmitted every second that it is infeasible for a single device to calculate the complete path for each and every packet. Early high-speed systems dealt with this with
262:
association; datagrams are routed simultaneously in a single transmission to many recipients. Multicast differs from broadcast in that the destination address designates a subset, not necessarily all, of the accessible
544:
A local administrator can set up host-specific routes that provide more control over network usage, permits testing, and better overall security. This is useful for debugging network connections or routing tables.
525:: When comparing route table entries from different sources such as different routing protocols and static configuration, a lower administrative distance indicates a more reliable source and thus a preferred route. 581:
algorithm. When a device chooses a path to a particular final destination, that device always chooses the same path to that destination until it receives information that makes it think some other path is better.
112:. Routing tables maintain a record of the routes to various network destinations. Routing tables may be specified by an administrator, learned by observing network traffic or built with the assistance of 724:
business tools, there has been increased interest in techniques and methods to monitor the routing posture of networks. Incorrect routing or routing issues cause undesirable performance degradation,
312:, allowing the network to act nearly autonomously in avoiding network failures and blockages. Dynamic routing dominates the Internet. Examples of dynamic-routing protocols and algorithms include 353:
When a node first starts, it only knows of its immediate neighbors and the direct cost involved in reaching them. (This information — the list of destinations, the total cost to each, and the
586:
randomly picked intermediate destination, and from there to its true final destination. In many early telephone switches, a randomizer was often used to select the start of a path through a
625:(AGVs) on a terminal, reservations are made for each vehicle to prevent simultaneous use of the same part of an infrastructure. This approach is also referred to as context-aware routing. 549:
needs to know a lot of information about what devices are connected to the network and how they are connected to each other. Once it has this information, it can use an algorithm such as
748:
optimization problem by pushing all the queuing to the end-points. The authors also propose a heuristic to solve the problem efficiently while sacrificing negligible performance.
699:
the work of sending it along an expensive trans-Atlantic link, but causes the message to experience latency 125 ms when the other route would have been 20 ms faster.
517:: When comparing routes learned via the same routing protocol, a lower metric is preferred. Metrics cannot be compared between routes learned from different routing protocols. 502:
In case of overlapping or equal routes, algorithms consider the following elements in priority order to decide which routes to install into the routing table:
244:. The network automatically replicates datagrams as needed to reach all the recipients within the scope of the broadcast, which is generally an entire network 645:: sending traffic along the path that minimizes the distance through the ISP's own network—even if that path lengthens the total distance to the destination. 1548: 1662: 1622: 321: 346:
number to each of the links between each node in the network. Nodes send information from point A to point B via the path that results in the lowest
1502: 938: 606:
A classic example involves traffic in a road system, in which each driver picks a path that minimizes their travel time. With such routing, the
1037: 1636: 1591: 1467: 1448: 1429: 1400: 1369: 1350: 773: 406: 1490: 636:(ISPs), each of which controls routes involving its network. Routing occurs at multiple levels. First, AS-level paths are selected via the 1203: 1484: 967: 1231:
Noormohammadpour, Mohammad; Raghavendra, Cauligi (16 July 2018). "Datacenter Traffic Control: Understanding Techniques and Tradeoffs".
1678: 1618: 1414: 1383: 1189: 295: 51: 842:"Tabu search algorithm for routing, modulation and spectrum allocation in elastic optical network with anycast and unicast traffic" 438:, but not between autonomous systems. Both of these routing protocols become intractable in large networks and cannot be used in 333: 1217: 566:. Later high-speed systems inject packets into the network without any one device ever calculating a complete path for packets. 1657: 237: 1709: 541:
to each route, where smaller administrative distances indicate routes learned from a protocol assumed to be more reliable.
509:: A matching route table entry with a longer subnet mask is always preferred as it specifies the destination more exactly. 473: 1601: 1165:
An Efficient Security Way of Authentication and Pair wise Key Distribution with Mobile Sinks in Wireless Sensor Networks
629: 435: 429: 380: 313: 90: 78: 468:
to multiple routes to select (or predict) the best route. Most routing algorithms use only one network path at a time.
278:
Unicast is the dominant form of message delivery on the Internet. This article focuses on unicast routing algorithms.
741: 374: 222:
association between a sender and destination: each destination address uniquely identifies a single receiver endpoint.
1541: 1112: 1052:
In R.R. Negenborn and Z. Lukszo and H. Hellendoorn (Eds.) Intelligent Infrastructures, Ch. 14, pp. 355–382. Springer.
339: 1534: 990:"Poster Abstract: Minimizing Flow Completion Times using Adaptive Routing over Inter-Datacenter Wide Area Networks" 1683: 1628: 633: 563: 492: 225: 173: 168: 1146: 1129: 671:
connected by a 5 ms link. Suppose both ISPs have trans-Atlantic links that connect their two networks, but
529:
Because a routing metric is specific to a given routing protocol, multi-protocol routers must use some external
294:
that can change rapidly, making the manual construction of routing tables unfeasible. Nevertheless, most of the
1652: 1596: 819: 798: 622: 317: 47: 31: 740:
In networks where a logically centralized control is available over the forwarding state, for example, using
308:
attempts to solve this problem by constructing routing tables automatically, based on information carried by
1581: 758: 538: 521: 389: 298:(PSTN) uses pre-computed routing tables, with fallback routes if the most direct route becomes blocked (see 105:
also forward packets and perform routing, although they have no specially optimized hardware for the task.
46:
or between or across multiple networks. Broadly, routing is performed in many types of networks, including
1168: 479:
In computer networking, the metric is computed by a routing algorithm, and can cover information such as
132:
Routing has become the dominant form of addressing on the Internet. Bridging is still widely used within
480: 434:
Distance vector and link-state routing are both intra-domain routing protocols. They are used inside an
412: 124: 269:
delivers a message to any one out of a group of nodes, typically the one nearest to the source using a
1079: 841: 1509: 1299: 929: 928:
Michael Mitzenmacher; Andréa W. Richa; Ramesh Sitaraman, "Randomized Protocols for Circuit Routing",
804: 778: 513: 495:, reliability, and communication cost. The routing table stores only the best possible routes, while 254:
delivers a message to a group of nodes that have expressed interest in receiving the message using a
94: 1044: 1173: 814: 611: 550: 299: 1013:"Minimizing Flow Completion Times using Adaptive Routing over Inter-Datacenter Wide Area Networks" 1494: 1315: 1289: 1258: 1240: 788: 768: 763: 642: 133: 86: 1091: 1463: 1444: 1425: 1410: 1396: 1379: 1365: 1346: 1087: 956: 861: 793: 558: 469: 241: 74: 1080:
Multi-agent reinforcement learning for network routing in integrated access backhaul networks
1704: 1571: 1557: 1307: 1250: 1095: 1062: 1016: 993: 887: 853: 809: 721: 607: 571: 309: 291: 113: 82: 55: 957:"The IEEE 1355 Standard: Developments, Performance and Application in High Energy Physics" 903:
Baumann, Rainer; Heimlicher, Simon; Strasser, Mario; Weibel, Andreas (February 10, 2007),
729: 578: 305: 290:, small networks may use manually configured routing tables. Larger networks have complex 240:) from one sender is routed to all of the possibly multiple endpoints associated with the 128: 1303: 1066: 725: 465: 385: 287: 98: 66: 65:
In packet switching networks, routing is the higher-level decision making that directs
43: 1698: 1277: 1012: 989: 783: 657: 484: 109: 1319: 1262: 1036:
Zutt, Jonne; van Gemund, Arjan J.C.; de Weerdt, Mathijs M.; Witteveen, Cees (2010).
1576: 452:
not the metric, of the nodes in its autonomous system or other autonomous systems.
439: 70: 1390: 997: 857: 1099: 1021: 891: 663: 587: 30:
This article is about routing in packet switching networks. For other uses, see
1311: 1254: 904: 1338: 1276:
Noormohammadpour, Mohammad; Srivastava, Ajitesh; Raghavendra, Cauligi (2018).
496: 393: 245: 120: 1407: 1376: 1069:". IEEE Network Magazine, special issue on Interdomain Routing, Nov/Dec 2005. 865: 1278:"On Minimizing the Completion Times of Long Flows over Inter-Datacenter WAN" 530: 488: 251: 187: 182: 603:
objectives, which may conflict with the objectives of other participants.
233: 102: 59: 840:
Goścień, Róża; Walkowiak, Krzysztof; Klinkowski, Mirosław (2015-03-14).
17: 1116: 420:(MPRs). MPRs distinguish OLSR from other link-state routing protocols. 266: 215: 201: 196: 159: 154: 1632: 668: 1526: 976:
maximize capacity and minimize delay under conditions of heavy load.
679:'s has latency 120 ms. When routing a message from a source in 1294: 1245: 931:
The Power of Two Random Choices: A Survey of Techniques and Results
533:
to select between routes learned from different routing protocols.
1586: 1163:
Santhi, P.; Ahmed, Md Shakeel; Mehertaj, Sk; Manohar, T. Bharath.
610:
routes can be longer than optimal for all drivers. In particular,
534: 499:
or topological databases may store all other information as well.
384:
least-cost path from itself to every other node using a standard
350:(i.e. the sum of the costs of the links between the nodes used). 1150: 1133: 69:
from their source toward their destination through intermediate
1530: 728:
or downtime. Monitoring routing in a network is achieved using
108:
The routing process usually directs forwarding on the basis of
637: 1204:"Building Express Backbone: Facebook's new long-haul network" 1038:"Dealing with Uncertainty in Operational Transport Planning" 1190:"How Microsoft builds its fast and reliable global network" 357:
to send data to get there — makes up the routing table, or
27:
Process of selecting paths in a data communications network
119:
Routing, in a narrower sense of the term, often refers to
1460:
Network Routing: Algorithms, Protocols, and Architectures
476:
techniques enable the use of multiple alternative paths.
621:
In a single-agent model used, for example, for routing
228:
delivers a message to all nodes in the network using a
1128:
Ratul Mahajan, David Wetherall, and Thomas Anderson. "
1458:
Medhi, Deepankar & Ramasamy, Karthikeyan (2007).
1145:
Ratul Mahajan, David Wetherall, and Thomas Anderson.
988:
Noormohammadpour, M.; Raghavendra, C. S. (Apr 2018).
537:
routers, for example, attribute a value known as the
218:
delivers a message to a single specific node using a
211:
Routing schemes differ in how they deliver messages:
1011:
Noormohammadpour, M; Raghavendra, C. S. (Apr 2018).
42:
is the process of selecting a path for traffic in a
1671: 1645: 1610: 1564: 1130:Negotiation-Based Routing Between Neighboring ISPs 1111:Neil Spring, Ratul Mahajan, and Thomas Anderson. " 1147:Mutually Controlled Routing with Independent ISPs 1499:, ways of avoiding the count-to-infinity problem 1439:Kurose, James E. & Ross, Keith W. (2004). 691:may choose to immediately send the message to 81:to another. Intermediate nodes are typically 1542: 1343:Dynamic Routing in Telecommunication Networks 411:A link-state routing algorithm optimized for 8: 1389:Doyle, Jeff & Carroll, Jennifer (2001). 1360:Doyle, Jeff & Carroll, Jennifer (2005). 720:As the Internet and IP networks have become 77:is the transit of network packets from one 1549: 1535: 1527: 1218:"Inside Google's Software-Defined Network" 322:Enhanced Interior Gateway Routing Protocol 73:by specific packet forwarding mechanisms. 1293: 1244: 1233:IEEE Communications Surveys and Tutorials 1172: 1020: 1113:Quantifying the Causes of Path Inflation 660:, connected by a fast link with latency 832: 379:When applying link-state algorithms, a 683:'s London network to a destination in 401:Optimized Link State Routing algorithm 774:Edge disjoint shortest pair algorithm 407:Optimized Link State Routing Protocol 147: 7: 1078:Shahaf Yamin and Haim H. Permuter. " 1067:BGP routing policies in ISP networks 675:'s link has latency 100 ms and 1362:Routing TCP/IP, Volume I, Second Ed 973:from the original on May 16, 2019, 464:Path selection involves applying a 365:that do not involve the down node. 338:Distance vector algorithms use the 1422:Routing in the Internet, Second Ed 1188:Khalidi, Yousef (March 15, 2017). 25: 944:from the original on Dec 13, 2023 628:The Internet is partitioned into 614:shows that adding a new road can 577:Most systems use a deterministic 296:public switched telephone network 52:public switched telephone network 648:For example, consider two ISPs, 334:Distance-vector routing protocol 200: 186: 172: 158: 618:travel times for all drivers. 1: 1441:Computer Networking, Third Ed 474:equal-cost multi-path routing 1086:, Volume 153, 2024, 103347, 998:10.1109/INFCOMW.2018.8406853 858:10.1016/j.comnet.2014.12.004 667:—and each has a presence in 430:Path-vector routing protocol 314:Routing Information Protocol 1505:about Routing and Switching 1420:Huitema, Christian (2000). 1282:IEEE Communications Letters 1100:10.1016/j.adhoc.2023.103347 1022:10.13140/RG.2.2.36009.90720 906:A Survey on Routing Metrics 742:software-defined networking 588:multistage switching fabric 375:Link-state routing protocol 1726: 1312:10.1109/LCOMM.2018.2872980 1255:10.1109/COMST.2017.2782753 634:internet service providers 427: 404: 372: 342:. This approach assigns a 331: 328:Distance vector algorithms 127:. IP routing assumes that 29: 1485:Count-To-Infinity Problem 1392:Routing TCP/IP, Volume II 1025:– via ResearchGate. 1000:– via ResearchGate. 656:. Each has a presence in 623:automated guided vehicles 493:maximum transmission unit 48:circuit-switched networks 1510:"IP Routing and Subnets" 820:Turn restriction routing 799:Path computation element 318:Open Shortest Path First 32:Routing (disambiguation) 759:Black hole (networking) 553:to find the best path. 539:administrative distance 522:Administrative distance 123:and is contrasted with 732:tools and techniques. 695:in London. This saves 413:mobile ad hoc networks 340:Bellman–Ford algorithm 232:association; a single 1710:Internet architecture 1503:Cisco IT Case Studies 1443:. Benjamin/Cummings. 687:'s New York network, 369:Link-state algorithms 282:Topology distribution 1491:"Stability Features" 955:Stefan Haas (1998), 805:Policy-based routing 779:Flood search routing 424:Path-vector protocol 390:Dijkstra's algorithm 260:many-to-many-of-many 1462:. Morgan Kaufmann. 1304:2018arXiv181000169N 1061:Matthew Caesar and 815:Small-world routing 736:Centralized routing 551:A* search algorithm 491:, path cost, load, 300:routing in the PSTN 256:one-to-many-of-many 134:local area networks 1514:www.eventhelix.com 789:Geographic routing 769:Deflection routing 764:Collective routing 643:hot-potato routing 630:autonomous systems 392:. The result is a 388:algorithm such as 271:one-to-one-of-many 101:. General-purpose 1692: 1691: 1558:Routing protocols 1469:978-0-12-088588-6 1450:978-0-321-22735-5 1431:978-0-321-22735-5 1424:. Prentice–Hall. 1402:978-1-57870-089-9 1371:978-1-58705-202-6 1352:978-0-07-006414-0 1288:(12): 2475–2478. 846:Computer Networks 794:Heuristic routing 559:circuit switching 472:and specifically 470:Multipath routing 436:autonomous system 418:multipoint relays 310:routing protocols 242:broadcast address 209: 208: 129:network addresses 114:routing protocols 79:network interface 75:Packet forwarding 56:computer networks 16:(Redirected from 1717: 1551: 1544: 1537: 1528: 1523: 1521: 1520: 1498: 1493:. Archived from 1473: 1454: 1435: 1406: 1375: 1356: 1324: 1323: 1297: 1273: 1267: 1266: 1248: 1239:(2): 1492–1525. 1228: 1222: 1221: 1214: 1208: 1207: 1200: 1194: 1193: 1185: 1179: 1178: 1176: 1160: 1154: 1143: 1137: 1126: 1120: 1109: 1103: 1076: 1070: 1063:Jennifer Rexford 1059: 1053: 1051: 1050:on Sep 22, 2017. 1049: 1043:. Archived from 1042: 1033: 1027: 1026: 1024: 1008: 1002: 1001: 985: 979: 978: 972: 961: 952: 946: 945: 943: 936: 925: 919: 918: 917: 916: 911: 900: 894: 885: 879: 876: 870: 869: 837: 810:Wormhole routing 722:mission critical 666: 612:Braess's paradox 204: 190: 176: 162: 144: 143: 140:Delivery schemes 85:devices such as 83:network hardware 21: 1725: 1724: 1720: 1719: 1718: 1716: 1715: 1714: 1695: 1694: 1693: 1688: 1667: 1646:Special-purpose 1641: 1606: 1560: 1555: 1518: 1516: 1508: 1489: 1481: 1476: 1470: 1457: 1451: 1438: 1432: 1419: 1403: 1395:. Cisco Press. 1388: 1372: 1364:. Cisco Press. 1359: 1353: 1345:. McGraw–Hill. 1337: 1333: 1331:Further reading 1328: 1327: 1275: 1274: 1270: 1230: 1229: 1225: 1220:. May 14, 2017. 1216: 1215: 1211: 1202: 1201: 1197: 1187: 1186: 1182: 1162: 1161: 1157: 1144: 1140: 1127: 1123: 1110: 1106: 1084:Ad Hoc Networks 1077: 1073: 1060: 1056: 1047: 1040: 1035: 1034: 1030: 1010: 1009: 1005: 987: 986: 982: 970: 959: 954: 953: 949: 941: 934: 927: 926: 922: 914: 912: 909: 902: 901: 897: 886: 882: 877: 873: 839: 838: 834: 829: 824: 754: 738: 730:route analytics 718: 716:Route analytics 661: 600: 598:Multiple agents 579:dynamic routing 462: 432: 426: 409: 403: 377: 371: 336: 330: 306:Dynamic routing 284: 148:Routing schemes 142: 67:network packets 35: 28: 23: 22: 15: 12: 11: 5: 1723: 1721: 1713: 1712: 1707: 1697: 1696: 1690: 1689: 1687: 1686: 1681: 1675: 1673: 1669: 1668: 1666: 1665: 1660: 1655: 1649: 1647: 1643: 1642: 1640: 1639: 1625: 1614: 1612: 1608: 1607: 1605: 1604: 1599: 1594: 1589: 1584: 1579: 1574: 1568: 1566: 1562: 1561: 1556: 1554: 1553: 1546: 1539: 1531: 1525: 1524: 1506: 1500: 1497:on 2015-09-25. 1487: 1480: 1479:External links 1477: 1475: 1474: 1468: 1455: 1449: 1436: 1430: 1417: 1401: 1386: 1370: 1357: 1351: 1334: 1332: 1329: 1326: 1325: 1268: 1223: 1209: 1206:. May 1, 2017. 1195: 1180: 1174:10.1.1.392.151 1155: 1138: 1121: 1104: 1071: 1054: 1028: 1003: 980: 966:, p. 15, 947: 937:, p. 34, 920: 895: 880: 871: 831: 830: 828: 825: 823: 822: 817: 812: 807: 802: 796: 791: 786: 781: 776: 771: 766: 761: 755: 753: 750: 737: 734: 717: 714: 632:(ASs) such as 599: 596: 527: 526: 518: 510: 466:routing metric 461: 460:Path selection 458: 428:Main article: 425: 422: 405:Main article: 402: 399: 386:shortest paths 373:Main article: 370: 367: 359:distance table 332:Main article: 329: 326: 288:static routing 283: 280: 276: 275: 264: 249: 223: 207: 206: 193: 192: 179: 178: 165: 164: 151: 150: 141: 138: 110:routing tables 58:, such as the 50:, such as the 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1722: 1711: 1708: 1706: 1703: 1702: 1700: 1685: 1682: 1680: 1677: 1676: 1674: 1670: 1664: 1661: 1659: 1656: 1654: 1651: 1650: 1648: 1644: 1638: 1634: 1630: 1626: 1624: 1620: 1616: 1615: 1613: 1611:Vendor-driven 1609: 1603: 1600: 1598: 1595: 1593: 1590: 1588: 1585: 1583: 1580: 1578: 1575: 1573: 1570: 1569: 1567: 1563: 1559: 1552: 1547: 1545: 1540: 1538: 1533: 1532: 1529: 1515: 1511: 1507: 1504: 1501: 1496: 1492: 1488: 1486: 1483: 1482: 1478: 1471: 1465: 1461: 1456: 1452: 1446: 1442: 1437: 1433: 1427: 1423: 1418: 1416: 1415:1-57870-089-2 1412: 1409: 1404: 1398: 1394: 1393: 1387: 1385: 1384:1-58705-202-4 1381: 1378: 1373: 1367: 1363: 1358: 1354: 1348: 1344: 1340: 1336: 1335: 1330: 1321: 1317: 1313: 1309: 1305: 1301: 1296: 1291: 1287: 1283: 1279: 1272: 1269: 1264: 1260: 1256: 1252: 1247: 1242: 1238: 1234: 1227: 1224: 1219: 1213: 1210: 1205: 1199: 1196: 1191: 1184: 1181: 1175: 1170: 1166: 1159: 1156: 1152: 1148: 1142: 1139: 1135: 1131: 1125: 1122: 1118: 1114: 1108: 1105: 1101: 1097: 1093: 1089: 1085: 1081: 1075: 1072: 1068: 1064: 1058: 1055: 1046: 1039: 1032: 1029: 1023: 1018: 1014: 1007: 1004: 999: 995: 991: 984: 981: 977: 969: 965: 958: 951: 948: 940: 933: 932: 924: 921: 908: 907: 899: 896: 893: 889: 884: 881: 875: 872: 867: 863: 859: 855: 851: 847: 843: 836: 833: 826: 821: 818: 816: 813: 811: 808: 806: 803: 800: 797: 795: 792: 790: 787: 785: 784:Fuzzy routing 782: 780: 777: 775: 772: 770: 767: 765: 762: 760: 757: 756: 751: 749: 745: 743: 735: 733: 731: 727: 723: 715: 713: 709: 706: 700: 698: 694: 690: 686: 682: 678: 674: 670: 665: 659: 655: 651: 646: 644: 639: 635: 631: 626: 624: 619: 617: 613: 609: 604: 597: 595: 591: 589: 583: 580: 575: 573: 567: 565: 560: 554: 552: 546: 542: 540: 536: 532: 524: 523: 519: 516: 515: 511: 508: 507:Prefix length 505: 504: 503: 500: 498: 494: 490: 486: 485:network delay 482: 477: 475: 471: 467: 459: 457: 453: 450: 449:speaker node. 444: 441: 437: 431: 423: 421: 419: 414: 408: 400: 398: 395: 391: 387: 382: 381:graphical map 376: 368: 366: 362: 360: 356: 351: 349: 345: 341: 335: 327: 325: 323: 319: 315: 311: 307: 303: 301: 297: 293: 289: 281: 279: 272: 268: 265: 261: 257: 253: 250: 247: 243: 239: 235: 231: 227: 224: 221: 217: 214: 213: 212: 205: 203: 198: 195: 194: 191: 189: 184: 181: 180: 177: 175: 170: 167: 166: 163: 161: 156: 153: 152: 149: 146: 145: 139: 137: 135: 130: 126: 122: 117: 115: 111: 106: 104: 100: 96: 92: 88: 84: 80: 76: 72: 71:network nodes 68: 63: 61: 57: 53: 49: 45: 41: 37: 33: 19: 1577:B.A.T.M.A.N. 1517:. Retrieved 1513: 1495:the original 1459: 1440: 1421: 1391: 1361: 1342: 1285: 1281: 1271: 1236: 1232: 1226: 1212: 1198: 1183: 1164: 1158: 1141: 1124: 1107: 1083: 1074: 1057: 1045:the original 1031: 1006: 983: 974: 963: 950: 930: 923: 913:, retrieved 905: 898: 883: 874: 849: 845: 835: 746: 739: 719: 710: 704: 701: 696: 692: 688: 684: 680: 676: 672: 653: 649: 647: 627: 620: 615: 605: 601: 592: 584: 576: 568: 555: 547: 543: 528: 520: 512: 506: 501: 478: 463: 454: 448: 445: 440:inter-domain 433: 417: 410: 378: 363: 358: 354: 352: 347: 343: 337: 304: 285: 277: 270: 259: 255: 229: 219: 210: 199: 185: 171: 157: 118: 107: 64: 54:(PSTN), and 39: 38: 36: 1339:Ash, Gerald 852:: 148–165. 608:equilibrium 320:(OSPF) and 1699:Categories 1519:2018-04-28 1408:Ciscopress 1377:Ciscopress 1295:1810.00169 1246:1712.03530 915:2020-05-04 827:References 497:link-state 394:tree graph 348:total cost 292:topologies 230:one-to-all 220:one-to-one 121:IP routing 1627:(Nortel) 1169:CiteSeerX 1132:". Proc. 1115:". Proc. 1092:1570-8705 866:1389-1286 574:routing. 531:heuristic 489:hop count 481:bandwidth 324:(EIGRP). 252:Multicast 226:Broadcast 183:Multicast 169:Broadcast 103:computers 95:firewalls 1617:(Cisco) 1341:(1997). 1320:52898719 1263:28143006 1149:. Proc. 968:archived 939:archived 878:RFC 3626 752:See also 726:flapping 658:New York 616:lengthen 572:next-hop 564:teardown 355:next hop 274:measure. 234:datagram 125:bridging 99:switches 91:gateways 60:Internet 18:Routable 1705:Routing 1672:Defunct 1565:General 1300:Bibcode 1117:SIGCOMM 964:INSPIRE 705:optimal 662:5  316:(RIP), 267:Anycast 216:Unicast 197:Anycast 155:Unicast 87:routers 44:network 40:Routing 1633:R-SMLT 1466:  1447:  1428:  1413:  1399:  1382:  1368:  1349:  1318:  1261:  1171:  1090:  890:  864:  669:London 514:Metric 263:nodes. 246:subnet 238:packet 1663:DVMRP 1637:DSMLT 1623:EIGRP 1587:IS-IS 1572:Babel 1316:S2CID 1290:arXiv 1259:S2CID 1241:arXiv 1153:2007. 1136:2005. 1119:2003. 1048:(PDF) 1041:(PDF) 971:(PDF) 960:(PDF) 942:(PDF) 935:(PDF) 910:(PDF) 801:(PCE) 535:Cisco 286:With 97:, or 1679:BGMP 1658:CSPF 1629:SMLT 1619:IGRP 1597:OSPF 1592:OLSR 1464:ISBN 1445:ISBN 1426:ISBN 1411:ISBN 1397:ISBN 1380:ISBN 1366:ISBN 1347:ISBN 1151:NSDI 1134:NSDI 1088:ISSN 892:1322 862:ISSN 652:and 344:cost 236:(or 1684:EGP 1653:CTP 1602:RIP 1582:BGP 1308:doi 1251:doi 1096:doi 1082:". 1065:. " 1017:doi 994:doi 888:RFC 854:doi 638:BGP 302:). 258:or 1701:: 1635:/ 1631:/ 1621:/ 1512:. 1314:. 1306:. 1298:. 1286:22 1284:. 1280:. 1257:. 1249:. 1237:20 1235:. 1167:. 1094:, 1015:. 992:. 962:, 860:. 850:79 848:. 844:. 664:ms 590:. 487:, 483:, 136:. 116:. 93:, 89:, 62:. 1550:e 1543:t 1536:v 1522:. 1472:. 1453:. 1434:. 1405:. 1374:. 1355:. 1322:. 1310:: 1302:: 1292:: 1265:. 1253:: 1243:: 1192:. 1177:. 1102:. 1098:: 1019:: 996:: 868:. 856:: 697:A 693:B 689:A 685:B 681:A 677:B 673:A 654:B 650:A 248:. 34:. 20:)

Index

Routable
Routing (disambiguation)
network
circuit-switched networks
public switched telephone network
computer networks
Internet
network packets
network nodes
Packet forwarding
network interface
network hardware
routers
gateways
firewalls
switches
computers
routing tables
routing protocols
IP routing
bridging
network addresses
local area networks
Routing schemes
Unicast

Broadcast

Multicast

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑