blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
E.3.1 The Revised Classic Algorithm Connected: An Internet Encyclopedia
E.3.1 The Revised Classic Algorithm

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1812
Up: APPENDIX E Additional Next-Hop Selection Algorithms
Up: E.3 Some Route Lookup Algorithms
Prev: E.3 Some Route Lookup Algorithms
Next: E.3.2 The Variant Router Requirements Algorithm

E.3.1 The Revised Classic Algorithm

E.3.1 The Revised Classic Algorithm The Revised Classic Algorithm is the form of the traditional algorithm that was discussed in Section [E.1]. The steps of this algorithm are:

  1. Basic match
  2. Longest match
  3. Best metric
  4. Policy

Some implementations omit the Policy step, since it is needed only when routes may have metrics that are not comparable (because they were learned from different routing domains).

The advantages of this algorithm are:

  1. It is widely implemented.

  2. Except for the Policy step (which an implementor can choose to make arbitrarily complex) the algorithm is simple both to understand and to implement.

Its disadvantages are:

  1. It does not handle IS-IS or OSPF route classes, and therefore cannot be used for Integrated IS-IS or OSPF.

  2. It does not handle TOS or other path attributes.

  3. The policy mechanisms are not standardized in any way, and are therefore are often implementation-specific. This causes extra work for implementors (who must invent appropriate policy mechanisms) and for users (who must learn how to use the mechanisms. This lack of a standardized mechanism also makes it difficult to build consistent configurations for routers from different vendors. This presents a significant practical deterrent to multi-vendor interoperability.

  4. The proprietary policy mechanisms currently provided by vendors are often inadequate in complex parts of the Internet.

  5. The algorithm has not been written down in any generally available document or standard. It is, in effect, a part of the Internet Folklore.


Next: E.3.2 The Variant Router Requirements Algorithm

Connected: An Internet Encyclopedia
E.3.1 The Revised Classic Algorithm

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages 1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609