Routingis the process of selecting a path for traffic in anetworkor between or across multiple networks. Broadly, routing is performed in many types of networks, includingcircuit-switched networks,such as thepublic switched telephone network(PSTN), andcomputer networks,such as theInternet.

In packet switching networks, routing is the higher-level decision making that directsnetwork packetsfrom their source toward their destination through intermediatenetwork nodesby specific packet forwarding mechanisms.Packet forwardingis the transit of network packets from onenetwork interfaceto another. Intermediate nodes are typicallynetwork hardwaredevices such asrouters,gateways,firewalls,orswitches.General-purposecomputersalso forward packets and perform routing, although they have no specially optimized hardware for the task.

The routing process usually directs forwarding on the basis ofrouting tables.Routing tables maintain a record of the routes to various network destinations. Routing tables may be specified by an administrator, learned by observing network traffic or built with the assistance ofrouting protocols.

Routing, in a narrower sense of the term, often refers toIP routingand is contrasted withbridging.IP routing assumes thatnetwork addressesare structured and that similar addresses imply proximity within the network. Structured addresses allow a single routing table entry to represent the route to a group of devices. In large networks, structured addressing (routing, in the narrow sense) outperforms unstructured addressing (bridging). Routing has become the dominant form of addressing on the Internet. Bridging is still widely used withinlocal area networks.

Delivery schemes

edit
Routing schemes
Unicast

Broadcast

Multicast

Anycast

Routing schemes differ in how they deliver messages:

  • Unicastdelivers a message to a single specific node using aone-to-oneassociation between a sender and destination: each destination address uniquely identifies a single receiver endpoint.
  • Broadcastdelivers a message to all nodes in the network using aone-to-allassociation; a singledatagram(orpacket) from one sender is routed to all of the possibly multiple endpoints associated with thebroadcast address.The network automatically replicates datagrams as needed to reach all the recipients within the scope of the broadcast, which is generally an entire networksubnet.
  • Multicastdelivers a message to a group of nodes that have expressed interest in receiving the message using aone-to-many-of-manyormany-to-many-of-manyassociation; datagrams are routed simultaneously in a single transmission to many recipients. Multicast differs from broadcast in that the destination address designates a subset, not necessarily all, of the accessible nodes.
  • Anycastdelivers a message to any one out of a group of nodes, typically the one nearest to the source using aone-to-one-of-many[1]association where datagrams are routed to any single member of a group of potential receivers that are all identified by the same destination address. The routing algorithm selects the single receiver from the group based on which is the nearest according to some distance or cost measure.

Unicast is the dominant form of message delivery on the Internet. This article focuses on unicast routing algorithms.

Topology distribution

edit

Withstatic routing,small networks may use manually configured routing tables. Larger networks have complextopologiesthat can change rapidly, making the manual construction of routing tables unfeasible. Nevertheless, most of thepublic switched telephone network(PSTN) uses pre-computed routing tables, with fallback routes if the most direct route becomes blocked (seerouting in the PSTN).

Dynamic routingattempts to solve this problem by constructing routing tables automatically, based on information carried byrouting protocols,allowing the network to act nearly autonomously in avoiding network failures and blockages. Dynamic routing dominates the Internet. Examples of dynamic-routing protocols and algorithms includeRouting Information Protocol(RIP),Open Shortest Path First(OSPF) andEnhanced Interior Gateway Routing Protocol(EIGRP).

Distance vector algorithms

edit

Distance vector algorithms use theBellman–Ford algorithm.This approach assigns acostnumber to each of the links between each node in the network. Nodes send information from point A to point B via the path that results in the lowesttotal cost(i.e. the sum of the costs of the links between the nodes used).

When a node first starts, it only knows of its immediate neighbors and the direct cost involved in reaching them. (This information — the list of destinations, the total cost to each, and thenext hopto send data to get there — makes up the routing table, ordistance table.) Each node, on a regular basis, sends to each neighbor node its own current assessment of the total cost to get to all the destinations it knows of. The neighboring nodes examine this information and compare it to what they already know; anything that represents an improvement on what they already have, they insert in their own table. Over time, all the nodes in the network discover the best next hop and total cost for all destinations.

When a network node goes down, any nodes that used it as their next hop discard the entry and convey the updated routing information to all adjacent nodes, which in turn repeat the process. Eventually, all the nodes in the network receive the updates and discover new paths to all the destinations that do not involve the down node.

edit

When applying link-state algorithms, agraphical mapof the network is the fundamental data used for each node. To produce its map, each node floods the entire network with information about the other nodes it can connect to. Each node then independently assembles this information into a map. Using this map, each router independently determines the least-cost path from itself to every other node using a standardshortest pathsalgorithm such asDijkstra's algorithm.The result is atree graphrooted at the current node, such that the path through the tree from the root to any other node is the least-cost path to that node. This tree then serves to construct the routing table, which specifies the best next hop to get from the current node to any other node.

edit

A link-state routing algorithm optimized formobile ad hoc networksis the optimized Link State Routing Protocol (OLSR).[2]OLSR is proactive; it uses Hello and Topology Control (TC) messages to discover and disseminate link-state information through the mobile ad hoc network. Using Hello messages, each node discovers 2-hop neighbor information and elects a set ofmultipoint relays(MPRs). MPRs distinguish OLSR from other link-state routing protocols.

Path-vector protocol

edit

Distance vector and link-state routing are both intra-domain routing protocols. They are used inside anautonomous system,but not between autonomous systems. Both of these routing protocols become intractable in large networks and cannot be used ininter-domainrouting. Distance vector routing is subject to instability if there are more than a few hops in the domain. Link state routing needs significant resources to calculate routing tables. It also creates heavy traffic due to flooding.

Path-vector routing is used for inter-domain routing. It is similar to distance vector routing. Path-vector routing assumes that one node (there can be many) in each autonomous system acts on behalf of the entire autonomous system. This node is called thespeaker node.The speaker node creates a routing table and advertises it to neighboring speaker nodes in neighboring autonomous systems. The idea is the same as distance vector routing except that only speaker nodes in each autonomous system can communicate with each other. The speaker node advertises the path, not the metric, of the nodes in its autonomous system or other autonomous systems.

The path-vector routing algorithm is similar to the distance vector algorithm in the sense that each border router advertises the destinations it can reach to its neighboring router. However, instead of advertising networks in terms of a destination and the distance to that destination, networks are advertised as destination addresses and path descriptions to reach those destinations. The path, expressed in terms of the domains (or confederations) traversed so far, is carried in a special path attribute that records the sequence of routing domains through which the reachability information has passed. A route is defined as a pairing between a destination and the attributes of the path to that destination, thus the name, path-vector routing; The routers receive a vector that contains paths to a set of destinations.[3]

Path selection

edit

Path selection involves applying arouting metricto multiple routes to select (or predict) the best route. Most routing algorithms use only one network path at a time.Multipath routingand specificallyequal-cost multi-path routingtechniques enable the use of multiple alternative paths.

In computer networking, the metric is computed by a routing algorithm, and can cover information such asbandwidth,network delay,hop count,path cost, load,maximum transmission unit,reliability, and communication cost.[4]The routing table stores only the best possible routes, whilelink-stateor topological databases may store all other information as well.

In case of overlapping or equal routes, algorithms consider the following elements in priority order to decide which routes to install into the routing table:

  1. Prefix length:A matching route table entry with a longer subnet mask is always preferred as it specifies the destination more exactly.
  2. Metric:When comparing routes learned via the same routing protocol, a lower metric is preferred. Metrics cannot be compared between routes learned from different routing protocols.
  3. Administrative distance:When comparing route table entries from different sources such as different routing protocols and static configuration, a lower administrative distance indicates a more reliable source and thus a preferred route.

Because a routing metric is specific to a given routing protocol, multi-protocol routers must use some externalheuristicto select between routes learned from different routing protocols.Ciscorouters, for example, attribute a value known as theadministrative distanceto each route, where smaller administrative distances indicate routes learned from a protocol assumed to be more reliable.

A local administrator can set up host-specific routes that provide more control over network usage, permits testing, and better overall security. This is useful for debugging network connections or routing tables.

In some small systems, a single central device decides ahead of time the complete path of every packet. In some other small systems, whichever edge device injects a packet into the network decides ahead of time the complete path of that particular packet. In either case, the route-planning device needs to know a lot of information about what devices are connected to the network and how they are connected to each other. Once it has this information, it can use an algorithm such asA* search algorithmto find the best path.

In high-speed systems, there are so many packets transmitted every second that it is infeasible for a single device to calculate the complete path for each and every packet. Early high-speed systems dealt with this withcircuit switchingby setting up a path once for the first packet between some source and some destination; later packets between that same source and that same destination continue to follow the same path without recalculating until the circuitteardown.Later high-speed systems inject packets into the network without any one device ever calculating a complete path for packets.

In large systems, there are so many connections between devices, and those connections change so frequently, that it is infeasible for any one device to even know how all the devices are connected to each other, much less calculate a complete path through them. Such systems generally usenext-hoprouting.

Most systems use a deterministicdynamic routingalgorithm. When a device chooses a path to a particular final destination, that device always chooses the same path to that destination until it receives information that makes it think some other path is better.

A few routing algorithms do not use a deterministic algorithm to find the best link for a packet to get from its original source to its final destination. Instead, to avoid congestion hot spots in packet systems, a few algorithms use a randomized algorithm—Valiant's paradigm—that routes a path to a randomly picked intermediate destination, and from there to its true final destination.[5][6]In many early telephone switches, a randomizer was often used to select the start of a path through amultistage switching fabric.

Depending on the application for which path selection is performed, different metrics can be used. For example, for web requests one can use minimum latency paths to minimize web page load time, or for bulk data transfers one can choose the least utilized path to balance load across the network and increase throughput. A popular path selection objective is to reduce the average completion times of traffic flows and the total network bandwidth consumption. Recently, a path selection metric was proposed that computes the total number of bytes scheduled on the edges per path as selection metric.[7]An empirical analysis of several path selection metrics, including this new proposal, has been made available.[8]

Multiple agents

edit

In some networks, routing is complicated by the fact that no single entity is responsible for selecting paths; instead, multiple entities are involved in selecting paths or even parts of a single path. Complications or inefficiency can result if these entities choose paths to optimize their own objectives, which may conflict with the objectives of other participants.

A classic example involves traffic in a road system, in which each driver picks a path that minimizes their travel time. With such routing, theequilibriumroutes can be longer than optimal for all drivers. In particular,Braess's paradoxshows that adding a new road canlengthentravel times for all drivers.

In a single-agent model used, for example, for routingautomated guided vehicles(AGVs) on a terminal, reservations are made for each vehicle to prevent simultaneous use of the same part of an infrastructure. This approach is also referred to as context-aware routing.[9]

The Internet is partitioned intoautonomous systems(ASs) such asinternet service providers(ISPs), each of which controls routes involving its network. Routing occurs at multiple levels. First, AS-level paths are selected via theBGPprotocol that produces a sequence of ASs through which packets flow. Each AS may have multiple paths, offered by neighboring ASs, from which to choose. These routing decisions often correlate with business relationships with these neighboring ASs,[10]which may be unrelated to path quality or latency. Second, once an AS-level path has been selected, there are often multiple corresponding router-level paths to choose from. This is due, in part, because two ISPs may be connected through multiple connections. In choosing the single router-level path, it is common practice for each ISP to employhot-potato routing:sending traffic along the path that minimizes the distance through the ISP's own network—even if that path lengthens the total distance to the destination.

For example, consider two ISPs,AandB.Each has a presence inNew York,connected by a fast link with latency5ms—and each has a presence inLondonconnected by a 5 ms link. Suppose both ISPs have trans-Atlantic links that connect their two networks, butA's link has latency 100 ms andB's has latency 120 ms. When routing a message from a source inA's London network to a destination inB's New York network,Amay choose to immediately send the message toBin London. This savesAthe work of sending it along an expensive trans-Atlantic link, but causes the message to experience latency 125 ms when the other route would have been 20 ms faster.

Additionally, a similar routing challenge can be observed in cellular networks, where different packets are destined for various endpoints, and each link exhibits varying spectral efficiency. In this context, the selection of theoptimalpath involves considering latency and packet error rate. To address this, multiple independent entities, one for each base station, play a crucial role in path selection while striving to optimize overall network performance.[11]

A 2003 measurement study of Internet routes found that, between pairs of neighboring ISPs, more than 30% of paths have inflated latency due to hot-potato routing, with 5% of paths being delayed by at least 12 ms. Inflation due to AS-level path selection, while substantial, was attributed primarily to BGP's lack of a mechanism to directly optimize for latency, rather than to selfish routing policies. It was also suggested that, were an appropriate mechanism in place, ISPs would be willing to cooperate to reduce latency rather than use hot-potato routing.[12]Such a mechanism was later published by the same authors, first for the case of two ISPs[13]and then for the global case.[14]

Route analytics

edit

As the Internet and IP networks have becomemission criticalbusiness tools, there has been increased interest in techniques and methods to monitor the routing posture of networks. Incorrect routing or routing issues cause undesirable performance degradation,flappingor downtime. Monitoring routing in a network is achieved usingroute analyticstools and techniques.[15]

Centralized routing

edit

In networks where a logically centralized control is available over the forwarding state, for example, usingsoftware-defined networking,routing techniques can be used that aim to optimize global and network-wide performance metrics. This has been used by large internet companies that operate many data centers in different geographical locations attached using private optical links, examples of which include Microsoft's Global WAN,[16]Facebook's Express Backbone,[17]and Google's B4.[18]

Global performance metrics to optimize include maximizing network utilization, minimizing traffic flow completion times, maximizing the traffic delivered prior to specific deadlines and reducing the completion times of flows.[19]Work on the later over private WAN discusses modeling routing as a graph optimization problem by pushing all the queuing to the end-points. The authors also propose a heuristic to solve the problem efficiently while sacrificing negligible performance.[20]

See also

edit

References

edit
  1. ^Goścień, Róża; Walkowiak, Krzysztof; Klinkowski, Mirosław (2015-03-14)."Tabu search algorithm for routing, modulation and spectrum allocation in elastic optical network with anycast and unicast traffic".Computer Networks.79:148–165.doi:10.1016/j.comnet.2014.12.004.ISSN1389-1286.
  2. ^RFC 3626
  3. ^RFC1322
  4. ^Baumann, Rainer; Heimlicher, Simon; Strasser, Mario; Weibel, Andreas (February 10, 2007),A Survey on Routing Metrics(PDF),retrieved2020-05-04
  5. ^Michael Mitzenmacher; Andréa W. Richa; Ramesh Sitaraman, "Randomized Protocols for Circuit Routing",The Power of Two Random Choices: A Survey of Techniques and Results(PDF),p. 34,archived(PDF)from the original on Dec 13, 2023
  6. ^Stefan Haas (1998),"The IEEE 1355 Standard: Developments, Performance and Application in High Energy Physics"(PDF),INSPIRE,p. 15,archived(PDF)from the original on May 16, 2019,To eliminate network hot spots,... a two phase routing algorithm. This involves every packet being first sent to a randomly chosen intermediate destination; from the intermediate destination it is forwarded to its final destination. This algorithm, referred to as Universal Routing, is designed to maximize capacity and minimize delay under conditions of heavy load.
  7. ^Noormohammadpour, M.; Raghavendra, C. S. (Apr 2018)."Poster Abstract: Minimizing Flow Completion Times using Adaptive Routing over Inter-Datacenter Wide Area Networks".doi:10.1109/INFCOMW.2018.8406853– via ResearchGate.
  8. ^Noormohammadpour, M; Raghavendra, C. S. (Apr 2018)."Minimizing Flow Completion Times using Adaptive Routing over Inter-Datacenter Wide Area Networks".doi:10.13140/RG.2.2.36009.90720– via ResearchGate.
  9. ^Zutt, Jonne; van Gemund, Arjan J.C.; de Weerdt, Mathijs M.; Witteveen, Cees (2010)."Dealing with Uncertainty in Operational Transport Planning"(PDF).Archived fromthe original(PDF)on Sep 22, 2017.In R.R. Negenborn and Z. Lukszo and H. Hellendoorn (Eds.) Intelligent Infrastructures, Ch. 14, pp. 355–382. Springer.
  10. ^Matthew Caesar andJennifer Rexford."BGP routing policies in ISP networks".IEEE Network Magazine, special issue on Interdomain Routing, Nov/Dec 2005.
  11. ^Shahaf Yamin and Haim H. Permuter. "Multi-agent reinforcement learning for network routing in integrated access backhaul networks".Ad Hoc Networks,Volume 153, 2024, 103347,ISSN1570-8705,doi:10.1016/j.adhoc.2023.103347.
  12. ^Neil Spring, Ratul Mahajan, and Thomas Anderson. "Quantifying the Causes of Path Inflation".Proc.SIGCOMM2003.
  13. ^Ratul Mahajan, David Wetherall, and Thomas Anderson. "Negotiation-Based Routing Between Neighboring ISPs".Proc.NSDI2005.
  14. ^Ratul Mahajan, David Wetherall, and Thomas Anderson.Mutually Controlled Routing with Independent ISPs.Proc.NSDI2007.
  15. ^Santhi, P.; Ahmed, Md Shakeel; Mehertaj, Sk; Manohar, T. Bharath.An Efficient Security Way of Authentication and Pair wise Key Distribution with Mobile Sinks in Wireless Sensor Networks.CiteSeerX10.1.1.392.151.
  16. ^Khalidi, Yousef (March 15, 2017)."How Microsoft builds its fast and reliable global network".
  17. ^"Building Express Backbone: Facebook's new long-haul network".May 1, 2017.
  18. ^"Inside Google's Software-Defined Network".May 14, 2017.
  19. ^Noormohammadpour, Mohammad; Raghavendra, Cauligi (16 July 2018). "Datacenter Traffic Control: Understanding Techniques and Tradeoffs".IEEE Communications Surveys and Tutorials.20(2):1492–1525.arXiv:1712.03530.doi:10.1109/COMST.2017.2782753.S2CID28143006.
  20. ^Noormohammadpour, Mohammad; Srivastava, Ajitesh; Raghavendra, Cauligi (2018)."On Minimizing the Completion Times of Long Flows over Inter-Datacenter WAN".IEEE Communications Letters.22(12):2475–2478.arXiv:1810.00169.Bibcode:2018arXiv181000169N.doi:10.1109/LCOMM.2018.2872980.S2CID52898719.

Further reading

edit
edit