Various routing protocols, including Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (ISIS), explicitly allow "Equal-Cost Multipath" (ECMP) routing. Some router implementations also allow equal-cost multipath usage with RIP and other routing protocols. The effect of multipath routing on a forwarder is that the forwarder potentially has several next-hops for any given destination and must use some method to choose which next- hop should be used for a given data packet.
RFC Downloads
Cited By
- Zheng C, Rienecker B and Zilberman N QCMP Proceedings of the 2nd ACM SIGCOMM Workshop on Future of Internet Routing & Addressing, (35-40)
- Wetherall D, Kabbani A, Jacobson V, Winget J, Cheng Y, Morrey III C, Moravapalle U, Gill P, Knight S and Vahdat A Improving Network Availability with Protective ReRoute Proceedings of the ACM SIGCOMM 2023 Conference, (684-695)
- Desmouceaux Y, Enguehard M and Clausen T (2021). Joint Monitorless Load-Balancing and Autoscaling for Zero-Wait-Time in Data Centers, IEEE Transactions on Network and Service Management, 18:1, (672-686), Online publication date: 1-Mar-2021.
- Paillisse J, Portoles M, Lopez A, Rodriguez-Natal A, Iacobacci D, Leong J, Moreno V, Cabellos A, Maino F and Hooda S SD-access Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, (496-508)
- Chahlaoui F, El-Fenni M and Dahmouni H Performance Analysis of Load Balancing Mechanisms in SDN Networks Proceedings of the 2nd International Conference on Networking, Information Systems & Security, (1-8)
- Abdou A, van Oorschot P and Wan T (2018). Comparative Analysis of Control Plane Security of SDN and Conventional Networks, IEEE Communications Surveys & Tutorials, 20:4, (3542-3559), Online publication date: 1-Oct-2018.
- Rottenstreich O, Kanizo Y, Kaplan H and Rexford J Accurate Traffic Splitting on Commodity Switches Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures, (311-320)
- Zhang Q, Yu G, Guo C, Dang Y, Swanson N, Yang X, Yao R, Chintalapati M, Krishnamurthy A and Anderson T Deepview Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, (519-532)
- Araújo J, Saino L, Buytenhek L and Landa R Balancing on the edge Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, (111-124)
- Desmouceaux Y, Pfister P, Tollet J, Townsley M, Clausen T, Tollet J, Townsley M, Desmouceaux Y, Clausen T and Pfister P (2018). 6LB, IEEE/ACM Transactions on Networking, 26:2, (819-834), Online publication date: 1-Apr-2018.
- Kohler T, Dürr F and Rothermel K ZeroSDN Proceedings of the Symposium on Architectures for Networking and Communications Systems, (25-37)
- Cui H, Karame G, Klaedtke F and Bifulco R (2016). On the Fingerprinting of Software-Defined Networks, IEEE Transactions on Information Forensics and Security, 11:10, (2160-2173), Online publication date: 1-Oct-2016.
- Guo C, Wu H, Deng Z, Soni G, Ye J, Padhye J and Lipshteyn M RDMA over Commodity Ethernet at Scale Proceedings of the 2016 ACM SIGCOMM Conference, (202-215)
- Ahad N, Qadir J and Ahsan N (2016). Neural networks in wireless networks, Journal of Network and Computer Applications, 68:C, (1-27), Online publication date: 1-Jun-2016.
- Gkounis D, Kotronis V, Liaskos C and Dimitropoulos X (2016). On the Interplay of Link-Flooding Attacks and Traffic Engineering, ACM SIGCOMM Computer Communication Review, 46:2, (5-11), Online publication date: 9-Apr-2016.
- Lan C, Sherry J, Popa R, Ratnasamy S and Liu Z Embark Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, (255-273)
- Liu V, Zhuo D, Peter S, Krishnamurthy A and Anderson T Subways Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, (1-13)
- Kang N, Ghobadi M, Reumann J, Shraer A and Rexford J Efficient traffic splitting on commodity switches Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, (1-13)
- Zhang J, Xi K and Chao H (2015). Load balancing in IP networks using generalized destination-based multipath routing, IEEE/ACM Transactions on Networking, 23:6, (1959-1969), Online publication date: 1-Dec-2015.
- Antonakopoulos S, Bejerano Y and Koppol P (2015). Full protection made easy, IEEE/ACM Transactions on Networking, 23:4, (1229-1242), Online publication date: 1-Aug-2015.
- Liu N, Haider A, Sun X and Jin D FatTreeSim Proceedings of the 3rd ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (199-210)
- Lopes N, Bjørner N, Godefroid P, Jayaraman K and Varghese G Checking beliefs in dynamic networks Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, (499-512)
- Agarwal K, Dixon C, Rozner E and Carter J Shadow MACs Proceedings of the third workshop on Hot topics in software defined networking, (157-162)
- Cao J, Xia R, Yang P, Guo C, Lu G, Yuan L, Zheng Y, Wu H, Xiong Y and Maltz D Per-packet load-balanced, low-latency routing for clos-based data center networks Proceedings of the ninth ACM conference on Emerging networking experiments and technologies, (49-60)
- Patel P, Bansal D, Yuan L, Murthy A, Greenberg A, Maltz D, Kern R, Kumar H, Zikos M, Wu H, Kim C and Karri N (2013). Ananta, ACM SIGCOMM Computer Communication Review, 43:4, (207-218), Online publication date: 19-Sep-2013.
- Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M, Zolla J, Hölzle U, Stuart S and Vahdat A (2013). B4, ACM SIGCOMM Computer Communication Review, 43:4, (3-14), Online publication date: 19-Sep-2013.
- Patel P, Bansal D, Yuan L, Murthy A, Greenberg A, Maltz D, Kern R, Kumar H, Zikos M, Wu H, Kim C and Karri N Ananta Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (207-218)
- Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M, Zolla J, Hölzle U, Stuart S and Vahdat A B4 Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (3-14)
- Donnet B Internet topology discovery DataTraffic Monitoring and Analysis, (44-81)
- Handigol N, Heller B, Jeyakumar V, Lantz B and McKeown N Reproducible network experiments using container-based emulation Proceedings of the 8th international conference on Emerging networking experiments and technologies, (253-264)
- Anderson J, Braud R, Kapoor R, Porter G and Vahdat A xOMB Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, (49-60)
- Krieger O, McGachey P and Kanevsky A (2010). Enabling a marketplace of clouds, ACM SIGOPS Operating Systems Review, 44:4, (103-114), Online publication date: 13-Dec-2010.
- Araújo J, Rio M and Pavlou G A mutualistic resource pooling architecture Proceedings of the Re-Architecting the Internet Workshop, (1-6)
- Banner R and Orda A Designing low-capacity backup networks for fast restoration Proceedings of the 29th conference on Information communications, (1864-1872)
- Yuan Q, Wu J and Cardei I (2009). SMRS, International Journal of Parallel, Emergent and Distributed Systems, 24:1, (69-84), Online publication date: 1-Feb-2009.
- Al-Fares M, Loukissas A and Vahdat A (2008). A scalable, commodity data center network architecture, ACM SIGCOMM Computer Communication Review, 38:4, (63-74), Online publication date: 1-Oct-2008.
- Al-Fares M, Loukissas A and Vahdat A A scalable, commodity data center network architecture Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (63-74)
- Ramamohanarao K, Gupta K, Peng T and Leckie C The curse of ease of access to the internet Proceedings of the 3rd international conference on Information systems security, (234-249)
- Bohacek S, Hespanha J, Lee J, Lim C and Obraczka K (2007). Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks, IEEE Transactions on Parallel and Distributed Systems, 18:9, (1227-1240), Online publication date: 1-Sep-2007.
- Enyedi G, Rétvári G and Cinkler T A novel loop-free IP fast reroute algorithm Proceedings of the 13th open European summer school and IFIP TC6.6 conference on Dependable and adaptable networks and services, (111-119)
- Donnet B, Huffaker B, Friedman T and Claffy K Increasing the coverage of a cooperative internet topology discovery algorithm Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (738-748)
- Dongmei Wang , Guangzhi Li and Doverspike R IGP Weight Setting in Multimedia IP Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2566-2570)
- Banner R and Orda A (2007). Multipath routing algorithms for congestion minimization, IEEE/ACM Transactions on Networking, 15:2, (413-424), Online publication date: 1-Apr-2007.
- Yang X and Wetherall D Source selectable path diversity via routing deflections Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, (159-170)
- Yang X and Wetherall D (2006). Source selectable path diversity via routing deflections, ACM SIGCOMM Computer Communication Review, 36:4, (159-170), Online publication date: 11-Aug-2006.
- Choi B, Moon S, Cruz R, Zhang Z and Diot C Practical delay monitoring for ISPs Proceedings of the 2005 ACM conference on Emerging network experiment and technology, (83-92)
- Banner R and Orda A Multipath routing algorithms for congestion minimization Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (536-548)
- Liang Y, Liu Y, Ren J and Li T Malicious Link Detection in Multi-Hop Wireless Sensor Networks 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
Recommendations
Revisiting next-hop selection in multipath networks
SIGCOMM '11: Proceedings of the ACM SIGCOMM 2011 conferenceMultipath routing strategies such as Equal-Cost MultiPath (ECMP) are widely used in IP and data-center networks. Most current methods to balance packets over the multiple next hops toward the destination base their decision on a hash computed over ...
Revisiting next-hop selection in multipath networks
SIGCOMM '11Multipath routing strategies such as Equal-Cost MultiPath (ECMP) are widely used in IP and data-center networks. Most current methods to balance packets over the multiple next hops toward the destination base their decision on a hash computed over ...
A hop-by-hop multipath routing protocol using residual bandwidth for wireless mesh networks
PWC'06: Proceedings of the 11th IFIP TC6 international conference on Personal Wireless CommunicationsIn wireless mesh networks, there are mesh routers which can compose a wireless backbone with low mobility. We propose a hop-by-hop multipath routing scheme which is suitable for mesh routers offering network reliability with route redundancy. We extend ...