A Detail Qualitative Performance Evaluation of Integrated EIGRP/IS-IS and RIP/IS-IS Routing Protocols in Hybrid Networks
A Detail Qualitative Performance Evaluation of Integrated EIGRP/IS-IS and RIP/IS-IS Routing Protocols in Hybrid Networks
A Detail Qualitative Performance Evaluation of Integrated EIGRP/IS-IS and RIP/IS-IS Routing Protocols in Hybrid Networks
MASTER OF TECHNOLOGY
IN
https://www.ThesisScientist.com
LIST OF ABBREVIATIONS
https://www.ThesisScientist.com
NET Network Entity Title
NSAP Network Service Access Point
NSSA Not-So-Stubby-Area
OSPF Open Shortest Path First
PDM Protocol Dependent Module
PSNP Partial Sequence Number Packet
RD Reported Distance
RTP Reliable Transport Protocol
SPF Shortest Path First
VLSM Variable Length Subnet Mask
https://www.ThesisScientist.com
ABSTRACT
In modern internet era, communication networks are growing very rapidly. To provide
efficient routing in the network, routers play an important role. They take part in the
network and forward the packets from source to destination and also keep an eye on the
data so that it remains in control manner. Routing is the process of transferring data from
source node to destination node. Routing selects appropriate path in the network and
forward a packet through the network to a device on a different networks and it is based
on routing protocols. Routing Information Protocol (RIP), Enhanced Interior Gateway
Routing Protocol (EIGRP) and Intermediate System to Intermediate System (IS-IS) are
the dominant interior routing protocols for such networks. This thesis presents a
simulation based analysis of these protocols. We used the combination of EIGRP&IS-IS,
RIP&IS-IS routing protocols on the Hybrid network in order to reveal the advantage of
one over the other as well as the robustness of each protocol combination and how this is
measured. To carry out the network simulations, we used Optimized Network
Engineering Tool (OPNET) v16.0. The comparison analysis is based on several
parameters that determine the robustness of these protocols. The routing protocol
convergence time is one important parameter which determines the time needed by the
routers to learn the new topology of the network whenever a change occurs in the
network. The routing protocol which converges faster is considered a better routing
protocol. We used throughput, HTTP object response time, database response time and e-
mail download response time parameters to measure the routing performance of the
network.
https://www.ThesisScientist.com
Chapter 1
INTRODUCTION
INTRODUCTION
Routing protocols provide essential role in the Enhanced Interior Gateway Routing
Protocol (EIGRP) is modern communication networks. A routing protocol based on
Distance Vector Routing algorithm where determines how routers communicate with
each other and Intermediate Systems-Intermediate Systems (IS-IS) and forward the
packets through the optimal path to travel Open Shortest Path First (OSPF) are based on
Link State from a source to a destination node. All of the above Protocols are from has
different configuration in comparison with others, the interior gateway protocol (IGP)
and are used for so in a network with a special structure, different Autonomous Systems
(AS) [2] protocols depending on their parameters demonstrates IS-IS can be extended
easily and utilizes Dijkstra better performance. As we know, Routing protocol algorithm
for finding the best route Meanwhile, EIGRP operates based on routing algorithms.
Dynamic and static and OSPF utilize Diffusing Update Algorithm (DUA), routing
algorithms are important algorithms for modern which consist of Distance Vector and
Link State routing communication networks. Modern communication algorithms EIGRP
has been CISCO dedicated protocol networks such as internet network use dynamic in
opposite to other general protocols. The cost of routing algorithms instead of static
algorithms, because static in EIGRP protocol is based on bandwidth and delay [5]
algorithms dont utilize network's current load in finding and also the cost of routing
OSPF is based on just the best paths [1]. Dynamic routing algorithms have bandwidth
utilization different kinds, but there are two essential and important Performance analyses
of different routing protocols algorithms Distance Vector Routing and Link State has
been done based on various performance metrics like Routing algorithms which are
employed in recent network convergence, router convergence, queuing communication
networks, Adaptively and scalability delay, throughput network bandwidth utilization, in
comparison with Vector Routing algorithm.
https://www.ThesisScientist.com
1.1 Problem Description:
Interior networks mainly use the following four routing protocols: EIGRP, RIP, OSPF
and IS-IS. Due to its scalability, OSPF is used more often than EIGRP [1]. OSPF and IS-
IS are link state protocols. These protocols consume high bandwidth during network
convergence. Both protocols are relatively complicated to setup on the network but they
are the preferred protocols for larger networks. On the other hand, EIGRP has a faster
convergence time than OSPF and IS-IS, it can be used in different network layer
protocols and it is relatively easy to setup on the network. However, EIGRP is a CISCO
proprietary protocol, which means that it can only be used on CISCO products.
In this thesis, we will look at the advantages of using RIP and IS-IS on hybrid network
and EIGRP and IS-IS on another network. The comparison analysis of the routing
protocols will be performed on OPNET.
1.2 Motivation
The major causes for the degradation of the service performance in Internet are network
congestion, link failures, and routing instabilities. In [2] it has been found that most of the
disruptions occur during routing changes. A few hundred milliseconds of disruption are
enough to cause a disturbance in voice and video [2]. A disruption lasting a few seconds
is long enough for interrupting web transactions. Hence, during routing protocol
convergence data packets are dropped, delayed, and received out-of-order at the
destination resulting thus in a serious degradation in the network performance.
To support a wide variety of network services such as web browsing, telephony, database
access and video streaming, it becomes important to analyze different routing protocols
so that network resources are utilized more efficiently. Routing protocols are the main
factors contributing to speed-up data transfers within the network. The performance of
the routing protocols can be tested by their convergence time, link throughput and
application layer service performance, e.g., HTTP and FTP. Convergence time is the time
period required for the routing protocol to converge and reach a steady state. In routing
https://www.ThesisScientist.com
protocols, the convergence time is an important aspect in indicating routing protocol
performance.
https://www.ThesisScientist.com
path for packet routing. A maximum number of 16 hops are employed to avoid routing
loops. However, this parameter limits the size of the networks that this protocol can
support. The popularity of this protocol is largely due to its simplicity and its easy
configurability. However, its disadvantages include slow convergence times, and its
scalability limitations. Therefore, this protocol works best for small scaled networks.
https://www.ThesisScientist.com
Open Shortest Path First (OSPF) is a very widely used link-state interior gateway
protocols (IGP). This protocol routes Internet Protocol (IP) packets by gathering link-
state information from neighbouring routers and constructing a map of the network.
OSPF routers send many message types including hello messages, link state requests and
updates and database descriptions. Djisktras algorithm is then used to find the shortest
path to the destination. Shortest Path First (SPF) calculations are computed either
periodically or upon a received Link State Advertisement (LSA), depending on the
protocol implementation. Topology changes are detected very quickly using this protocol.
Another advantage of OSPF is that its many configurable parameters make it a very
flexible and robust protocol. Contrary to RIP, however, OSPF has the disadvantage of
being too complicated.
https://www.ThesisScientist.com
Chapter 2
LITERATURE REVIEW
2. Literature Review:
The Literature Review part of the presented thesis intends to accomplish two tasks.
Firstly, a detailed overview of the theoretical background related to the discussed
technologies is performed. It is believed that the in-depth explanation of the functions of
the involved routing protocols and IP protocols offers a knowledge foundation that is
absolutely necessary for the reader to comprehend with the presented research. Secondly,
the conducted by the scientific community related work, related to the Thesis topic is
presented. Finally, the author of this thesis introduces his personal view and critic on the
related research and hes subjective opinion and conclusions on the subject. Both
Theoretical Background and Related Work sections authorship was assisted by
reviewing existing bibliography that is being cited accordingly. For the Theoretical
Background part, published scientific and computer networking books were advised in
order to give an as deep as possible understanding of the discussed technologies.
Ittiphon krinpayorm et al. [2] applied the EIGRP algorithm to an application based on
Maude. Maude is a programming language for formal specifications using algebraic
terms. It is an interpreted language that allows the verification of properties and
transformations on models that can run the model like a prototype. The authors show how
to build an infrastructure of processes implemented by Maude, giving the chance to send
a message directly to a neighbor or broadcast to all neighbors. EIGRP protocol
implements the top of this basic infrastructure. Finally, the global system is tested and
analyzed. The analysis is based on the search command that proves if a "bad" success
could happen. This allows verifying the model, which examines whether a formula is true
for all conditions. We have also found some works and a master thesis that compare and
make some kind of testing with multiple protocols.
https://www.ThesisScientist.com
Y. Navaneeth Krishnan et al; [3] In this thesis explored two eminent protocols namely
Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol
(EIGRP). Performed based on the Quantitative metrics such as Convergence Time, End-
to-End delays, Throughput and Packet Loss through the simulated network models. The
evaluation results indicate that EIGRP routing protocol provides a better performance
than OSPF routing protocol for real time. Conclude that EIGRP uses less system
resources when compared to OSPF. A use of less system resources of EIGRP Routing
protocol that produces lesser heat and therefore the cooling Cost is also saved.
Mr. Rajneesh Narula, Mr. Kaushal [7] This research focuses on the design and
performance of Hybrid Network incorporating different intra-domain routing algorithms
and performed the transmission of video-and voice-data streams over Hybrid network.
Discussed classification of Routing Protocols such as Distance vector routing protocol
and Link state routing then compared IS-IS & RIP and IS-IS & OSPF on various
performance parameters for video & voice data transmission.
Jagdeep Singh, Dr. Rajiv Mahajan [8] Here in this thesis OPNET simulation tool is used
to analyzed the performance of different routing protocols RIP, EIGRP and OSPF
.Simulated Email Download Response Time, Email Upload Response Time, Using
Throughput parameter determined that EIGRP has higher throughput and less packet loss
than other protocols. Also Found that EIGRP performs poor for Email download and
upload response time and DB query response time. While RIP performs well.
Kisten, S et al [9] This work presents the implementation decisions to be made when the
choice is between protocols that involve distance vector or link state or the combination
of both. Here a comparison is made between different parameters and a detailed
simulation study is performed on the network with Different routing protocols and it has
been shown that EIGRP provides a better network convergence time, less bandwidth
requirements and better CPU and memory utilization compared to OSPF also
RIP.EIGRP, OSPF also RIP are the active routing protocol being used in the practical
networks to propagate network topology information to the neighbouring routers. There
https://www.ThesisScientist.com
have been a large number of static and dynamic routing protocols available but choice of
the right protocol for routing is dependent on many parameters critical being network
convergence time, scalability, memory and CPU requirements, Security and bandwidth
requirement etc.
Thorenoor, S.G et al; [10] This work provides a lot of information about this routing
protocol. RIP is the oldest protocol. It uses a distance vector algorithm to form the
routing tables and calculates the distance to a destination host in terms of how many hops
a packet must traverse. It also shows technical aspects of the packet format and the
metric. Due to its small number of hops, RIP is not created for large systems. Several
methods have been added to the RIP protocol in order to solve some problems such as the
generation of loops.
Nohl, A.R, Molnar et al; [12] OSPF and EIGRP will distribute routing information
between routers in the same autonomous system. In This research found that how routing
protocol works and compare those dynamic routing protocols in IPv4 and IPv6
environments. Simulated Network based on GNS3 and Packet Tracer software. The
conclusions according to simulation and analysis performed that Packet sents in an IPv4
networks is smaller than the packet sents in an IPv6 networks. packet loss is smaller
when using EIGRP as compared with OSPF. Whether it is using an IPv4 addressing or
IPv6 addressing. EIGRP packets sent has a smaller size compared to the packets sent by
OSPF.
Talal Mohamed Jaffar et al; [13] This thesis compared the performance of intra-domain
routing protocols such as Enhanced Interior Gateway Protocols of IEEE 802.3 LAN by
evaluating various parameters including Network convergence time, Delay Variation,
End to End Delay, Utilization, Throughput, Queuing Delay and IP Processing Delay and
Also compared the performance of video- and voice-data on the entire networks results
found that IGRP routing protocol enabled networks performs better than that of EIGRP.
OSPF (Open Shortest Path First) and EIGRP (Enhanced Interior Gateway Protocol) are
routing protocol which is a member of IGP (Interior Gateway Protocol). OSPF and
https://www.ThesisScientist.com
EIGRP will distribute routing information between routers in the same autonomous
system. This research wills find how routing protocols works and compare those dynamic
routing protocols in IPv4 and IPv6 network. This research will simulate some network
topology and shows that EIGRP are much better than OSPF in many different topologies.
[13] This thesis looks at an approach for tuning dynamic routing systems using link
metrics and focusing on the EIGRP dynamic routing protocol in order to get consistent
and expected failover of dynamically routed links in complex networks. It examines:
architectural issues for designing enterprise network backbones with redundant links;
operational routing issues associated with configuring "hot spare" routers and
contingency backbone sites; and finally a metrics system for tuning the routing system
where multiply redundant links (redundant groups of redundant links) are used.
B. Albrightson et al. let us know in [14] that EIGRP is based on IGRP protocol, but
improving their benefits. They explain that EIGRP is a protocol based on a hybrid routing
algorithm, sharing some properties of distance vector and link state algorithms. This
protocol is the first Internet protocol that addressed the loop problem. Other aspects
which shows are the type of metrics, the transport mechanisms and the methods used to
discover the networks, among other features.
M. Nazrul and Md. A. Ullah in [16] their goal was to evaluate which protocol, EIGRP or
OSPF, is most suitable to route in real-time traffic. The simulations are based on the
convergence Time, Jitter, End-to-End delay, Throughput and Packet Loss. They
demonstrated that EIGRP has faster convergence time than OSPF, because EIGRP can
learn the topology information and updates faster than the others. Another important
issue is that the packet delay variation for EIGRP is better than for OSPF, and
consequently data packets in EIGRP reach faster to the destination compared to OSPF.
Also, EIGRP, present less number of lost packets and a higher throughput than OSPF,
when there is high link congestion.
https://www.ThesisScientist.com
Xu, Dahai et al [26]. show the design and development of a method for detecting RIP
routing updates. Specifically, RIP-TP protocol is presented. It uses hop count as routing
metric. The authors emphasize its efficiency, simplicity, low operating cost and
compatibility with the standard RIP. In order to assess the design efficiency, they show a
series of experimental simulations to demonstrate that it is possible the improvement of
fault detection in routing protocols. They particularize these evidences with RIP. There is
published a work about OSPF routing protocol in [12].
Ahmed Mahmoud et al. [38] In this thesis, its authors provided a study of the OSPF
behaviour in a large operational network, based on a hierarchical structure formed by 15
areas and 500 routers. One of its main features of this network is that it provides highly
available and reliable connectivity from customers facilities to applications and
databases residing in a data canter. They introduced a methodology for OSPF traffic
analysis, analyzing the link-state advertisement (LSA) traffic which is generated when
the network experiments a topology change. Also the authors provide a general method to
predict the rate of refresh LSAs from router configuration information and a set of
measurements confirm that the method is accurate. Moreover, the authors observed that
the type of topology could provoke certain asymmetries in duplicate-LSA traffic. Finally
they showed a method for reducing duplicate-LSA traffic by altering the routers logical
OSPF configurations, without changing the physical topology of the network. Another
study of OSPF is shown in [13].
A. Basu et al., studies the stability of the OSPF protocol under steady state and with
interferences. In this study we will see what effects are given by the TE (Traffic
Engineering) extensions on the stability of a network when OSPF is running. OSPF TE
extensions provide mechanisms for ensuring that all network nodes have a consistent
view of the traffic parameters associated with the network. The authors also analyze
whether it is possible to accelerate the convergence time of the network, analyzing the
Hello packets and the number of route flaps caused by a failure in the network, because
the number of route flaps characterizes the intensity disruption of the network. The
authors conclude the thesis letting us know that the OSPF-TE protocol seems fairly
https://www.ThesisScientist.com
stable, and adding that extensions TE does not significantly change the times of
convergence, even in presence of multiple failures. But, a high number of failures in the
network could lead to overload of the processor because it will have to attend a large
number of alerts in the short term. Because EIGRP is a Cisco proprietary protocol,
sometimes, it is quite difficult to find information about it.
Another work of the same authors where there is a comparative analysis of the routing
protocols EIGRP and OSPF is shown in [17]. In order to evaluate OSPF and EIGRPs
performance, their authors designed three network models configured with OSPF, EIGRP
and a combination of EIGRP and OSPF and the three topologies where simulated using
the Optimized Network Engineering Tool (OPNET) [18]. In this case, the protocols and
the combined use of them are also analyzed in terms of convergence time, jitter, end-to-
end delay, throughput and packet loss. The evaluation results show that, in general, the
combined implementation of EIGRP and OSPF routing protocols in the network
performs better than each one of them alone.
E. S. Lemma at al. in [19] They use OPNET to carry out the network simulations, using
a combination of EIGRP&IS-IS, OSPF&IS-IS. The main aim of that thesis was to
configure multiple routing protocols on a selected network topology and analyze the
performance improvement of the network. They based their comparison analysis on
several parameters that determined the robustness of these protocols. In order to do it,
their authors simulated five different scenarios on the same network in order to reveal the
advantage of one over the others as well as the robustness of each protocol combination
and how this can be measured. The selected protocols for each scenario were OSPF,
EIGRP, IS-IS, OSPF/IS-IS and EIGRP/IS-IS. The results show that the use of combined
protocols in a network, improve significantly the network performance.
The increased use of new technologies incremented the possibility of malicious attacks to
our network, which could cause data loss, loss of privacy and even, eventually can lead to
large monetary losses. Therefore, in [20], the authors examine the advantages and
disadvantages of MD5 (Message-Digest Algorithm 5) authentication system compared to
non-secure system when EIGRP, RIPv2, OSPF routing protocols are used. MD5 is a 128
https://www.ThesisScientist.com
bits cryptographic reduction algorithm that is widely used. The authors measure values of
delay, jitter and network overhead, in both cases for all protocols, and conclude that the
EIGRP protocol shows the lower overhead, even when the system is heavily overloaded.
C-C Chiang et al. [21] As we know, the security mechanisms play an important role in
networks and in the Internet world. There are many ways to find vulnerabilities in a
network and launch attacks against the network. In this thesis, the authors examine the
performance and security problems of several existing routing protocols including RIP,
OSPF and EIGRP. Several routing performance parameters are evaluated and analyzed
through using SNMP (Simple Network Management Protocol) sessions. They briefly
describe the three IGP protocols, their network Infrastructure and the experimental
evaluation methods. In opposite of denegation of service (DOS) attacks and contaminated
tables, which are among the most serious attacks to network topologies, the authors
propose an automatic mechanism to analyze the states of routing and intrusion detection
in real-time response. The study concludes that the distance vector routing protocols are
more robust than link-state routing protocols for the unstable network topology because
global link-state's flooding of updates increase when link state changes. But, the distance
vector algorithms can only used for small networks.
Don Xu et al; [47] In this thesis we evaluate the Enhanced Interior Gateway Routing
Protocol (EIGRP) via packets simulation. EIGRP, an intra-domain routing protocols
developed by Cisco, is mainly based on the Diffusing Update Algorithm (DUAL) which
computes shortest paths distributed without creating routing-table loops or incurring
counting-to-infinity problem. Previous studies showed EIGRPs ability to adapt quickly
to routing changes in medium-scale networks. In our research, we developed a detailed
simulation model of EIGRP (publicly available), and we used it to evaluate EIGRP
performance under a very dynamic network. Our results showed that EIGRP converges
faster than a single TCP timeout in most cases. The simulated network was a composite
of wired and wireless hosts, and the results hold for both types of media. In addition, the
study showed a feasible approach for seamless mobility and continuous connectivity for
users of mobile wireless devices as they move within an Autonomous System (AS).
https://www.ThesisScientist.com
Neha Singh et al; [56] In this thesis, we model power of core routers which are using
OSPF and EIGRP protocols. The model can accurately predict the power consumption of
the routers with an important speedup. Also we establish the total quantity of routers
required to support thousands of servers in the mentioned network. Simulations done
with NS2 in a wide range of network configurations to support the proposed model.
Results obtained from the simulations are in agreement with those obtained by the model.
This work settles an open question with a positive answer: Optimal traffic engineering (or
optimal multi commodity flow) can be realized using just link-state routing protocols
with hop-by-hop forwarding. Todays typical versions of these protocols, Open Shortest
Path First (OSPF) and Intermediate System-Intermediate System (ISIS), split traffic
evenly over shortest paths based on link weights. However, optimizing the link weights
for OSPF/ISIS to the offered traffic is a well-known-hard problem and even the best
setting of the weights can deviate significantly from an optimal distribution of the traffic.
In this thesis, we propose a new link-state routing protocol, PEFT that split traffics over
multiple paths with an exponential penalty on longer path. Unlike its predecessor, DEFT,
our new protocol provably achieves optimal traffic engineering while retaining the
simplicity of hop-by-hop forwarding. The new protocol also leads to a significant
reduction in the time needed to compute the best Link weights. Both the protocol and the
computational methods are developed in a conceptual framework, called Network
Entropy Maximization that is used to identify the traffic distributions that are not just
most select, but also achievable by link-state routing.
https://www.ThesisScientist.com
are used to connect multiple networks and to provide packet forwarding for different
types of networks. The main objective of routing protocols is to determine the best path
from a source to a destination. A routing algorithm uses different metrics based on a
single or on several properties of the path in order to determine the best way to reach a
given network. Conventional routing protocols used in interior gateway networks are
classified as Link State Routing Protocols and Distance Vector Routing Protocols. There
are also other classifications of routing protocols, i.e., dynamic or static, reactive or
proactive, etc. The conventional routing protocols can be used as a basis for building up
other protocols for other types of communication networks such as Wireless Ad-Hoc
Networks, Wireless Mesh Networks, etc. This chapter introduces different types of routing
protocols, routing methods, network roles and characteristics.
https://www.ThesisScientist.com
available in the routing table saving thus valuable time for discovering a new
route
Quality of Service (QoS): The protocol design should provide some class of
QoS depending upon its intended network use. Not all routing protocols used in
current networks meet the above requirements. Each protocol differs in some
way.
https://www.ThesisScientist.com
Load: It describes the traffic utilization of a certain link. When load is used as a
metric the link with lowest load is the best path.
Delay: It is a measure of the time a packet takes to pass through a path. The best
path is selected with the least delay.
Reliability: Calculates the probability of a link failure. Probabilities can be
calculated from previous failures or interface error count. Path with highest
reliability is chosen as the best path.
Cost: Cost is a value which is decided by the network administrator or Internet
Operating System (IOS) to indicate a preferred route. Cost can be represented as a
metric, combinations of metrics or a policy.
https://www.ThesisScientist.com
For example, consider Figure 2.1. When the routing protocol uses hop count as a metric,
the router R1 will select suboptimal route directly through R2 to arrive at PC2. However,
in routing protocol such as OSPF, R1 will choose the shortest path depending on the
bandwidth. R1 chooses the link through R3.
2.6 Classification
Routing protocols can be classified as:
Static and dynamic routing protocols
Classful and Classless routing protocols
Distance Vector and Link State routing protocols
https://www.ThesisScientist.com
as follows: it is impossible to accommodate rapid network topology changes and it is
hard to setup all the routes manually. In dynamic routing protocols, the routing tables are
created automatically in such a way that adjacent routers exchange messages with each
other and the best routes are computed using own rules and metrics. The selection of best
routes is based on specific metrics such as link cost, bandwidth, number of hops and
delay and these values are updated by using protocols which propagate route information.
The main advantage of this type of routing protocols is that it helps the network
administrator to overcome the time consumed in configuring and maintaining routes. The
drawback of dynamic routing is that it may create diverse problem such as route
instabilities and routing loops.
Classful routing protocols can still be employed in todays networks but may not be used
in all scenarios since they do not include the subnet mask. Figure 2.2 shows a network
using classful routing protocol in which the subnet mask is same throughout the network.
https://www.ThesisScientist.com
RIPv1 and IGRP are examples of routing protocols that belong to the classful routing
family of protocols.
In classless routing, the subnet mask can vary in network topology and in the routing
updates and the subnet mask together with the network address are included. Most
networks today are not allocated based on classes and the value of the first octet is not
used to determine the subnet mask. Classless routing protocols support discontinuous
networks. Figure 2.3 shows a network using classless routing in which different subnet
https://www.ThesisScientist.com
mask are used within the same topology. RIPv2, EIGRP, OSPF, IS-IS and BGP are
examples that belong to the classless routing family of protocols.
https://www.ThesisScientist.com
router keeps a list of known routes in a table. During booting, the router initializes the
routing table and every entry identifies the destination in a table and assigns the distance
to that network. This is measured in hops. In DV, routers do not have information of the
entire path to the destination router. Instead, the router has knowledge of only the
direction and the interface from where the packets could be forwarded [5].
https://www.ThesisScientist.com
Being impossible for hierarchical routing.
Bad performance for large networks.
Few techniques exist to minimize the limitations of DV routing protocols. They are [7]:
Split horizon rule It is a one of the methods to eliminate routing loops and increase the
convergence speed. Triggered update It uses specific timers and increases the response
of the protocol.
https://www.ThesisScientist.com
flexibility but are complex compared to DV protocols. A better decision about routing is
made by link state protocols and it also reduces overall broadcast traffic. The most
common types of LSR protocols are OSPF and IS-IS. OSPF uses the link weight to
determine the shortest path between nodes.
2.14 EIGRP
The Enhanced Interior Gateway Routing Protocol (Enhanced IGRP) is a routing protocol
developed by Cisco Systems and introduced with Software Release 9.21 and Cisco
Internetworking Operating System (Cisco IOS) Software Release 10.0. Enhanced IGRP
combines the advantages of distance vector protocols, such as IGRP, with the advantages
https://www.ThesisScientist.com
of link-state protocols, such as Open Shortest Path First (OSPF). Enhanced IGRP uses the
Diffusing Update Algorithm (DUAL) to achieve convergence quickly. Enhanced IGRP
includes support for IP, Novell NetWare, and AppleTalk. The discussion on Enhanced
IGRP covers the following topics:
Enhanced IGRP Network Topology: Enhanced IGRP uses a non hierarchical (or flat)
topology by default. Enhanced IGRP automatically summarizes subnet routes of directly
connected networks at a network number boundary. This automatic summarization is
sufficient for most IP networks. See the section "Enhanced IGRP Route Summarization"
later in this chapter for more detail.
Enhanced IGRP Addressing: The first step in designing an Enhanced IGRP network is
to decide on how to address the network. In many cases, a company is assigned a single
NIC address (such as a Class B network address) to be allocated in a corporate
internetwork. Bit-wise sub-netting and variable-length sub-network masks (VLSMs) can
be used in combination to save address space. Enhanced IGRP for IP supports the use of
VLSMs.
https://www.ThesisScientist.com
Enhanced IGRP Route Selection: Routing protocols compare route metrics to select the
best route from a group of possible routes. The following factors are important to
understand when designing an Enhanced IGRP internetwork. Enhanced IGRP uses the
same vector of metrics as IGRP. Separate metric values are assigned for bandwidth,
delay, reliability and load. By default, Enhanced IGRP computes the metric for a route by
using the minimum bandwidth of each hop in the path and adding a media-specific delay
for each hop. The metrics used by Enhanced IGRP are as follows:
https://www.ThesisScientist.com
A router using Enhanced IGRP receives full routing tables from its neighbours when it
first communicates with the neighbours. Thereafter, only changes to the routing tables are
sent and only to routers that are affected by the change. A successor is a neighbouring
router that is currently being used for packet forwarding, provides the least cost route to
the destination, and is not part of a routing loop. Information in the routing table is based
on feasible successors. Feasible successor routes can be used in case the existing route
fails. Feasible successors provide the next least-cost path without introducing routing
loops.
The routing table keeps a list of the computed costs of reaching networks. The topology
table keeps a list of all routes advertised by neighbours. For each network, the router
keeps the real cost of getting to that network and also keeps the advertised cost from its
neighbour. In the event of a failure, convergence is instant if a feasible successor can be
found. A neighbour is a feasible successor if it meets the feasibility condition set by
DUAL. DUAL finds feasible successors by the performing the following computations:
Memory: A router running Enhanced IGRP stores all routes advertised by neighbors so
that it can adapt quickly to alternate routes. The more neighbours a router has, the more
memory a router uses. Enhanced IGRP automatic route aggregation bounds the routing
table growth naturally. Additional bounding is possible with manual route aggregation.
CPU: Enhanced IGRP uses the DUAL algorithm to provide fast convergence. DUAL re-
computes only routes, which are affected by a topology change. DUAL is not
computationally complex, so it does not require a lot of CPU.
Bandwidth: Enhanced IGRP uses partial updates. Partial updates are generated only
when a change occurs; only the changed information is sent, and this changed
information is sent only to the routers affected. Because of this, Enhanced IGRP is very
https://www.ThesisScientist.com
efficient in its usage of bandwidth. Some additional bandwidth is used by Enhanced
IGRP's HELLO protocol to maintain adjacencies between neighbouring routers.
Enhanced IGRP Security: Enhanced IGRP is available only on Cisco routers. This
prevents accidental or malicious routing disruption caused by hosts in a network. In
addition, route filters can be set up on any interface to prevent learning or propagating
routing information inappropriately.
Analysis: Now that the <Client> requirements as well as the technical merits and
downfalls of the routing protocols have been defined an analysis needs to be conducted of
this information. The Open Shortest Path First Protocol is an open standard. This
means that it can be implemented on any platform, from any vendor or manufacturer.
This is an advantage over Enhanced Interior Gateway Protocol, which is a proprietary
standard from Cisco. However, this is the only clear advantage of OSPF over EIGRP.
As previously stated, OSPF is designed primarily for hierarchical networks with a clearly
defined backbone area. This is clearly not the case in the <Client> network. In addition,
when compared to EIGRP, OSPF uses more bandwidth to propagate its topology requires
more router CPU time and memory. OSPF is also more difficult, and therefore more
costly, to implement that EIGRP.
EIGRP, as stated previously, has several advantages over OSPF when used in the
<Client> network. A brief summarization of these advantages includes:
https://www.ThesisScientist.com
even during routing topology computations, a defined portion of the link capacity
remains available for data traffic.
EIGRP does not require a hierarchical network design to operate efficiently. It will
automatically summarize routes where applicable.
Given all of this data and analysis a table is used to consolidate the issues and synthesize
CPU Requirements Lower CPU and memory Higher CPU and memory
requirements requirements
https://www.ThesisScientist.com
Unlike OSPF, which only takes bandwidth into consideration when calculating the
cost of a route, EIGRP can be configured to use bandwidth, delay, reliability, and
load when calculating optimum routes. This has proven to be a valuable
consideration in a wireless environment.
EIGRP has greater control on timing issues, such as hold times and hello intervals,
than does OSPF. This allows greater flexibility with wireless connections, where
these intervals must be fine-tuned to a particular device or bandwidth.
EIGRP is less complex and has less cost (manpower and time) involved in
configuration and administration.
Although EIGRP is proprietary, it can communicate and redistribute routing
information with other routing protocols, such as OSPF. This is accomplished
through router redistribution or using an exterior routing protocol such as BGP.
The comparison of the two protocols has been a matter of debate through the years, but
nowadays the subject still preoccupies the networking community. IS-IS, although used
primarily in ISPs networks, is being reviewed by researchers about the possibility of a
broader deployment. A recent publication has attempted to emphasize IS-IS advantages
and why it should be considered as an alternative to OSPF. It is suggested that IS-IS is an
extensible routing protocol that offer huge support to the global IPv6 deployment.
https://www.ThesisScientist.com
Furthermore, as discussed in the Theoretical Background chapter its hierarchical structure
helps to reduce the exchanged routing information. In terms of security, IS-IS is also
strong, as it supports clear-text authentication by using specialized TLVs, and is
extensible to new authentication forms that are being researched by IETF. Except that, in
comparison to OSPF, IS-IS routing information is not carried over IP but is encapsulated
in layer 2, making a possible attacker task difficult, as they should directly connect to an
IS-IS router to start any malicious activities. Apart from the obvious advantages,
researchers believe that IS-IS also has disadvantages that may have played a role in its
reduced popularity. Notably, IS-IS level 1 adjacencies do not carry external route
information and this can only be done by injecting these routes to the level 2 topology, in
comparison to OSPF that can achieve this goal by using not-so-stubby-areas.
Furthermore, it is noted that IS-IS does not support virtual links like OSPF. However, this
is believed to be of less importance as IS-IS doesnt require to achieve connectivity with
a backbone area. Back to IS-IS advantages, the LSP lifetime can grow up to 18.2 hours
unlike OSPF that is limited to 1 hour, making this way IS-IS more scalable for bigger
areas. Moreover, IS-IS can make use of the Overload bit to signal memory exhaustion of
a router and also includes a feature that enables routers in full-mesh topologies to receive
only one LSP copy, where OSPF has no such capabilities. Eventually, this research points
out that IS-IS may be a more efficient solution as it can be extended for future needs by
adding new TLVs in comparison to OSPF that needs the creation of new LSAs, by the
most obvious example being that of the IPv4 and IPv6 coexistence capability. It is
suggested that the above discussed characteristics should make the scientific and industry
community reconsider IS-IS place in the networking world, especially for larger
networks.
Even though several research thesis signalize IS-IS superiority, the OSPF - IS-IS
comparison topic is controversial and research thesis that support the opposite also exist.
Based on an example research thesis, OSPF is compared with other IGPs, namely IGRP,
EIGRP and OSPF and is suggested to be better than all of them. This research
emphasizes on the advantages of OSPF due to its hierarchical structure that facilitates
reducing the routing data traffic, as well as on the fast convergence times that it offers.
Thereinafter, it attempts to build a comparative table with the characteristics of each
https://www.ThesisScientist.com
mentioned IGP in order to conduct a comparison, and conclude to the most efficient of
them. The thesis suggests that OSPFs greater advantage is that it is open, making
possible this way its deployment to networks that include routers and other network
devices by various vendors. These characteristics are used by the research as arguments
that lead to the conclusion that OSPF is superior to IGRP and EIGRP. However, the
presented comparative table regarding the comparison with IS-IS only presents
differences in the type of the hierarchy format, the Dead Timer times and the metric used,
and no other supremacy points are discussed. Thus, it is believed by the author of the
current project, that this information is inadequate to lead to a conclusion about which
protocol among OSPF and IS-IS is prime.
More than that, another general research review thesis about IGP and BGP protocols
dedicates a part in the popular OSPF - IS-IS comparison. Except the disclosure of the
main characteristics and differences of the two protocols, this research thesis presents a
brief comparison by showing some of their advantages and disadvantages. More
specifically, the research suggests that in OSPF, routers may belong to multiple areas in
comparison with IS-IS Intermediate Systems that belong to only one area, and this fact
results in higher power consumption. Furthermore, it is noted that OSPF area boundaries
fall on the routers where IS-IS area boundaries fall on the links, which could lead in
higher delay times in the sending and receipt of the packets for the latter. Additionally,
IS-IS is considered by the thesis as more flexible because holding timers dont need to be
identical on all routers. Finally, an argument is made which supports that OSPF is
superior than IS-IS in security terms due to the fact that OSPF runs over IP. However,
this statement is believed by the author of this project to be untrue, as IP is more
vulnerable to various types of attacks and also is more popular and more hackers have
better knowledge of it.
Relatively recent research has been focused on the comparison of the OSPF and IS-IS
protocols in terms of performance in ISPs IPv4 networks. This research notes the
importance of selecting the right routing protocol to assure the temporal efficiency of a
network in the distribution of data, as well as the superiority of dynamic routing protocols
over static routing due to the fact that they are able to easily adapt network changes. The
https://www.ThesisScientist.com
performance comparison of the two protocols has been conducted with the help of the
OPNET modeler network simulator. More specifically, the same topology of 21 routers
spread across different states of the USA, has been configured with each protocol one
after the other in order to produce comparative metrics. The research aimed to produce
results regarding the router and network and router convergence activities and duration
times, as well as queuing delay times on point-to-point links. The results of the
experiment showed that OSPF demands more network activity regarding the messages
sent between the routers until the network has reached convergence, and also the network
and router convergence duration times are 6 and 5 times higher than the ones of IS-IS
respectively. In addition, in the specific experiment IS-IS presented much higher
throughput than OSPF, with the second resulting in lower queuing delays than the first.
The different metric results regarding convergence are possibly related to the hierarchical
format that each protocol is using. More precisely, in OSPF internal routers in an area
have to learn about routes to every possible destination, where internal IS-IS routers only
need to know about the closest level 1/2 IS, speeding this way the network convergence
procedure. Except that, IS-IS only requires the exchange of one LSP during the
convergence procedure where OSPF demands many different LSA types to be exchanged
between the routers.
Although most of the research implies that IS-IS presents better characteristics and
performance than OSPFv2, the performance of OSPFv3 should also be taken into account
when comparing the two protocols, especially nowadays that IPv6 becomes a constant
part of modern networks. One more motive for this research review, is that there is no
published research about the IS-IS OSPFv3 performance in IPv6 networks. Based on
this fact, researchers have conducted experiments to discover any performance
improvements of OSPFv3 in comparison to OSPFv2. The experiments were implemented
by using OPNET Modeler and by creating a simple OSPF topology including five areas,
specifically two non-backbone areas and a backbone area, and five routers in total. Then,
the same topology was configured separately with OSPFv2 on one occasion and OSPFv3
on the other, and performance metrics were calculated in order to compare the two
protocols performance, by running 10 minutes simulations. In terms of convergence
https://www.ThesisScientist.com
duration and amount of traffic sent, the two versions of OSPF presented similar results.
As far as it concerns the LSDB size, measurements were taken according to the research
on an internal router, and the results showed that OSPFv3 LSDB is 27% smaller than the
OSPFv2 LSDB. Such behaviour can be explained due to the fact that OSPFv3 does not
store any network addresses carried in Router LSAs in the LSDB. Moreover, even if IPv6
addresses are bigger than IPv4 ones, similar measurements were taken for memory
consumption for both protocols, fact that may be explained by the facilitating role of the
OSPFv3 Link LSA. However, OSPFv3 presents greater routing table sizes due to the
inclusion of both global unicast and link-local unicast addresses, and it was also proved
that it produces more updates than OSPFv2 in case of a router failure. (Chen Haihong,
2013) Eventually, this research suggests that OSPFv2 and OSPFv3 present similar
performance and predicts that OSPFv3 will be one of the most popular routing protocols
in the near future due to its effectiveness. Nevertheless, important metrics such as
throughput and round-trip delay have not been measured in order to produce more clear
results.
https://www.ThesisScientist.com
intermediate systems, hosts as end systems, routing as routeing and packets as PDUs.
Nowadays, it is a less common protocol than OSPF but still is the favourite choice for
many Internet Service Providers backbone networks. More than that, IS-IS doesnt need
to be upgraded to a new version in opposition to OSPF, because it can easily adapt the
carriage of IPv6 addresses as it will be discussed later on the thesis. Generally, as a link-
state protocol, IS-IS is considered to be an IGP with fast convergence time and stability,
as well as low resources consumption.
2.16.1 Addressing
Either being used to route CLNP or IP, IS-IS remains an OSI protocol and demands the
assignment of an OSI address on every Intermediate System, and not on interfaces. These
addresses are called NSAPs (Network Service Access Points), their length varies from 8
to 20 bytes and are usually written in hexadecimal. They consist of three main fields: the
Area ID which defines the IS-IS area where the IS resides, the System ID which is unique
for every device and commonly is assigned the MAC address of the device, and the N-
Selector (SEL). The latest field defines the user of the network service. At the most usual
situation where an NSAP address is assigned to an IS, the N-Selector takes always the
hex-value 0x00. Every such IS address is also called NET (Network Entity Title). ISs
assigned with addresses including the same Area ID field value belong to the same area
and moreover, a single IS can be assigned more than one NET addresses as long as the
Area ID changes and the System ID stays identical. NET addresses always start and end
with a single byte. It has to be noted that except this format, another two formats are
present, the OSI and the GOSIP format. The first one adds to the address a Routing
Domain Part, where the second adds six fields, namely AFI, ICD, DFI, AAI, Reserved
and RDI.
2.16.2 Hierarchy
Like OSPF and as a link-state protocol, IS-IS also uses the concept of splitting the entire
IS to smaller areas. The motivation behind this technique is again to limit the
consumption of CPU and memory resources at the ISs by minimizing their databases and
give them a relief when executing the SPF algorithm. Additionally, dividing into areas
https://www.ThesisScientist.com
facilitates route summarization at the areas edges in order to also minimize routing
tables. On the other hand, unlike OSPF, IS-IS only defines one type of area. The basic
differentiate characteristic is the lack of a backbone area. More specifically, areas do not
need to be connected physically or logically to a specific area. This specificity of IS-IS
makes it more scalable to larger networks and easier to adapt to any subnet additions.
However, as routing roles are not dependent on the area type, IS-IS includes another
feature to define routing hierarchy and manage the way routing is performed. This is
accomplished with the introduction of levels.
2.16.3 Levels
IS-IS includes two levels of hierarchy, level 1 and level 2. The first is used to characterize
intra-area routing where the second is used for inter-area routing. Level 1/2 is used for
both types of routing. Every IS is defined by one of these levels, depending on its role in
the topology, and so are its links. The level of every IS also defines the type of
relationship that will be formed with the IS-IS configured ISs.
Level 2: On the other hand, level 2 ISs contain a level 2 Link-State Database only. This
means that level 2 ISs have knowledge of the topological information of other IS-IS
areas but not from theirs. More than that, Area IDs of level 2 routers do not have to match
in order to form an adjacency. However there is no way that a level 2 router is isolated
from the other level 2 routers. An area containing only level 2 routers can be considered
as similar to the OSPF backbone area, as far as it concerns its functionality that includes
spreading routing information from one area to another. However, this theoretical
https://www.ThesisScientist.com
backbone can be extended with the addition of another level 2 or level 1/2 IS, and any
connection to it is not mandatory. It has to be noted here, that an area containing only
level 2 routers can exist only in IP routing environments and not in solely OSI routing
networks.
Level 1/2: In IS-IS, an IS can belong to only one area so there is no ABR router concept
in terms that it has interfaces to more than one area. However an IS can be configured as
level 1/2. This means that such an IS stores both a level 1 and level 2 Link-State
Databases and is able to form adjacencies with all level 1, level 2 and level 1/2 ISs.
Therefore, a level 1/2 IS contains topological information of the area it resides in and
also of other areas. Communication with a level 1 IS leads to the update of the level 1
database, communication with a level 2 IS leads to the update of the level 2 database and
accordingly communication with another level 1/2 will update both Link-State Databases.
This feature makes a level 1/2 IS simulate the behaviour of an ABR in OSPF. The level
1/2 IS is usually placed at the edge of the area, and is responsible for forwarding packets
from the areas level 1 ISs to inter-area destinations.
PDU Types: The IS-IS protocol makes use of three main categories of PDUs (Protocol
Data Units) in order to establish neighbour relationships and manage the distribution of
routing information between ISs. These three categories include Hello packets, Link-
State Packets (LSPs) and Sequence Number Packets (SNPs). Each of these PDU
https://www.ThesisScientist.com
categories has a slightly different header format but the first eight fields with eight byte
length in total are identical for every one of them. Thus, every PDU consists of its header
and various TLVs (Type, Length, Value). TLVs have variable length and depending on
their numeric value, they describe the information that the PDU-packet carries. More
specifically, the Type part consists of a numeric code to define the type of the TLV, the
Length shows the actual length of the TLV and the Value part defines the content. The
following figure shows the common header part for every PDU sub-category. The fields
Intra-domain Routing Protocol Discriminator, Version/Protocol ID Extension, Version
and Reserved are fixed and have the decimal values 131, 1, 1 and 0 accordingly. Length
Indicator and ID Length fields define the header length and System ID length, where the
PDU Type field shows the category that the PDU belongs to. Finally, the Maximum Area
Addresses field defines the size of the IS-IS area.
Hello Packets: Hello packets are exchanged between ISs during neighbour discovery in
order to start forming adjacencies, and vary depending on the type of the link as well as
the type of the routing relationship. For broadcast links there are two subcategories. First,
level 1 LAN IIHs (Intermediate System to Intermediate System Hello packets) are used
in broadcast links which connect ISs in order to form a level 1 adjacency. On the other
hand, level 2 LAN IIHs are exchanged on the same type of links but for level 2 adjacency
establishment. On point-to-point links, point-to-point IIHs are used to form both level
1and level 2 adjacencies. Not to be confused by these categories, are the ESH (End
System Hello) and ISH (Intermediate System Hello) packets, which are being sent and
received between hosts and routers in order to discover each other. IS circuits can be
configured to allow or ban a specific type of Hello packets in order to optimize
performance.
Link-State Packets: LSPs, referred also as Link-State PDUs, have exactly the same
functionality that LSA packets have in OSPF. In IS-IS LSPs come in two versions,
depending on the routing information that they carry, having however the same packet
format. Specifically, level 1 LSPs are flooded by each IS within their area in order to
inform the rest ISs about their adjacent routers, their attached IP subnets (when talking
about Integrated IS-IS) and carry area, metric and authentication information. Level 1
https://www.ThesisScientist.com
Link-State Databases are built by them in the area and are identical at the time of
convergence. The second category consists of level 2 LSPs which are exchanged between
level 2 ISs by neighbour flooding, and carry information about the level 2 topology.
Thus, the level 2 Link-State Database is updated by their facilitation on the
communicating ISs. It has to be noted that level 1/2 ISs produce both types of LSPs.
Sequence Number Packets: SNPs are used to facilitate the Link-State Database
synchronization between ISs. They come in two forms, CNSPs (Complete Sequence
Number Packets) and PNSPs (Partial Sequence Number Packets), and each one of them
is divided in level 1 and level 2 sub-categories depending on which Link-State Database
they are describing accordingly, just like LSPs. CNSPs contain a summary of every LSP
in the Link-State Database that includes an LSP Identifier, a Sequence Number, a
Checksum and a Remaining Lifetime field. CNSPs are exchanged once during the
establishment of an adjacency and before any other LSPs have been exchanged. This way
ISs are informed about the topological information that each one of them contains. For
broadcast networks, CNSPs are only sent by the Designated IS of the network. On the
other hand, PSNPs contain only summaries about a specific LSPs and facilitate the Link-
State Database synchronization procedure, either as requests for missing LSPs or to
acknowledge receive LSPs.
Network Types: In opposition to OSPF, IS-IS supports only two types of networks,
point-to-point and broadcast. Adjacencies on NBMA networks can also be accomplished
without problems, if configured as a series of point-to-point links.
Broadcast Networks: Broadcast networks are multi-access networks that support both
broadcasts and multicasts. In every broadcast network, a Designated IS (DIS) is elected,
https://www.ThesisScientist.com
that plays a similar role to a DR in OSPF. The election process is based on link
configured priorities that have a default value of 64, and in the case of a tie, the IS with
the higher MAC address wins the election. In contradiction to OSPF, there is no Backup
Designated IS, and a new election must be performed if the DIS goes down. In IS-IS, a
Broadcast Network is considered a pseudo node in the Link-State Database and every IS
in it has to advertise a link to it. The DIS has the role of flooding the LSPs and Hello
Packets for the pseudo node except its own packets, and establishing and maintaining
adjacencies. Of course, different DISs are elected for level 1 and level 2 topologies and
the two may be the same or vary.
Operation
As IS-IS is based on OSI model, its functions are divided to two categories that resemble
the two sub-layers of the OSI network Layer, the sub-network dependent layer and the
sub-network independent layer. The most vital functions of each sub-layer are presented
below.
Neighbouring Process: ISs send, every 10 seconds by default, Hello packets on their
attached interfaces, declaring this way their identity and capabilities as well as the
parameters of the link. If the two ISs agree on the parameters, they become adjacent.
Unlike OSPF, it is not demanded for all capabilities to match in order to form an
adjacency. For example Hello interval times may vary on the two ISs but the adjacency
will be established. As described above, adjacencies are level 1 and level 2. For level 1,
Area IDs must match where for level 2 that is not necessary. After the adjacency is
established, Hello packets are still used to maintain it as keep-alive messages. Moreover,
a Hold Time value is included in the Hello packets in order to inform neighbour about the
time they need to wait until they should declare the sending IS as dead. Finally, two ISs
https://www.ThesisScientist.com
are fully adjacent only when the Link-State Database synchronization is accomplished.
Hello packets are multicoated to all neighbours even by ISs that belong to the same
broadcast network, with the elected DIS sending the appropriate SNPs to ensure the
reliable transfer of LSPs.
Shortest Path First Algorithm: IS-IS uses the same SPF algorithm as OSPF in order to
build an SPF tree and calculate the shortest routes to the known destinations. After the
Link-State Database update procedure has finished, the ISs run a separate instance of the
SPF algorithm for the level 1 and level 2 databases, depending of course on which of
them do they support. The difference with OSPF resides on the metric used to perform
the calculations. More specifically, IS-IS uses a metric called default, which takes the
default value of 10 for every link. It also supports three optional metrics, namely delay,
expense and error that characterize the delay, the actual cost and the error rate of the link
respectively. However, using all metrics is not recommended as the SPF algorithm has to
https://www.ThesisScientist.com
be run separately for each one of them increasing this way the CPU and memory
overload. By running the SPF algorithm, ISs calculate the level 1 and level 2 routes and
inject them into their routing tables.
https://www.ThesisScientist.com
IPv6 Capability: The adaptability of the Hello packets and LSPs to be modified to
include extra TLV fields, has given a huge advantage to IS-IS to the point that it can
carry newer addressing schemes network addresses without changing at all the operation
of the protocol. Therefore, the upcoming arrival of IPv6 found IS-IS almost ready, in
contradiction to OSPF that needed to be extended to a completely new version.
Specifically, another TLV was added to the IS-IS routing packets, equivalent to the ones
for IPv4. This TLV is named IPv6 Reach ability TLV and includes the global IPv6
addresses prefix, a metric and two bits to signify if the routing information comes from a
higher Level or from another routing protocol. Finally, the IPv6 equivalent TLV for the
IP Interface Address TLV is called IPv6 Interface Address TLV and it has identical
format, except the fact that it is modified to contain 16-byte long IPv6 addresses.
Features:
https://www.ThesisScientist.com
It can simulate many standards such as IEEE 802.11a, IEEE 802.11b,
IEEE 802.11e,IEEE 802.16d, IEEE802.11g and IEEE 802.11.
It supports large number of nodes.
It includes directional, bidirectional and omni directional communation.
https://www.ThesisScientist.com
Figure 2.4 : NCTU ns simulator. The architecture of NCTU ns 6.0 network protocol
simulation.
https://www.ThesisScientist.com
NS-2 consists of two key languages one is the C++ and second is the Object-oriented
Tool Command Language (OTCL). In NS-2 C++ defines the internal mechanism
(backend) of the simulation objects, and OTCL defines external simulation environment
(i.e., a frontend)for assembling and configuring the objects. After simulation, NS-2 gives
simulation outputs either in form of text-based or animation-based.
https://www.ThesisScientist.com
Re-Specification
Data Collection
Initial Specification And
Simulation
Analysis
https://www.ThesisScientist.com
- Node mobility, including handover
- Interconnection with wire-line transport networks
The wireless module has rich protocol model suites to optimize the R&D processes, and
more effectively design technologies such as MANET, 802.11, 3G/4G, Ultra Wide Band,
802.16, Bluetooth, and Transformational Communications systems. Wireless network
planners, architects, and operations professionals can analyze end-to-end behaviour, tune
network performance, and evaluate growth scenarios for revenue-generating network
services.
OPNET Capabilities
OPNET has a lot of capabilities. Some of these capabilities are the following:
Hierarchical Network Models: Manage complex network topologies with unlimited sub-
network nesting [27].
https://www.ThesisScientist.com
Object Oriented Modeling: Nodes and protocols are model as classes with inheritance
and specialization [27].
Clear and Simple Modeling Paradigm: Model the behavior of individual objects at the
process level and interconnect them to from devices at the Node Level ; interconnect
devices using links to form networks at the Network Level [27].
Finite State Machine Modeling: Finite state Machine modeling of protocols and other
processes. Simulate arbitrary behavior with C/C++ logic in FSMs states and transitions.
You control the level of detail [27].
Comprehensive Support for Protocol Programming: 400 library functions support and
simplifying writing protocol models [27].
Wireless, Point-to-Point and Multipoint Links: Link behavior is open and
programmable [27].
Geographical and Dynamic Mobility Modelling: It is for mobile and satellite systems
[27].
Total Openness: APIs from program-driven construction or inspection of all models and
result files. Easily integrate existing code libraries into your simulations [27].
Integrated Analysis Tools: Display simulation results. Easily plot and analyze, time
series, histograms, probability functions, parametric curves, and confidence intervals.
Export to spreadsheets [27].
Animation: Animation of model behavior, either during or after simulation [27].
Integrated Debugger: Integrated debugger to quickly validate simulation behavior or
track down problems [27].
Import Data from Some Popular Tools: Such as HP Open View and Network
Associated Sniffer [27].
Comprehensive Library of Detailed Protocol Models: Including ATM, Frame Relay,
TCP/IP, RIP, OSPF, BGP4, IGRP, Ethernet, FDDI, Token Ring, and many more.
Provided as FSMs with source code [27]
Run Time Environment (Modeler XE): Deliver proprietary protocol and device models
to end-users, working and running simulations at the network level only [27].
Solaris, Windows NT, and HP-UX: Supported (Transparent cross platform usage)
Flexible Licenses: Floating license (concurrent use based), and loan able license
https://www.ThesisScientist.com
Figure. 2.7 OPNET-A Powerful Network Simulation Tool
d.) QualNet (Quality Networking): QualNet is a highly scalable, fastest simulator for
large heterogeneous network It supports the wired and wireless network protocol.
QualNet execute any type of scenario 5 to 10 times faster than other simulators. It is
highly scalable and simulate up to 50,000 mobile nodes. And this simulator is designed as
a powerful Graphical User Interface (GUI) for custom code development. one of the main
advantage of QualNet is that it supports Windows and Linux.
https://www.ThesisScientist.com
Figure 2.8: QualNet simulator. QualNet in visual mode.
https://www.ThesisScientist.com
Chapter 3
PROJECT ESSENTIALS
In our dissertation work we are using the Optimized Network Engineering Tool (OPNET
v16.0) software for simulating selected routing protocols. OPNET is a network simulator.
It provides multiple solutions for managing networks and applications e.g. network
operation, planning, research and development (R&D), network engineering and
performance management.
OPNET 16.0 is designed for modelling communication devices, technologies, and
protocols and to simulate the performance of these technologies. It allows the user to
design and study the network communication devices, protocols, individual applications
and also simulate the performance of routing protocol. It supports many wireless
technologies and standards such as, IEEE 2002.11, IEEE 2002.15.1, IEEE 2002.16, IEEE
2002.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to
the academic research and teaching community.
https://www.ThesisScientist.com
It provides a virtual network environment that models the behaviour of an entire network
including its switches, routers, servers, protocols and individual application. The main
merits of OPNET are that it is much easier to use, very user friendly graphical user
interface and provide good quality of documentation.
OPNET Modeler constitutes a network simulation program based on C and C++, which
offers a convenient GUI in order to facilitate users to conduct network experiments.
OPNET Modeler includes model libraries that represent various network hardware
devices from many vendors and various communication protocols. Thus, the OPNET
Modeler users are able to simulate large network environments with network devices and
routing protocols of will, without the need of pursuing real equipment, saving this way
cost. The specific program also gives the capability to add or modify existing models, and
bases its simulations on the Discrete Event Simulation system which uses defined
processes to model network events. Additionally, traffic patterns can be simulated by the
use of network layer traffic flows, by well-defined applications or by transport layer
application demands.
https://www.ThesisScientist.com
The sequence of the needed acts needed for a network simulation, includes the design and
configuration of the network topology, the selection of the desired measured metrics, the
simulation run and the analysis of the calculated statistics. Eventually, OPNET Modeler
is considered a reliable program when it comes to network evaluation, usually met on
computer networking publications and also used by industry. These advantages of the
program led the author to select it as the tool to facilitate the intended experiments.
Visual Studio is a complete set of development tools for building ASP.NET Web
applications, XML Web Services, desktop applications, and mobile applications. Visual
Basic, Visual C#, and Visual C++ all use the same integrated development environment
(IDE), which enables tool sharing and eases the creation of mixed-language solutions. In
addition, these languages use the functionality of the .NET Framework, which provides
access to key technologies that simplify the development of ASP Web applications and
XML Web Services. Microsoft Visual Studio is an integrated development
environment (IDE) from Microsoft. It is used to develop computer
programs for Microsoft Windows, as well as web sites, web applications and web
services. Visual Studio uses Microsoft software development platforms such as Windows
API, Windows Forms, Windows Presentation Foundation, Windows Store and Microsoft
Silver light. It can produce both native code and managed code.
Visual Studio includes a code editor supporting IntelliSense as well as code refactoring.
The integrated debugger works both as a source-level debugger and a machine-level
debugger. Other built-in tools include a forms designer for building GUI
applications, web designer, class designer, and database schema designer. It accepts plug-
ins that enhance the functionality at almost every levelincluding adding support
for source-control systems (like Subversion) and adding new toolsets like editors and
visual designers for domain-specific languages or toolsets for other aspects of
the software development lifecycle(like the Team Foundation Server client: Team
Explorer).
3.3 Modeling Methodology of OPNET
The environment of OPNET is shown in the following Figure 3.3.
https://www.ThesisScientist.com
Figure.3.3: OPNET Environment.
This section of the project contains the analysis of the buttons, which are located in the
environment of OPNET. In addition describes the basic modeling categories of OPNET,
which are the following:
Network Editor
Node Editor and
Process Editor.
The toolbar, which is located on the top of the above figure 3.3, can be analyzed as
follows.
https://www.ThesisScientist.com
Figure.3.4: The Main Toolbar of OPNET Environment.
https://www.ThesisScientist.com
Figure. 3.5: Example of the Network Editor.
B. Node Editor
The Node Editor captures the architecture of a network device or system by depicting the
flow of data between functional elements, called modules. Each module can generate,
send, and receive packets from other modules to perform its function within a node.
Modules typically represent applications, protocol layers, algorithms and physical
resources such as buffers, ports, and buses. Modules are assigned process models
(developed in the Process Editor) to achieve any required behavior [27].
C. Node Editor Environment
The environment of a Node Editor is shown in the following Figure 3.6.
https://www.ThesisScientist.com
Figure. 3.6 : The Node Environment.
The toolbar, which is located on the top of the above figure 3.7, can be analyzed as
follows.
https://www.ThesisScientist.com
Figure. 3.7: The Node Editor Toolbar.
Process Editor
The Process Editor is used to define the behavior for the programmable modules. In this
way, it is possible to control the underlying functionality of the node models created in
the node editor. These models are used to simulate software subsystems, such as a
communication protocol, and also to model hardware subsystems, such as the CPU of a
MT. A process is an instance of a process model and operates within on module. Initially,
a process model contains only one process, this is referred to as the root process.
However, a process can create additional child processes dynamically. These can in
turn create additional processes themselves. This is well suited to model certain
protocols. Processes respond to interrupts. These interrupts indicate that events of interest
have occurred like the arrival of a message or the expiration of a timer. An interrupted
process takes actions in response to interrupts and then blocks, waiting for a new
interrupt. It may also invoke another process and its execution is suspended until the
invoked process blocks [28]. Finite state machines, named State Transition Diagrams
(STDs) in OPNET, represent the process models. An example of a STD is shown in
Figure 3.8. These STDs consist of icons representing states and lines that represent the
https://www.ThesisScientist.com
transition between the states. The operations performed in each state or for a transition
are expressed in Proto-C (embedded C/C++ code blocks and library of Kernel Procedures
providing commonly needed functionality for modeling communications and information
processing) [28].
The main features of a STD are:
Initial State: is the first state the process model enters upon invocation. This state is
easily identified by a large arrow on its left-hand side (i.e. the INIT state in Figure.22). It
usually performs functions such as the initialization of variables [28].
The Transition Arc: describes the possible movement of a process from one state to
another and the conditions under which such a change in state may take place. A
transition with no attached condition is depicted with a directed solid line, while one with
an attached condition is depicted using a directed dashed line [28].
The Transition Conditions: Transition conditions are specified as Booleans. If no
possible transition or more than one possible transition exists then the simulation halts.
A default transition ensures that a situation where a simulation halts due to the fact that
no transition evaluated to TRUE never occurs [28].
The Transition Executive: The transition executive is carried out when a transition is
taken. As a transition is made from one state to another, actions can be executed when
leaving the first state (exit executives) and upon entering the next state (enter executives)
[28].
Unforced States: Unforced States represent true states of the system. A process blocks
after the enter executives of an unforced state have been executed. The exit executives
are executed when a new interrupt causes the process to be reinvaded. The unforced
states represent the possible stable states of process. These states have a red colour in the
process editor [28].
Forced States: Forced States do not allow a process to wait or block. When a transition
is followed that leads to a forced state, the enter executives are executed and another
transition is followed. This chain continues until finally an unforced is entered. Forced
states are useful when attempting to simplify a complex task by sub-dividing the task into
multiple forced states. The forced states are easily discriminated from the unforced states
by its green colour [28].
https://www.ThesisScientist.com
Variables: OPNET processes not only include the facility to define variables for use
during process invocations, temporary variables, but also maintain a set of state
variables. While the values of the temporary variables are lost between process
invocations, the values of state variables are maintained. State variables are typically used
to model counters, statistical information and retransmission timer values while
temporary variables are simply used to complete tasks such as packet handling [28].
State Attributes: State attributes define a set of parameters, which can be used to tailor
process instance beha viour. This allows generic specification of a process, which can be
used in many different scenarios [28].
Process Editor Environment
The environment of the Process Editor is shown in the following figure 3.9
https://www.ThesisScientist.com
Figure. 3.10: The Toolbar of Process Editor Environment.
Finally, the sequence of the three basic editors of OPNET can be represented by the
following figure 3.11
https://www.ThesisScientist.com
3.3 Calculated Performance Metrics
Using OPNET Modeler the performance of OSPF and IS-IS on a dual-stack network will
be evaluated by calculating and comparing network performance metrics. Performance
metrics are values that can be measured and give clues about the speed, the scalability,
the adaptability to changes and the overall capacity and capability of the network.
OPNET Modeler allows the measurement of several metrics and the production of
statistics that can lead to conclusions regarding the performance of the network when
using one or the other routing protocol. OPNET Modeler itself divides the available
metrics to Global, Node and Link metrics, where the first concern the overall network
function and the other two are measured on specific network nodes or links. For the needs
of the experiments, the overall performance metrics that were measured were divided in
two additional sub-categories, the pure network metrics and the end-to-end Quality of
Service metrics. Both categories and the specific metrics that they include are deeper
explained below.
Pure Network Metrics: As pure network metrics are described in this thesis the network
performance metrics that are measured on the initial network topology when no traffic is
implemented or when the traversing traffic does not have an effect on them. These
metrics values remain the same regardless of the application and traffic rates that are
running on the network. Metrics of this type can give an overall view of the performance
of the configured routing protocols configured on the network, and depend on the
specifically selected topology. During the experiment conduction of this project, the
following pure network metrics were calculated:
Convergence Duration: In routing protocol terms, convergence is the state that routers
configured with a dynamic routing protocol reach, where they all have the same
topological knowledge of the network or AS that they run on. Different routing protocols
follow different procedures until they converge. In any case, the convergence state
represents the phase where the appropriate information have been exchanged between
participating routers, routing tables have been built, and thus, all routers are in stable state
and can begin routing. The time needed for a network configured with a routing protocol
https://www.ThesisScientist.com
in order to reach convergence is called convergence duration. Convergence duration can
lead to conclusions about the protocols speed, because the sooner convergence is
achieved, the sooner data can be forwarded. Furthermore, convergence duration can
indicate how fast a network can return to a functioning stable state after a link or router
failure has occurred.
Routing Table Size: Another metric that can be calculated on the initial pure network
topology, is the routers routing table size. This metrics literally shows the number of
route entries that a routing table holds. This specific value can also give a hint about the
routing protocols speed. As routers search their routing tables sequentially when seeking
an available route to forward a packet, a routing protocol that introduces less entries in
the routing table, will self-evidently achieve a higher routing speed. Again, the routing
table size is depending on the size of the topology and not on the type or amount of sent
traffic.
End-to-End QoS Metrics: Apart from the pure network metrics, network performance
evaluation demands the measurement of metrics that have to do with the actual
performance of the network when transferring data. In order to achieve a realistic
network simulation, traffic flows have to be emulated. The end-to-end QoS metrics
concern the reaction, speed and efficiency of the routing protocol configured network,
when specific type of traffic is forwarded from a source to a destination. During the
experiment conduction of this project, the following end-to-end QoS metrics were
calculated:
https://www.ThesisScientist.com
bits or packets that are successfully transferred over a link. High throughput values
indicate efficient network function as packets sent reach their destination without being
dropped and retransmitted for various reasons. Low throughput on the other hand shows
lower speed and more utilization of the network capacity.
End-to-End Delay Variation: This metric, also known as jitter, refers to the dispersion
of delay between different IP packets of a traffic flow. An average value for this metric
can be calculated for every client-server peer group. Obviously, high jitter is not desirable
and it has a negative effect especially on UDP traffic and real-time applications.
CPU Utilization: CPU utilization actually represents CPU overhead. A routing protocol
can be evaluated based on this metric, according to the burden that it applies to the
participating routers. The CPU utilization metric in OPNET Modeler shows the
percentage of the CPU part that deals with IP packet forwarding. High CPU utilization
values can lead to latencies as well as in dangers such as a router overload and failure.
https://www.ThesisScientist.com
Chapter 4
Simulation Results and Analysis
4.1 Simulation
Simulation is a software package in which we predict the behavior of network, and we
have no need of actual network. In simulation we set different parameters related to our
network. Simulation of routing protocols is one of them. Simulation is not as real network
but it is a standard for research purpose It provides environment like physical which is
not possible in real. In real we cannot create 200 routers, 100 switches, 200 LAN nodes
etc. but in simulation it is possible. Main advantage of simulation is that it gives you your
results in Mathematical, and graphical form by using these graphs summarizes the
research results. Another advantage of simulation is that any type of routing protocol like
OSPF, MPLS, IS-IS, BGP RIP
In our thesis, we used five different scenarios. The scenarios are created based on the
routing protocols presented. The network topology consists of the following network
devices and configuration utilities:
This scenario implements RIP as a routing protocol on the selected network topology. As
a first step, we created the network topology without a routing protocol and then, we
duplicated it to five scenarios so that we could simulate RIP, EIGRP, IS-IS, RIP/IS-IS
and EIGRP/IS-IS on each of them. So, on one of the duplicated scenarios, RIP is
configured as a routing protocol for the whole routers in the network. After configuring
the routing protocol, we choose the statistics that will be viewed on the result. These
statistics are: RIP Traffic received (bits/s), HTTP object response time, E-mail download
response time, Database response time and point to point throughput
https://www.ThesisScientist.com
On this scenario, EIGRP is configured as routing protocol for the selected network
topology. We used one of the duplicated scenarios with no routing protocol and configure
EIGRP on it. Then, we choose the statistics that will be viewed on the result: EIGRP
Traffic received (bits/s), EIGRP Convergence duration, HTTP object response time , E-
mail download response time and point to point throughput.
On this Scenario, IS-IS is configured as routing protocol for the network topology. Then,
we choose the statistics that will be viewed on the result: IS-IS Traffic received (bits/s),
IS-IS Convergence activity, HTTP object response time, E-mail download response time
, Database response time and point to point throughput.
One of the main focuses of our thesis is to analyze the network that is configured with
EIGRP and IS-IS routing protocols together and deduce the advantages of using both
protocols together. This scenario is a little different from the others because two routing
protocols are configured on the network.
As shown in Figure, some part of the network uses EIGRP and the other part uses IS-IS.
Both protocols use route redistribution for exchanging route information to each other.
Route redistribution is a feature that allows for the exchange of route information among
multiple protocols and multiple sessions [3]. The characteristics of each routing protocols
is analyzed, while using both protocols together.
The statistics chosen for this scenario: IS-IS Traffic received (bits/s), IS-IS Convergence
activity , HTTP object response time, E-mail download response time, Database response
time, EIGRP convergence activity, EIGRP traffic sent (bits/s) and point to point
throughput (packet/s).
https://www.ThesisScientist.com
Figure: 4.1 EIGRP/IS-IS Scenario
The other main focus of our thesis is the combination RIP/IS-IS, which analyzes the
implementation of RIP and IS-IS together on the topology network. As shown in Figure,
some part of the network uses RIP and the other part uses IS-IS
https://www.ThesisScientist.com
Figure: 4.2 RIP/IS-IS Topology
As we mentioned earlier, we have five simulation scenarios: RIP, EIGRP, IS-IS, RIP/IS-
IS and EIGRP/IS-IS. This helps us compare one protocol with the other. So, we select a
specific parameter and compare the results of all protocols on one graph based on the
selected parameter. In all the scenarios, router are setup to fail at 250 s and 350 s.
Figure 4.3 shows the RIP traffic sent in bits per Sec. On the graph RIP traffic is higher at
the time of first convergence in RIP/IS-IS protocol than in RIP. At the time when router
fails, there will be a network topology update; therefore the routers will exchange route
information with the whole network. Again, the second time, when router fails, it will
update the network tables, so there will be another route information exchange. At the
second and third convergence, the RIP traffic will be higher in RIP than RIP/IS-IS.
https://www.ThesisScientist.com
18000
16000
14000
12000
10000
RIP
8000
RIP_ISIS
6000
4000
2000
0
0 min. 5 min. 10 min. 20 min. 25 min 30 min
Figure 4.4 shows EIGRP traffic sent in bits/s. It is shown that during the time of
convergence, the EIGRP traffic is much higher in EIGRP network than of EIGRP/IS-IS
network. In EIGRP/IS-IS network, the EIGRP route information will be lower because
the EIGRP traffic is exchanged within the interface that uses EIGRP protocol. The
network that use EIGRP for the whole network will have more interfaces that use EIGRP,
so there will be more EIGRP traffic than a network that use EIGRP and IS-IS in the
network.
https://www.ThesisScientist.com
18000
16000
14000
12000
10000
EIGRP
8000
EIGRP_ISIS
6000
4000
2000
0
0 min. 5 min. 10 min. 20 min. 25 min 30 min
Figure 4.5 shows the convergence time of EIGRP in the network that uses EIGRP routing
protocol and EIGRP/IS-IS routing protocol. As its shown in Figure, the convergence
time of EIGRP in EIGRP/IS-IS network is relatively smaller than the network that uses
only EIGRP. EIGRP route information update will be advertised within the interface that
use EIGRP routing protocol, since the interfaces enabled to use EIGRP are smaller in
EIGRP/IS-IS than EIGRP, it will take a smaller time to update the topology table, routing
table and neighbour table. The first convergence time of EIGRP/IS-IS is 0.8 s, whereas
for EIGRP it is around 0.025 s. The second convergence time, it is 3.21 s for EIGRP,
whereas for EIGRP/IS-IS it is 2.54 s. The third convergence time is 2.66 s for EIGRP,
whereas for EIGRP/IS-IS it is around 2.5s.
https://www.ThesisScientist.com
3.5
2.5
2
EIGRP
1.5 EIGRP_ISIS
0.5
0
0 min. 5 min. 10 min. 20 min. 25 min 30 min
As it is shown in Figure 4.6 the elapsed time to converge the network on IS-IS network is
slower than RIP/IS-IS network and EIGRP/IS-IS network. On the other hand, the
network convergence time for EIGRP/IS-IS network is faster than the other networks.
The first convergence time of IS-IS is 12 s, whereas for EIGRP/IS-IS is around 0.9 s and
for RIP/IS-IS is 13 s. The second convergence time of IS-IS is 11 s, whereas for
EIGRP/IS-IS it is around 0.9 s and for RIP/IS-IS it is 6 s. The third convergence time of
IS-IS is 11 s, whereas for EIGRP/IS-IS is around 6 s and for RIP/IS-IS is 7 s.
https://www.ThesisScientist.com
3.5
2.5
2
ISIS
EIGRP_ISIS
1.5
RIP_ISIS
0.5
0
0 min. 5 min. 10 min. 20 min. 25 min 30 min
Figure 4.7 shows the database query response time in the second scenario. The LAN
network is able to access the database from the server, so in this scenario we show how
the protocols affect the performance to access the database from the server. In the
comparison of these protocols in database query response time, EIGRP/IS-IS shows a
better response time than of the other protocols at the whole time. On the other hand,
RIP/IS-IS shows a slower response time than of all the other protocols. At the beginning,
the response time of RIP, IS-IS, RIP/IS-IS and EIGRP is almost similar but as time
increases, RIP/IS-IS becomes slower in response time. On the other hand EIGRP shows
better performance than the other three protocols. RIP and IS-IS protocols show almost
similar database response time in the whole time.
https://www.ThesisScientist.com
5
4.5
3.5
3
ISIS
2.5
EIGRP_ISIS
2
RIP_ISIS
1.5
0.5
0
0 min. 5 min. 10 min. 20 min. 25 min 30 min
E-mail application is heavily used by the users in the LAN network, the E-mail access is
done from the mail server in the network. Figure 4.8 shows E-mail download response
time in s. The graph shows that the EIGRP/IS-IS protocol performs very well for the
whole simulation time. On the other hand, RIP/IS-IS performs bad compared to the other
protocols. In the first 4 minutes, IS-IS shows better E-mail download response time than
of EIGRP and RIP. After 4 minutes RIP, EIGRP and IS-IS show almost similar
performance for E-mail download response time.
https://www.ThesisScientist.com
4
3.5
2.5
ISIS
2
EIGRP_ISIS
1.5 RIP_ISIS
0.5
0
0 min. 5 min. 10 min. 20 min. 25 min 30 min
Figure 4.9 shows HTTP object response time in s. Heavy HTTP application is used by
the users in the network and the application service is supported by the server. The graph
shows that EIGRP/IS-IS shows a shortest object response time in the whole simulation
time. For the first 3 minutes, RIP/IS-IS has a better object response time than of RIP, IS-
IS and EIGRP. But as time increases, RIP/IS-IS object response time increases, and
instead IS-IS become better than the other four protocols.
https://www.ThesisScientist.com
6
ISIS
3
EIGRP_ISIS
RIP_ISIS
2
0
0 min. 5 min. 10 min. 20 min. 25 min 30 min
4.6.8Throughput:
Figure 4.10 shows point to point throughput between the router and Link router measured
in packets/s. The graph shows RIP/IS-IS has high throughput in this link. On the other
hand IS-IS, RIP, EIGRP/IS-IS and EIGRP have a lower packet throughput in this link.
EIGRP/IS-IS has are relatively better performance on point to point packet throughput
than of the other three protocols.
https://www.ThesisScientist.com
9
5 ISIS
4 RIP_ISIS
EIGRP_ISIS
3
0
0 min. 5 min. 10 min. 20 min. 25 min 30 min
https://www.ThesisScientist.com
CONCLUSIONS AND FUTURE WORK
The objective of this thesis was to configure multiple routing protocols on a selected
network topology and analyze the performance of the network. We aimed to configure
RIP and IS-IS together in one network, then EIGRP and IS-IS together in one another
network. After configuring the protocols we analyzed the network performance
improvements as compared to the network that use RIP alone, EIGRP alone or IS-IS
alone. The RIP traffic in the network using RIP/IS-IS is smaller than of network using
only RIP. This indicates that the bandwidth utilization of RIP is better and the link
congestion probability is smaller in RIP/IS-IS network than that of network using only
RIP. The EIGRP traffic in the network using EIGRP/IS-IS is lower than of network using
only EIGRP. This indicates that the bandwidth utilization of EIGRP is better in the
EIGRP/IS-IS network than that of network using only EIGRP. Convergence time of
EIGRP in the network using EIGRP/IS-IS network is much faster than in the network
using only EIGRP. Therefore the nodes in EIGRP/IS-IS network learn the topology faster
than the nodes in the EIGRP network.
IS-IS convergence time in EIGRP/IS-IS network is much faster than in IS-IS network or
RIP/ISIS network. On the other hand, IS-IS network shows lower convergence time than
the EIGRP/IS-IS network or the RIP/IS-IS network. Then we conclude, EIGRP/IS-IS
network learns all nodes in the whole network faster than of IS-IS network or RIP/IS-IS
network. And IS-IS network learns slower than of the other two networks. Database
response time is better in the network which uses EIGRP/IS-IS combination as compared
to other networks using RIP, IS-IS, EIGRP, RIP/IS-IS. Network using RIP/IS-IS
combination shows slower database response time. Therefore database access is much
faster in EIGRP/IS-IS networks and very slow in RIP/IS-IS network. The network using
EIGRP/IS-IS shows faster HTTP object response time, E-mail download response time
than of other networks using RIP, EIGRP, IS-IS, RIP/IS-IS. On the other hand network
using RIP/IS-IS combination shows slow response in both the cases. Hence, EIGRP/IS-IS
provides the end users access to the HTTP applications and e-mails faster than networks
using RIP, EIGRP, IS-IS, RIP/IS-IS. The overall throughput performance of all networks
https://www.ThesisScientist.com
is similar at the beginning of the simulation. But after few minutes, network using
RIP/IS-IS combination shows much better throughput performance than of all other
networks. In our thesis, we analyzed the performance of different routing protocols and
have found EIGRP/IS-IS performed better than the other protocols. So, as a future work,
we recommend any interested researcher to combine EIGRP and IS-IS routing protocols
performs on MANET and Hybrid networks, and make one advanced routing protocol.
This can be done by analyzing the source code of each protocol and make a modification
on the codes.
https://www.ThesisScientist.com
REFERENCES
[1] Vishal sharma, Rajneesh Narula and Sameer khullar Performance Analysis of IEEE
802.3 using IGRP and EIGRP Routing Protocols International Journal of Computer
Applications Volume 44 No13, April 2012
[5] Ahmad Karim, Minhaj Ahmad Khan "Behaviour of Routing Protocols for Medium to
Large Scale Networks", Australian Journal of Basic and Applied Sciences, 5(6): 1605-
1613, 2011
[6] E. Dahlman, S. Parkvall, J. Skold, P. Beming,3G Evolution - HSPA and LTE for
Mobile Broadband. 2nd ed. Elsevier Ltd. 2008.
[7] Shen Yang, Dai Hao; Qi Qang-dong Performance comparisons between OSPF and
EIGRP in tactical IP networks (Inst. of Command Autom, PLA Univ. of Sci. & Tech.
Nanjing, China); Source: Journal of PLA University of Science and Technology (Natural
Science Edition), v 6, n 3, p2 41-5, June 2000.
https://www.ThesisScientist.com
NY, USA); Source: International Conference on Internet Computing - IC'03, p 591-3
Vol.2, 2003.
[11] Yee, J.R. On the International routing protocol enhanced interior gateway routing
protocols International Transactions in Operational Research, v 13, n 3, p 177-94, May
2006
[12] Nohl, A.R, Molnar, G The convergence of the OSPF routing protocol (Ericsson
Res., Ericsson Hungary Ltd., Budapest, Hungary). Source: Periodica Polytechnica
Electrical Engineering, v 47, n 1-2, p 89-100, 2002
[15] G. A. Abed, M. Ismail, and K. Jumari, "Traffic Modeling of LTE Mobile Broadband
Network Based on NS-2 Simulator," Computational Intelligence, Communication
Systems and Networks, 2011 Third International Conference on, 2011, pp. 120-125.
[16] M. Sauter, From GSM to LTE: An Introduction to Mobile Networks and Mobile
Broadband.Wiley, 2011, pp. 205-276.
[18] F. Khan, "LTE performance verification", in LTE for 4G Mobile Broadband: Air
Interface Technologies and Performance. New York: Cambridge University Press, 2009,
pp. 468-487.
https://www.ThesisScientist.com
[19] Merlin Sheeba, G.; Nachiappan, A.; Gokulnath, P.S.L. presents "Improving link
quality using OSPF routing protocol in a stable Wi-Fi mesh network," Communications
and Signal Processing (ICCSP), 2012 International Conference on , vol., no., pp.23,26, 4-
5 April 2012
[22] Ibanez, G.; Rojas, E. presents "All-path bridging: Path exploration as an efficient
alternative to path computation in bridging standards," Communications Workshops
(ICC), 2013 IEEE International Conference on, vol., no., pp.1280,1285, 9-13 June 2013.
[23] Jagdeep Singh, Dr. Rajiv Mahajan presents Simulation Based Comparative Study
of RIP, OSPF and EIGRPVolume 3, Issue 8, August 2013.
[24] Neha Singh presentsA Review of IS-IS Intrarouting Protocol International Journal
of Emerging Science and Engineering (IJESE) ISSN: 23196378, Volume-2, Issue-1,
November 2013.
[25] Lee, Seung Hwan, and SeungHyong Rhee presents "Efficient flooding for reliability
in link-state routing protocols." In ICT Convergence (ICTC), 2012 International
Conference on, pp. 787-788. IEEE, 2012.
[26] Xu, Dahai, Mung Chiang, and Jennifer Rexford presents "Link-state routing with
hop-by-hop forwarding can achieve optimal traffic engineering." IEEE/ACM
Transactions on Networking (TON) 19, no. 6 (2011): 1717-1730
[27] Brun, Olivier, and J. Garcia presents "Dynamic IGP Weight Optimization in IP
Networks." In Network Cloud Computing and Applications (NCCA), 2011 First
International Symposium on, pp. 36-43. IEEE, 2011.
https://www.ThesisScientist.com
[28] Wijaya, C. "Performance Analysis of Dynamic Routing Protocol EIGRP and OSPF
in IPv4 and IPv6 Network," Informatics and Computational Intelligence (ICI), 2011 First
International Conference on , vol., no., pp.355,360, 12-14 Dec. 2011
[29] Sun Jian; Yin Ya Fang "Research and implement of Ospfv3 in Ipv6 network," Cross
Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC),
2011 , vol.1, no., pp.743,746, 26-30 July 2011
[30] Guangyu Pei; Spagnolo, P.A.; Templin, F.L. presents "Enabling OSPFv3 MANET
extensions over IPv4 encryptors," Military Communications Conference, 2008.
MILCOM 2008. IEEE , vol., no., pp.1,6, 16-19 Nov. 2008.
[31] NehaGrang and Anuj Gupta Compare OSPF Routing Protocol with other Interior
Gateway Routing ProtocolsIJEBEA 13-147; 2008.
[32] Inderjeet Kaur, Manju Sharma, Performance Evaluation of Hybrid Network using
EIGRP and OSPF for different application. International Journal of Engineering Science
and Technology (IJEST).
[33] P Pankaj Rankheja, Prabhjot kaur, Anjali Gupta, Aditi Sharma, Performance
Analysis of RIP, OSPF, IGRP, and EIGRP Routing protocols International Journal of
Computer Applications (0975 888) Volume 48 No.18, June 2012
[34] S. G. Thornier, Communication service providers choice between OSPF and IS-IS
dynamic routing protocols and implementation criteria using OPNET simulator, in Proc.
Second International Conference on Computer and Network Technology (ICCNT),
Bangkok, Thailand, Apr. 2010, p. 38 42
[35] S. G. Thornier, Dynamic routing protocol implementation decision between
EIGRP, OSPF, and RIP based on technical background using OPNET Modeler, in Proc.
Second International Conference on Computer and Network Technology (ICCNT),
Bangkok, Thailand, Apr. 2010, pp. 191195.
[36] B. Fortz, J. Rexford, and M. Thorup, Traffic engineering with traditional IP routing
protocols, IEEE Communications Magazine, vol. 40, no. 10, pp. 118124, Oct. 2002.
https://www.ThesisScientist.com
[37] A. Feldmann, A. Greenberg, C. Lund, N. Reingold, and J. Rexford, Netscape:
traffic engineering for IP networks, IEEE Network Magazine, vol. 14, no. 2, pp. 1119,
Mar. 2000.
[38] Cisco, Enhanced Interior Gateway Routing Protocol [Online]. Available:
http://docwiki.cisco.com/wiki/Enhanced_Interior_ Gateway_Routing_Protocol
[39] H. Newton, Newtons Telecom Dictionary 24th Edition. New York: Flatiron
Publihing, 2008, p. 683.
[40] Harry G. Perros: Connection-Oriented Networks SONET/SDH, ATM, MPLS and
Optical Networks, John Wiley & Sons Ltd, UK, 2005.
[42] Saleem N. Bhatti and Jon Crowcroft: QoS-sensitive flows: Issues in IP packet
handling, IEEE Internet Computing, pp. 48-57, July/August, 2000.
[43]John Evans and Clarence Filsfils: Deploying IP and MPLS QOS for Multiservice
Networks: Theory and Practice, Morgan Kaufmann Publishers, USA, 2007.
[44] Ram Balakrishnan: Advanced QoS for Multi-Service IP/MPLS Networks, Wiley
Publishing, USA, 2008.
https://www.ThesisScientist.com
[49] K.Balasundaram, T.Velmurugan, R.Suresh: Performance Analysis of Queuing
Disciplines for Difference Services Using OPNET Tool, International Journal of
Scientific Engineering and Technology, Vol. 3, No.1, pp : 47-50, Jan 2014
[53] Michael, N.; Ao Tang; DahaiXu presents "Optimal link-state hop-by-hop routing,"
Network Protocols (ICNP), 2013 21st IEEE International Conference on , vol., no.,
pp.1,10, 7-10 Oct. 2013.
[54] Ibanez, G.; Rojas, E. presents "All-path bridging: Path exploration as an efficient
alternative to path computation in bridging standards," Communications Workshops
(ICC), 2013 IEEE International Conference on, vol., no., pp.1280,1285, 9-13 June 2013.
[55] Jagdeep Singh, Dr. Rajiv Mahajan presents Simulation Based Comparative Study
of RIP, OSPF and EIGRPVolume 3, Issue 8, August 2013.
[56] Neha Singh presentsA Review of IS-IS Intrarouting Protocol International Journal
of Emerging Science and Engineering (IJESE) ISSN: 23196378, Volume-2, Issue-1,
November 2013:
[57] Merlin Sheeba, G.; Nachiappan, A.; Gokulnath, P.S.L. presents "Improving link
quality using OSPF routing protocol in a stable Wi-Fi mesh network," Communications
https://www.ThesisScientist.com
and Signal Processing (ICCSP), 2012 International Conference on , vol., no., pp.23,26, 4-
5 April 2012
[58] Lee, Seung Hwan, and Seung Hyong Rhee presents "Efficient flooding for reliability
in link-state routing protocols." In ICT Convergence (ICTC), 2012 International
Conference on, pp. 787-788. IEEE, 2012.
[59] Xu, Dahai, Mung Chiang, and Jennifer Rexford presents "Link-state routing with
hop-by-hop forwarding can achieve optimal traffic engineering." IEEE/ACM
Transactions on Networking (TON) 19, no. 6 (2011): 1717-1730
[60] Brun, Olivier, and J. Garcia presents "Dynamic IGP Weight Optimization in IP
Networks." In Network Cloud Computing and Applications (NCCA), 2011 First
International Symposium on, pp. 36-43. IEEE, 2011.
[61] Sun Jian; Yin Ya Fang presents "Research and implement of Ospfv3 in Ipv6
network," Cross Strait Quad-Regional Radio Science and Wireless Technology
Conference (CSQRWC), 2011 , vol.1, no., pp.743,746, 26-30 July 2011.
[62] Guangyu Pei; Spagnolo, P.A.; Templin, F.L. presents "Enabling OSPFv3 MANET
extensions over IPv4 encryptors," Military Communications Conference, 2008.
MILCOM 2008. IEEE, vol., no., pp.1,6, 16-19 Nov. 2008.
[63] Neha Grang and Anuj Gupta presents Compare OSPF Routing Protocol with other
Interior Gateway Routing Protocols IJEBEA vol.1, no., pp.743,746, 26-30 July 2012
https://www.ThesisScientist.com
[66] Baranski, J.; Crocker, M.; Lazarou,G. Dynamic routing protocol performance in a
fault- tolerant Ethernet-based IP network (Dept. of Electr. & Comput. Eng., Mississippi
State Univ., MS, USA Source: The 8th World Multi-Conference on Systemics, Cybernetics
and Informatics, pp 1-5 Vol. 8, 2004
[67] Yee, J.R.On the International routing protocol enhanced interior gateway routing
protocols: is it optimal? (Dept. of Electr. Eng.,Hawaii Univ., Honolulu, HI, USA) Source:
International Transactions in Operational Research, v 13, n 3, p 177-94, May 2006
[68] Al-Saud, K.A. Tahir, H.M.; El-Zoghabi, A.A.; Saleh, M.Performance evaluation of
secured versus non-secured EIGRP routing protocol (Dept. of CS & Eng., Qatar Univ.,
Doha, Qatar); Source: Proceedings of the 2008 International Conference on Security &
Management (SAM 2008), p 292-7, 2008
[70] Rick Graziani and Allan Jonson, Routing protocols and concepts: CCNA
exploration companion guide Pearson Education. London,2008.
[71] Li, Harnes, Holte, Impact of Lossy Links on Performance of Multihop Wireless
Networks, IEEE, Proceedings of the 14th International Conference on Computer
Communications and Networks, Oct 2005, 303 308
[72] R K Bansal1, Vikas Gupta, Rahul Malhotra, Performance Analysis of Wired and
Wireless LAN Using Soft Computing Techniques- A Review Global Journal of
Computer Science and Technology, Vol. 10 Issue 8 Ver.1.0 September 2010 pp67 -71
https://www.ThesisScientist.com