Fixed and Flooding Routing algorithms
Last Updated :
22 Apr, 2023
In most situations, packets require multiple hops to make a journey towards the destination. Routing is one of the most complex and crucial aspects of packet-switched network design.
Desirable Properties of Routing Algorithms:-
- Correctness and Simplicity
- Robustness: Ability of the network to deliver packets via some route even in the face of failures.
- Stability: The algorithm should converge to equilibrium fast in the face of changing conditions in the network.
- Fairness and Optimality
- Efficiency: Minimum overhead.
Design Parameters of Routing Algorithms :
- Performance Criteria: Number of hops, Cost(Send packet with high bandwidth path as the cost is less), Delay(Size of Queue), Throughput time(Number of packets delivered/time).
- Decision Time: When to decide to route a packet? Per-Packet(Datagram) or Per-session(Virtual-Circuit).
- Decision Place: Who will decide about routing? Each Node(distributed), Central Node (centralized),Originated Node (source) .
- Network Information Source: None, Local, Adjacent node, Nodes along the route, All nodes.
- Network Information Update Time: Continuous, Periodic, Major Load Change, Topology Change.
Routing Strategies :
- Fixed Routing
- Flooding
- Dynamic Routing
- Random Routing
- Flow-based Routing
Fixed Routing -
- A route is selected for each source and destination pair of nodes in the network.
- The route is fixed; changes only if the topology of the network changes.
Fixed Routing: Example (1)

Figure - A simple packet switching network with six nodes (routers)

Figure - Central routing table based on least-cost path algorithm
- A Central routing matrix is created based on the least-cost path which is stored in the network control center
- The matrix shows for each source-destination of the route, the identity of the next node on the route.
- Drawback: If the network control center fails, then everything will collapse. Hence it is not reliable.
Fixed Routing: Example (2)

Figure - Routing table stored in different nodes of the network
- Routing Table is created for each node. This is called a distributed routing algorithm
- Routing table can be created using the least-min path or min-hop reach method. Two famous path algorithms
- Dijkstra Algorithm
- Bellman Ford Algorithm
Advantages -
- Simple
- Works well in reliable network with stable load in a reliable network
- Same for virtual circuit and datagram
Disadvantages -
- Lack of flexibility
- Doesn't react to failure or network congestion
Flooding -
- Requires no network information like topology, load condition, cost of diff. paths
- Every incoming packet to a node is sent out on every outgoing like except the one it arrived on.
- For Example in the above figure
- An incoming packet to (1) is sent out to (2),(3)
- from (2) is sent to (6),(4), and from (3) it is sent to (4),(5)
- from (4) it is sent to (6),(5),(3), from (6) it is sent to (2),(4),(5), from (5) it is sent to (4),(3)
Characteristics -
- All possible routes between Source and Destination are tried. A packet will always get through if the path exists
- As all routes are tried, there will be at least one route which is the shortest
- All nodes directly or indirectly connected are visited
Limitations -
- Flooding generates a vast number of duplicate packets
- Suitable damping mechanism must be used
Hop-Count -
- A hop counter may be contained in the packet header which is decremented at each hop.
with the packet being discarded when the counter becomes zero - The sender initializes the hop counter. If no estimate is known, it is set to the full diameter of the subnet.
- Keep track of the packets which are responsible for flooding using a sequence number. Avoid sending them out a second time.
Selective Flooding: Routers do not send every incoming packet out on every line, only on those lines that go in approximately in the direction of the destination.
Advantages of Flooding :
- Highly Robust, emergency or immediate messages can be sent (eg military applications)
- Set up the route in virtual circuit
- Flooding always chooses the shortest path
- Broadcast messages to all the nodes
Disadvantages of Flooding :
- Network congestion: Flooding can cause a significant amount of traffic in the network, leading to congestion. This can result in slower network speeds and delays in delivering data packets.
- Wastage of network resources: Flooding uses a lot of network resources, including bandwidth and processing power, to deliver packets. This can result in the wastage of valuable network resources and reduce the overall efficiency of the network.
- Security risks: Flooding can be used as a tool for launching various types of attacks, including denial of service (DoS) attacks. Attackers can flood the network with data packets, which can overload the network and cause it to crash.
- Inefficient use of energy: Flooding can result in an inefficient use of energy in wireless networks. Since all nodes receive every packet, even if they are not the intended recipient, they will still need to process it, which can waste energy and reduce the overall battery life of mobile devices.
- Difficulty in network troubleshooting: Flooding can make it difficult to troubleshoot network issues. Since packets are sent to all nodes, it can be challenging to isolate the cause of a problem when it arises.
Reference -
Data and Computer Communications
Read next article - Routing Protocols Set 1 (Distance Vector Routing)
Similar Reads
What is MAC Address? To communicate or transfer data from one computer to another, we need an address. In computer networks, various types of addresses are introduced; each works at a different layer. A MAC address, which stands for Media Access Control Address, is a physical address that works at the Data Link Layer. I
12 min read
Collision Avoidance in wireless networks We take a close look at so-called WiFi which is also known as IEEE standard 802.11 Consider the situation depicted in the figure, where each of the four nodes is able to send and receive signals that reach just the nodes to its immediate left and right. For example, B can exchange frames with A and
6 min read
Difference between Unicast, Broadcast and Multicast in Computer Network The cast term here signifies some data(stream of packets) is being transmitted to the recipient(s) from the client(s) side over the communication channel that helps them to communicate. Let's see some of the "cast" concepts that are prevailing in the computer networks field. What is Unicast?This typ
5 min read
Collision Domain and Broadcast Domain in Computer Network Prerequisite - Network Devices, Transmission Modes The most common network devices used are routers and switches. But we still hear people talking about hubs, repeaters, and bridges. Do you ever wonder why these former devices are preferred over the latter ones? One reason could be: 'because they ar
5 min read
Introduction of Classful IP Addressing An IP address is an address that has information about how to reach a specific host, especially outside the LAN. An IP address is a 32-bit unique address having an address space of 232.Classful IP addressing is a way of organizing and managing IP addresses, which are used to identify devices on a ne
11 min read
IPv4 Datagram Header IP stands for Internet Protocol and v4 stands for Version Four (IPv4). IPv4 was the primary version brought into action for production within the ARPANET in 1983. IP version four addresses are 32-bit integers which will be expressed in decimal notation. In this article, we will discuss about IPv4 da
4 min read
Fragmentation at Network Layer In computer networks, data is sent in small units called packets or datagrams. Sometimes, these datagrams are too large to pass through a network with a smaller size limit. To handle this, the datagram is broken into smaller parts is called fragmentation.IPv4 datagram can be as large as 65,535 bytes
7 min read
Internet Protocol version 6 (IPv6) The Internet Protocol version 6, or IPv6, is the latest version of the Internet Protocol (IP), which is the system used for identifying and locating computers on the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the problem of IPv4 exhaustion. IPv6 is a 128-
7 min read
Classless Addressing in IP Addressing The Network address identifies a network on the internet. Using this, we can find a range of addresses in the network and total possible number of hosts in the network. Mask is a 32-bit binary number that gives the network address in the address block when AND operation is bitwise applied on the mas
7 min read
Supernetting in Network Layer Supernetting is the opposite of Subnetting. In subnetting, a single big network is divided into multiple smaller subnetworks. In Supernetting, multiple networks are combined into a bigger network termed a Supernetwork or Supernet. In this article, we'll explore the purpose and advantages of supernet
4 min read