On The Performance Comparison of RIP, OSPF, IS-IS and EIGRP Routing Protocols
On The Performance Comparison of RIP, OSPF, IS-IS and EIGRP Routing Protocols
Vasos Hadjioannou
Department of Computer Science
University of Nicosia
Nicosia, Cyprus
e-mail: [email protected]
The distance from the router to the destination is EIGRP has four methods[4]:
periodically advertised by the routers to their neighbors. Neighbor Discovery/Recovery
When a router receives such an advertisement, it checks Reliable Transport Protocol (RTP)
whether or not any of the advertised routes are useful in Diffusion Update Algorithm (DUAL)
improving the current routes. If so, the current route of the Protocol Dependent Modules (PDM)
router is updated, in order for it to go through the
advertising neighbor.
As mentioned before, routes are compared by their III. INTERIOR GATEWAY PROTOCOLS
length, where their value needs to be between 1 and 16 (16 Both of the following Interior Gateway Algorithms
means infinity). In order for loops to be avoided, routers (OSPF and IS-IS) are based on the Dijkstra algorithm.
must do split horizon when they advertise a route to their
neighbor. Dijkstra:
The complete routing table is advertised by a router The Dijkstra algorithm is a graph search algorithm
to all of its neighbors, and for each route there are two that solved the single-source shortest path problem for a
timers ("timeout" and "garbage-collection" time). graph with non-negative edge paths, producing a shortest
A destination will be marked as unreachable when path tree. It maintains a set of vertices (S) whose shortest
a route hasn't been refreshed for three minutes, letting the path from the source has already been determined. It
router assume that there is a link failure. This will set the repeatedly selects the vertex with the minimum shortest
timer of the garbage collection to 2 minutes, and if the timer path, adds it to the set, and then relaxes all edges leaving
expires before the entry is updated, the route will then be from it.
removed from the routing table [2].
RIP disadvantages: Steps for executing the Dijkstra algorithm:
Maximum hop size is 15 1. Assign to every node distance value from the source
Variable length subnet masks are not supported by - 0 for the source
RIP version 1 - ∞ for all other nodes
Slow convergence and count-to-infinity problem 2. Mark all nodes unvisited and set the initial node as
"current". Create a set of unvisited nodes consisting all the
B. Enhanced Interior Gateway Routing Protocol(EIGRP) nodes except the initial one.
3. For the current node, consider all of its unvisited
The Enhanced Interior Gateway Routing Protocol neighbors and calculate their tentative distances. If the new
is an advanced distance-vector routing protocol, designed by distance is less than what already exists, we override the old
Cisco Systems, in ordered to help automate routing distance with the new one.
decisions and configuration on a computer network. EIGRP 4. When we are done considering all the neighbors of the
was designed to support classless IPv4 addresses, and for current node, mark it as "visited" and remove it from the
this reason, it replaced the Interior Gateway Routing "unvisited" set.
Protocol (IGRP), which could not. 5. If the destination node has been marked "visited" ---> exit
Routers use EIGRPs discovery and recovery the search
mechanism in order to dynamically learn of other routers on 6. Otherwise, select the unvisited node with the smallest
their directly attached networks. They must also find out tentative distance and mark it as current. Repeat from step3.
whether or not their neighbors are reachable, or indeed
operational, which is achieved by having each router send
small Hello packets periodically. A router can determine the A. Open Short Path First (OSPF)
operation of its neighbor as long as Hello packets keep OSPF is an Interior Gateway Protocol (IGP), based
getting received by it, and once the availability of its on the Dijkstra algorithm, used for routing Internet Protocol
neighbors is made positive, routers can exchange routing (IP) packets within autonomous systems, or other routing
information [3]. domains. It is a link-state routing protocol. Such protocols
The rules by which traffic is forwarded is kept in a are also referred as SPF (Shortest Path First)-based or
routing table which many routers have, and if a valid path to distributed database protocols [5].
a destination is not known by a router, the traffic is In link-state routing, each node constructs a map,
discarded. Furthermore, routers automatically share in the form of a graph, which contains the connectivity
information, which makes EIGRP a dynamic routing information about the network. This map shows how the
protocol. nodes are connected to one another and which node to
which. Every node will then calculate the best logical path
to every possible destination in the network, leading to the Features of IS-IS [29]:
creation of the node's routing table, by collecting the best Hierarchical routing
paths individually calculated by each node. After the routing Classless behavior
table is created, it is presented to the Internet Layer which Rapid flooding of new information
routes datagrams according to the address located in the IP Fast convergence
packets [6]. Scalable
OSPF is able to detect link failures, or any other
changes in the topology, and adapt within seconds by Operation of IS-IS:
converging to a new loop-free structure. Shortest Path First Each router running IS-IS sends a hello packet to
algorithms, in general, make for a stable network since they every interface that has IS-IS enabled in order to discover its
require frequent, but small, updates and converge quickly, neighbors and establish adjacencies. If the information
thus avoiding routing loops and the count-to-infinity contained in a hello packet meets the criteria for forming an
problem. On the other hand, they take up a lot of CPU adjacency, then routers that share a common data link will
power and memory. become IS-IS neighbors. After that, routers flood Link-State
OSPF supports Internet Protocol Version 4 (IPv4), Packets (LSP) to their neighbors, except the ones who they
Internet Protocol Version 6 (IPv6), Variable Subnet received the same LSP from. Then, all routers will construct
Masking (VLSM) and Classless Inter-Domain Routing their individual Link-State Database and a shortest-path tree
(CIDR) addressing models. (SPT) is calculated by each IS, which is used to construct
The portable devices (e.g. smart phones, tablets etc.) in the routing table [8].
emerging mobile network architectures have shrunk in size,
incorporating advanced functions and mechanisms as IV. SIMULATION
explored in [7-15]. Authors in [16] use a novel algorithm to The simulation was performed using Opnet IT
handle the traffic with the self-similarity properties that the Guru Academic Edition [30] and the model was setup with
traffic that traverses the routing paths exhibits. In [17-19] the help of many video and written tutorials. A network was
the traffic diversities are used incorporated using a relay created, consisting of 2 computers that exchange IP packets
routing mechanism for MP2P systems. Authors in [20-21] with one another through several routers that are in between
use a resource traffic offloading technique for energy usage them.
optimization in the cloud, using the centrality principle of A failure scenario also exists where the
social networks. Mobile users take advantage of the mobile communication between 2 routers would repeatedly fail and
opportunistic cloud, in order to increase their reliability in recover, in order to investigate the behavior of the routing
service provision by guaranteeing sufficient resources for protocols in such cases. Furthermore, the route each
the execution of mobile applications. In [22] authors apply protocol takes will be investigated by replacing the links of
mechanisms for precise performance analysis of reactive a particular route with faster ones, in order to check whether
routing protocols in Mobile Ad hoc Networks including the datagram packets will travel from the fastest or the
comparative evaluation of the efficiency under sudden shortest route to reach their destination.
failures. Very important comparative evaluations have been
exposed in [24-28] in both Cognitive radio level architecture
and heuristic routing decisions. In this work a comparison of A. Network model
four diversified routing decisions are presented exposing The created network is comprised of the following
both the pros and cons of each one the decisions/ components:
implementations. Ethernet workstation: Workstation used with client-
server applications that runs over TCP/IP and
UDP/IP. It can support one underlying Ethernet
connection at 10Mbps, 100Mbps, or 1000Mbps and
B. Intermediate System to Intermediate System (IS-IS) for each packet, it requires a fixed amount of time in
IS-IS is a dynamic routing protocol designed and order to route them, as the "IP Forwarding Rate"
used for forwarding traffic within a packet-switched attribute of the node specifies. Packets are routed on
network by determining the best route for datagrams to take. first-come-first-serve basis and, depending on the
It is also based on the Dijkstra algorithm, and similarly to transmission rates of the corresponding output
OSPF, IS-IS is also an Interior Gateway Protocol (IGP), interfaces, they may encounter queuing at the lower
which uses link-state routing by reliably flooding link state protocol layers,.
information throughout a network of routers. Each Ethernet64 switch: Switch that implements the
Spanning Tree Algorithm in order for the network
Intermediate System (IS or router), that is configured to run
topology not to contain any loops. It supports up to
IS-IS, creates a database of the network's topology
64 Ethernet interfaces. The communication between
aggregating the information[23]. switches is done by sending Bridge Protocol Data
Units (BPDUs) to each other, and the packets are Traffic dropped: The number of IP datagrams
received and processed based on the current dropped by all nodes in the network across all IP interfaces.
configuration of the spanning tree.
Cisco 7000 router: An IP-based router gateway
model. According to the destination IP address,
packets that arrive on an IP interface are routed to
the appropriate output interface.
10BaseT duplex link: Ethernet connection link that
transmits data at a rate of 10Mbps and is able to
connect any Stations, Hubs, Bridges, Switches and
LAN nodes with one another.
100BaseT duplex link: Similar to the 10BaseT
duplex link. The only difference is that the speed of
data transfer over the 100BaseT duplex link is
100Mbps instead of 10Mbps.
Time Status
(seconds)
225 Fail
400 Recover
535 Fail
590 Recover
605 Fail
620 Recover
625 Fail
630 Recover
730 Fail
830 Recover Figure 4: Average Network Convergence Activity
Table1: Timing of failures/recoveries While EIGRP, IS-IS and RIP have almost the same
network convergence activity, for even less than a minute,
B. Results OSPF shows dramatic difference when compared to the
other 3 protocols, in both magnitude and longevity.
As mentioned above, the protocols that are
compared are the Routing Information Protocol (RIP),
Background Traffic: Measure of the end to end delay,
Enhanced Interior Gateway Routing Protocol (EIGRP),
experienced by information about background traffic flow
Open Short Path First (OSPF) and Intermediate System to
while it travels between the flow's source and the flow's
Intermediate System (IS-IS).
destination.
will keep using the same route, by investigating the number
of hops from one PC to the other.