Fact-checked by Grok 2 weeks ago

IP routing

IP routing is the process of selecting paths for data packets across IP networks, enabling communication between devices on different subnets by forwarding packets through intermediate routers based on IP addresses and routing tables. It operates at the network layer (Layer 3) of the , using the (IP) to encapsulate data into datagrams that include source and destination addresses for logical addressing and routing decisions. This mechanism ensures efficient packet delivery across local area networks (LANs), wide area networks (WANs), and the global by determining optimal or feasible paths while managing and failures. At its core, IP routing relies on routing tables maintained by routers, which map destination IP addresses or networks to next-hop interfaces or addresses, consulted for each packet's forwarding decision. These tables can be populated statically through manual configuration for small, stable networks or dynamically via routing protocols that exchange topology information to adapt to changes in real-time. Static routing is simple and secure but lacks scalability, whereas dynamic routing uses algorithms like distance-vector (e.g., measuring hop count) or link-state (e.g., building a map) to compute paths based on metrics such as , delay, or reliability. Key protocols define IP routing's implementation: Interior Gateway Protocols (IGPs) like Routing Information Protocol (RIP), which employs a distance-vector approach with a maximum 15-hop limit for small networks, and , a link-state protocol offering fast convergence and scalability for enterprise environments. Enhanced IGPs such as Enhanced Interior Gateway Routing Protocol (EIGRP) provide advanced features like unequal-cost load balancing for Cisco networks, while Intermediate System to Intermediate System (IS-IS), a link-state protocol that runs directly over the , supports large-scale ISP backbones. For inter-domain routing across autonomous systems, Border Gateway Protocol (BGP) serves as the de facto standard, using path-vector attributes to manage global Internet traffic and policy enforcement. Historically, IP routing evolved from the ARPANET's packet-switching foundations in the late 1960s, with TCP/IP standardization in 1983 marking the Internet's birth and enabling scalable routing across heterogeneous networks. Early protocols like , formalized in 1988, laid the groundwork for , while BGP's development addressed the Internet's explosive growth in the . Today, IP routing underpins the Internet's resilience, supporting billions of devices through advancements like segment routing and , yet it faces challenges in security, scalability, and transition.

Fundamentals

Definition and Purpose

IP routing is the process by which routers forward datagrams from a source to a destination across interconnected , determining the next-hop based on the destination through a lookup in a routing database or (FIB). This mechanism operates at the network layer (Layer 3) of the , enabling packets to traverse multiple hops without requiring end-to-end visibility between sender and receiver. Routers perform this forwarding by examining the of incoming datagrams and selecting the from the to identify the appropriate output and next-hop . The primary purpose of IP routing is to facilitate scalable by dividing the global into autonomous systems (ASes), which are collections of IP networks and routers under a single administrative control with a unified policy. Each AS manages internal independently while exchanging information with other ASes to enable packet traversal across administrative boundaries, thus supporting the Internet's hierarchical and distributed architecture without centralized control. This approach allows for efficient resource utilization and policy enforcement, as routers within an AS can optimize paths locally while inter-AS ensures global connectivity. Key components include routers, which act as gateways interconnecting networks, and the , containing 32-bit source and destination address fields essential for routing decisions, along with fields like () to prevent infinite loops. Unlike Layer 2 switching, which forwards frames based on addresses within a single , IP routing uses logical addresses to direct packets across diverse network types and topologies. Routing protocols may be employed to dynamically populate and update the routing tables that support these forwarding decisions. For example, consider a simple where two local area networks (s) are connected via a gateway router: a on the first sends an to a destination on the second by addressing it to the remote host's ; the source host's (the router) receives the packet, performs a table lookup on the destination to select the interface toward the second , decrements the , and forwards the , enabling communication across the networks.

Historical Development

The roots of IP routing trace back to the 1960s development of the , a pioneering packet-switched network funded by the U.S. Department of Defense's Advanced Research Projects Agency (ARPA). In 1969, Bolt, Beranek and Newman (BBN) was contracted to build the network's Interface Message Processors (IMPs), which functioned as the first operational packet routers by handling between hosts and the communications subnet using the ARPANET protocol. These IMPs implemented initial routing concepts, enabling store-and-forward delivery across leased lines connecting up to four hosts per site. A major milestone occurred on January 1, 1983 (known as ), when ARPANET transitioned from the Network Control Program (NCP) to /IP, operationalizing IP-based routing across the network. The formal introduction of the Internet Protocol (IP) in 1981 marked a pivotal shift, as defined in RFC 791, which established IP as a connectionless protocol for datagram transmission across interconnected networks, necessitating robust routing mechanisms for end-to-end delivery. This era saw the adoption of classful addressing in the early 1980s, dividing the IPv4 space into fixed classes (A, B, C) to simplify initial routing hierarchies, though it later contributed to inefficiencies. Early routing protocols emerged to support this, including the Routing Information Protocol (RIP) standardized in 1988 via RFC 1058, a distance-vector protocol for exchanging routing information within local networks using hop count as the primary metric. Concurrently, inter-domain routing advanced with the Border Gateway Protocol (BGP) in RFC 1105 (1989), designed for path-vector exchanges between autonomous systems (ASes) to handle policy-based decisions beyond simple distance. BGP evolved significantly, with BGP-4 (RFC 1654, 1994) introducing support for classless inter-domain routing (CIDR) to enable route aggregation and scalability, and RFC 4271 (2006) providing an updated specification for clarity and enhancements. The formation of the (IETF) in 1986 provided a collaborative framework for standardizing these developments, evolving from ARPA-funded meetings into the primary body for protocols. The 1990s brought commercialization and explosive growth, straining the classful model and leading to address exhaustion; this prompted the shift to (CIDR) in RFC 1519 (1993), which enabled address aggregation and hierarchical routing to conserve space and curb explosion. Hierarchical routing, combining CIDR with AS-level BGP, addressed scale issues from the 's expansion into a commercial ecosystem, allowing providers to summarize routes efficiently. To extend addressing amid ongoing exhaustion, development began in 1995 with RFC 1883 outlining its 128-bit structure, culminating in RFC 2460 (1998) as the core specification for next-generation IP routing. By the late , around the era, concerns mounted over growth—from a few thousand entries in the early to nearly 100,000 by 2000—driven by deaggregation and multi-homing, though CIDR mitigated worse-case projections to sizes nearing a million for IPv4 as of 2025.

IP Addressing Foundations

IP Addresses and Prefixes

IP addresses serve as unique identifiers for devices on a network, enabling the routing of packets across the (IP) infrastructure. In IPv4, addresses are 32-bit numbers, typically represented in dotted decimal notation, such as 192.168.1.1, where each octet (8 bits) is converted to a decimal value from 0 to 255 and separated by periods. This format facilitates human readability while maintaining the binary structure essential for efficient processing by network hardware. The IPv4 is divided into a network portion, which identifies the overall , and a host portion, which specifies individual devices within that . Initially, from 1981 to 1993, IP addressing employed a classful system that categorized addresses into classes based on the leading bits, determining the split between network and host fields. Class A addresses, identified by a leading 0 bit, allocate 7 bits to the network (supporting 126 networks from 1.0.0.0 to 126.0.0.0) and 24 bits to the host, allowing up to 16,777,214 hosts per network. Class B addresses, with leading bits 10, use 14 bits for the network (ranges 128.0.0.0 to 191.255.255.255) and 16 bits for the host, supporting 65,534 hosts. Class C addresses, starting with 110, dedicate 21 bits to the network (192.0.0.0 to 223.255.255.255) and 8 bits to the host, accommodating 254 hosts per network. This classful approach, defined in the original IP specification, provided a fixed hierarchy but was later superseded by more flexible methods to address address exhaustion. Prefixes extend the classful model by specifying the length of the network portion in bits, using slash notation such as 192.168.1.0/24, where /24 indicates the first 24 bits define the identifier. This notation allows for variable-length network boundaries, enabling routers to aggregate multiple contiguous networks into a single route entry, thereby reducing the size of tables and improving . For instance, a /16 prefix can represent 256 /24 networks, minimizing the number of entries needed for backbone routers. Subnet masks complement prefixes by providing a binary template to delineate network bits from host bits, often expressed in dotted decimal like 255.255.255.0, which corresponds to a /24 prefix (binary: 11111111.11111111.11111111.00000000). To determine if a destination IP belongs to the local network, a router performs a bitwise AND operation between the destination address and the subnet mask, yielding the network prefix:
network_prefix = destination_IP AND subnet_mask
This operation extracts the network portion for comparison against routing entries, ensuring accurate forwarding decisions. As IPv4 address space became depleted, IPv6 was developed with 128-bit addresses to vastly expand the available identifiers, represented in hexadecimal notation with colons separating eight 16-bit groups, such as 2001:db8::1. Prefixes in IPv6 follow a similar /n convention, like 2001:db8::/32, but leverage the larger structure for hierarchical allocation without delving into full mechanics here.

Subnetting and CIDR

Subnetting divides an network into smaller subnetworks by reallocating bits from the host portion of the address to extend the network portion, thereby creating multiple logical networks within a single allocated block. This technique, formalized in RFC 950 in 1985, improves address efficiency and reduces broadcast domains without requiring additional public IP allocations. For instance, a Class C network with a /24 prefix (255.255.255.0 mask, providing 254 usable hosts) can be subnetted to /26 (255.255.255.192 mask) by borrowing 2 bits, resulting in 4 subnets each supporting 62 usable hosts (2^6 - 2 addresses per subnet, excluding network and broadcast). Variable Length Subnet Masks (VLSM) extend subnetting by permitting subnets of varying sizes within the same major , overcoming the limitations of fixed subnet masks and enabling tailored allocation based on host requirements. Standardized in RFC 1878 in 1995, VLSM supports hierarchical addressing where smaller subnets use longer masks for efficiency. An example derivation from a /16 (65,534 usable hosts) to /20 subnets borrows 4 bits, yielding 16 subnets each with 4,094 usable hosts (2^{12} - 2 addresses per subnet). Classless Inter-Domain Routing (CIDR), introduced in 1519 in 1993, supplants rigid classful addressing with flexible prefix lengths to aggregate routes and conserve IPv4 space amid rapid growth. CIDR notation, such as /23, specifies the network prefix length directly, allowing summarization of contiguous blocks; for example, the prefixes 192.168.0.0/24 and 192.168.1.0/24 merge into 192.168.0.0/23 if they cover sequential address ranges without gaps. Aggregation rules require prefixes to be adjacent in representation and of compatible lengths, ensuring the supernet encompasses all child networks exactly. CIDR's implementation conserved IPv4 addresses by enabling variable allocation, delaying exhaustion by an estimated three to five years from the early projections. It also curbed the exponential growth of the global BGP routing table, which had reached thousands of entries by through classful allocations, by promoting prefix aggregation to limit unique announcements. In BGP, autonomous systems announce CIDR prefixes along AS paths, facilitating scalable inter-domain routing.

Routing Protocols

Classification

IP routing protocols are classified primarily by their scope of operation into two main categories: Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs). IGPs operate within a single autonomous system (AS), such as an organization's internal network, where routers exchange information under the assumption of trust among participants to efficiently compute paths for intra-domain traffic. EGPs, in contrast, enable between multiple ASes, such as those managed by different Internet service providers, incorporating policy-based decisions to manage scalability and interactions across potentially untrusted administrative domains. The original EGP, formally specified in 1984 for exchanging between AS gateways, became obsolete due to limitations in supporting modern network growth and was replaced by BGP as the for inter-AS . In addition to scope, protocols are categorized by their algorithmic type, which determines how they exchange and compute . Distance-vector protocols rely on routers periodically their tables with neighbors, using metrics like to select paths, which promotes simplicity but can lead to slower in large networks. Link-state protocols flood detailed link status updates across the AS to construct a database, enabling faster recomputation of optimal paths based on global network knowledge. Path-vector protocols extend the distance-vector approach by including the sequence of traversed ASes in advertisements, primarily to detect and avoid loops in inter-domain environments. Hybrid protocols, such as EIGRP, integrate distance-vector table with link-state-like partial awareness to achieve quicker and reduced overhead. Representative examples illustrate these classifications without overlap in scope: exemplifies a distance-vector IGP for small-scale intra-AS routing; OSPF represents a link-state IGP for larger, hierarchical intra-AS topologies; and BGP serves as the primary path-vector EGP for policy-driven inter-AS connectivity. These protocols advertise routes using prefixes to align with addressing schemes like CIDR.

Interior Gateway Protocols

Interior Gateway Protocols (IGPs) are routing protocols designed to exchange routing information within a single autonomous system (AS), enabling efficient path selection among internal routers based on network topology and metrics. These protocols prioritize fast convergence and scalability for intra-domain routing, contrasting with inter-domain approaches by assuming a trusted environment without policy enforcement. Common IGPs include distance-vector, link-state, and hybrid variants, each balancing simplicity, overhead, and performance for different network sizes. The () is a distance-vector IGP that uses hop count as its primary metric, limiting paths to a maximum of 15 hops to prevent infinite loops. Routers exchange entire routing tables via periodic broadcasts every 30 seconds, with triggered updates for changes, but this leads to slow times often measured in minutes due to sequential . A key limitation is the count-to-infinity problem, where routers incrementally increase metrics for unreachable networks until hitting the 15-hop limit, exacerbating in larger topologies. Open Shortest Path First (OSPF) is a link-state IGP that floods Link State Advertisements (LSAs) across the network to construct a complete topology map, allowing each router to independently compute shortest paths using . It supports hierarchical areas to reduce flooding overhead in large networks, dividing the AS into backbone and stub areas for summarized , and includes authentication mechanisms like to secure updates. OSPF's cost metric is inversely proportional to link —calculated as reference bandwidth divided by interface speed (default reference: 100 Mbps)—favoring higher- paths, with convergence typically occurring in seconds for efficient adaptation to failures. Intermediate System to Intermediate System () is a link-state IGP originally developed under ISO standards but adapted for networks, sharing similarities with OSPF in flooding and shortest-path computation. It uses Type-Length-Value (TLV) encodings for messages, enabling native support for multiple address families, and is widely deployed in large backbones due to its and lower CPU overhead compared to OSPF in high-link-count environments. supports extensions without major redesign, as specified in extensions that existing TLVs for reachability information. Enhanced Interior Gateway Routing Protocol (EIGRP), a Cisco-proprietary hybrid IGP, combines distance-vector messaging with link-state-like partial topology awareness through its Diffusing Update Algorithm () for loop-free path computation. maintains a topology table of feasible successors to enable sub-second , outperforming pure distance-vector protocols like , while using a composite incorporating , delay, reliability, and load. Though not an , EIGRP's design addresses 's limitations, achieving times closer to OSPF's seconds rather than minutes.

Exterior Gateway Protocols

Exterior Gateway Protocols (EGPs) facilitate the exchange of routing information between autonomous systems (ASes), which are distinct networks under separate administrative control, enabling inter-domain connectivity on the Internet. Unlike interior protocols, EGPs emphasize policy-driven decisions to reflect business relationships, traffic engineering preferences, and scalability needs across global networks. The primary EGP in use today is the Border Gateway Protocol (BGP), which supports the vast scale of Internet routing while allowing operators to enforce complex routing policies. The evolution of EGPs began with the original (EGP), introduced in 1984 as a distance-vector protocol for exchanging reachability information between ASes, but it proved inadequate for the growing and was moved to Historic status in 1994. BGP emerged as its successor, with BGP-4 standardized in 1994 and updated in 4271 in 2006, introducing support for (CIDR) and path-vector mechanisms to detect routing loops by advertising full AS paths. BGP operates in two variants: external BGP (eBGP) for inter-AS peering and internal BGP (iBGP) for distributing external routes within an AS, often in conjunction with interior gateway protocols for intra-AS path computation. Key policy attributes in BGP include LOCAL_PREF for prioritizing routes within an AS and Multi-Exit Discriminator (MED) for influencing inbound traffic from neighbors. BGP sessions are established over TCP on port 179, with incremental updates sent only for changes to minimize overhead, and route reflectors employed to reduce the need for full iBGP meshes in large ASes, enhancing scalability. As of November 17, 2025, the global BGP routing table contains approximately 1,038,640 active IPv4 prefixes, underscoring the protocol's role in managing Internet-scale address announcements. Extensions such as Multiprotocol BGP (MP-BGP), defined in RFC 4760, extend BGP to support IPv6 and multicast routing alongside IPv4. Despite its robustness, BGP faces significant challenges, including route leaks where internal or unintended prefixes are advertised externally, leading to traffic blackholing or hijacking, as seen in 2010s incidents like the leak that disrupted global connectivity for hours. Convergence after failures or updates can also take minutes to hours due to sequential propagation and policy filtering, amplifying outage durations.

Routing Algorithms and Metrics

Shortest Path Algorithms

Shortest path algorithms form the core of route computation in IP routing protocols, determining the optimal between network nodes based on representations of the where nodes are routers and edges are links with associated costs. These algorithms operate on weighted directed , minimizing the total cost from a source to all destinations, and are essential for both link-state and distance-vector protocols to maintain efficient forwarding tables. In IP networks, they enable routers to adapt to topology changes by recomputing , ensuring to loop-free routes. Dijkstra's algorithm, a greedy method for finding the shortest path from a single source to all nodes in a with non-negative edge weights, is widely used in link-state routing protocols such as OSPF and . Introduced by in 1959, it maintains a of nodes ordered by tentative distance from the source and iteratively selects the node with the smallest distance to relax its outgoing edges, propagating updates until all nodes are processed. The basic implementation initializes distances to except for the source (set to zero), then repeatedly extracts the minimum-distance node and updates neighbors if a shorter path is found via the equation d(v) = \min(d(v), d(u) + w(u,v)), where d is the distance estimate and w is the edge weight. In form:
Initialize distance[source] = 0
distance[others] = ∞
priority_queue = { (0, source) }
visited = empty set

while priority_queue is not empty:
    u = extract_min(priority_queue)
    if u in visited: continue
    visited.add(u)
    for each neighbor v of u:
        if distance[v] > distance[u] + weight(u,v):
            distance[v] = distance[u] + weight(u,v)
            update priority_queue with (distance[v], v)
This yields a time complexity of O(V^2) using a simple array for the priority queue, or O((V+E) \log V) with a binary heap, where V is the number of vertices (routers) and E is the number of edges (links), making it suitable for large networks when implemented efficiently. The Bellman-Ford algorithm, foundational to distance-vector routing, computes shortest paths by relaxing all edges in the graph repeatedly, allowing it to handle negative weights (though not cycles) and serving as the basis for protocols like . Developed independently by Richard Bellman in 1958 and Lester Ford Jr. in 1956, it performs |V|-1 iterations over all edges, updating each node's distance via d(v) = \min(d(v), d(u) + w(u,v)) for every edge (u,v), starting with d(\text{source}) = 0 and others infinity. An additional relaxation pass detects negative cycles if any distance decreases further. With O(VE), it is less efficient than Dijkstra for dense graphs but enables distributed computation where routers exchange distance vectors iteratively. In practice, OSPF and employ on a synchronized link-state database to compute the from each router, using the (SPF) terminology originating from IETF development work in the 1980s. , conversely, implements a distributed variant of Bellman-Ford, where routers periodically broadcast their routing tables to neighbors, converging through iterative relaxations limited to hops to prevent infinite loops. For illustration, consider a simple network with nodes A (source), B, and C; edges A–B with weight 1, A–C with weight 4, and B–C with weight 2. first sets d(A)=0, extracts A, relaxes to d(B)=1 and d(C)=4; then extracts B, relaxes to d(C)=min(4,1+2)=3, yielding paths A–B (cost 1) and A–B–C (cost 3). Bellman-Ford achieves the same after two iterations: first pass updates d(B)=1, d(C)=4; second pass updates d(C)=3 via B.

Distance and Path Metrics

In IP routing, distance and path metrics serve as quantitative criteria for evaluating and selecting optimal routes among multiple alternatives, directly influencing path selection in routing protocols. These metrics quantify aspects such as network topology, link characteristics, and policy preferences to determine the "best" path, where lower values generally indicate preferable routes. Early protocols relied on simple metrics like hop count, while modern ones incorporate composite factors for more nuanced decisions. Distance metrics primarily measure the cumulative "distance" along a path, often based on link properties. The (RIP) employs hop count as its core metric, incrementing by 1 for each router traversed, with a maximum of 15 hops to prevent routing loops; paths exceeding this are deemed unreachable. This approach, originating from mid-1970s precursors like (XNS) routing, prioritizes simplicity but overlooks or variations, potentially leading to suboptimal paths in heterogeneous networks. In contrast, (OSPF) uses a cost metric derived from interface , calculated as \text{Cost} = \frac{10^8}{\text{interface bandwidth in bps}}, where the reference bandwidth of 100 Mbps yields a cost of 1 for a 100 Mbps link. This bandwidth-inverse formula favors higher-capacity links, enhancing efficiency in large-scale interior networks. Path metrics extend beyond simple distances by considering broader attributes, particularly in inter-domain routing. (BGP) prioritizes the shortest (AS) path length during selection, prepending AS numbers to track traversal and preferring fewer AS hops to minimize external dependencies, though local preferences can override this for policy reasons. In scaling to global networks, this balances loop prevention with path brevity, as longer AS paths increase latency and vulnerability. (EIGRP), a , uses a tunable composite combining , delay, reliability, load, and MTU, formalized as: \text{Metric} = 256 \left[ K_1 \cdot \text{BW} + \frac{K_2 \cdot \text{BW}}{256 - \text{load}} + K_3 \cdot \text{delay} + \left( \frac{K_5}{\text{reliability}} \right) \right] where BW and delay are scaled values, and K values (default K1=1, K3=1, others 0) allow customization; by default, it simplifies to bandwidth plus delay for path optimization. When metrics yield ties, tie-breakers resolve selections. Administrative distance (AD) acts as a protocol-level trustworthiness score, with lower values preferred; for instance, connected interfaces have AD 0, static routes AD 1, external BGP AD 20, EIGRP AD 90, OSPF AD 110, and RIP AD 120.
Route SourceDefault AD
Connected interface0
Static route1
eBGP20
EIGRP90
OSPF110
120
iBGP200
This hierarchical AD ensures consistent route preference across protocols. Additionally, equal-cost multipath (ECMP) load-balancing distributes traffic across paths with identical metrics, improving utilization without altering primary selection. Evolving from hop-only metrics in and , these refinements address in expansive networks, where pure hop counts falter against diverse link qualities.

Routing Tables and Forwarding

Routing Table Structure

A in IP networks consists of entries that map destination network prefixes to forwarding instructions, enabling efficient packet routing decisions. Each entry typically includes the destination prefix, which identifies the target network or host; the next-hop IP address or gateway, specifying the immediate router to forward packets to; the subnet mask or prefix length defining the scope of the destination; the outgoing , such as eth0, indicating the physical or port used for transmission; a representing the route's or preference; and flags denoting route status and type, such as U for up (active) or G for gateway (indirect route). For example, a typical IPv4 routing table entry might appear as follows:
DestinationGatewayMaskFlagsInterface
192.168.1.0/24-255.255.255.0Ulo
In this entry, the destination 192.168.1.0/24 represents a local loopback network, with no gateway needed (direct connection), a Class C subnet mask, an up flag indicating the route is active, and the loopback interface lo for internal traffic. Routing table entries originate from three primary sources: connected routes, automatically added for directly attached interfaces when an IP address is configured and the interface is up; static entries, manually configured by administrators for fixed paths; and dynamic entries, learned and updated via routing protocols like OSPF or BGP to adapt to network changes. Connected routes for point-to-point links, such as serial or PPP connections, often employ a /31 prefix length to efficiently allocate two IP addresses without wasting space, as defined in RFC 3021. In modern operating systems like , routing tables are managed through two key structures: the (RIB), which stores comprehensive routing data from all sources including multiple protocols and paths, and the (FIB), a streamlined subset of the RIB optimized for hardware-accelerated lookups by deriving the best active routes and resolving next-hops. The populates the FIB from the RIB to separate control-plane route computation from data-plane forwarding. Administrators can view the routing table using tools such as netstat -r for a formatted display or ip route show for detailed routes. By 2025, global IPv4 routing tables in the default-free zone (DFZ) have expanded to approximately 1 million entries, driven by address scarcity leading to de-aggregation, where autonomous systems announce more specific prefixes for traffic engineering and policy needs, fragmenting larger allocations into smaller ones. This growth underscores the importance of efficient table management to handle increasing scale without overwhelming router resources.

Longest Prefix Matching

Longest prefix matching (LPM) is the algorithm employed by IP routers to select the most specific route from the (FIB) for a given destination when multiple entries partially match. In this process, the router examines the destination address D and identifies all candidate routes where the bitwise AND of D with the route's subnet mask yields the route's network prefix. Among these, it selects the route with the longest prefix length (i.e., the greatest number of matching bits), ensuring the most precise forwarding decision. This approach is mandatory for IPv4 routers to support (CIDR) and variable-length subnet masks, as it resolves ambiguities in overlapping routes without requiring strict class boundaries. The LPM process begins with a basic match to find all applicable routes, followed by pruning to retain only those with the maximum prefix length. For efficiency, software implementations often use trie-based data structures, such as Patricia tries or binary search trees, where the destination address traverses the trie bit by bit, descending left or right based on each bit value until reaching a prefix match; the deepest matching node determines the longest prefix. This trie descent scales logarithmically with address length, typically requiring O(W) time for W-bit addresses like IPv4's 32 bits. Hardware implementations, conversely, leverage ternary content-addressable memory (TCAM), which performs parallel comparisons across all table entries in a single cycle, enabling sub-microsecond lookups (often <1 μs) by encoding prefixes with don't-care bits for wildcard matching. CIDR fundamentally depends on LPM to enable route aggregation, allowing multiple contiguous networks to be represented by a single shorter prefix while preserving specificity for more detailed routes, thus preventing forwarding loops and table explosion. Consider a destination address of 10.144.2.5 with the following FIB entries:
PrefixLengthNext Hop
10.144.2.0/2424Router A
10.144.0.0/1616Router B
0.0.0.0/00Default GW
The address matches the /24 (first 24 bits align), which is longer than the /16 match, so Router A is selected over Router B; the (/0) serves only if no other match exists. In edge cases, if no matches any part of the destination, the router falls back to the (0.0.0.0/0). For multipath scenarios with equal-length prefixes, LPM tie-breaks via administrative metrics or policy, distributing traffic across equivalent routes.

Packet Forwarding Process

The packet forwarding process in IP routing involves a series of steps performed by a router to relay an IPv4 datagram from an incoming interface to an outgoing one, ensuring reliable transit across interconnected networks. Upon receipt of a datagram via a local network interface, the router strips the layer 2 (L2) header and passes the IP header and payload to its IP module for processing. This module then decrements the Time to Live (TTL) field in the IP header by at least one; if the TTL reaches zero, the datagram is discarded to prevent indefinite looping, and an ICMP Time Exceeded message (Type 11, Code 0) is sent back to the source address, including the IP header and the first 64 bits of the original datagram's data. The IPv4 header checksum is recalculated after the TTL modification, as the change invalidates the prior computation, using the standard one's complement sum algorithm over the header fields. Next, the router extracts the destination IP address from the header and performs a (LPM) lookup in its (derived from the ) to identify the next-hop IP address and the outgoing . If the destination is directly connected to the outgoing , the is delivered locally; otherwise, the router resolves the next-hop's layer 2 address if necessary—typically via the (ARP) on Ethernet links, where an ARP request is broadcast to map the next-hop IP to its MAC address, and the response updates a local ARP cache for subsequent use. The L2 header is then rewritten: the source MAC address is set to the router's MAC, the destination MAC to the resolved next-hop MAC, and the is encapsulated and transmitted out the selected . If the datagram's total length exceeds the (MTU) of the outgoing interface and the Don't Fragment (DF) bit is not set, the router fragments the datagram into smaller pieces, each with adjusted fragment offset, more fragments () flag, and total length fields, while recomputing the header for each fragment; an ICMP Destination Unreachable message (Type 3, Code 4) is sent to the source if DF is set, indicating fragmentation needed but prohibited. Error conditions during forwarding may trigger additional ICMP messages: for instance, if no route matches the destination, an ICMP Destination Unreachable (Type 3, Code 0 for unreachable or Code 1 for unreachable) is generated and sent to the source. Routers may also issue ICMP Redirect messages (Type 5) to the source if a shorter path to the destination exists via another gateway on the same , providing the better next-hop to optimize future transmissions. Modern routers achieve wire-speed forwarding—processing packets at the full line rate of incoming interfaces without delay—through application-specific integrated circuits () optimized for high-throughput operations, supporting speeds exceeding 100 Gbps in contemporary deployments. This hardware acceleration ensures minimal in the forwarding , from header to encapsulation, while adhering to the protocol's loop prevention via and error signaling via ICMP.

Advanced Concepts

Static vs Dynamic Routing

Static routing involves manually configuring routes on routers to define explicit paths for packet forwarding, such as using the command ip route 10.0.0.0 255.0.0.0 192.168.1.1 to direct traffic for the 10.0.0.0/8 via the next-hop 192.168.1.1. This approach requires administrators to enter each route directly into the , without reliance on automated protocols. The primary advantages of static routing include its simplicity, as it imposes no computational overhead on the router's CPU or bandwidth consumption for protocol exchanges, making it efficient for resource-constrained environments. It also enhances security by avoiding the vulnerabilities associated with routing protocol implementations and ensures routes remain active as long as the underlying physical links are operational. However, static routing lacks adaptability to network topology changes, such as link failures, requiring manual reconfiguration that can be labor-intensive and error-prone in large-scale networks. In contrast, dynamic routing employs protocols like to automatically compute and distribute routes among routers, enabling the network to adapt to changes through periodic updates and mechanisms. This method supports by reducing administrative burden in complex topologies, though it introduces overhead from messaging and potential delays during failures. A common hybrid technique involves using floating static routes as backups, configured with a higher administrative distance (e.g., 200) than dynamic routes (typically 110 for OSPF), allowing them to activate only if the primary dynamic path fails. In practice, stub networks or edge devices often rely on static routes for simplicity, while core infrastructures use dynamic routing for resilience; a specific example is the default route (0.0.0.0/0), frequently configured statically to direct all unspecified traffic to an Internet gateway. Trade-offs between static and dynamic routing depend on network scale and requirements: static routing suits small, secure environments like enterprise edges where predictability outweighs flexibility, whereas dynamic routing excels in resilient, large-scale setups such as data centers by providing automatic failover and load balancing.

Hierarchical and Policy-Based Routing

Hierarchical routing organizes autonomous systems (ASes) into multiple levels or areas to enhance scalability in large networks. In protocols like OSPF, this involves dividing the network into areas where intra-area routing remains detailed, but inter-area routing uses summarization at area border routers (ABRs) to aggregate routes and reduce the propagation of link-state advertisements (LSAs). This two-level hierarchy, with a backbone area connecting all others, ensures that inter-area traffic flows through designated paths, minimizing flooding of topology updates across the entire domain. By limiting the scope of LSAs to within areas, hierarchical OSPF significantly decreases network overhead compared to a flat topology. Policy-based routing (PBR) extends traditional metric-driven decisions by allowing administrators to enforce custom policies that override shortest-path selections. PBR typically uses access control lists (ACLs) to classify traffic based on criteria such as source/destination addresses, protocols, or ports, then directs matching packets along specified interfaces or next hops. For instance, voice-over-IP (VoIP) packets can be routed via a low-latency path despite longer metric distances for other traffic, ensuring quality-of-service requirements. In BGP, route maps implement similar policies by filtering advertisements or modifying attributes like local preference and communities to influence path selection across AS boundaries. Key implementations of hierarchical routing include BGP route reflectors, which eliminate the need for a full iBGP mesh by designating reflectors to redistribute routes within and across clusters, supporting scalable hierarchies in large deployments. Route reflector hierarchies further relax mesh requirements, allowing nested levels where client routes are aggregated and propagated upward. The itself exemplifies tiered hierarchy, with providers engaging in settlement-free without dependencies, a structure that solidified during the commercial expansion of the as AS counts grew exponentially. These approaches yield substantial benefits in scalability and security. Hierarchical designs hide intra-area topology details from external routers via summarization, reducing routing table sizes and computational load—multi-area OSPF, for example, cuts memory usage and processing by confining updates to local scopes. Policy mechanisms enhance security by blocking unintended route leaks; in BGP, route maps and leak detection policies prevent erroneous advertisements from propagating, mitigating risks like traffic blackholing or hijacking. Overall, such strategies align with core principles for Internet-scale routing, balancing efficiency and control without relying solely on distance metrics.

IPv6 Routing Specifics

IPv6 routing differs from IPv4 primarily due to its expanded addressing architecture, which uses 128-bit addresses to support vast scalability and simplified . Subnets within IPv6 sites typically use /64 prefixes, enabling efficient stateless address autoconfiguration (SLAAC) where hosts generate their own interface identifiers without relying on DHCP servers, thus reducing administrative overhead in environments. Additionally, addresses in IPv6 allow packets to be routed to the nearest node within a group of potential receivers, optimizing load balancing and redundancy without altering core protocols. Routing protocols for IPv6 have been adapted from IPv4 counterparts to handle the new address format and features. OSPFv3 extends OSPF to support link-state advertisements, using separate link-local addresses for neighbor discovery while maintaining flooding and area-based hierarchy. was updated to carry IPv6 reachability information through new type-length-value (TLV) encodings, preserving its protocol-independent design for multi-topology environments. (MP-BGP) enables the exchange of IPv6 prefixes across autonomous systems via address family extensions, facilitating inter-domain similar to IPv4 but with native support for the longer addresses. A key distinction is that IPv6 routers do not perform fragmentation; instead, end hosts must use , relying on "Packet Too Big" messages to adjust packet sizes along the path and avoid blackholing. IPv6 routing tables are potentially larger due to the but benefit from strong aggregation policies, with global allocations confined to the 2000::/3 prefix to minimize route entries and enhance . As of November 2025, adoption stands at approximately 45% globally based on traffic to major services, though dual-stack configurations—running IPv4 and concurrently—remain prevalent in enterprise and ISP networks to ensure during transition. Transition challenges in IPv6 routing include mechanisms like , which embeds IPv4 addresses into IPv6 prefixes for automatic tunneling but requires injecting 2002::/16 routes into the global IPv6 table via relays, often leading to suboptimal paths and security risks. Due to these issues, has been deprecated in favor of more reliable native or tunneled alternatives.

References

  1. [1]
    What Is Routing? - Cisco
    Routing is the process of selecting and defining paths for IP-packet traffic within or between networks as well as the process of managing network traffic ...
  2. [2]
    IP Routing: Protocol-Independent Configuration Guide, Cisco IOS ...
    Jul 19, 2018 · This module describes how to configure basic IP routing. The Internet Protocol (IP) is a network layer (Layer 3) protocol that contains addressing information.
  3. [3]
    RFC 1180 - TCP/IP tutorial - IETF Datatracker
    This RFC is a tutorial on the TCP/IP protocol suite, focusing particularly on the steps in forwarding an IP datagram from source host to destination host ...Missing: fundamentals | Show results with:fundamentals
  4. [4]
    Dynamic Routing Protocols: OSPF, EIGRP, RIPv2, IS-IS, BGP
    Dec 4, 2021 · Introduction to Routing Protocols The purpose of routing protocols is to enable end-to-end network layer connectivity between endpoints.
  5. [5]
    RFC 1058: Routing Information Protocol
    ### Summary of RIP in RFC 1058
  6. [6]
    A Brief History of the Internet - UCSB Computer Science
    DARPA let three contracts to Stanford (Cerf), BBN (Ray Tomlinson) and UCL (Peter Kirstein) to implement TCP/IP (it was simply called TCP in the Cerf/Kahn paper ...
  7. [7]
  8. [8]
  9. [9]
  10. [10]
  11. [11]
  12. [12]
  13. [13]
  14. [14]
  15. [15]
  16. [16]
  17. [17]
    A Brief History of the Internet - Internet Society
    All this came together in September 1969 when BBN installed the first IMP at UCLA and the first host computer was connected. Doug Engelbart's project on “ ...
  18. [18]
    The Communications Subnet: BBN 1969
    The 1969 BBN subnet used minicomputer IMPs connected by leased lines, routing messages in packets. Each IMP could connect up to four hosts.
  19. [19]
    RFC 791 - Internet Protocol - IETF Datatracker
    The internet protocol is designed for use in interconnected systems of packet-switched computer communication networks. Such a system has been called a catenet.
  20. [20]
    History of the Internet - APNIC
    In order to address some of the problems of classful addressing, the technique of subnetting was invented. Described in RFC 791 in 1984, subnetting provided ...Before the RIRs · The RIR system · RIRs and the global Internet...Missing: adoption | Show results with:adoption
  21. [21]
    RFC 1105: Border Gateway Protocol (BGP)
    The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol. It is built on experience gained with EGP as defined in RFC 904.Missing: 4271 2006<|separator|>
  22. [22]
    RFC 4271 - A Border Gateway Protocol 4 (BGP-4) - IETF Datatracker
    RFC 4271 defines BGP-4, an inter-Autonomous System routing protocol that exchanges network reachability information and supports CIDR.
  23. [23]
    About - IETF
    The Internet Engineering Task Force (IETF), founded in 1986, is the premier standards development organization (SDO) for the Internet.
  24. [24]
    RFC 1519 - Classless Inter-Domain Routing (CIDR) - IETF Datatracker
    This memo discusses strategies for address assignment of the existing IP address space with a view to conserve the address space and stem the explosive growth ...
  25. [25]
    Chapter5 IP address policy in the fully-fledged Internet age
    IP address use and routing technology required significant reforms, which led to a drastic change of IP address management policy.
  26. [26]
    RFC 2460: Internet Protocol, Version 6 (IPv6) Specification
    This document specifies version 6 of the Internet Protocol (IPv6), also sometimes referred to as IP Next Generation or IPng.
  27. [27]
    RFC 3221 - Commentary on Inter-Domain Routing in the Internet
    ... growth in the BGP routing table. During this period, the BGP table grew at an approximate linear rate, adding some 10,000 entries per year. A close ...Missing: 10k | Show results with:10k
  28. [28]
    RFC 870 - Assigned numbers - IETF Datatracker
    ... dotted decimal is 010.002.000.052, or 10.2.0.52. The dotted decimal notation will be used in the listing of assigned network numbers. The class A networks ...
  29. [29]
    RFC 1466 - Guidelines for Management of IP Address Space
    Table 1 shows the current allocation of the IP network numbers. Total Allocated Allocated (%) Class A 126 49 38% Class B 16383 7354 45% Class C 2097151 ...Missing: IPv4 | Show results with:IPv4
  30. [30]
    RFC 950 - Internet Standard Subnetting Procedure - IETF Datatracker
    RFC 950 specifies procedures for using subnets, which are logically visible sub-sections of a single Internet network, for hosts.Missing: fundamentals | Show results with:fundamentals
  31. [31]
    RFC 4291: IP Version 6 Addressing Architecture
    ### IPv6 Address Structure Summary
  32. [32]
    RFC 1878 - Variable Length Subnet Table For IPv4 - IETF Datatracker
    This memo clarifies issues surrounding subnetting IP networks by providing a standard subnet table. This table includes subnetting for Class A, B, and C ...
  33. [33]
    [PDF] IPv4 Address Exhaustion - IEEE-USA
    At the time of the original CIDR proposal (1992),12 it was anticipated CIDR would extend IPv4 address exhaustion by three to five years. The next technology ...Missing: conservation | Show results with:conservation
  34. [34]
    RFC 3221: Commentary on Inter-Domain Routing in the Internet
    ... growth in the BGP routing table. During this period, the BGP table grew at an approximate linear rate, adding some 10,000 entries per year. A close ...Missing: 10k | Show results with:10k
  35. [35]
    IP Routing: BGP Configuration Guide, Cisco IOS XE Gibraltar 16.10.x
    Dec 3, 2018 · Aggregate prefixes use the classless interdomain routing (CIDR) principle to combine contiguous networks into one classless set of IP ...
  36. [36]
    RFC 904: Exterior Gateway Protocol formal specification
    - **Confirmation**: RFC 904, published April 1984 by D.L. Mills, is the formal specification of the Exterior Gateway Protocol (EGP), the original exterior protocol for the ARPA-Internet.
  37. [37]
    RFC 2328: OSPF Version 2
    Below is a merged response summarizing all the provided segments of RFC 2328 - OSPF Version 2. To retain all information in a dense and organized manner, I will use a combination of narrative text and a table in CSV format for key details. This ensures comprehensive coverage while maintaining clarity and avoiding redundancy.
  38. [38]
    Introduction to EIGRP - Cisco
    This document describes the Interior Gateway Routing Protocol (IGRP) suite of routing protocols designed and developed by Cisco Systems.What is EIGRP? · How Does EIGRP Work? · Route Tagging · Compatibility Mode
  39. [39]
    RFC 1195 - Use of OSI IS-IS for routing in TCP/IP and dual ...
    This RFC specifies an integrated routing protocol, based on the OSI Intra-Domain IS-IS Routing Protocol, which may be used as an interior gateway protocol (IGP ...
  40. [40]
    Understand and Use the Enhanced Interior Gateway Routing Protocol
    EIGRP is an enhanced distance vector protocol, which relies on the Diffused Update Algorithm (DUAL) to calculate the shortest path to a destination within a ...Neighbor Discovery and... · EIGRP Metrics · Redistribution Between Two...
  41. [41]
    Active BGP entries (FIB) - BGP potaroo.net
    The total span of address space advertised in the BGP table, and the relationship of this value to the number and size of address prefix objects in the table.
  42. [42]
    A Brief History of the Internet's Biggest BGP Incidents | Kentik Blog
    Jun 6, 2023 · This comprehensive blog post covers the most notable and significant BGP incidents in the history of the internet, from traffic-disrupting BGP leaks to crypto- ...
  43. [43]
    A note on two problems in connexion with graphs
    Article PDF. Download to read the full article text. Use our pre-submission ... Cite this article. Dijkstra, E.W. A note on two problems in connexion with graphs.
  44. [44]
    [PDF] dijkstra-routing-1959.pdf
    of set A, and by placing all branches that end in this node in set II. To start with, set 1 is empty. From then onwards we perform the following two steps.
  45. [45]
    (PDF) THE BELLMAN-FORD ALGORITHM AND " DISTRIBUTED ...
    The Bellman-Ford algorithm finds shortest paths in graphs, with its origins traced back to 1956-1958. Key historical sources include Ford's 1956 paper, Moore's ...
  46. [46]
    RIP overview - Nokia Documentation Center
    RIP is an interior gateway protocol (IGP) that uses a distance-vector (Bellman-Ford) algorithm to determine the best route to a destination.
  47. [47]
    Review OSPF Frequently Asked Questions - Cisco
    Feb 2, 2023 · The formula to calculate the cost is reference bandwidth divided by interface bandwidth. For example, in the case of Ethernet, it is 100 ...
  48. [48]
    Select BGP Best Path Algorithm - Cisco
    The BGP best path algorithm decides which is the best path to install in the IP routing table and to use for traffic forwarding.
  49. [49]
    [PDF] EIGRP Wide Metrics - Cisco
    By using the default formula, you can simplify the EIGRP composite cost metric calculation to 256*(Scaled Bw + Scaled Delay), thus resulting in the following ...
  50. [50]
    Describe Administrative Distance - Cisco
    Sep 27, 2024 · This table lists the administrative distance default values of the protocols that Cisco supports. Route Source, Default Distance Values.Background Information · Select the Best Path
  51. [51]
    Configure Route Selection for Routers - Cisco
    Administrative distance- This is the measure of trustworthiness of the source of the route. If a router learns about a destination from more than one ...Backup Routes · Adjust the Administrative... · How Metrics Determine the...
  52. [52]
    Interpretation of Components of a Routing Table - GeeksforGeeks
    Dec 12, 2022 · A routing table is made up of entries that point to networks that are either directly connected, statically configured, or dynamically learned.
  53. [53]
    IP Routing: Linux Route Flags (U – Up, G – Gateway, H – Host)
    May 4, 2012 · Following is the list of flags and their significance in the routing table : U : This flag signifies that the route is up; G : This flag ...
  54. [54]
    IP Routing and Subnets - EventHelix
    Routers maintain a routing table to decide how to route the IP packets. Each routing entry consists of the destination address, subnet mask and "route to" field ...An Example Internet · Ip Routing · Routing Of A Packet From...
  55. [55]
    Connected, static & dynamic routes - Study CCNA
    By adding static routes, a router can learn a route to a remote network that is not directly connected to one of its interfaces. Static routes are configured ...
  56. [56]
    Sources of Routing Information - Pearson IT Certification
    Oct 28, 2021 · A router's routing table can be populated from various sources. As an administrator, you could statically configure a route entry.
  57. [57]
    Subnet Cheat Sheet – 24 Subnet Mask, 30, 26, 27, 29, and other IP ...
    Feb 12, 2021 · /31 is a special case detailed in RFC 3021 where networks with this type of subnet mask can assign two IP addresses as a point-to-point link.<|separator|>
  58. [58]
    RIB vs FIB differences? - cisco - Network Engineering Stack Exchange
    Feb 2, 2017 · Each FIB is programmed by one or more routing information bases (RIB). The RIB is a selection of routing information learned via static ...Router table and forwarding table [closed]Switch FIB and router FIB - Network Engineering Stack ExchangeMore results from networkengineering.stackexchange.com
  59. [59]
    Route and Netstat - datahacker
    The presence of an Up flag (U) indicates the routing table entry is a route, and it is currently active (Up). If you don't see the Up flag set for a route or ...Route And Netstat · Default Routes · Metric, Ref, And Use<|separator|>
  60. [60]
    How to View the IP routing table - linux - Server Fault
    Dec 14, 2013 · To view the basic IPv4 routing table: ip route. To view a specific table: ip route list table test1. To view everything: ip route list table all.How to see routes for a specific Host - Server Faultiptables - list all route tables - Server FaultMore results from serverfault.comMissing: tools | Show results with:tools
  61. [61]
    ISP Column - June 2025 - Geoff Huston
    One day later the IPv4 routing table contained 1,002,006 IPv4 prefixes and the IPv6 table contained 221,144 IPv6 prefixes, a net gain of 674 IPv4 prefixes and ...
  62. [62]
  63. [63]
    TCAM-based high speed Longest prefix matching with fast ...
    Abstract: This paper presents a new TCAM-based method for determining the Longest Prefix Match (LPM) in an IP routing table.
  64. [64]
  65. [65]
    [PDF] IP Routing: Protocol-Independent Configuration Guide, Cisco IOS ...
    Page 15. CHAPTER 1. Basic IP Routing. This module describes how to configure basic IP routing. The Internet Protocol (IP) is a network layer (Layer.
  66. [66]
    [EPUB] IP Routing: Protocol-Independent Configuration Guide, Cisco IOS ...
    Static routes are manually configured and define an explicit path between two networking devices. Unlike a dynamic routing protocol, static routes are not ...
  67. [67]
    IP Routing - Cisco Community
    Feb 27, 2019 · ... routing table. There are the advantages and disadvantages of Static Routing. Here the advantages: · There is no overhead on the router CPU. · ...
  68. [68]
    Routing Configuration Guide for Cisco ASR 9000 Series Routers ...
    Aug 1, 2023 · The main disadvantage to using static routes is the lack of automatic reconfiguration if the network topology changes.
  69. [69]
    Routing Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst ...
    Dynamic routing protocols are used by routers to dynamically calculate the best route for forwarding traffic. There are two types of dynamic routing protocols:.
  70. [70]
    Solved: Routing Rrotocol - Cisco Community
    Sep 21, 2023 · Dynamic routing is best when your topology is large, it is scalable. Also, flexible is you configure properly (especially, when you tag/ add ...
  71. [71]
    Configure a Next Hop IP Address for Static Routes - Cisco
    A static route with a high administrative distance is called a floating static route. It is installed in the routing table only when the dynamically learned ...
  72. [72]
    Chapter: Configuring Static Routing - Cisco
    Apr 20, 2011 · Most networks use dynamic routes to communicate between routers but may have one or two static routes configured for special cases.
  73. [73]
    Chapter: Static and Default Routes for Firepower Threat Defense
    Feb 18, 2022 · A default static route is simply a static route with 0.0.0.0/0 (IPv4) or ::/0 (IPv6) as the destination IP address. You should always define a ...
  74. [74]
    Implementing Static Routes on Cisco IOS XR Software
    Apr 28, 2011 · The benefits of using static routes include security and resource efficiency. Static routes use less bandwidth than dynamic routing protocols, ...
  75. [75]
    Routing Configuration Guide for Cisco NCS 5000 Series Routers ...
    Dec 1, 2023 · The main disadvantage to using static routes is the lack of automatic reconfiguration if the network topology changes.
  76. [76]
    Optimal configuration of OSPF aggregates | IEEE Journals & Magazine
    In order to scale for large networks containing hundreds and thousands of subnets, OSPF supports a two-level hierarchical routing scheme through the use of OSPF ...
  77. [77]
    Hierarchical routing using link vectors - IEEE Xplore
    In OSPF, all inter-area traffic must be routed via the backbone. There have been many hierarchical routing proposals described in the past based on the notion ...<|separator|>
  78. [78]
    Hierarchical networks and the LSA N-squared problem in OSPF ...
    Hierarchical OSPF network architectures have been proposed to reduce the number of link state advertisements (LSA) that are generated by a network topology ...
  79. [79]
    RFC 8519 - YANG Data Model for Network Access Control Lists ...
    Jan 13, 2024 · It is used in many networking technologies such as Policy-Based Routing (PBR), firewalls, etc. An ACL is a user-ordered set of rules that is ...
  80. [80]
    [PDF] I2RS working group S. Hares Internet-Draft Q. Wu Intended status
    Jul 2, 2014 · Policy based Routing is a technique used to make routing decisions based on policies set by the network administrator. PBR enables network ...
  81. [81]
    An Application of the BGP Community Attribute in Multi-home Routing
    This document presents an application of the BGP community attribute in simplifying the implementation of routing strategies in the multi-provider Internet.
  82. [82]
    RFC 4364 - BGP/MPLS IP Virtual Private Networks (VPNs)
    All the usual techniques for using route reflectors to improve scalability (e.g., route reflector hierarchies) are available. Route reflectors are the only ...
  83. [83]
    draft-ietf-idr-bgp-optimal-route-reflection-04
    ... BGP paths. In the event of constructing a hierarchy of reflectors to relax the full RR mesh requirements ORR should not be run between such route reflectors.
  84. [84]
    A Public Option for the Core - NYU Computer Science
    Aug 14, 2020 · As the Internet devolved into separate Autonomous Systems (each with many internal nodes) and became commercial in the 90s, it settled into a ...Missing: 1990s | Show results with:1990s
  85. [85]
    To Split or not to Split? A Simulation Study on the Network ...
    The multi-area feature of OSPF leads to reduced network overhead, low processing and memory requirements and smaller routing tables.
  86. [86]
    Methods for Detection and Mitigation of BGP Route Leaks
    Apr 19, 2019 · This document describes a solution for detection and mitigation route leaks which is based on conveying route-leak protection (RLP) information ...
  87. [87]
    RFC 2791 - Scalable Routing Design Principles - IETF Datatracker
    This document attempts to analyze routing scalability issues and define a set of principles for designing scalable routing system for large networks.
  88. [88]
    RFC 4862 - IPv6 Stateless Address Autoconfiguration
    This document specifies the steps a host takes in deciding how to autoconfigure its interfaces in IP version 6.
  89. [89]
    RFC 7421 - Analysis of the 64-bit Boundary in IPv6 Addressing
    Dec 19, 2021 · This document describes the advantages of this fixed boundary and analyzes the issues that would be involved in treating it as a variable boundary.
  90. [90]
    RFC 5340 - OSPF for IPv6 - IETF Datatracker
    This document describes the modifications to OSPF to support version 6 of the Internet Protocol (IPv6).
  91. [91]
    RFC 5308 - Routing IPv6 with IS-IS - IETF Datatracker
    RFC 5308 specifies a method for exchanging IPv6 routing information using the IS-IS protocol, using new TLVs.
  92. [92]
    RFC 8201 - Path MTU Discovery for IP version 6 - IETF Datatracker
    This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4.
  93. [93]
    RFC 4443 - Internet Control Message Protocol (ICMPv6) for the ...
    This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).
  94. [94]
    IPv6 Address Allocation and Assignment Policy - RIPE NCC
    Mar 16, 2020 · This document defines registry policies for the assignment and allocation of globally unique IPv6 addresses to Internet Service Providers (ISPs) and other ...
  95. [95]
    IPv6 Adoption - Google
    The graph shows the percentage of users that access Google over IPv6. Native: 45.26% 6to4/Teredo: 0.00% Total IPv6: 45.26% | Oct 30, 2025. 0.00%. 5.00%. 10.00 ...
  96. [96]
    RFC 3056 - Connection of IPv6 Domains via IPv4 Clouds
    RFC 3056 specifies an interim mechanism for IPv6 sites to communicate over IPv4, using a unique IPv6 prefix and encapsulation, as a transition tool.
  97. [97]
    RFC 7526 - Deprecating the Anycast Prefix for 6to4 Relay Routers
    6to4 was designed to help transition the Internet from IPv4 to IPv6. It has been a good mechanism for experimenting with IPv6, but because of the high ...