RoutingWork PDF
RoutingWork PDF
1. Introduction
The first question we should make ourselves is why routing protocols are so important. Routing is the
act of sending information from a source to a destination. Usually, this information passes through some
intermediate devices. The purpose of routing protocols is to provide these intermediate devices the
necessary information to send the packet correctly. So, the importance of routing protocols is such that
without them the different devices that make up a network are not able to communicate with each other.
All routing protocols are defined based on an algorithm. This algorithm must describe some procedures
in order to make the routing protocols operate correctly. These procedures are:
A procedure to receive and send information about the network.
A procedure to find the best path to a destination and install the route in the routing table.
And finally, a procedure to detect, react and inform to other devices about changes in the network
topology.
The two main existing algorithms are Bellman-Ford algorithm [1] and Dijsktra algorithm [2]. Depending
on which algorithm is used, the routing protocols are classified in Distance Vector or Link State,
respectively. The fundamental difference between them is how they implement the procedures
mentioned above. In subsequence paragraphs we will see these differences with more detail.
On the other hand, since the appearance of routing IP, there have been mainly eight dynamic routing
protocols: EGP, BGP, RIP, RIPv2, IGRP, EIGRP, ISIS and OSPF. This work is based in three of them,
which are the main IGPi non proprietary routing protocols: RIPv2 [4], OSPFv2 [5] and Integrated ISIS
(which is ISIS for IP) [6].
This work is divided into three sections. First of all, we will see a theoretical analysis of the three routing
protocols under study. This analysis has been done from a comparative point of view. Secondly, we will
see the methodology used to make the design and implementation of a baseline scenario on which we
will test the different routing protocols. We have done this practical analysis with the networks
simulation tool OPNET Modeler 12. Finally, we will see some of the obtained results and validate the
conclusions arising from their analysis. After all, we will take some conclusions about the work done.
2. Theoretical Analysis
The purpose of the first section of this paper is to give us some basics about the operation of the
different protocols from a theoretical point of view. The information given below is based on different
sources [3] [4] [5] [6] [7] [8] [9].
Routing protocols are classified in Distance Vector or Link State protocols according to the method they
use to exchange information about the network and to use this information to calculate the best path to a
destination. In this section we are going to see the differences between the operation method of two link
state protocols: OSPF and ISIS, and one distance vector protocol: RIPv2.
A.1.
A typical distance vector routing protocol uses a routing algorithm in which routers periodically send
routing updates to all neighbours by broadcasting their entire routing tables. Nevertheless, there exist
other possibilities. The main features of distance vector protocols are the following:
Periodic and Triggered Updates. Periodic Updates means that at the end of a certain time period, updates
will be transmitted. If updates are sent too frequently, congestion and router CPU overloading might
occur; if updates are sent too infrequently, convergence time might be unacceptably high.
Triggered updates are the solution to this problem: if a metric change, a router will immediately sent out
an update without waiting for its update timer to expire. Reconvergence will occur far more quickly.
Regular updates might still occur along with triggered updates.
A further refinement is to include in the update only the networks that actually triggered it, rather than
the entire route table. This technique reduces the processing time ant the impact on network bandwidth.
Broadcast and Multicast Updates. When a router first become active on a network, the simplest method
to find other routers and announce its own presence is sending the update to the broadcast address
(255.255.255.255). Neighbouring devices will hear the broadcasts and will take appropriate actions. The
problem with this method is that the hosts and devices not speaking the same routing protocol also
receive broadcast updates, thus causing an unnecessary consumption of bandwidth in some links.
Multicast updates send the information to an IP address only known by those devices who speaks the
same routing protocol, so that only these devices will receive the update.
Full Routing Table Updates. Most distance vector routing protocols take the very simple approach of
telling their neighbours everything they know by broadcasting their entire route table. Neighbours
receiving these updates glean the information they need and discard everything else.
Routing by Rumor. Distance Vector algorithms provide road signs to networks. They provide the
direction and the distance, but no details about what lies along the route. That is why they are vulnerable
to accidental or intentional misdirection.
Timers and Stability Features. It can happen that a metric change cause that, at a given time, there are
some devices in the network with routing information that is no longer valid. These devices can
unknowingly forward packets to an unreachable destination. The problem is handled by setting a route
invalidation timer for each entry in the routing table, so that if a device no longer hears updates about a
specific route, the timer will expire and the route will be marked as unreachable.
Another common timer in most distance vector routing protocols is Holddown timer. It introduces a
certain amount of scepticism to reduce the acceptance of bad routing information. If the distance to a
destination increases, the router sets a holddown timer for that route. Until the timer expires, the router
will not accept any new updates for the route. The advantage of this procedure is that the likelihood of
bad routing information getting into a table is reduced but at the expense of the reconvergence time.
Split Horizon and Poisoned Reverse. A route pointing back to the router from which packets were
received is called a reverse route. Split Horizon is a technique for preventing reverse routes between two
routers. Besides not wasting resources, there is a more important reason for not sending reachability
information back to the routers from which the information was learned: implementing split horizon
prevents the possibility of a routing loop. There are two categories: Split Horizon and Split Horizon with
Poisoned Reverse.
Simplest split horizon works by suppressing information. Split horizon with poisoned reverse is a
modification that provides more positive information. The rule for split horizon with poisoned reverse
is, when sending updates out to a particular interface, designate any networks that were learned from
updates received on that interface as unreachable.
Counting to Infinity. The situation in which the hop count of a route continues increasing to infinity due
to a routing loop is known as counting-to-infinity problem. The way to alleviate the effects of counting to
infinity is to define infinity. Most distance vector protocols define infinity to be 16 hops. When a route
eventually increment its metric to 16, the network will be considered unreachable. This method is also
used by routers to advertise a network as unreachable.
A.2.
All RIP messages are encapsulated in UDP segments (port 520). RIP defines two messages types:
Request messages and Response messages. The first one is used to ask neighbouring routers to send
updates; the Response message carries the updates. The metric used by RIP is hop count, with 1
signifying a directly connected network of the advertising router and 16 signifying an unreachable
network.
On startup, RIP broadcast a packet carrying a Request message out each RIP-enabled interface. The RIP
process then starts listening for RIP Requests or Response messages from other routers. Neighbours
receiving the Request send a Response containing their routing table. When the requesting router
receives the Response message it processes the enclosed information.
If a particular route entry included in the update is new it is entered into de route table along with the
address of the advertising router. If the route is for a network that RIP has already entered in the table,
the existing entry will be replaced only if the new route has a lower hop count. If the advertised hop
count is higher than the recorded hop count and the update was originated by the recorded next-hop
router, the route will be marked as unreachable for a specified holddown period. If at the end of that
time the same neighbour is still advertising the higher hop count, the new metric will be accepted.
RIP message format
RIPv1 limitations
RIP has a very simple operation and that is why it is still a popular routing protocol. But the main
limitation of RIPv1 is that it is a classful routing protocol, so that it does not support variable-length
subnet masks (VLSM).
A.3.
RIPv2
RIP Version 2 is defined in RFC 2473 [4] and it is not a new protocol; rather, it is RIPv1 with some
extensions to bring it more up to date with modern routing environments. These extensions are:
Subnetmaskcarriedwitheachrouteentry.
Authenticationofroutingupdates.
Nexthopaddressescarriedwitheachrouteentry.
Externalroutetags.
Multicastrouteupdates.
Addition of a Subnet Mask field to the routing update entries, enabling the use of variable
lengthsubnetmasksandqualifyingRIPv2asaclasslessroutingprotocol.
As Version 1, RIPv2 updates can contain entries for up to 25 routes. Also like Version 1, RIPv2 operates
on UPD port 520. In general, all the operation procedures, timers, and stability functions of RIPv1
remain the same in Version 2, with the exception of the broadcast updates: RIPv2 multicasts updates to
other RIPv2-speaking routers, using the reserved class D address 224.0.0.9.
The basic structure of RIPv2 message format is the same as for RIPv1. All the extensions to the original
protocol are carried within what were unused fields. As it is mentioned above, the information added in
these unused fields is:
RouteTag.ItprovidesafieldfortaggingexternalorredistributedroutesintotheRIPv2process.
SubnetMask.Itisa32bitmaskthatidentifiesthenetworkandsubnetportionoftheIPv4address.
Next Hop. It identifies a better nexthop address, if one exists, than the address of the advertising
router.
A.4.
As it has been said before, the main difference between distance vector and link state protocols is the
algorithm in which they are based. This difference results in a set of features that are implemented in a
very different way for the two types of routing protocols. This makes hard to set an exhaustive
comparison between RIP and the two link state protocols under study: OSPF and ISIS.
A distance vector protocol learns routes and sends them to directly connected neighbours. By contrast,
link state protocols advertise the state of all links (through packages known as LSAs) that participate in
the routing process, so that the other routers in the area can build the topology database. Thanks to the
fact that each device has a total knowledge of the network, the existence of routing loops is completely
avoided.
Furthermore, in link state protocols, the flooding of LSAs takes place on startup and whenever there is a
change in the network topology. In this case, a partial update will be sent immediately with only the
information about the modified links. If there is no change, the updates will take place after a specific
amount of time. By contrast, distance vector protocols send the entire routing table every 30 seconds by
default. Nevertheless, it is important to note that the initial flooding of LSAs in link state protocols can
significantly reduce the capacity of the network to send data and degrade considerably the performance
at startup.
In terms of metric, link state protocols use a metric based on the cost, which contains information about
the capacity of each link, while distance vector protocols use a metric based only in the hop count.
Besides, in link state protocols, areas can be defined in order to reduce the SPF calculation and the size
of routing tables and databases. This results in a faster convergence. An important limitation in distance
vector protocols is that they cannot be implemented in networks of over 15 hops because they define
infinity to be 16 hops.
Overall, it seems that link state protocols are better than distance vector. But writing a stable
implementation of a link state protocol is difficult, and its memory and CPU consumption is quite
bigger. Of course, in a network with just a few routers and a simple topology, RIP will meet your needs
quite well.
The most important issues about the differences between distance vector and link state protocols are
summarized in the next table:
DISTANCE
VECTOR
Algorithm
Network view
Best Path
Calculation
Updates
Updates
Frequency
Routing
Loops
LINK STATE
Bellman-Ford
Topology knowledge
from the neighbour
point of view
Based on the fewest
number of hops
Full routing table
Frequently periodic
updates
Needs additional
procedures to avoid
them
Dijsktra
Common and complete
knowledge of the
network topology
Based on the cost (hops,
BW, delay...)
Link State Updates
Triggered updates
By construction, routing
loops cannot happen
CPU and
Memory
Low utilization
Intensive
Simplicity
High simplicity
Requires a trained
network administrator
B.1.
Messages
OSPF operates directly over IP (network layer), while IS-IS operates over the data link layer. Both of
them unicast or multicast packets, and never broadcast them.
10
OSPF messages and LSAs are all structured on 32-bit boundaries, so the format of OSPF messages is
fixed and the protocol can only be extended by creating new LSAs. By contrast, IS-IS does not adhere to
set boundaries and all messages are constructed of type-specific headers followed by type/length/value
(TLV) structures.
Table 2 associates the OSPF and IS-IS message types by function.
OSPF
IS-IS
FUNCTIONS
Hello
Hello
Database
Description
Link State
Request
Link State
Acknowledgement
Complete Sequence
Number PDU (CSNP)
Partial Sequence
Number PDU (PSNP)
No equivalent
message, although
PSNPs are used as
ACKs in some cases
Link State PDU
Neighbor discovery
Adjacency negotiation
Adjacency keepalive
Database synchronization
Link State
Update
Database synchronization
Database synchronization
Database synchronization
and flooding
Unlike OSPF, IS-IS messages have subtypes. There are LAN and Point-to-Point Hellos, also subdivided
into level 1 and level 2 types. Likewise, CSNPs, PSNPs and LSPs are also subdivided into level 1 and
level 2 types.
Moreover, the OSPF routers LS database is just a collection of all LSAs the router has originated or has
heard from other routers. LSAs are sent from one router to its adjacent neighbours in Update messages,
which can carry many LSAs. In a similar way, IS-IS database consist of LSPs the local router has
originated or heard from other routers.
OSPF can generate several types of LSAs, whereas an IS-IS router generates at most two LSPs: one for
L1 adjacencies and one for L2 adjacencies. To communicate different type of information, an IS-IS
router needs to generate different TLVs within the single LSP.
B.2. addressing
Each router must be able to uniquely identify itself within the routing domain. This is the purpose of the
OSPF router ID (RID) and the IS-IS system ID (SysID). In addition, the router must be able to identify
its position within the routing domain. This is the purpose of the area ID (AID).
An OSPF router uses a 32-bit number for its RID, represented in the same dotted-decimal format as an
IP address. The OSPF area ID (AID) is also a 32-bit number that can be expressed in dotted-decimal
format or as a simple decimal number.
In contrast to the OSPF AID and RID, which are expressed separately, the IS-IS AID and SysID are
specified together in the Network Entity Title (NET).
11
B.4. adjacencies
To ensure that two IS-IS or OSPF neighbours can reliably exchange routing information, they form an
adjacency.
In OSPF, neighbors are adjacent when they discover each other, after the three-way-handshaking
process, but are not fully adjacent until they complete the database synchronization. OSPF uses a
complex, state-machine-driven process to synchronize its databases, whereas IS-IS database
synchronization is a much simpler process. In IS-IS there is an assumption that if two neighbours have
two-way communication, they can synchronize their databases. Much of this assumption has to do with
the fact that the rules for accepting IS-IS LSPs are more flexible than those for accepting OSPF LSAs.
Designated Router
OSPF elects a designated router (DR) on all multi-access links. The DR represents the network to the
rest of the OSPF area. To minimize the impact of a failed DR, OSPF elects a backup designated router
(BDR). Routers that are neither the DR nor the BDR (called DROthers) form adjacencies with both, the
DR and the BDR. The DR and BDR are also adjacent, and the BDR synchronizes with the DR just like
the DROthers.
IS-IS designated intermediate systems (DIS) serve the same purpose as OSPF DRs, but differ in several
significant ways:
12
B.5. flooding
As we have seen before, OSPF's basic unit of topological information are LSAs. OSPF uses Update
packets to send LSAs from one router to another during the flooding process. Whereas LSAs are
flooded throughout an area, Update packets are exchanged only between directly connected routers, that
is, if an LSA received in an Update packet must be forwarded to another router, it is put into a new
Update packet for the next hop.
Like OSPF Updates messages, an IS-IS LSP is the "package" by which information is sent from one
router to another. But unlike Updates, IS-IS LSPs are not limited in scope to a single link. They are
flooded intact throughout an area. And also unlike Updates, the information contained in a single LSP
pertains only to the router that originated it. On the other hand, just as LSAs, LSPs are the basic data
structures that the OSPF link state database is built from.
13
In conclusion, it is not possible to draw a direct comparison between OSPF and IS-IS messages. Because
IS-IS runs over the data link level rather than the network level, LSPs are themselves packets and do not
require a separate means of transport the way LSAs require Update packets.
Like OSPF, IS-IS uses a two-level hierarchy: the upper-lever area is the level 2 (L2) area, and the lowerlevel (nonbackbone) areas are level 1 (L1) areas. Unlike OSPF, where different interfaces can be assigned
to different areas, an IS-IS router can only belong to a single area: there are L1 routers, L2 routers and
L1/L2 routers. So, instead of thinking of IS-IS areas in terms of physical links and logical boundaries, it
will be better to think in terms of adjacencies.
B.7. metrics
Both OSPF and IS-IS use a dimensionless metric that is best named cost. The metric is assigned to every
interface on which the protocol runs, and it is essential to find the shortest path between any two nodes.
RFC 2328 does not specify a default interface cost for OSPF, but many vendors calculate the cost by
dividing 100Mbps by the interface bandwidth.
14
In IS-IS, ISO 10589 specifies four different metric fields that can be assigned to an IS-IS interface:
A default metric, which must be understood by every router in the IS-IS domain. Usually, this
metric represents interface cost, the same as the OSPF metric, or the hop count.
A delay metric.
An expense metric.
An error metric.
The use of the default metric is mandatory, and the other metrics are optional.
15
A. Methodology
In OPNET Modeler 12 documentation [10] there is a set of procedures and workflows which serve as a
guide for the user to create a network model. We have defined our own workflow based on one diagram
contained in OPNET Documentation, introducing some changes to suit the goals we wanted to achieve.
Figure 8: Workflow
16
Among the objectives we are seeking, we should emphasize in the study of the convergence time and of
the links overload due to the routing protocols traffic. These features, and others that has also been
evaluated, cannot be studied in the same way over small networks, where routing protocols hardly
introduce overload and there is no so much routes to learn, than in large networks, where these
parameters become more critical. However, the chosen scenario cannot be too big either because
OPNET is a CPU intensive and memory intensive tool, which means that it uses many resources from
the computer where it is executed. This utilization of computer resources, and the amount of time taken
for a simulation, is directly related to the size of the simulated scenario.
To accomplish these requirements, we decided to implement a real network case, with a number of
nodes high enough to detect the effects of routing protocols over the network, but reasonably small to
allow the computer to work without saturation. So we decided to implement the RedIRIS network,
which is a Spanish network that interconnects the main universities and research centers of the country.
The backbone is formed by a set of nodes conveniently distributed throughout the country,
interconnected between them with a set of links that forms a mesh network with a 10 Gbps core.
Inside the node called Nacional we have implemented a full-mesh topology with six nodes (see Figure 10).
Inside each one of the other nodes there is a subnetwork formed by a unique router, which is a variation
of the Cisco 3660, connected to a 100baseT LAN.
17
IP addresses for all connected interfaces of each device in the network (routers and LANs), with
their correspondingly subnet mask.
Default gateway addresses for the 100baseT LAN nodes, pointing to the routers interface to
which they are directly connected.
Failure of the link Galicia<->Asturies and the node Nacional.Router1 (200 seconds after the start
of the simulation).
Recovery of the link Galicia<->Asturies and the node Nacional.Router1 (500 seconds after the
start of the simulation).
Failure of the node Nacional.Router5 (800 seconds after the start of the simulation).
These events have been configured using a node, called Failure Recovery, contained in the library of
nodes of OPNET Modeler.
C. Protocols configuration
Concerning the protocols configuration, it must be noted that most parameters have been left with the
defaults values configured in the OPNET protocol model, including the metrics values and timers
initializations.
All routers in the network start the routing process following a uniform distribution that can vary
between 5 and 10 seconds.
Of course, RIP has been configured to be RIP Version 2 and to operate with multicast updates. Split
horizon with poisoned reverse has been left enabled on all interfaces, and the triggered extension is
disabled.
18
In OSPF and IS-IS scenarios there has not been configured any area, but all routers belong to backbone
area (this means that all OSPF routers belong to area 0, and all IS-IS routers are configured with L2 area
type). With these protocols it is important to configure the type of interface correctly, especially in the
case of IS-IS as it implements different processes depending on the interface type.
OSPF process uses a metric based on the cost of each interface, calculated as the ratio of the interface
bandwidth and a reference bandwidth. IS-IS process uses a metric based on the cost as well, but this cost
is calculated depending on the hop count. Remember also that, by default, OSPF uses the SPF algorithm
while IS-IS uses the Incremental SPF algorithm.
Finally, in the IS-IS configuration, the Hello Padding has been left enabled and the NET addresses have
been configured in the same way that IP addressing: with environment files.
Node statistics
Link statistics
The collection mode for all these statistics is All Values, since we want to capture every single data during
the simulation.
19
Due to the high CPU utilization of OPNET, we had to carry out techniques for the optimization of the
simulations, following the Opnetwork proceeding 1550 [11].
Within the simulations parameters we had to specify the different environment files that we were using,
but the most important issue at this point was to disable the RIP/OSPF/IS-IS efficiency, so that we can
appreciate the effects of routing during all the simulation time.
4. PRACTICAL ANALYSIS
In the previous section we have mentioned the different statistics collected during the simulations. Now
we are going to show and discuss the results of some of them.
Before we begin this section, it is noteworthy that most of the graphics shown below have been
constructed from samples obtained with OPNET, but represented on a spreadsheet to show their
cumulative distribution function, instead the value of each sample.
A. Convergence time
The fist attribute we have analyzed is the convergence time. In OPNET, the convergence is defined as
the absence of changes over a period of time. The next graphic shows the convergence time for each
protocol in each one of the defined events.
Startup
Event 1
Event 3
Event 2
The first thing we can observe from this graphic is that RIP has an irregular convergence time that is
over 80 seconds when there is a failure of a link or node. However, RIP has the lowest initial
convergence time. This is due to the simplicity of RIP process: while RIP only has to send its routing
table every 30 seconds, OSPF and IS-IS have to carry out the neighbour discovering, adjacency
establishments, flooding, synchronization of the LS databases and execution of the SPF algorithm.
In the case of OSPF and IS-IS, the initial convergence time is quite similar for both, and it is around 30
seconds.
The graph shown below corresponds to the convergence time cumulative distribution function for each
node. It can be seen that the protocol with lowest and more stable convergence times is OSPF. By
20
contrast, RIP has an irregular and slow convergence because it performs a distributed calculation of the
best path: a RIP router receives an update, calculates the best path and then forwards the update. This
makes that each router in the network performs the calculation of the best path in a different moment.
However, OSPF and IS-IS routers send an update as soon as they receive it, so that all the routers in the
network has the information to calculate the best path almost at once, and all of them can converge at
the same time.
Regarding the differences between OSPF and IS-IS convergence, there are different issues. First of all,
we must remember that OSPF starts the database synchronization after the three-way-handshaking,
while IS-IS starts this process after bidirectional communication is established. This means that the
synchronization process starts earlier in IS-IS protocol. In addition, OSPF implements the SPF algorithm
while IS-IS uses the Incremental SPF.
In the next table we can see the aspects that influence in convergence time:
RIP
Event detection
Best path
calculation
Topology change
updates
Database
synchronization
OSPF
IS-IS
Depends on lower OSI levels
BellmanSPF
Incremental SPF
Ford
LSA flooding, LSP flooding,
adjacencies
adjacencies
Periodic
formed after
formed after
updates
three-waybidirectional
handshaking
communication
No
Complex FSM Simple process
database
synchronization
B. Utilization
The utilization represents the percentage of available bandwidth consumption, where a value of 100
would indicate full usage.
B.1.
In order to evaluate the amount of traffic generated by each protocol, first we have done a simulation
without the presence of data traffic, that is, only with the traffic generated by the protocols.
21
First of all, it should be noticed that the utilization is very low. This is because all the defined links have a
bandwidth over 100 Mbps.
From the graphics obtained we can conclude that OSPF is the protocol that use less the links in average.
That is due to the packet size used by each protocol, and the rate they are sent.
On the one hand, we should remember that RIP sends periodic updates every 30 seconds, and that ISIS
also sends CSNP packets periodically to maintain the database synchronization. Instead, OSPF only
sends Hello packets periodically (so does IS-IS), but the bandwidth consumption of these packets is
negligible. We will see these effects in more detail when we discuss the throughput.
On the other hand, OSPF sends a different update message, known as LSA, for each destination, while
IS-IS send as much as possible destinations in only one packet, known as LPS. Apparently, IS-IS seems
to be more efficient since it only transmits one header. However, when there is a topology change, OSPF
only needs to send the information concerning the destination that has change, while IS-IS needs to send
the whole range of destinations that have been packed together in an unique LSP with the destination
that had changed. For that reason, in unstable networks, as is the case, OSPF presents a more desirable
behaviour.
In the maximum utilization graphic, we observe that IS-IS has a higher maximum utilization. By contrast,
RIP has the lowest maximum utilization. This is because RIP, although it generates a large amount of
22
traffic, makes it in a more regular way. IS-IS and OSPF generate significant traffic peaks due to the
flooding and database synchronization processes that take place when a topology change occurs.
C. Throughput
The throughput represents the average number of bits successfully received or transmitted by the
receiver or transmitter channel per unit time, in bits per second.
C.1.
The following figure corresponds to the ten links that generate a higher throughput for each protocol. As
it has been said before, RIP generates periodic updates every 30 seconds. The peaks generated by RIP
during unstable moments are lower than the peaks generated by the other two protocols. In addition, we
can see that OSPF practically only generates traffic in unstable moments, while IS-IS also generates
traffic periodically due to the transmission of CSNP packets for the LS database synchronization
process.
Figure 15: Routing protocols throughput: RIP (top left), OSPF (top right) and IS-IS (bottom)
C.2.
In order to evaluate how the routing protocols distribute the data traffic over the network, some
application traffic has been defined. This traffic has a medium load.
The graphics obtained are shown in the following figures:
23
In the average throughput graphic we observe that OSPF has a lower bandwidth consumption. This is
because of the metric used by each protocol: RIP and IS-IS uses a metric based only on the hop count.
However, OSPF uses a metric based on the capacity of the links, so it will prioritize those links with
higher bandwidth and the traffic distribution will be more efficient.
In the maximum throughput graphic we observe that now is OSPF who has higher bandwidth
consumption. This fact suggests one of the major limitations of the OSPF routing protocol: it
discriminates low-capacity links, so that all traffic passes through links with a higher bandwidth.
If we take a look to the processing delay graphics (see Figure 19) we can see that RIP has a higher and
more regular processing delay. This is because of the periodic updates with the entire routing table sent
by RIP, and because it performs a distributed calculation of the best path. IS-IS has also a regular
24
consumption of CPU due to the regular transmission of CSNP packets. By contrast, OSPF practically
has only CPU utilization when there is a topology change, but its magnitude is higher than for the case of
the other protocols.
Figure 19: RIP (top left), OSPF (top right) and IS-IS (bottom) processing delay
5. Conclusions
The simulations have revealed the major constraints of RIPv2 protocol. However, the great advantage of
this protocol is its ease of configuration and its lower processing consumption. The link state protocols
improve the distance vector protocols shortcomings, especially those related to the network scalability
and the adaptability to different types of topologies.
The next table shows a summarization of the main analyzed attributes of each protocol.
Convergence
Link utilization
Metric
CPU Utilization
Delay
Jitter
Load balancing
RIP
Slow
Inefficient
OSPF
IS-IS
Medium
Fast
Optimal
Inefficient
Cost based on Cost based on
Hop count
BW
hop count
Optimal
Inefficient
Optimal
No differences between protocols
No differences between protocols
No
Si
Si
Table 4: Summary
The bottom line that emerges from this work is that there is no protocol that satisfies all the desirable
qualities. All protocols, in their basic forms, work under the same principle: they define costs on the links
based on a metric, and this is a common limitation in all routing protocols: once the metric value is set, it
does not adapt itself to possible changes in the network.
25
6. References
[1] R.E.Bellman.DynamicProgramming.Princeton,NewJersey:PrincetonUniversityPress;1957.
[2] T.H.Cormen,C.E.Leiserson,R.L.Rivest,andC.Stein.IntroductiontoAlgorithms.SecondEdition.MIT
PressandMcGrawHill,2001.ISBN0262032937.Section24.3:Dijkstra'salgorithm,pp.595601.
[3] HEDRICK,C.(1988,June).RoutingInformationProtocol.RFC1058.
[4] MALKIN,G.(1998,November).RIPVersion2.RFC2453.
[5] MOY,J.(1998,April).OSPFVersion2.RFC2328.
[6] CALLON,R.(1990,December).UseofOSIISISforRoutinginTCP/IPandDualEnvironments.RFC1195.
[7] DOYLE, J. (2005, November). OSPF and ISIS: Choosing an IGP for LargeScale Networks. First Edition.
AddisonWesleyProfessional.ISBN0321168798.
[8] DOYLE,J.,CARROL,J.(2005,October).CCIEProfessionalDevelopmentRoutingTCP/IP,VolumeI.Second
Edition.CiscoPress.ISBN1587052024.
[9] GHOUGH, C. (2003, December). CCNP SelfStudy: CCNP BCSI Exam Certification Guide. Third Edition.
CiscoPress.ISBN1587200856.
[10] OPNET Technologies, Inc. (2006). OPNET Modeler 12.0 Documentation: Modeler Documentation Set.
Version12.0,OPNETTechnologies.
[11] OPNET Technologies, Inc. OPNETWORKS proceedings 2008. Session 1550: Accelerating Simulations
Using
Efficient
Modeling
Techniques
[online].
Available
on
Internet:
https://enterprise14.opnet.com/4dcgi/PRCD_Main?ViewCONF_ConferenceID=14.
[12] HONKOLA,J.(2004,April).OSPFandISISEvolution.SeminarofInternetworkingT110.551.
[13] IANNACCONE,G.,CHUAH,C.,MORTIER,R.,BHATTACHARYYA,S.,DIOT,C.(2002).Analysisoflinkfailures
inanIPbackbone.
[14] PERLMAN, R. (1991, September). A comparison Between Two Routing Protocols: OSPF and ISIS. IEEE
NetworkMagazine.
[15] PUN, H. (2001, December). Convergence Behaviour of RIP and OSPF Network Protocols. University of
BritishColumbia.
[16] SHAIKH,A.,ISETT,C.,GREENBERG,A.,ROUGHAN,M.,GOTTLIEB,J.(2002,November).ACaseStudyof
OSPFBehaviourinLargeEnterpriseNetwork.IMW02.Marsella,France.
[17] DOYLE, J. (2005, November). OSPF and ISIS: Choosing an IGP for LargeScale Networks. First Edition.
AddisonWesleyProfessional.ISBN0321168798.
[18] DOYLE,J.,CARROL,J.(2005,October).CCIEProfessionalDevelopmentRoutingTCP/IP,VolumeI.Second
Edition.CiscoPress.ISBN1587052024.
[19] GHOUGH, C. (2003, December). CCNP SelfStudy: CCNP BCSI Exam Certification Guide. Third Edition.
CiscoPress.ISBN1587200856.
[20] MEDHI, D., RAMASAMY, K. (2007). Network Routing: Protocols, Algorithm and Architectures. First
Edition.MorganKaufmannSeries.ISBN0120885883.
26