Fact-checked by Grok 2 weeks ago

Routing protocol

A routing protocol is a standardized set of rules and procedures that enables routers in a to dynamically exchange information about , destinations, and paths, allowing them to select and maintain optimal routes for forwarding data packets between nodes. These protocols operate at the network layer (Layer 3 of the ) and are essential for scalable , as they automate path discovery and adaptation to changes such as link failures, congestion, or topology updates, without requiring manual reconfiguration of every router. Unlike , which relies on fixed, administrator-defined routes suitable only for small or stable networks, protocols support by periodically sharing routing tables or updates among routers to build and refine a shared view of the network. Routing protocols are broadly classified into categories based on their scope and mechanism. Interior Gateway Protocols (IGPs) manage routing within a single autonomous system (AS), such as an enterprise network, and include distance-vector protocols like the Routing Information Protocol (RIP), which uses hop count as a metric to measure path distance and exchanges full routing tables periodically. Link-state IGPs, such as Open Shortest Path First (OSPF), flood link-state advertisements to all routers in the AS, enabling each to compute shortest paths independently using algorithms like Dijkstra's. In contrast, Exterior Gateway Protocols (EGPs) handle inter-AS routing across the broader internet; the dominant example is Border Gateway Protocol version 4 (BGP-4), a path-vector protocol that propagates AS-level path attributes to make policy-based decisions, ensuring scalability for the global Internet. Other variants, like hybrid protocols such as Enhanced Interior Gateway Routing Protocol (EIGRP), combine distance-vector and link-state elements for faster convergence and efficient bandwidth use in Cisco environments. Key aspects of routing protocols include convergence time—the speed at which the network stabilizes after a change—scalability to handle large topologies, and security features to mitigate threats like route hijacking or spoofing, as outlined in IETF guidelines. Metrics such as bandwidth, delay, load, and reliability guide path selection, with protocols prioritizing loop prevention. These protocols underpin modern networks, from local area networks (LANs) to the , while evolving to address emerging needs like and low-power environments.

Overview

Definition and Purpose

A routing protocol is a standardized set of rules that enables routers to dynamically exchange information about the network topology and select optimal paths for data packets in a . These protocols operate at the network layer, facilitating communication between routers to build and maintain a map of the network's structure. The primary purpose of routing protocols is to automate route discovery and adaptation in packet-switched networks, such as the , ensuring efficient data transmission despite changes like failures or . They support load balancing across multiple paths to optimize resource use and provide by rerouting traffic around disruptions, thereby maintaining end-to-end connectivity. Core functions of routing protocols include neighbor discovery to identify directly connected routers, route advertisement to propagate topology updates, and path computation to evaluate and choose the best routes based on predefined metrics. Following network changes, protocols achieve , the process by which all routers agree on a consistent set of routes, stabilizing the network. For instance, in networks, these protocols populate routing tables that guide to destination addresses. Importantly, routing protocols focus on building these tables in the , distinct from the data plane's role in actual packet transmission using the established routes.

Historical Development

The development of routing protocols began in the 1970s with the , the precursor to the modern , where initial packet-switching networks relied on basic mechanisms for forwarding data across interconnected systems. Early efforts included protocols for public data networks, such as X.25 standardized by the in 1976, which provided connection-oriented packet delivery but lacked dynamic routing capabilities suited for wide-area networks. This evolved with the introduction of the (IP) in RFC 791 in 1981, which established the foundation for datagram routing in interconnected packet-switched networks, emphasizing without built-in routing specifics. In the 1980s, as the ARPANET transitioned to TCP/IP and the early emerged, dedicated routing protocols were formalized to handle inter-network communication. The (EGP), specified in 904 in 1984, became the first standard for exchanging reachability information between autonomous systems on the nascent , functioning primarily as a reachability protocol rather than a full solution. Shortly after, the (RIP), documented in 1058 in 1988, emerged as the first widely adopted (IGP) for within local networks, using a simple distance-vector approach based on hop count to propagate updates. The 1990s marked a period of standardization and scalability improvements amid rapid Internet growth. (OSPF) was introduced in RFC 1131 in 1989 as a link-state IGP alternative to , with significant updates in RFC 2328 in 1998 to enhance authentication, load balancing, and . For inter-domain routing, the (BGP) debuted in RFC 1105 in 1989, evolving to BGP-4 in RFC 1771 in 1995, which introduced support for classless addressing to manage the expanding global . A pivotal shift occurred with the adoption of (CIDR) in RFC 1519 in 1993, transitioning from rigid classful addressing to flexible prefix-based aggregation, which conserved space and reduced sizes. Additionally, RFC 1812 in 1995 outlined comprehensive requirements for IPv4 routers, including forwarding behaviors and support, standardizing implementation practices. Entering the 2000s, protocols saw enhancements for emerging needs like . (IS-IS), originally for OSI networks and adapted for in RFC 1195 in 1990, received extensions through Type-Length-Value (TLV) additions in the early 2000s, enabling multi-protocol support without major redesign. Meanwhile, Cisco's (EIGRP), developed as a proprietary hybrid protocol in the to improve upon and IGRP, was opened to other vendors in 2013 via an IETF informational draft. These advancements addressed convergence challenges from expansion, with link-state protocols like OSPF and offering faster updates compared to early distance-vector methods.

Fundamental Concepts

Static vs. Dynamic Routing

Static routing involves the manual configuration of routes by network administrators, where specific paths are explicitly defined in the without any automatic adaptation to network changes. These routes remain fixed until manually updated, making them suitable for small, stable networks where alterations are infrequent. For instance, static routes are often used to direct to a or to reach non-connected networks that do not require ongoing monitoring. In contrast, dynamic routing employs protocols that enable routers to automatically discover, share, and update routing information with neighboring devices, allowing the network to adapt in real-time to events such as link failures or . This approach relies on periodic exchanges of routing updates or event-triggered notifications to maintain an optimal path selection based on current network conditions. is essential for larger or more volatile environments, as it supports and without constant human intervention. The primary differences between static and dynamic routing lie in their configuration, resource utilization, and adaptability. Static routing is simpler to implement, consumes minimal bandwidth and CPU resources since no update protocols are involved, and offers higher security by avoiding exposure to routing protocol vulnerabilities. However, it lacks scalability and fault tolerance, requiring manual reconfiguration for any changes, which can lead to downtime in dynamic environments. Dynamic routing, while more resource-intensive due to the overhead of protocol exchanges, provides automatic recovery from failures and better load balancing, though it introduces complexity and potential security risks from protocol interactions. Static routing is typically preferred in edge cases, such as defining default routes or in stub networks with predictable traffic patterns, whereas dynamic routing is ideal for core infrastructures experiencing frequent topology shifts. Many modern networks adopt a hybrid model, leveraging dynamic protocols for primary route learning while incorporating static routes as overrides or backups to ensure reliability and control in specific scenarios.

Key Routing Metrics and Algorithms

Routing protocols rely on metrics to assess and compare potential paths, enabling routers to select the most efficient route for based on predefined criteria. The count serves as the simplest , quantifying the number of intermediate routers () a packet must pass through to reach its destination; paths exceeding a certain limit, such as 15 in some implementations, are deemed unreachable. is a critical that prioritizes paths with greater data-carrying to reduce potential bottlenecks and improve throughput. Delay encompasses the total along a , including time, delays, and queuing effects, favoring lower-latency routes for time-sensitive traffic. often represents a composite integrating multiple factors, such as and delay, to balance speed and in selection. Reliability measures link stability by considering factors like error rates and uptime, while load evaluates current traffic utilization to avoid overburdened paths. Path selection in routing protocols is driven by algorithms that compute the "shortest" path according to the chosen , treating the network as a weighted where links represent edges and routers represent nodes. Link-state protocols utilize to construct a from a source router to all destinations, leveraging global topology knowledge; the algorithm iteratively selects the unvisited node with the minimum from the source and relaxes the distances to its neighbors using a for efficiency. This approach ensures optimal paths in stable networks but requires significant computational resources for large topologies. In contrast, distance-vector protocols implement the Bellman-Ford algorithm in a distributed manner, where each router periodically exchanges estimates with neighbors and updates its table via iterative relaxation. The Bellman-Ford equation forms the basis of these updates: d_x(y) = \min_{v \in N_x} \left\{ c(x,v) + d_v(y) \right\} where d_x(y) denotes the shortest-path distance from router x to destination y, N_x is the set of x's neighbors, c(x,v) is the between x and neighbor v, and the minimization occurs over all neighbors v. In practice, a distance-vector update for the path to destination D via neighbor N computes the new distance as the sum of N's reported metric to D and the direct to N, retaining the minimum across all neighbors. Convergence is the process by which routers synchronize their tables to a stable state following changes, such as failures or additions; rapid minimizes disruptions, but slow in distance-vector protocols can propagate outdated information, leading to temporary inconsistencies. A notable issue during is the count-to- problem, where routers incrementally increase distance metrics in a until reaching an (e.g., 16 ), exacerbating delays and potential packet loss. To mitigate routing loops, loop-prevention mechanisms are integrated into protocols. Split horizon prevents a router from advertising a route back out the same on which it was learned, reducing the risk of updates that could form loops between adjacent routers. Poison reverse extends split horizon by actively advertising such routes with an infinite metric (e.g., 16), explicitly signaling unreachability and accelerating loop detection and resolution. These techniques enhance stability in dynamic environments without requiring global knowledge.

Classification

By Network Scope

Routing protocols are classified by network scope into interior gateway protocols (IGPs) and exterior gateway protocols (EGPs), based on whether they operate within or across autonomous systems (ASes). An autonomous system is a collection of networks and routers under the control of one or more network operators that presents a common policy to the . ASes are assigned unique identifiers, known as autonomous system numbers (ASNs), by the (IANA), which allocates them to regional Internet registries. Originally, BGP-4 used 16-bit ASNs as defined in RFC 4271, but this was extended to 32-bit ASNs to accommodate growth, per RFC 6793. Interior gateway protocols (IGPs) are designed for within a single AS, focusing on intra-domain efficiency to enable fast and optimal selection based on metrics like or delay. They exchange information among routers under unified administrative control, prioritizing rapid adaptation to internal changes without considering external policies. Common IGPs include OSPF and , which support scalable intra-AS through mechanisms like hierarchical areas or levels. Exterior gateway protocols (EGPs), in contrast, facilitate inter-domain routing between multiple ASes, emphasizing scalability for the global Internet and policy-based decisions such as peering agreements or traffic engineering preferences over simple metrics. The original EGP specified in RFC 827 has been largely superseded by BGP, which handles route advertisement and selection across AS boundaries while preventing loops through path attributes. EGPs must manage vast scale, with BGP supporting millions of routes through aggregation and filtering, but they converge more slowly than IGPs due to policy validations. This scope distinction influences protocol design: IGPs optimize for low-latency internal operations, while EGPs incorporate administrative policies to enforce business or security rules across diverse domains. In practice, the core employs a hybrid approach, using BGP as the primary EGP for inter-AS connectivity and OSPF or as IGPs within backbone providers' ASes to distribute internal routes efficiently.

By OSI Layer

Routing protocols predominantly operate at Layer 3 of the , known as the Network Layer, where they perform path determination and packet forwarding based on logical addressing, such as addresses, abstracted from the specifics of the physical transmission medium. This layer's functions, as outlined in the , include relaying and routing data units across multiple interconnected networks to reach the destination . For instance, the () exemplifies this by using hierarchical addressing to enable end-to-end delivery independent of underlying Layer 2 technologies like Ethernet or . Although primarily Layer 3 entities, routing protocols frequently interface with Layer 2, the , for essential operations such as adjacent router discovery and link status monitoring. A representative case is the use of Hello packets in protocols like OSPF, which are encapsulated in but rely on Layer 2 mechanisms, such as Ethernet framing and addressing, to exchange information between directly connected neighbors. These interactions ensure that Layer 3 routing decisions are informed by real-time Layer 2 topology changes without embedding physical details into the routing logic itself. Layer 4, the , plays a supporting role in many routing protocols by providing reliable message delivery, though it does not influence the routing computations. For example, BGP leverages on port 179 to establish persistent sessions and ensure ordered, error-checked exchange of routing updates between peers, distinguishing it from connectionless alternatives that might use . This transport mechanism enhances protocol robustness but remains ancillary to the core Layer 3 functions. The historical standardization of , particularly for networks, firmly anchors it at Layer 3, consistent with the OSI model's delineation in ISO/IEC 7498-1, which separates from lower-layer concerns. Notable exceptions include (ATM) networks, where routing and connection management blend Layer 2 switching with partial Layer 3 addressing, often described as operating at an intermediate "Layer 2.5." Overall, this Layer 3 orientation promotes interoperability, allowing routing protocols to function uniformly across varied Layer 2 media, from traditional wired links to modern wireless infrastructures, thereby supporting scalable, multi-vendor network deployments. Routed protocols like exemplify this layered independence.

By Algorithm Type

Routing protocols can be classified by their underlying algorithms, which determine how routers exchange and compute paths to destinations. The primary categories include distance-vector, link-state, path-vector, and hybrid algorithms, each balancing , speed, and resource usage differently. In distance-vector algorithms, routers maintain a table of distances to all destinations and periodically share their entire with directly connected neighbors. Each router updates its table by selecting the minimum offered by neighbors, plus the to that neighbor, using an iterative process based on the Bellman-Ford method. This approach relies on hop-by-hop updates, where routers propagate indirectly through . However, it is susceptible to routing loops without mechanisms like split horizon or poison reverse, which prevent advertising routes back to the next-hop neighbor or advertise infinite distances for such routes. Link-state algorithms enable each router to build a complete of the network by flooding link-state advertisements—summaries of a router's direct connections and their costs—to all other routers. Once the is constructed, each router independently computes the shortest paths to all destinations using a shortest-path-first , such as Dijkstra's. This flooding ensures a consistent view of the network across all nodes, allowing for rapid detection and response to changes like link failures. Sequence numbers in advertisements help manage updates and discard obsolete information. Path-vector algorithms extend distance-vector methods for larger, policy-driven environments by including not just distances but the full sequence of nodes (or autonomous systems) in the path to a destination. Routers exchange these path vectors with neighbors, rejecting any that include their own identifier to prevent loops without needing additional safeguards like split horizon. This inclusion of path attributes supports policy enforcement, such as preferring certain paths based on administrative rules, making it suitable for interdomain routing. Hybrid algorithms combine elements of distance-vector and link-state approaches to mitigate the limitations of each, such as using partial knowledge from link-state flooding within a limited scope while relying on distance-vector updates for broader propagation. This partial sharing reduces the overhead of full topology dissemination while improving over pure distance-vector methods. Key features include incremental updates and load balancing, allowing routers to maintain efficiency in medium-sized networks. The choice among these algorithms involves trade-offs in and . Distance-vector algorithms require low CPU and , as they only track neighbor distances, but consume more due to frequent full-table exchanges and converge slowly, exacerbating risks in dynamic networks. In contrast, link-state algorithms demand higher CPU for path computations and for the full but use more efficiently after initial flooding and converge faster with fewer loops. Path-vector adds flexibility at the of larger sizes, while hybrids balance these by optimizing for in specific scopes.
AspectDistance-VectorLink-StatePath-VectorHybrid
CPU UsageLow (simple updates)High (full path calculations)Moderate (path checks + distances)Moderate (partial computations)
Memory UsageLow (neighbor tables only)High (complete topology)Moderate (paths + attributes)Moderate (selective topology)
BandwidthHigh (periodic full tables)Low after convergence (flooding initial)Moderate (path vectors)Low (incremental + partial)
ConvergenceSlow (reactive propagation)Fast (proactive flooding)Variable (policy-dependent)Fast (combined mechanisms)
Loop RiskHigh (needs safeguards)Low (global view)Low (self-detection in paths)Low (hybrid safeguards)
ScalabilityPoor for large networksGood for large networksGood for interdomainGood for medium networks
These trade-offs highlight how distance-vector suits simple, small networks with low overhead, while link-state excels in complex environments requiring quick adaptation.

Interior Gateway Protocols

Distance-Vector Protocols

Distance-vector protocols are a class of interior gateway protocols (IGPs) where routers maintain routing tables that list the distance (typically measured in or a ) to all known destinations and periodically share these tables with neighboring routers. These protocols operate on the principle of distributed , where each router independently calculates its best paths based on information received from peers, without maintaining a complete map. The core mechanics rely on the Bellman-Ford algorithm for route computation. Routers broadcast their entire to directly connected neighbors at fixed intervals, such as every 30 seconds, using port 520. Upon receiving an update, a router relaxes its distance estimates using the Bellman-Ford equation: D_x(y) = \min_v \left\{ C(x,v) + D_v(y), \, D_x(y) \right\} where D_x(y) is the estimated distance from router x to destination y, C(x,v) is the cost of the link from x to neighbor v, and D_v(y) is the distance reported by v to y. This relaxation step ensures that routes are updated only if a shorter path is found, promoting toward optimal distances over multiple iterations. A primary example is the (RIP), first specified in RFC 1058 as RIPv1 in 1988. RIPv1 is a classful protocol that assumes fixed network boundaries without subnet mask information, making it incompatible with modern variable-length subnet masking (VLSM). It enforces a maximum hop count of 15, with 16 denoting infinity (unreachable destinations), to prevent routing loops and limit network diameter. Although foundational to distance-vector routing, RIPv1 has become obsolete by 2025 due to its limitations in handling subnetted networks and lack of security features. RIPv2, defined in RFC 2453 (1998), addresses these shortcomings while retaining the core distance-vector mechanics. It supports VLSM through inclusion of subnet masks in route advertisements, enabling (CIDR). is provided via a simple MD5-based mechanism to verify update integrity, and updates are sent as multicasts to 224.0.0.9 rather than broadcasts for efficiency. The 15-hop limit and UDP port 520 remain unchanged. Distance-vector protocols offer advantages in simplicity and low , requiring minimal computational overhead as routers only need to store and exchange vectors rather than full data. This makes them suitable for small to medium-sized, stable networks with limited router capabilities. However, they suffer from slow times, particularly after changes, as updates propagate hop-by-hop. The count-to-infinity problem exacerbates this, where a link causes routers to incrementally increase metrics in a loop until reaching infinity (16), potentially taking up to 15 iterations. loops can form temporarily during , leading to or blackholing. Mitigations include split horizon (omitting routes learned from a in updates to that ), poisoned reverse (advertising such routes with metric 16), and hold-down timers (temporarily ignoring updates for routes in flux for 180 seconds). The 15-hop limit also inherently curbs infinite counting but restricts to small networks. Link-state protocols are a class of interior gateway protocols (IGPs) used in networks to dynamically discover and maintain routing tables by exchanging detailed information among routers. Unlike distance-vector approaches, which rely on partial neighbor reports and can suffer from slow and routing loops due to count-to-infinity problems, link-state protocols enable each router to independently compute optimal paths based on a complete network map. The core mechanics of link-state protocols involve the generation and flooding of Link-State Advertisements (LSAs), which describe a router's local links, including neighbors, costs, and states. These LSAs are reliably flooded across the network using a reliable flooding algorithm, ensuring every router receives identical copies. Each router then constructs a Link-State Database (LSDB) from the collected LSAs, representing the entire as a weighted . To derive forwarding tables, routers execute the Shortest Path First (SPF) algorithm, specifically , which computes the minimum-cost paths from the local router to all destinations. uses a to iteratively select the node with the lowest tentative , updating paths to neighbors with relaxation steps; its is O((V + E) \log V), where V is the number of vertices (routers) and E is the number of edges (links), making it efficient for moderate-sized networks with binary heaps. A prominent example is , standardized for IPv4 networks in RFC 2328 (1998). OSPFv2 organizes the network into areas to enhance , with Area 0 serving as the backbone for inter-area routing; LSAs are categorized into types such as Router LSAs (Type 1) for intra-area and Summary LSAs (Type 3) for inter-area routes. Adjacencies form via Hello packets sent to addresses 224.0.0.5 (all OSPF routers) and 224.0.0.6 (designated routers), enabling bidirectional neighbor detection and database synchronization through Database Description and Link-State Request exchanges. OSPFv2 supports fast , typically within seconds, by triggering LSAs on changes and recomputing SPF trees. Another key protocol is , originally defined in ISO 10589 (1992) for Connectionless Network Service (CLNS) and adapted for via RFC 1195 (1990). IS-IS uses Link-State Protocol Data Units (PDUs)—analogous to LSAs—flooded within levels (Level 1 for intra-area, Level 2 for inter-area), with the network divided into areas for . It employs a type-length-value (TLV) encoding for flexibility, allowing extensions like support without protocol redesign, and uses addresses like 224.0.0.18 for Hellos. IS-IS is favored in large ISP backbones for its faster (often sub-second with modern implementations) and lower overhead in stable topologies, as it avoids IP-specific assumptions inherent in OSPF. Link-state protocols offer several advantages, including rapid after failures (typically 1-5 seconds), inherent prevention due to synchronized views, and support for equal-cost multipath (ECMP) to balance loads across equivalent paths. However, they demand significant CPU and memory resources for LSDB maintenance and SPF computations in large networks (e.g., thousands of routers), often necessitating area partitioning to limit flood scope and reduce overhead. issues can arise without careful configuration, as full-mesh flooding scales poorly beyond regional sizes.

Hybrid Protocols

Hybrid protocols, such as the (EIGRP), combine elements of distance-vector and link-state routing to achieve efficient, loop-free path computation within an autonomous system. Developed by Cisco Systems in the early 1990s as an enhancement to the (IGRP), EIGRP was initially proprietary but became an with the publication of 7868 in 2016. Unlike pure distance-vector protocols that rely solely on periodic updates and can suffer from slow and loops, or link-state protocols that flood complete topology information, hybrid approaches like EIGRP use partial topology knowledge to balance and speed. At the core of EIGRP's mechanics is the Diffusing Update Algorithm (), which ensures loop-free routing by diffusing computations across the network only when necessary. DUAL maintains a that tracks routes advertised by neighbors, including the reported (RD) from each neighbor to a destination and the feasible (FD), which is the best-known from the local router. Loop prevention is achieved through the feasibility condition: a successor route is selected only if a neighbor's RD is less than the local FD, guaranteeing no loops without requiring global . This partial topology awareness allows EIGRP to propagate updates selectively, reducing overhead compared to full link-state flooding. The Reliable Transport Protocol (RTP) supports DUAL by providing reliable, ordered delivery of EIGRP packets via sequence numbers, acknowledgments, and retransmissions, using for efficiency in stable topologies and for queries. EIGRP employs a composite to evaluate path quality, incorporating (K1), delay (K3), load (), and reliability (K5), with MTU (K4) and other factors optionally included; values emphasize and delay for a balanced assessment. The scales these components to produce a 32-bit value, enabling fine-grained path selection. EIGRP supports both IPv4 and , using number 88 and addresses like 224.0.0.10 for IPv4 and FF02:0:0:0:0:0:0:A for IPv6. Route updates occur via hello packets for neighbor discovery and maintenance, with triggered updates for changes. Key advantages of EIGRP include rapid through its query-and-response , where a router in active state queries neighbors for alternative paths and awaits replies before installing a new route, often sub-second in small networks. is enhanced by feasible successors—backup routes precomputed and stored in the topology that meet the feasibility condition—allowing instant without recomputation. This design minimizes bandwidth usage with partial updates while providing link-state-like loop prevention and fast recovery. However, EIGRP has limitations, including historical vendor specificity that restricted interoperability until RFC 7868, making it less open than standards like OSPF or . Potential issues like "stuck-in-active" states can arise if query replies timeout (default 180 seconds), leading to route recomputation delays, though mitigated by active timers and queries. The DUAL (FSM) governs route states per destination, operating independently to ensure consistency. Routes are either passive (stable and usable, with a successor and optional feasible successors) or active (unusable during recomputation, triggered by topology changes like link failures). Transitions occur via events such as updates, queries, or replies: for instance, a passive route may become active upon successor loss, diffusing a query until sufficient replies confirm a loop-free path, after which it returns to passive. This state management avoids loops by only advertising distances from confirmed successors.

Exterior Gateway Protocols

Path-Vector Protocols

Path-vector protocols are a of routing algorithms primarily used in exterior gateway protocols (EGPs) for inter-domain across autonomous systems (ASes) in large-scale networks like the . Unlike interior gateway protocols (IGPs) such as distance-vector methods, which focus on hop counts or metrics within a single domain, path-vector protocols maintain and advertise complete path sequences of ASes to destinations, enabling explicit path selection and policy enforcement. In terms of mechanics, path-vector protocols extend the distance-vector approach by including the full of ASes in route advertisements, rather than just a distance metric; routers append their own AS number to the path before propagating updates and select the best path based on local policies applied to these sequences. This allows for loop detection: if a router receives a path containing its own AS number, it discards the advertisement to prevent loops. Policies can then prioritize or reject paths based on attributes like AS sequence length or specific AS preferences, supporting complex inter-domain decisions. Key advantages include scalability for handling millions of routes across the global , as the path information abstracts internal domain details and reduces the need for full knowledge. Additionally, the protocol's policy-based nature enables autonomous systems to enforce business agreements, such as preferring shorter AS paths or avoiding certain transit providers, which is essential for commercial . However, path-vector protocols exhibit limitations, including slower times compared to IGPs, often due to conflicts that cause prolonged route oscillations during changes. —repeated advertisement and withdrawal of the same route—can also occur, exacerbating instability and increasing overhead in dynamic environments. Historically, path-vector protocols evolved from the original (EGP), specified in 1984 as a simple reachability exchange mechanism for early core gateways but limited to tree-like topologies and now obsolete. This led to the development of more robust path-vector designs, with the (BGP) emerging as the primary implementation for modern inter-domain routing.

Border Gateway Protocol (BGP)

The (BGP) serves as the primary for exchanging routing information between autonomous systems (ASes) on the , operating as a path-vector protocol that prevents routing loops by tracking AS paths. It enables decisions, allowing network operators to influence traffic flow based on business, performance, or security considerations, and has become the for interdomain routing since its widespread adoption in the 1990s. BGP version 4 (BGP-4), specified in 4271 and published in 2006, forms the core of modern implementations and supports both IPv4 and addressing through multiprotocol extensions defined in 4760. BGP establishes reliable sessions using port 179, ensuring ordered and error-checked delivery of routing updates between peers. Key BGP attributes include well-known mandatory ones like AS_PATH, which records the sequence of ASes traversed to detect loops, and NEXT_HOP, which specifies the of the next router along the path. Optional attributes encompass LOCAL_PREF for prioritizing routes within an AS based on internal policies and MED (Multi-Exit Discriminator) for suggesting preferred entry points to external ASes. BGP operates in two main modes: external BGP (eBGP) for direct peering between adjacent , typically over single-hop links, and internal BGP (iBGP) for disseminating routes within an AS, which traditionally requires a full of sessions or scalable alternatives like route reflectors to avoid N-squared overhead. Peers maintain sessions with periodic messages sent every 60 seconds by default to detect failures, while update messages propagate reachability information and withdraws remove invalid routes. Route selection follows a deterministic best-path that evaluates attributes in a fixed order: preferring the highest LOCAL_PREF, then the shortest AS_PATH length, followed by the lowest MED value among paths from the same neighboring AS, and additional tie-breakers such as the lowest IGP to the NEXT_HOP or the lowest router . To manage the Internet's scale, BGP handles a global IPv4 routing table exceeding 1 million prefixes as of November 2025, reflecting the growth in Internet-connected networks and address allocations. Mechanisms like route dampening, introduced in RFC 2439, suppress unstable routes that flap repeatedly—penalizing them with exponentially increasing suppression periods based on instability history—to prevent unnecessary propagation of transient failures across the network.

Modern Developments

IPv6-Specific Routing

Routing protocols for IPv6 have been developed through extensions to existing IPv4 protocols and the introduction of IPv6-native mechanisms to accommodate the protocol's expanded address space and features, such as mandatory support for IPsec and stateless address autoconfiguration. OSPFv3, defined in RFC 5340 (2008), adapts the Open Shortest Path First (OSPF) protocol for IPv6 by separating the control plane from the data plane, allowing OSPFv3 to operate independently of IPv4 while supporting multiple address families through link-local signaling and area flooding of link-local addresses (LLAs). This enables OSPFv3 routers to advertise IPv6 prefixes using opaque link-local addresses for neighbor discovery, ensuring compatibility with IPv6's neighbor discovery protocol (NDP). Similarly, RIPng (RIPv6), specified in RFC 2080 (1997), extends the distance-vector Routing Information Protocol for IPv6 by using UDP port 521 and IPv6 multicast addresses for updates, while introducing prefix lengths in route advertisements to handle IPv6's hierarchical addressing. For exterior routing, BGP's multiprotocol extensions in RFC 4760 (2007) enable the exchange of reachability information via the Address Family Identifier () and Subsequent Address Family Identifier (SAFI) mechanisms, allowing a single BGP session to carry both IPv4 and routes without requiring separate peering sessions. This (MP-BGP) uses the AFI value 2 for unicast (SAFI 1) and supports additional SAFIs for and VPNs, facilitating seamless integration in inter-domain environments. Intermediate System to Intermediate System () was extended for in RFC 5308 (2008), which introduces native Type-Length-Value (TLV) encodings to advertise prefixes directly in IS-IS link-state packets, leveraging the protocol's existing flooding mechanisms without altering its core adjacency formation. While no entirely new unicast routing protocols have achieved dominance for , Protocol Independent Multicast (PIM) in RFC 4601 (2003) provides robust support for routing through sparse-mode operations, using addresses (ff02::x) for protocol messages and embedded-RP mechanisms to simplify rendezvous point discovery in larger networks. These adaptations address -specific requirements, such as address handling in OSPFv3 and via route types that distinguish from prefixes, and routing challenges in PIM, where group address scoping prevents unintended flooding across sites. The larger 128-bit space poses challenges for protocols, primarily by increasing the potential size of forwarding information bases (FIBs) and requiring more efficient aggregation to mitigate route table bloat, as evidenced by the model observed in BGP tables. and specifics further complicate deployment, as protocols like OSPFv3 must explicitly filter routes to avoid suboptimal paths, while PIM's implementation demands careful management of listener discovery (MLD) integration to handle source-specific trees efficiently. In practice, dual-stack operation—running and protocols concurrently on the same routers—remains the predominant deployment model for IPv6 routing as of 2025, enabling gradual transition without disrupting existing IPv4 infrastructure. Full IPv6 routing tables in BGP have grown to approximately 238,000 entries by November 2025, reflecting increased adoption but still significantly smaller than IPv4 tables due to better aggregation practices.

Security Considerations

Routing protocols are susceptible to various security threats that can compromise network integrity, availability, and confidentiality. Key vulnerabilities include route spoofing and hijacking, where attackers falsely advertise routes to redirect traffic, often exploiting the trust-based nature of protocols like BGP through prefix announcements or leaks. Denial-of-service (DoS) attacks can overwhelm routers by flooding them with excessive updates or management messages, consuming CPU resources and disrupting routing convergence. Man-in-the-middle (MITM) attacks on peering sessions, such as those in BGP, allow or alteration of routing information since protocols like BGP lack inherent peer entity . In interior gateway protocols (IGPs), authentication mechanisms like are commonly used to protect against unauthorized updates; for instance, employs as specified in 2082, while OSPF integrates it into its cryptographic framework per 2328. However, IGPs remain vulnerable to sequence number attacks, where an attacker floods link-state advertisements (LSAs) with incremented sequence numbers in protocols like OSPF, causing routers to repeatedly recalculate the and leading to instability. For exterior gateway protocols (EGPs), particularly BGP, advanced mitigations address these issues. BGPsec, defined in RFC 8205, introduces cryptographic path validation using digital signatures to verify the authenticity and integrity of the AS path, preventing hijacking by ensuring each AS in the path has authorized the advertisement. Complementing this, the (RPKI) per RFC 6480 enables certificate-based origin validation through Route Origin Authorizations (ROAs), allowing routers to confirm that a prefix advertisement originates from the legitimate holder. General mitigation strategies across protocols include security checks, such as the Generalized Security Mechanism (GTSM) in RFC 5082, which discards packets with values below an expected threshold (e.g., 254 for directly connected peers) to limit spoofing from off-path attackers by enforcing a count limit. or TLS-based encryption provides integrity for protocol messages, while on update reception helps counter by capping the volume of incoming announcements. As of , BGPsec has seen no deployment and remains largely experimental, with limited due to implementation complexity and lack of widespread router support. Incidents underscore ongoing risks; for example, the stemmed from a BGP error that inadvertently withdrew critical prefixes, severing global for hours and highlighting the fragility of even non-malicious misconfigurations. More recently, a incident involving the prefix 203.127.225.0/24 occurred in April , demonstrating persistent vulnerabilities despite mitigation efforts.

Integration with Software-Defined Networking

(SDN) fundamentally alters traditional routing by decoupling the from the data plane, enabling a centralized controller to manage network behavior through protocols like , which communicates with switches to install flow rules and compute routes, thereby replacing the distributed decision-making of protocols such as OSPF or BGP in core networks. In this architecture, traditional routing protocols are often retained at network edges for discovery and connectivity to legacy systems, while the SDN controller handles internal path optimization and traffic engineering. This shift allows for programmable routing policies that adapt dynamically to application needs, contrasting with the static convergence of conventional protocols. Key integrations between routing protocols and SDN include BGP FlowSpec, defined in RFC 5575, which extends BGP to distribute dynamic traffic filtering rules as Network Layer Reachability Information (NLRI), enabling SDN controllers to propagate policies for without altering core forwarding tables. Similarly, OSPF serves as an underlay protocol in SDN environments, providing link-state routing for the physical fabric that supports overlay networks; for instance, in , OSPF ensures robust connectivity across compute nodes and gateways, allowing the SDN overlay to focus on virtual tenant isolation. Within SDN, advanced protocols enhance routing programmability, such as P4, a that allows developers to define custom packet processing behaviors on switches, enabling flexible routing decisions like load balancing or in-network computing without relying on vendor-specific ASICs. Another example is (EVPN), outlined in 7432, which leverages BGP as a to advertise MAC/IP reachability over VXLAN overlays, facilitating scalable multi-tenancy in SDN data centers by integrating with centralized controllers for endpoint discovery and mobility. The integration offers advantages like centralized policy enforcement, where a single controller applies consistent rules across the network, simplifying management compared to per-device configurations in traditional . It also improves scaling by offloading complex computations to the controller, reducing convergence times in large topologies, and supports hybrid models that combine SDN cores with traditional edges for gradual adoption in environments. As of 2025, trends highlight SDN's role in networks, where BGP integrates with SDN controllers to enable network slicing, partitioning resources for low-latency services like autonomous vehicles via dynamic policy orchestration. In data centers, solutions like ACI exemplify widespread adoption, using SDN to automate BGP/EVPN overlays for intent-based networking and multi-cloud scaling.

Implementation and Tools

Routing Software

Routing software encompasses the implementations that execute routing protocols on network devices, enabling dynamic route computation and exchange. These implementations range from open-source daemons suitable for diverse environments to proprietary operating systems optimized for vendor-specific hardware. Open-source options provide flexibility and community-driven enhancements, while proprietary solutions offer integrated features tailored to enterprise-scale deployments. FRRouting (FRR), the successor to , is a prominent open-source routing protocol suite for and Unix systems, supporting key protocols such as BGP, OSPF, and . It facilitates routing, peering, and integration with containerized networks. serves as a lightweight, full-featured routing daemon, with a strong emphasis on BGP for use in Internet Exchange Points and high-performance environments. ExaBGP, a Python-based tool, functions as a versatile BGP implementation primarily for testing, route injection, and network attack mitigation scenarios. Proprietary routing software includes , which provides a comprehensive suite of routing protocols integrated into Cisco's for robust networking. Juniper Junos OS emphasizes modularity and supports protocols like , enabling consistent operation across Juniper hardware with features for large-scale routing. Arista EOS, a Linux-based , delivers extensible routing capabilities, including BGP and OSPF, with a focus on programmability for cloud data centers. A common architectural feature in routing software is the use of daemon-based designs for modularity and efficiency. In FRR, the zebra daemon acts as a central IP routing manager, handling kernel table updates, interface lookups, and route redistribution across protocols to ensure seamless integration with the host's networking stack. Many implementations, including FRR, incorporate Virtual Routing and Forwarding (VRF) support to enable MPLS-based segmentation, allowing multiple isolated routing instances on a single device for enhanced traffic isolation in service provider networks. Deployments of routing software extend to Linux-based routers like , an open-source platform that leverages FRR for protocol support in virtual and cloud environments. In cloud infrastructures, AWS Transit Gateway utilizes BGP for dynamic routing across virtual private clouds and on-premises connections, providing scalable hub-and-spoke topologies. Additionally, FRR supports containerization, with images and deployments like frr-k8s enabling BGP route advertisement in cluster-based networks.

Routed Protocols

Routed protocols are protocols that carry user data across networks, such as packets, and can be forwarded by routers from source to destination based on addressing information. These protocols operate independently of protocols but depend on them to determine forwarding paths, as protocols topology information to populate routing tables used for packet delivery. Prominent examples include (IPv4) and version 6 (), which dominate modern by providing logical addressing and fragmentation for end-to-end data transmission. Legacy routed protocols, such as /Sequenced Packet Exchange (IPX/SPX) developed by for networks and for early Macintosh systems, were widely used in the 1980s and 1990s but have become obsolete with the shift to IP-based infrastructures. Routing protocols construct and maintain forwarding tables that enable routers to direct traffic for routed protocols; for instance, in networks, the (TOS) field in the IPv4 header (now evolved into Differentiated Services Code Point or DSCP in and updated IPv4) allows routing decisions to prioritize packets for (QoS). Operating at OSI Layer 3, routed protocols are encapsulated within Layer 2 frames, such as Ethernet, for transmission over , ensuring compatibility across diverse link-layer technologies. In contemporary networks, technologies like (MPLS) introduce pseudo-routed mechanisms by using labels to forward packets in lieu of traditional lookups, enhancing efficiency in service provider environments while still supporting as the underlying routed protocol. Similarly, Routing (SR), as defined in RFC 8402, integrates source-based routing instructions directly into or MPLS headers, allowing explicit path control without intermediate state maintenance in routers.

References

  1. [1]
    What is Routing? - Network Routing Explained - Amazon AWS
    Routing is the process of path selection in any network. A computer network is made of many machines, called nodes, and paths or links that connect those nodes.What Is A Router? · How Does Routing Work? · Interior Gateway ProtocolsMissing: authoritative | Show results with:authoritative
  2. [2]
    RFC 1058 - Routing Information Protocol - IETF Datatracker
    This RFC describes an existing protocol for exchanging routing information among gateways and other hosts.
  3. [3]
    RFC 4271 - A Border Gateway Protocol 4 (BGP-4) - IETF Datatracker
    This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.
  4. [4]
    Generic Threats to Routing Protocols - IETF
    Routing protocols are subject to threats at various levels. For example, threats can affect the transport subsystem, where the routing protocol can be subject ...
  5. [5]
    RFC 6550 - RPL: IPv6 Routing Protocol for Low-Power and Lossy ...
    This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from ...
  6. [6]
    [PDF] Ospf A Network Routing Protocol
    A routing protocol specifies how routers communicate with each other to distribute information that enables them to select paths between nodes on a computer ...
  7. [7]
    IP Routing - Cisco
    Select from the following IP routing technologies for more in-depth information. Technology-specific resources available from these pages can assist you.
  8. [8]
    Dynamic Routing Protocols: OSPF, EIGRP, RIPv2, IS-IS, BGP
    Dec 4, 2021 · Introduction to Routing Protocols. The purpose of routing protocols is to enable end-to-end network layer connectivity between endpoints.
  9. [9]
    [PDF] Routing Overview - Cisco
    Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric is a standard of measurement, such as path bandwidth, ...
  10. [10]
    Routing Protocols an Overview - Cisco Learning Network
    Oct 28, 2024 · Routing protocols such as Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) provides reachability ...
  11. [11]
    [PDF] CHAPTER 18 - Network Routing - II Routing Around Failures - MIT
    Nov 3, 2012 · In an ideal, correctly working routing protocol, two properties hold: 1. For any node, if the node has a route to a given destination, then ...
  12. [12]
    What Is Routing? - Cisco
    Routing is the process of selecting and defining paths for IP-packet traffic within or between networks as well as the process of managing network traffic ...
  13. [13]
    [PDF] Lecture 07-01: Network Layer Forwarding and Routing
    Network layer forwarding moves packets from router input to output, while routing determines the route from source to destination. Data plane does forwarding, ...Missing: core | Show results with:core
  14. [14]
    A Brief History of the Internet & Related Networks
    The objective was to develop communication protocols which would allow networked computers to communicate transparently across multiple, linked packet networks.
  15. [15]
    [PDF] September 1981 Internet Protocol - RFC
    Sep 3, 1981 · This document specifies the DoD Standard Internet Protocol. This document is based on six earlier editions of the ARPA Internet Protocol.
  16. [16]
    RFC 791 - Internet Protocol - IETF Datatracker
    The internet protocol is designed for use in interconnected systems of packet-switched computer communication networks. Such a system has been called a catenet.
  17. [17]
    RFC 904 - Exterior Gateway Protocol formal specification
    This document is a formal specification of the Exterior Gateway Protocol (EGP), which is used to exchange net-reachability information between Internet ...
  18. [18]
    RFC 2328 - OSPF Version 2 - IETF Datatracker
    This memo documents version 2 of the OSPF protocol. OSPF is a link-state routing protocol. It is designed to be run internal to a single Autonomous System.Missing: 1131 | Show results with:1131
  19. [19]
    RFC 1105 - Border Gateway Protocol (BGP) - IETF Datatracker
    Mar 2, 2013 · This RFC is labeled as "Legacy"; it was published before a formal source was recorded. This RFC is not endorsed by the IETF and has no formal ...Missing: 1771 | Show results with:1771
  20. [20]
    RFC 1519 - Classless Inter-Domain Routing (CIDR) - IETF Datatracker
    This memo discusses strategies for address assignment of the existing IP address space with a view to conserve the address space and stem the explosive growth ...
  21. [21]
    RFC 1812 - Requirements for IP Version 4 Routers - IETF Datatracker
    A router that supports a dynamic routing protocol MUST allow static routes to be defined with any metric valid for the routing protocol used. The router ...
  22. [22]
  23. [23]
    [PDF] Configuring Static Routing - Cisco
    Most networks use dynamic routes to communicate between routers but might have one or two static routes configured for special cases.
  24. [24]
    RFC 1058: Routing Information Protocol
    This RFC describes an existing protocol for exchanging routing information among gateways and other hosts.
  25. [25]
    IGRP Metric - Cisco
    Aug 10, 2005 · IGRP metric is calculated by adding weighted values of bandwidth, delay, load, reliability, and MTU. By default, it uses bandwidth and delay.
  26. [26]
    Understand and Use the Enhanced Interior Gateway Routing Protocol
    This document describes how to use the interior gateway protocol called Enhanced Interior Gateway Routing Protocol (EIGRP).
  27. [27]
    [PDF] dijkstra-routing-1959.pdf
    Paper, P-923, 1956. [4] BERGE, C.: Théorie des graphes et ses applications, pp. 68-69. Paris: Dunod 1958. Mathematisch Centrum. 2e Boerhaavestraat 49.
  28. [28]
    [PDF] Network Layer: Link-state and Distance-Vector Routing Protocols
    Distance vector algorithm. Bellman-Ford equation (dynamic programming) let dx. (y) := cost of least-cost path from x to y then dx. (y) = min {c(x,v) + dv. (y) ...
  29. [29]
    Autonomous System (AS) Numbers
    Jan 17, 2025 · Autonomous System (AS) Numbers are used by various routing protocols. IANA allocates AS Numbers to Regional Internet Registries (RIRs). The RIRs ...
  30. [30]
    RFC 6793 - BGP Support for Four-Octet Autonomous System (AS ...
    This document describes extensions to BGP to carry the Autonomous System numbers as four-octet entities. This document obsoletes RFC 4893 and updates RFC 4271.<|separator|>
  31. [31]
    RFC 7311 - The Accumulated IGP Metric Attribute for BGP
    ... protocols that have been designed to run within a single administrative domain. These are known collectively as "Interior Gateway Protocols" (IGPs).<|separator|>
  32. [32]
    Cisco IOS XR Deployment Best Practices for OSPF/IS-IS and BGP ...
    This document outlines some established best practices and recommendations for building simplified, efficient, and scalable networks powered by IOS XR routing ...
  33. [33]
    RFC 827 - Exterior Gateway Protocol (EGP) - IETF Datatracker
    The purpose of the Exterior Gateway Protocol (EGP) is to enable one or more autonomous systems to be used as transport media for traffic originating in some ...
  34. [34]
    RFC 2791 - Scalable Routing Design Principles - IETF Datatracker
    This document attempts to analyze routing scalability issues and define a set of principles for designing scalable routing system for large networks.Missing: differences | Show results with:differences
  35. [35]
    RFC 1930 - Guidelines for creation, selection, and registration of an ...
    This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.
  36. [36]
    [PDF] ISO/IEC 7498-1 - Ecma International
    Jun 15, 1996 · 7. Detailed description of the resulting OSI architecture. 7.1. Application Layer. 7.2. Presentation Layer. 7.3. Session Layer......... 7.4.
  37. [37]
    Classification of Routing Algorithms - GeeksforGeeks
    Jul 11, 2025 · Adaptive Algorithms are the algorithms that change their routing decisions whenever network topology or traffic load changes. It is called Dynamic Routing.
  38. [38]
    [PDF] Lecture 8: Routing I Distance-vector Algorithms - UCSD CSE
    Distance-vector algorithms tell neighbors when you know about everyone. Each router knows its address and cost to directly connected neighbors. It is ...
  39. [39]
  40. [40]
    Path Vector Protocol - an overview | ScienceDirect Topics
    A path vector protocol is defined as a type of routing protocol that allows a node to receive both the distance and the complete path to a destination from ...
  41. [41]
    Link State vs Distance Vector vs Hybrid Routing Protocols
    Jun 28, 2024 · As the name suggests, hybrid routing protocols employ the best parts of both link state and distance vector protocols to provide the shortest ...
  42. [42]
    Link State vs Distance Vector Routing Protocols | OrhanErgun.net Blog
    Mar 16, 2023 · Link state routing protocols are more efficient at handling large networks, while distance vector protocols are better suited for smaller networks.
  43. [43]
    Hybrid Routing Protocols - Advantages and Disadvantages
    Hybrid routing protocols are a combination of distance-vector and link-state routing protocols, and are used to provide a more efficient and scalable routing ...
  44. [44]
  45. [45]
  46. [46]
  47. [47]
  48. [48]
  49. [49]
    Currently Used Terminology in Global Routing Operations - IETF
    Oct 7, 2025 · Routing Information Protocol: RIP is an old and by now obsolete protocol which was used to distribute routing information. RIP is no longer in ...
  50. [50]
  51. [51]
  52. [52]
  53. [53]
  54. [54]
  55. [55]
    RFC 7868 - Cisco's Enhanced Interior Gateway Routing Protocol ...
    EIGRP is a routing protocol based on Distance Vector technology. The specific algorithm used is called DUAL, a Diffusing Update Algorithm.
  56. [56]
    Enhanced Interior Gateway Routing Protocol (EIGRP) - Cisco Press
    30-day returnsInitially, EIGRP was a Cisco proprietary protocol, but it was released to the Internet Engineering Task Force (IETF) through RFC 7868, which ...Missing: introduction | Show results with:introduction
  57. [57]
    [PDF] Loop-free routing using diffusing computations - eScholarship
    Loop-Free Routing Using Diffusing Computations. Permalink https:// ... Author. Garcia-Luna-Aceves, J.J.. Publication Date. 1993-02-01. Peer reviewed.
  58. [58]
  59. [59]
    [PDF] Network Routing with Path Vector Protocols: Theory and Applications
    For performance-oriented routing, typical in intra-domain routing, we conclude that path vec- tor protocols can be made to converge to widest or widest-.
  60. [60]
    RFC 1105: Border Gateway Protocol (BGP)
    The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol. It is built on experience gained with EGP as defined in RFC 904.
  61. [61]
    [PDF] An analysis of convergence delay in path vector routing protocols
    We also provide convergence definitions that are used throughout the paper, and describe the various enhancements that have been proposed to improve. SPVP s ...
  62. [62]
    Route Flapping: A complete guide to understand router flaps
    Route flapping is a networking issue where a router's state constantly fluctuates, switching between available and unavailable, and updating/withdrawing routes.Missing: limitations | Show results with:limitations
  63. [63]
    Active BGP entries (FIB) - BGP potaroo.net
    Active BGP entries (FIB). Table Size Metrics. The trend of the size of the BGP Forwarding Table (FIB). Also the underlying BGP Routing Table (RIB).
  64. [64]
    AS131072 IPv6 BGP Table Data - BGP potaroo.net - Geoff Huston
    Active BGP entries (FIB). Table Size Metrics. The trend of the size of the BGP Forwarding Table (FIB) and the underlying BGP Routing Table (RIB).Prefix Length Distributions · As Diameter Reports · Bgp Update Reports
  65. [65]
    IPv6 in 2025 – Where Are We? - Cisco Blogs
    Jan 29, 2025 · They foresee an IPv6-only future and know that remaining in a dual-stack state indefinitely is the worst situation to be in, even though it is ...
  66. [66]
    IPv6 CIDR Report
    This report is generated from an analysis of the BGP routing table withinAS131072, and was produced at Sat Nov 8 20:46:36 2025 AEST.
  67. [67]
    What is BGP hijacking? - Cloudflare
    BGP hijacking is when attackers maliciously reroute Internet traffic. Attackers accomplish this by falsely announcing ownership of groups of IP addresses, ...
  68. [68]
    RFC 2082 - RIP-2 MD5 Authentication - IETF Datatracker
    RIP-2 MD5 Authentication · RFC - Proposed Standard January 1997. Report errata. Obsoleted by RFC 4822. Was draft-ietf-ripv2-md5 (ripv2 WG) · 03 · RFC 2082.
  69. [69]
    RFC 6863 - Analysis of OSPF Security According to the Keying and ...
    The cryptographic authentication described in RFC 5709 meets modern standards for per-packet integrity protection. ... OSPF cryptographic authentication. The ...
  70. [70]
    RFC 8205 - BGPsec Protocol Specification - IETF Datatracker
    This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes)
  71. [71]
    RFC 6480 - An Infrastructure to Support Secure Internet Routing
    This document describes an architecture for an infrastructure to support improved security of Internet routing.
  72. [72]
    RFC 5082 - The Generalized TTL Security Mechanism (GTSM)
    RFC 5082's GTSM generalizes using TTL/Hop Limit to protect routers from CPU attacks by verifying if a packet originated from an adjacent node.
  73. [73]
    BGPsec — could you run it if you wanted to? - APNIC Blog
    May 23, 2025 · BGPsec is an extension to BGP that provides the basis for path verification and can protect against the two types of attack mentioned above.
  74. [74]
    Understanding how Facebook disappeared from the Internet
    Oct 4, 2021 · A BGP UPDATE message informs a router of any changes you've made to a prefix advertisement or entirely withdraws the prefix. We can clearly see ...
  75. [75]
    What is Software-Defined Networking (SDN)? - VMware
    SDN is an approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware ...
  76. [76]
    Software-Defined Networking | CS 168 Textbook
    In the context of routing, the SDN architecture involves having a centralized control center compute routes and distribute them to individual routers. We'll see ...Missing: replacing | Show results with:replacing
  77. [77]
    What Is Software-Defined Networking (SDN)? - IBM
    SDN is an approach to networking that uses software controllers that can be driven by APIs to communicate with hardware infrastructure and direct network ...
  78. [78]
    RFC 5575: Dissemination of Flow Specification Rules
    This document defines a new Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute traffic ...
  79. [79]
    VXLAN Underlay OSPF - NetworkLessons.com
    OSPF can be used for the VXLAN underlay. This lesson explains the configuration with /31 prefixes and ip unnumbered interfaces.<|separator|>
  80. [80]
    OpenStack Networking — Neutron 27.1.0.dev97 documentation
    Aug 23, 2024 · OpenStack Networking allows you to create and manage network objects, such as networks, subnets, and ports, which other OpenStack services can use.Openstack Networking¶ · Concepts · Provider Networks
  81. [81]
    Hybrid SDN evolution: A comprehensive survey of the state-of-the-art
    Jun 19, 2021 · SDN and SR technologies can be deployed together to enable key benefits such as scalability (SR minimizes state changes by maintaining the ...
  82. [82]
    Software Defined Networking Market Trends 2025–2028 - LinkedIn
    May 19, 2025 · Why 5G Networks Need SDN for Dynamic Orchestration ... Due to their inherent complexity, 5G networks require low-latency, configurable routing.
  83. [83]
    [PDF] Cisco 2025 Networking Research
    AI-ready infrastructure that expands data center, edge, and cloud environments to run high-performance workloads closer to where data is created – unlocking ...
  84. [84]
    FRRouting
    FRRouting (FRR) is a free, open-source routing protocol suite for Linux/Unix, implementing protocols like BGP and OSPF, and used for various network purposes.Missing: ExaBGP features
  85. [85]
    The BIRD Internet Routing Daemon Project
    ### Summary of BIRD Routing Software
  86. [86]
    Exa-Networks/exabgp: The BGP swiss army knife of ... - GitHub
    ExaBGP has been used to: provide cross-datacenters failover solutions migrating /32 service IP. mitigate network attacks, centrally deploying network-level ...Missing: FRR | Show results with:FRR
  87. [87]
    404 | HPE Juniper Networking US
    **Summary of Juniper Junos OS and Routing Protocols:**
  88. [88]
    Arista EOS® - Cloud Network Operating System
    Arista EOS is a fully programmable and highly modular, Linux-based network operation system, using familiar industry standard CLI and runs a single binary ...Open and Programmable · EOS · EOS Applications · CloudVisionMissing: proprietary Cisco Juniper Junos
  89. [89]
    Zebra — FRR latest documentation - FRRouting User Guide
    Zebra is an IP routing manager. It provides kernel routing table updates, interface lookups, and redistribution of routes between different routing protocols.Missing: software | Show results with:software
  90. [90]
    Documentation for multiple instance and multi-vrf support · Issue #353
    Apr 8, 2017 · Is there any documentation regarding setting up the FRR/Zebra daemons and start the OSPF daemon for each namespaces? I'm playing around with ...
  91. [91]
    VyOS User Guide — VyOS 1.5.x (circinus) documentation
    ### Summary of VyOS as a Linux Router and Routing Protocols Support
  92. [92]
    metallb/frr-k8s: A kubernetes-based FRR daemon to be ... - GitHub
    A kubernetes based daemonset that exposes a subset of the FRR API in a kubernetes compliant manner. The rationale behind the creation of this project is to ...Missing: v8 | Show results with:v8
  93. [93]
    Routing and Routed protocol - Cisco Learning Network
    A routing protocol such as RIP, EIGRP, OSPF, etc is one that shares routing information with one another for the purposes of routing packets through the network ...
  94. [94]
    What is the difference between routing protocols and routed protcols?
    Jun 4, 2016 · Routing protocols allow routers to exchange routing information so they can learn about networks from other routers.
  95. [95]
    IP Routing: Protocol-Independent Configuration Guide, Cisco IOS ...
    Nov 24, 2014 · This module describes how to configure basic IP routing. The Internet Protocol (IP) is a network layer (Layer 3) protocol that contains addressing information.
  96. [96]
    CCNA Certification: Routed Protocols vs Routing Protocols
    A routed protocol is a protocol by which data can be routed. Examples of a routed protocol are IP, IPX, and AppleTalk.Missing: explanation | Show results with:explanation
  97. [97]
    Common network protocols
    Jul 28, 2004 · These "local area" protocol suites include: AppleTalk, originally developed for Macintosh computers and printers; Netware (IPX/SPX) ...