[Back to Lecture Notes page]

Routing Algorithms

If all routers have a solution for this, then we basically can say we have a route from any source to any destination. Note that in some algorithms and protocols, not all routers will have the full routes for all possible source/destination, but that doesn't matter – the routers ONLY needs to know which NEXT router to send the packets.

Regardless of when we decide on constructing the routes, we can still make use of the same information and come up with the same routes.

 

Desirable Properties of Routing Algorithms

 

Static vs Dynamic Routing

 

Finding a Sink Tree

If router J is on the optimal path from I to K, then optimal path from J to K is also on the same path.

 

Static Routing

 

Shortest Path Routing

Read section 5.2.2 and see figure 5-6 p349.

 

Flooding

If every router sends all packets out to all lines, there will be an exponential increase in the number of packets and eventually the routers will all be jammed with packets. There needs to be some mechanism which

 

Flow Based Routing

 

Dynamic Routing

 

Distance Vector Routing

 

Link State Routing

  1. Discover its neighbours and addresses – this is done by sending out HELLO packets on start-up and receiving replies from neighbours.
  2. Measure the cost to each neighbour – measure the round-trip time taken to send an ECHO packet and to receive a reply.
  3. Construct link state packets and send all routers – these link state packets contains what each router knows about the cost to each of its neighbours. See figure 5-15 p362.
  4. Compute the shortest path to each router based on received link state packets from other routers.

 

Hierarchical Routing

Figure 5-17 p366

 

Routing for Mobile Hosts

 

Broadcast Routing

 

Multicast Routing

Eg. a news update service where news is sent to every user who subscribes

In a LAN, we are less security conscious and assume that the supporting protocols for each machine will ignore all packets not meant for it. Here we have a set of routers from very different networks. We can't trust that all routers (or their administrators) will not illegally read the packets.

 

[Back to Lecture Notes page]