Source routing
Encyclopedia
In computer networking, source routing allows a sender of a packet to partially or completely specify the route
Routing
Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network , electronic data networks , and transportation networks...

 the packet takes through the network. In contrast, in non-source routing protocols, routers in the network determine the path based on the packet's destination.

Source routing allows easier troubleshooting, improved traceroute
Traceroute
traceroute is a computer network diagnostic tool for displaying the route and measuring transit delays of packets across an Internet Protocol network. Traceroute is available on most operating systems....

, and enables a node to discover all the possible routes to a host. It also allows a source to directly manage network performance by forcing packets to travel over one path to prevent congestion on another.

In the Internet Protocol
Internet Protocol
The Internet Protocol is the principal communications protocol used for relaying datagrams across an internetwork using the Internet Protocol Suite...

, two header options are available which are rarely used: "strict source and record route" (SSRR) and "loose source and record route
Loose Source Routing
Loose Source Routing is an IP option which can be used for address translation. LSR is also used to implement mobility in IP networks. Loose source routing uses a source routing option in IP to record the set of routers a packet must visit. The destination of the packet is replaced with the next...

" (LSRR). Because of security concerns, packets marked LSRR are frequently blocked on the Internet. If not blocked, LSRR can allow an attacker to spoof its address
IP address spoofing
In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.-Background:The basic...

 but still successfully receive response packets.

Policy-based routing
Policy-based routing
In computer networking, policy-based routing is a technique used to make routing decisions based on policies set by the network administrator....

can also be used to route packets using their source addresses.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK