skip to main content
RFC2991: Multipath Issues in Unicast and Multicast Next-Hop Selection2000 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 November 2000
Bibliometrics
Skip Abstract Section
Abstract

Various routing protocols, including Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (ISIS), explicitly allow "Equal-Cost Multipath" (ECMP) routing. Some router implementations also allow equal-cost multipath usage with RIP and other routing protocols. The effect of multipath routing on a forwarder is that the forwarder potentially has several next-hops for any given destination and must use some method to choose which next- hop should be used for a given data packet.

RFC Downloads

Cited By

  1. ACM
    Zheng C, Rienecker B and Zilberman N QCMP Proceedings of the 2nd ACM SIGCOMM Workshop on Future of Internet Routing & Addressing, (35-40)
  2. ACM
    Wetherall D, Kabbani A, Jacobson V, Winget J, Cheng Y, Morrey III C, Moravapalle U, Gill P, Knight S and Vahdat A Improving Network Availability with Protective ReRoute Proceedings of the ACM SIGCOMM 2023 Conference, (684-695)
  3. Desmouceaux Y, Enguehard M and Clausen T (2021). Joint Monitorless Load-Balancing and Autoscaling for Zero-Wait-Time in Data Centers, IEEE Transactions on Network and Service Management, 18:1, (672-686), Online publication date: 1-Mar-2021.
  4. ACM
    Paillisse J, Portoles M, Lopez A, Rodriguez-Natal A, Iacobacci D, Leong J, Moreno V, Cabellos A, Maino F and Hooda S SD-access Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, (496-508)
  5. ACM
    Chahlaoui F, El-Fenni M and Dahmouni H Performance Analysis of Load Balancing Mechanisms in SDN Networks Proceedings of the 2nd International Conference on Networking, Information Systems & Security, (1-8)
  6. Abdou A, van Oorschot P and Wan T (2018). Comparative Analysis of Control Plane Security of SDN and Conventional Networks, IEEE Communications Surveys & Tutorials, 20:4, (3542-3559), Online publication date: 1-Oct-2018.
  7. ACM
    Rottenstreich O, Kanizo Y, Kaplan H and Rexford J Accurate Traffic Splitting on Commodity Switches Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures, (311-320)
  8. Zhang Q, Yu G, Guo C, Dang Y, Swanson N, Yang X, Yao R, Chintalapati M, Krishnamurthy A and Anderson T Deepview Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, (519-532)
  9. Araújo J, Saino L, Buytenhek L and Landa R Balancing on the edge Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, (111-124)
  10. Desmouceaux Y, Pfister P, Tollet J, Townsley M, Clausen T, Tollet J, Townsley M, Desmouceaux Y, Clausen T and Pfister P (2018). 6LB, IEEE/ACM Transactions on Networking, 26:2, (819-834), Online publication date: 1-Apr-2018.
  11. Kohler T, Dürr F and Rothermel K ZeroSDN Proceedings of the Symposium on Architectures for Networking and Communications Systems, (25-37)
  12. Cui H, Karame G, Klaedtke F and Bifulco R (2016). On the Fingerprinting of Software-Defined Networks, IEEE Transactions on Information Forensics and Security, 11:10, (2160-2173), Online publication date: 1-Oct-2016.
  13. ACM
    Guo C, Wu H, Deng Z, Soni G, Ye J, Padhye J and Lipshteyn M RDMA over Commodity Ethernet at Scale Proceedings of the 2016 ACM SIGCOMM Conference, (202-215)
  14. Ahad N, Qadir J and Ahsan N (2016). Neural networks in wireless networks, Journal of Network and Computer Applications, 68:C, (1-27), Online publication date: 1-Jun-2016.
  15. ACM
    Gkounis D, Kotronis V, Liaskos C and Dimitropoulos X (2016). On the Interplay of Link-Flooding Attacks and Traffic Engineering, ACM SIGCOMM Computer Communication Review, 46:2, (5-11), Online publication date: 9-Apr-2016.
  16. Lan C, Sherry J, Popa R, Ratnasamy S and Liu Z Embark Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, (255-273)
  17. ACM
    Liu V, Zhuo D, Peter S, Krishnamurthy A and Anderson T Subways Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, (1-13)
  18. ACM
    Kang N, Ghobadi M, Reumann J, Shraer A and Rexford J Efficient traffic splitting on commodity switches Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, (1-13)
  19. Zhang J, Xi K and Chao H (2015). Load balancing in IP networks using generalized destination-based multipath routing, IEEE/ACM Transactions on Networking, 23:6, (1959-1969), Online publication date: 1-Dec-2015.
  20. Antonakopoulos S, Bejerano Y and Koppol P (2015). Full protection made easy, IEEE/ACM Transactions on Networking, 23:4, (1229-1242), Online publication date: 1-Aug-2015.
  21. ACM
    Liu N, Haider A, Sun X and Jin D FatTreeSim Proceedings of the 3rd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (199-210)
  22. Lopes N, Bjørner N, Godefroid P, Jayaraman K and Varghese G Checking beliefs in dynamic networks Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, (499-512)
  23. ACM
    Agarwal K, Dixon C, Rozner E and Carter J Shadow MACs Proceedings of the third workshop on Hot topics in software defined networking, (157-162)
  24. ACM
    Cao J, Xia R, Yang P, Guo C, Lu G, Yuan L, Zheng Y, Wu H, Xiong Y and Maltz D Per-packet load-balanced, low-latency routing for clos-based data center networks Proceedings of the ninth ACM conference on Emerging networking experiments and technologies, (49-60)
  25. ACM
    Patel P, Bansal D, Yuan L, Murthy A, Greenberg A, Maltz D, Kern R, Kumar H, Zikos M, Wu H, Kim C and Karri N (2013). Ananta, ACM SIGCOMM Computer Communication Review, 43:4, (207-218), Online publication date: 19-Sep-2013.
  26. ACM
    Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M, Zolla J, Hölzle U, Stuart S and Vahdat A (2013). B4, ACM SIGCOMM Computer Communication Review, 43:4, (3-14), Online publication date: 19-Sep-2013.
  27. ACM
    Patel P, Bansal D, Yuan L, Murthy A, Greenberg A, Maltz D, Kern R, Kumar H, Zikos M, Wu H, Kim C and Karri N Ananta Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (207-218)
  28. ACM
    Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M, Zolla J, Hölzle U, Stuart S and Vahdat A B4 Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (3-14)
  29. Donnet B Internet topology discovery DataTraffic Monitoring and Analysis, (44-81)
  30. ACM
    Handigol N, Heller B, Jeyakumar V, Lantz B and McKeown N Reproducible network experiments using container-based emulation Proceedings of the 8th international conference on Emerging networking experiments and technologies, (253-264)
  31. ACM
    Anderson J, Braud R, Kapoor R, Porter G and Vahdat A xOMB Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, (49-60)
  32. ACM
    Krieger O, McGachey P and Kanevsky A (2010). Enabling a marketplace of clouds, ACM SIGOPS Operating Systems Review, 44:4, (103-114), Online publication date: 13-Dec-2010.
  33. ACM
    Araújo J, Rio M and Pavlou G A mutualistic resource pooling architecture Proceedings of the Re-Architecting the Internet Workshop, (1-6)
  34. Banner R and Orda A Designing low-capacity backup networks for fast restoration Proceedings of the 29th conference on Information communications, (1864-1872)
  35. Yuan Q, Wu J and Cardei I (2009). SMRS, International Journal of Parallel, Emergent and Distributed Systems, 24:1, (69-84), Online publication date: 1-Feb-2009.
  36. ACM
    Al-Fares M, Loukissas A and Vahdat A (2008). A scalable, commodity data center network architecture, ACM SIGCOMM Computer Communication Review, 38:4, (63-74), Online publication date: 1-Oct-2008.
  37. ACM
    Al-Fares M, Loukissas A and Vahdat A A scalable, commodity data center network architecture Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (63-74)
  38. Ramamohanarao K, Gupta K, Peng T and Leckie C The curse of ease of access to the internet Proceedings of the 3rd international conference on Information systems security, (234-249)
  39. Bohacek S, Hespanha J, Lee J, Lim C and Obraczka K (2007). Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks, IEEE Transactions on Parallel and Distributed Systems, 18:9, (1227-1240), Online publication date: 1-Sep-2007.
  40. Enyedi G, Rétvári G and Cinkler T A novel loop-free IP fast reroute algorithm Proceedings of the 13th open European summer school and IFIP TC6.6 conference on Dependable and adaptable networks and services, (111-119)
  41. Donnet B, Huffaker B, Friedman T and Claffy K Increasing the coverage of a cooperative internet topology discovery algorithm Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (738-748)
  42. Dongmei Wang , Guangzhi Li and Doverspike R IGP Weight Setting in Multimedia IP Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2566-2570)
  43. Banner R and Orda A (2007). Multipath routing algorithms for congestion minimization, IEEE/ACM Transactions on Networking, 15:2, (413-424), Online publication date: 1-Apr-2007.
  44. ACM
    Yang X and Wetherall D Source selectable path diversity via routing deflections Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, (159-170)
  45. ACM
    Yang X and Wetherall D (2006). Source selectable path diversity via routing deflections, ACM SIGCOMM Computer Communication Review, 36:4, (159-170), Online publication date: 11-Aug-2006.
  46. ACM
    Choi B, Moon S, Cruz R, Zhang Z and Diot C Practical delay monitoring for ISPs Proceedings of the 2005 ACM conference on Emerging network experiment and technology, (83-92)
  47. Banner R and Orda A Multipath routing algorithms for congestion minimization Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (536-548)
  48. Liang Y, Liu Y, Ren J and Li T Malicious Link Detection in Multi-Hop Wireless Sensor Networks 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
Contributors

Recommendations