Академический Документы
Профессиональный Документы
Культура Документы
School of Computing
July
2014
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Authorship declaration
I, Paris – Alexandros Roussinos, confirm that this dissertation and the work presented
in it are my own achievement.
1. Where I have consulted the published work of others this is always clearly
attributed;
2. Where I have quoted from the work of others the source is always given. With
the exception of such quotations this dissertation is entirely my own work;
3. I have acknowledged all main sources of help;
4. If my research follows on from previous work or is part of a larger
collaborative research project I have made clear exactly what was done by
others and what I have contributed myself;
5. I have read and understand the penalties associated with Academic
Misconduct.
6. I also confirm that I have obtained informed consent from all people I have
involved in the work in this dissertation following the School's ethical
guidelines
Signed:
Date:
2
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Please sign your name against one of the options below to state your preference.
The University may make this dissertation, with indicative grade, available to others.
The University may make this dissertation available to others, but the grade may not
be disclosed.
3
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Abstract
The aim of this dissertation project was to investigate the performance of the two
most popular link-state routing protocols when configured in IPv4/IPv6 dual-stack
enterprise networks. The paper intended to make the first step of scientific research in
performance comparison of different routing protocols in IPv4-IPv6 coexistence
environments that will become popular and dominant for a long time-space with the
advent of IPv6. This intention was dictated by the lack of research regarding the
performance of routing protocols in dual-stack environments, and by the need to
further investigate the rife stereotype which states that OSPF is most appropriate for
enterprise networks and IS-IS is preferred for ISP networks. Furthermore, under the
scope of this work, OSPF and IS-IS were selected for the comparison, as they
constitute two proven effective routing protocols with common routing function
characteristics. The aim of the work was to provide proof-based advice for selecting
the protocol that offers optimal performance in business enterprise networks, in the
new developing network landscape, and recommend possible migration from one
protocol to another.
Under this framework, a detailed theoretical background of OSPF, IS-IS and their
IPv6 versions and modifications were provided to facilitate the better understanding
and comprehension of the research and experimental results. Moreover, dual-stack
networks were selected among other IPv4 to IPv6 migration and coexistence
techniques as the background of the practical experiments, after a careful and
elaborated review of the recent academic research on the topic, and after following the
scientific community recommendations and conducted performance comparisons. On
the side, the limited already published work about the OSPF – IS-IS debate in existing
IPv4 networks was examined, in order to determine elements of their function,
performance advantages and disadvantages that could be also present when
configured in dual-stack networks. This comparison becomes of higher importance
due to the fact that OSPF demands the configuration of two different routing instances
for IPv4 and IPv6, where IS-IS can handle both types of traffic with the same protocol
instance.
For the practical part of the paper, experiments were conducted using the renowned
OPNET Modeler network simulator. The configured OSPF and IS-IS basic enterprise
topologies over a dual-stack network were selected this way, as to evaluate their
performance regarding IPv4 and IPv6 traffic, as well as under different Transport
Layer TCP and UDP traffic patterns. The results of the simulations revealed the
superiority of IS-IS compared to OSPF, as far as it concerns convergence times,
routing table sizes and throughput, where both protocols seemed to perform almost
equally in terms of end-to-end delay times and jitter. Based on these findings, it can
be assumed that IS-IS constitutes a more optimal solution for dual-stack enterprise
networks than OSPF, and can be considered from companies as a migration option,
given also the advantage of the single instance capability and the security benefits that
it offers.
4
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Table of Contents
1 Introduction ............................................................................................................. 13
1.1 Problem and Context ....................................................................................... 13
1.2 Aims and Objectives......................................................................................... 13
1.3 Organization ..................................................................................................... 14
2 Literature Review ................................................................................................... 16
2.1 Introduction ...................................................................................................... 16
2.2 Theoretical Background .................................................................................. 16
2.2.1 Routing and Routing Protocols ................................................................. 16
2.2.1.1 Basics ..................................................................................................... 16
2.2.1.2 Categories .............................................................................................. 17
2.2.2 OSPF............................................................................................................ 19
2.2.2.1 History ................................................................................................... 19
2.2.2.2 OSPFv2.................................................................................................. 19
2.2.2.2.1 Hierarchy ........................................................................................ 19
2.2.2.2.2 Router Types................................................................................... 20
2.2.2.2.3 Packet Types ................................................................................... 21
2.2.2.2.4 Network Types ................................................................................ 23
2.2.2.2.5 Operation ........................................................................................ 23
2.2.2.3 OSPFv3.................................................................................................. 25
2.2.2.3.1 Basics ............................................................................................... 25
2.2.2.3.2 Added Characteristics ................................................................... 25
2.2.2.3.3 Packet Types ................................................................................... 25
2.2.2.3.4 Address Families ............................................................................ 26
2.2.3 IS-IS ............................................................................................................. 26
2.2.3.1 History ................................................................................................... 26
2.2.3.2 Addressing ............................................................................................ 27
2.2.3.3 Hierarchy .............................................................................................. 27
2.2.3.4 Levels ..................................................................................................... 28
2.2.3.5 PDU Types ............................................................................................ 29
2.2.3.6 Network Types ...................................................................................... 30
2.2.3.7 Operation .............................................................................................. 31
2.2.3.7.1 Sub-network Dependent Layer ..................................................... 31
5
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
6
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
7
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
8
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
List of Tables
Table 1 - IPv6 Transition Categories Comparison ...................................................... 47
Table 2 - Comprehensive Results for the No-Traffic Simulations .............................. 81
Table 3 - Comprehensive Results for the TCP-Traffic Simulations ............................ 81
Table 4 - Comprehensive Results for the UDP-Traffic Simulations ........................... 82
9
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
List of Figures
Figure 1 - IGP and EGP Purpose ................................................................................. 17
Figure 2 - Simple OSPFv2 Network ............................................................................ 21
Figure 3 - OSPFv2 Packet Header ............................................................................... 21
Figure 4 - OSPF Neighbour States............................................................................... 24
Figure 5 - OSPFv3 Packet Header ............................................................................... 26
Figure 6 - NET Address Format and Simple Example ................................................ 27
Figure 7 - Simple IS-IS Network ................................................................................. 29
Figure 8 - Generic IS-IS PDU Header ......................................................................... 29
Figure 9 - IPv6 Unicast Address Format ..................................................................... 35
Figure 10 - IPv6 Multicast Address Format ................................................................ 35
Figure 11 - IPv6 Anycast Address Format .................................................................. 35
Figure 12 - IPv6 Packet Header Format ...................................................................... 36
Figure 13 - Dual-Stack Router Structure and Function ............................................... 38
Figure 14 - Translation Mechanisms General Function .............................................. 39
Figure 15 - Tunnelling Mechanisms General Function ............................................... 41
Figure 16 - OPNET Modeler 14.5 Opening Screen ..................................................... 53
Figure 17 - Enterprise Network Topology Option ....................................................... 56
Figure 18 - Object Palette Utility ................................................................................. 56
Figure 19 - Baseline Topology .................................................................................... 57
Figure 20 - Application Demand's Attributes .............................................................. 58
Figure 21 - Application Demand Enabled Baseline Topology .................................... 59
Figure 22 - Router OSPF Instances Configuration ...................................................... 59
Figure 23 - OSPF Topology and Areas........................................................................ 60
Figure 24 - Router IS-IS Instance Configuration ......................................................... 61
Figure 25 - IS-IS Topology and Areas ......................................................................... 61
Figure 26 - Failure Recovery Option ........................................................................... 62
Figure 27 - Individual Statistics Selection ................................................................... 62
Figure 28 - Simulation Parameters .............................................................................. 63
Figure 29 - OSPF and IS-IS Convergence Activity (No Traffic) ................................ 64
Figure 30 - OSPF and IS-IS Convergence Duration (No Traffic) ............................... 64
Figure 31 - Average Backbone/Level 2 Router Routing Table Size (No Traffic)....... 65
Figure 32 - Average ABR/Level 1-2 Router Routing Table Size (No Traffic) ........... 65
Figure 33 - Average Internal/Level 1 Router Routing Table Size (No Traffic) .......... 66
Figure 34 - Average Backbone/Level 2 Router CPU Utilization (TCP Traffic) ......... 67
Figure 35 - IPv4 Throughput (TCP Traffic) ................................................................ 68
Figure 36 - OSPF IPv4 Clients End-to-End Delay (TCP Traffic) ............................... 69
Figure 37 - IS-IS IPv4 Clients End-to-End Delay (TCP Traffic) ................................ 69
Figure 38 - OSPF IPv4 Clients End-to-End Delay Variation (TCP Traffic) ............... 70
Figure 39 - IS-IS IPv4 Clients End-to-End Delay Variation (TCP Traffic) ................ 70
Figure 40 - IPv6 Throughput (TCP Traffic) ................................................................ 71
Figure 41 - OSPF IPv6 Clients End-to-End Delay (TCP Traffic) ............................... 72
Figure 42 - IS-IS IPv6 Clients End-to-End Delay (TCP Traffic) ................................ 72
Figure 43 - OSPF IPv6 Clients End-to-End Delay Variation (TCP Traffic) ............... 73
Figure 44 - IS-IS IPv6 Clients End-to-End Delay Variation (TCP Traffic) ................ 73
Figure 45 - OSPF and IS-IS Average Convergence Duration (TCP Traffic) .............. 74
Figure 46 - Average Backbone/Level 2 Router CPU Utilization (UDP Traffic) ........ 75
Figure 47 - IPv4 Throughput (UDP Traffic)................................................................ 76
Figure 48 - OSPF IPv4 Clients End-to-End Delay (UDP Traffic) .............................. 76
10
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
11
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Acknowledgements
I would like to thank my supervisor Imed Romdhani for his valuable advice and
support that facilitated the completion of the project, as well as for his lecturing that
inspired me in the conception of the initial dissertation topic idea. Additionally, I
would like to thank the internal examiner Isam Wadhaj for consistently being there to
discuss any obstacles that came up in the progress of the dissertation project. Finally, I
would like to thank my family for their multifaceted tolerance and support throughout
the Masters studies’ period.
12
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
1 Introduction
1.1 Problem and Context
The upcoming domination of global IPv6 configuration due to the exhaustion of IPv4
addresses will pass through a long period of IPv4-IPv6 coexistence in many enterprise
networks and the whole Internet. Even if the IPv6 protocol is standardized and
decided as the successor of IPv4, the Internet reconfiguration is a time consuming,
painful and risky procedure. Thus, network engineers still attempt to make the most
out of IPv4 by using IPv4 existence prolonging mechanisms. However, research on
IPv6 deployment techniques is being conducted more and more by various working
groups. For these reasons, it is believed that it is a matter of time for the scientific
community to deepen the research on routing protocol performance comparison under
the already proposed transition mechanisms, in order to bring it to the contemporary
network trends. The change on the foundations of the Internet and enterprise networks
will surely have an impact on the network performance, as networks will have to cope
with two different types of traffic simultaneously and in most cases even run more
than one routing protocol. As a constantly increasing number of IPv4 to IPv6
migration mechanisms is published and presented, it is expected that the routing
protocol comparison under every single one of these environments will be a
necessary, but long procedure. Thus, this project tries to set an initial point, by
evaluating two renowned competing routing protocols, OSPF and IS-IS, over the most
wide spread migration solution, namely dual-stack, in order to reflect the majority of
modern IPv4-IPv6 coexistence networks.
OSPF and IS-IS are both link-state protocols that make use of the same Dijkstra
algorithm in order to calculate the lowest-cost routes to every available destination.
However, they present prominent differences as they were built on different protocol
stacks, namely OSPF is based on the TCP/IP stack, where IS-IS is based on OSI.
Research shows that the dual-stack solution as well as other transition technologies
can burden the network in means of CPU processing power, memory needs and may
also add latency to the routing procedure. Specifically in dual-stack this is a result of
the IPv4 and IPv6 stacks running simultaneously on every network device and host.
This fact makes even more important the selection of an optimum performing routing
protocol in order to mitigate the inevitable dual-stack negative effects. Additionally,
nowadays network performance is of vital importance due to the continuously
increasing use of real-time applications such as voice and video which demand high
throughput and low round-trip delay values in order to work effectively. The project’s
aims and objectives are set, based on these assumptions.
The first target point of the dissertation is to base its experiments on the most
ubiquitous migration technology, so that its results will have a more extensive
reflection in reality. This will be attempted to be achieved by reviewing the
13
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
published literature on the IPv4 to IPv6 migration topic and by advising the
networking scientific community’s recommendations and statistics.
Secondly, it is aimed to present OSPF and IS-IS functions and any already
performed comparison between the two on IPv4 networks, in order to enhance
the arguments on the final recommendation.
1.3 Organization
The paper is divided in three major chapters:
Chapter 1 contains the introduction of the dissertation and sets the aims and
goals of the paper.
14
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Chapter 4 includes the evaluation of the conducted work, the conclusions that
can be drawn out of the total research and implementation chapters, and the
recommendations that derive from the collected results. Possible future work
that is aimed to be done by the author and research ideas which it is believed
that should be examined by the academic community are also presented.
15
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
2 Literature Review
2.1 Introduction
The Literature Review part of the presented paper intends to accomplish two tasks.
Firstly, a detailed overview of the theoretical background related to the discussed
technologies is performed. It is believed that the in-depth explanation of the functions
of the involved routing protocols and IP protocols offers a knowledge foundation that
is absolutely necessary for the reader to comprehend with the presented research.
Secondly, the conducted by the scientific community related work, related to the
paper’s topic is presented. Finally, the author of this paper introduces his personal
view and critic on the related research and he’s subjective opinion and conclusions on
the subject. Both Theoretical Background and Related Work sections’ authorship was
assisted by reviewing existing bibliography that is being cited accordingly. For the
Theoretical Background part, published scientific and computer networking books
were advised in order to give an as deep as possible understanding of the discussed
technologies. These books were found at the author’s personal library, on e-book form
and in Edinburgh Napier University’s online library. On the other hand, the Related
Work part was based on published papers in scientific journals and presented papers
on renowned computer science conferences. The IEEE library web-site
(http://ieeexplore.ieee.org) and the scientific web databases http://dl.acm.org/ and
http://www.sciencedirect.com/ were profoundly researched in order to retrieve the
most accurate and present scientific work related to the paper’s subject. All
publications chosen to be used during the review of the Related Work were published
after 2010, in order to ensure that they are up-to-date with the current technology
trends. Finally, IETF Requests for Comments were cited throughout the Literature
Review chapter as they constitute reliable, valuable citations sources.
2.2.1.1 Basics
In the computer networking field, routing is the process during which a data packet is
transferred from a source device in one network, to a destination device in another
network. This vital procedure is performed usually by a dedicated network device
with specialized software– the router. Routers perform on the Internet Layer of the
TCP/IP protocol stack and are responsible for forwarding encapsulated data in the
form of a packet. Each data packet includes the IP address of the device that sourced
it, as well as the IP address of the device to which it is destined for. When routers
receive a packet, they take decisions about what is the next hop device that they
should forward them, in order to guarantee the delivery of the packet to the
destination in the fastest and most optimal way. The procedures that are used by the
routers to select the best route for each destination network, and the rules that are
followed in order to exchange information with other routers about the networks that
are reachable via them, are called routing protocols. (Doyle, 2005) Routing protocols
are responsible for the creation of routing tables at the routers, the communication
between them and therefore the procedure of learning new routes, and eventually the
16
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
2.2.1.2 Categories
Dynamic routing protocols fall under the three main categorization schemes that
follow:
IGPs and EGPs: IGPs (Interior Gateway Protocols) are used to distribute routes
within an AS (Autonomous System), which is defined as a set of routers under the
same administrative authority. Common IGPs are RIP, OSPF, EIGRP and IS-IS. On
the other hand EGPs (Exterior Gateway Protocols) are used to discover routes from
one AS to another AS. The most famous EGP is the BGP. EGPs are usually used by
ISPs in order to define routing policies between their infrastructure and their client’s
networks. (Eiji Oki, 2012) The following figure displays the relationship between the
ASs and the two types of protocols.
17
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
The second main IGP category consists of the link-state routing protocols. The main
characteristic of these protocols is that every router constructs a database which
contains a picture of the whole network. Differently from distance-vector protocols
introduce a procedure during which every router informs its adjacent nodes with
information regarding its directly connected neighbors and links, and also forwards
the updates sent by other routers unchanged. The common function of a link-state
protocol starts with the establishment of neighbor relationship between the
participating routers by exchanging Hello packets. After these adjacencies have been
made, the routers exchange packets containing the above mentioned information,
commonly named Link-State Packets (LSPs), and forward the updates of other
routers. Every such packet is copied in each router’s database, and in the end of the
procedure, all routers have the same map of the network. Eventually, the routing
algorithm Dijkstra is run by every node to compute routes to every destination with
source the router itself, creating this way the routing table. Link-state protocols are
usually hierarchical by dividing the AS into areas in order to limit the flood of update
information and make the protocol more efficient. Link-state offer faster convergence
times, more specific metrics, fewer loops and are scalable into larger network
infrastructure, although more complex and resource demanding. The most well-
known link-state protocols are OSPF and IS-IS which will be discussed thoroughly.
(Doyle, 2005)
Finally, the last category is that of path-vector routing protocols which belong to the
EGP group. Although path-vector protocols have their basis on distance-vector
protocols, there are different because of the fact that the route advertisement updates
do not contain just the destination address and the next-hop node, but also the full
path to the destination. Thus, each participating router has to maintain both a routing
table and a path table to hold the paths to each destination. The definition of path-
vector protocols is almost matching the BGP protocol. (Medhi, 2007)
Classful and Classless Protocols: The last categorization divides routing protocols to
classful and classless. Classful routing protocols carry only destination IP addresses
and not their subnet masks. This means, that when a router receives an update which
includes a new destination, it will associate this address with the initial subnet mask
derived from the address range that the address comes from. This type of protocol
group includes the older RIP and IGRP, which are being less and less popular due to
the incapability to support VLSM. On the other hand, classless routing protocols
support VLSM, and carry subnet masks within their advertisements, so that the
receiver does not have to assume the subnet mask according to the address. This
feature of classless routing protocols makes them more scalable and thus popular for
18
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
larger networks. Widely popular classless protocols include RIPv2, OSPF, EIGRP
and IS-IS. (Malhotra, 2002)
2.2.2 OSPF
2.2.2.1 History
The OSPF (Open Shortest Path First) protocol development started in 1987 by the
IETF (Internet Engineering Task Force) as a replacement to the RIP protocol. During
that period, the Internet was evolving and broadened, resulting in more and larger
networks resulting in bigger routing tables. The RIP updates in the new network
environment were also wasting a lot of bandwidth. The OSPF working group of IETF
managed to create a new hierarchical, classless link-state protocol that achieved
higher convergence to adapt to the network changes faster, used a more descriptive
metric than hop-count, and supported security and Type of Service. The first version
of OSPF, named OSPFv1 was published in 1989, in the RFC 1131. Problems
regarding the deletion of information in the routing tables, the performance of the
network being destroyed by endless routing update loops, and the motivation to
enhance the protocol interval times and routing lookup process, lead to the publication
of the OSPFv2 in 1991, in the RFC 1247. (Moy, 1998) Finally, OSPFv2 was modified
to support the new IPv6. The new version named OSPFv3 was published in 2008, in
RFC 5340. This paper will present the main characteristics of the two latest, as they
have dominated in the networking world.
2.2.2.2 OSPFv2
2.2.2.2.1 Hierarchy
OSPFv2 protocol is hierarchical. Due to this, the network infrastructure is divided into
areas in order to increase manageability and improve the performance of the network
by reducing the routing information that travel between the routers, as well as
congestion. As in every link-state protocol, in OSPFv2 each router stores a
topological map of the network. As in large networks this database can be extremely
large and consume a lot of resources, the division into areas allows OSPFv2 routers
to hold the database of only the area that they belong to. OSPFv2 includes the types of
areas that are discussed below.
Backbone Area: The area 0, or backbone area, constitutes the core of the OSPFv2
configured autonomous system. The main role of the backbone area (also often called
area 0.0.0.0) is to carry the routing information from one non-backbone area to
another. As mentioned above, every non-backbone area must be connected physically
or logically in extreme circumstances, to the backbone area.
19
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Stub Areas: Stub areas were introduced into OSPFv2 in order to minimize the area’s
routing tables if needed, and therefore the memory requirements. Stub areas have only
one exit-point to the rest of the AS, which means that a default route is injected to the
routers’ routing tables, and every packet destined for another AS destination will
follow that route. In packet type terms, the ABR of the stub-area doesn’t allow Type 4
an Type 5 LSAs to be forwarded into the area. However, intra-area routes to other
areas are allowed in, and therefore all other types of LSAs may pass through.
Obviously, only non-backbone areas can be configured as stubs. A variation to the
stub areas called totally-stubby area also exists. The only difference from the first is
that the ABR also blocks Type 3 LSAs and therefore summary intra-area routes, and
every packet is forwarded via the injected default route.
Not-So-Stubby Areas: Not-so-stubby areas are similar to the stub areas but with the
huge difference that they allow external route information, meaning routes to a
different AS’s destinations. This is accomplished with the introduction of Type 7
LSAs, and is useful for distributing RIP routes into a stub area where devices that
cannot run OSPF exist. (Thomas, 2003)
Internal Routers: As internal routers, are described the routers that have all their
interfaces in a single area, either that is a non-backbone area or the backbone. Each of
those routers stores the Link-State Database meaning the topological map, only for
the area they belong to.
Backbone Routers: Backbone routers are the OSPFv2 routers that have all their
interfaces into area 0, the backbone area. Nevertheless, they still are internal routers.
Area Border Routers: ABRs (Area Border Routers) are the routers that have directly
connected links to more than one OSPF area, commonly to a non-backbone and the
backbone area. The ABRs are the gateway of the internal routers of an area, when
they need to communicate with intra-area destinations. These routers store a
topological map for every area they are attached to, and they are responsible for
summarizing routing information and distributing them into the backbone via Type 3
LSAs. Every OSPFv2 area must have at least one ABR. Moreover, ABRs are
responsible for performing route summarization, one of the most important reasons
for using a multi-area OSPF network. By summarizing groups of destination into one
single route, minimizing routing tables at the routers is achieved as long as fewer
routes are written in the routing tables. Thus, the memory requirements and CPU
usage of the routers is reduced and performance is optimized.
20
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
The Version field contains the OSPF protocol version and the Packet Length field the
length of the packet in bytes. The following Router ID and Area ID fields contain the
ID of the advertising router as well as the ID of the area that it belongs to, and the
Checksum field - as its name implies - the calculated checksum for the packet. The
AuType and Authentication fields contain information regarding authentication.
OSPF supports three types of authentication: no-authentication, plaintext and MD5
authentication that are characterized with the values 0, 1 and 2 in the AuType field
accordingly. The Authentication fields include information such as passwords and
keys for the latest two types of authentication supported. Finally, the Type field takes
values varying from 1 to 5 to characterize the packet as Hello Packet, Database
Description Packet, LS Request, LS Update and LS Acknowledgement. The
following section presents basic information about each group.
Hello Packets: Hello packets are exchanged between OSPFv2 routers in order to
discover each other and form neighbor adjacencies. They are part of the Hello
Protocol and carry a set of parameters to be negotiated between routers in order to
form the neighbor relations. Such parameters are the Hello and Dead interval times
21
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
that describe in seconds, the frequency that the Hello packets are sent and the time
space that a router has to wait for a Hello packet before declaring a neighbor as dead.
In broadcast networks, Hello packets play also a vital role in the election of the
Designated Router and the Back-up Designated Router by using the relative Hello
packet fields.
Link State Requests: During the neighbor discovery and adjacency forming process,
LSRs (Link State Requests) might be sent from one router to another in order to
request information that were included in the already received DD, that the receiving
router doesn’t have.
Link State Updates: LSUs (Link State Updates) are the most important OSPFv2
packets and are used either to reply to an LSR or to distribute newly learned routing
information to neighbor routers. Each LSU contains a list of LSAs (Link State
Advertisement) that be under an umbrella of several types. The most usual LSA types
are briefly discussed below. (Rick Graziani, 2008)
Router LSA – Type 1: Type 1 LSAs are created by every OSPFv2 router and
flooded to every router within the same area and not outside it. Router LSAs
contain a list that includes all the OSPF enabled interfaces of the router, their
cost, the OSPF neighbor routers on each interface and the originating router’s
ID.
Network LSA – Type 2: Type 2 LSAs are produced only by the DR on a
Broadcast Multi-Access Network. As the DR represents all other routers on
the network, produces Network LSAs that contain a list of these routers
together with the originating Router’s ID, in order to reduce bandwidth
utilization with unnecessary LSAs.
Network Summary LSA – Type 3: Type 3 LSAs are produced by the ABRs in
order to distribute into one attached area destinations that belong to other
areas. Moreover, Type 3 LSAs carry destination within the attached areas into
the backbone, in order to be distributed afterwards in the other areas.
Autonomous System Boundary Router Summary LSA – Type 4: Type 4
LSAs are created by ABRs and are identical to Type 3 LSAs with the vital
difference that distribute routes to ASBRs in AS.
Autonomous System External LSA – Type 5: Type 5 LSAs are created by the
ASBRs and flood within the whole AS. These LSAs contain routes to
destinations outside the AS or default routes to outside the AS.
Not-So-Stubby Area External LSA – Type 7: Type 7 LSAs belong to an LSA
type that was introduced in order to bypass the main function of not-so-stubby
Areas that ban the flood of outside destination advertising in the. ASBRs
create this type of LSAs in order to distribute this type of routing information
in the NSSA areas.
Rest of LSAs: Some less popular Types of LSAs include Group Membership
LSAs (Type 6), External Attributes LSAs (Type 8) and Opaque LSAs (Types
9, 10 and 11) that are facilitating extensions of OSPFv2.
22
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Broadcast Multi-Access Networks: Broadcast networks allow more than two routers
connect on the same network. As mentioned above, a DR and BDR elections happens
in every broadcast network in order to handle the LSA distribution for the whole
network. The main characteristic of these networks is that a packet can be destined to
all nodes using a broadcast MAC address. Moreover, the dynamic discovery of OSPF
routers is accomplished by using the multicast address 224.0.0.6. The most common
example of broadcast networks is the Ethernet.
2.2.2.2.5 Operation
All routers in an OSPFv2 configured AS are identified by a unique identifier, the
router ID. This ID has the form of an IPv4 address and can be configured manually,
can take the value of the highest configured loopback address or at last the highest IP
address of the router’s active interfaces.
Neighboring Process: The first step in the OSPFv2 operation is the establishment of
neighbor relationships. Regarding on the network type, Hello packets are sent
periodically to attached routers. In order for an adjacency to be formed, parameters as
the Area ID, the Hello and Dead Intervals, the subnet mask for broadcast networks
and the authentication values must match. In broadcast networks a Designated Router
is elected in order to reduce excessive adjacencies as well as a Back-Up Designated
Router to serve the DR’s role in case it comes down. DR is elected the broadcast
network with the highest priority value, which is contained in the Hello packets it
23
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
sends. It has to be noted here that routers with priority equal to zero can’t be elected
as either DR or BDR, and the default priority value is 1. In an OSPFv2 configuration,
the strongest routers in means of memory and processing power are selected to be the
DRs and can be configured manually to have a greater priority value. In case of
matching priorities, the highest router ID is used to determine the DR and the second
higher to determine the BDR. (Thomas, 2003) The previous explained procedures are
performed on the DOWN, INIT and 2WAY states of the OSPFv2 routers. After
neighbor recognition and bi-directional communication is established, the exchange of
Link-State Databases of the routers follows. In the EXSTART state, the
communicating routers establish a master-slave relationship where the master is the
router with the higher router ID, in order to decide which router will start the LSDB
distribution. The following EXCHANGE state includes the exchange of DD packets,
and once this is accomplished, the routers pass to the LOADING state where any
needed LSRs as well as the LSUs that include the appropriate LSAs are exchanged.
The final state where the routers have formed the adjacency, are synchronized and the
routing procedure can start, is called FULL state. The following diagram shows the
above mentioned procedure. (Lammle, 2013)
24
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Obviously, a link with higher bandwidth has a lower cost and is preferred. The overall
cost for each route is the sum of the cost for every link in the route to the destination.
(Thomas, 2003)
2.2.2.3 OSPFv3
2.2.2.3.1 Basics
In order to accommodate the upcoming domination of IPv6, OSPF as one of the most
popular protocols should be modified in terms of the form of LSAs. Instead, it was
selected to introduce an improved OSPF version, OSPFv3, which supported IPv6 but
did not offer backward compatibility with OSPFv2, at least in its initial form. The
new protocol version was vastly based on its predecessor, using the same hierarchical
architecture, identical timer, network types and Designated Router elections. The LSA
flooding procedure is also identical, as is the routing algorithm used, namely SPF.
Moreover, even though OSPFv3 is designed to be used with IPv6, the area IDs and
router IDs are still represented by IPv4-address-formed values. However, as it
constitutes a completely new protocol it presents also obvious differences.
25
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Again, the functionalities of the LSA Types 1 to 7 are the same as OSPFv2, except the
fact that Network Summary LSA is renamed to Inter-Area Prefix LSA, ASBR
Summary LSA to Intra-Area Prefix LSA and NSSA External LSA to Type-7 LSA.
The LS Type number is also changed from 1 - 7, to 0x2001 - 0x2009, including the
two newly introduced LSAs. The first of the two is called Link LSA, and is produced
on every OSPFv3 enabled interface of the routers. The scope of this packet is link-
local, meaning that the receiving router won’t flood the packet further. The purpose of
the Link LSA is to distribute the sender’s link-local address and the IPv6 prefixes that
characterize the link to neighbors, as well as to provide more capability options
through the use of the Option field. The second newly introduced LSA, the Intra-Area
Prefix LSA is used to flood routing information containing prefix changes within the
OSPF area, without forcing the execution of the SPF algorithm, thus making the
protocol more scalable for big networks with rapid prefix changes. (Doyle, 2005)
2.2.3 IS-IS
2.2.3.1 History
The IS-IS (Intermediate System to Intermediate System Routing Protocol) is also a
link-state routing protocol with several similarities with OSPF protocol, such as the
use of the same SPF algorithm. It was defined by ISO (International Organization for
Standardization) and tagged as ISO 10589, in an attempt to implement DECnet Phase
V of Digital Equipment Corporation for large networks. Although it was initially
designed to work with CLNP (Connectionless Network Layer Protocol), it was later
in 1990 modified to also route IP as defined in RFC 1195 by the name Integrated IS-
IS. Opposite to all other IGPs that were created based on the TCP/IP protocol stack,
26
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
IS-IS is based on the primer OSI (Open System Interconnection) reference model. As
a result IS-IS was not initially build to support the IP protocol but the OSI layer 3
CLNP protocol, which offers network services to the upper layers. More specifically,
CLNP, IS-IS and ES-IS (End System to Intermediate System) routing protocol all lay
on OSI’s network layer and are being encapsulated in different frames at the data-link
layers. Except this difference, IS-IS also uses a different terminology. Routers are
defined as intermediate systems, hosts as end systems, routing as routeing and packets
as PDUs. Nowadays, it is a less common protocol than OSPF but still is the favourite
choice for many Internet Service Providers’ backbone networks. More than that, IS-IS
doesn’t need to be upgraded to a new version in opposition to OSPF, because it can
easily adapt the carriage of IPv6 addresses as it will be discussed later on the paper.
Generally, as a link-state protocol, IS-IS is considered to be an IGP with fast
convergence time and stability, as well as low resources consumption. The frame
under which the IS-IS protocol works, as well as its basic components, functions and
characteristics will be presented at the following chapters. (Abe Martey, 2002)
2.2.3.2 Addressing
Either being used to route CLNP or IP, IS-IS remains an OSI protocol and demands
the assignment of an OSI address on every Intermediate System, and not on
interfaces. These addresses are called NSAPs (Network Service Access Points), their
length varies from 8 to 20 bytes and are usually written in hexadecimal. They consist
of three main fields: the Area ID which defines the IS-IS area where the IS resides,
the System ID which is unique for every device and commonly is assigned the MAC
address of the device, and the N-Selector (SEL). The latest field defines the user of
the network service. At the most usual situation where an NSAP address is assigned
to an IS, the N-Selector takes always the hex-value 0x00. Every such IS address is
also called NET (Network Entity Title). ISs assigned with addresses including the
same Area ID field value belong to the same area and moreover, a single IS can be
assigned more than one NET addresses as long as the Area ID changes and the
System ID stays identical. NET addresses always start and end with a single byte. It
has to be noted that except this format, another two formats are present, the OSI and
the GOSIP format. The first one adds to the address a Routing Domain Part, where
the second adds six fields, namely AFI, ICD, DFI, AAI, Reserved and RDI. However
the most easy to understand and most common format is the first and thus the
following figure shows this NET format and an example NET address. (Doyle, 2005)
10. 00a7.81b0.0030. 00
Figure 6 - NET Address Format and Simple Example
2.2.3.3 Hierarchy
Like OSPF and as a link-state protocol, IS-IS also uses the concept of splitting the
entire IS to smaller areas. The motivation behind this technique is again to limit the
consumption of CPU and memory resources at the ISs by minimizing their databases
and give them a relief when executing the SPF algorithm. Additionally, dividing into
areas facilitates route summarization at the areas’ edges in order to also minimize
27
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
routing tables. On the other hand, unlike OSPF, IS-IS only defines one type of area.
The basic differentiate characteristic is the lack of a backbone area. More specifically,
areas do not need to be connected physically or logically to a specific area. This
specificity of IS-IS makes it more scalable to larger networks and easier to adapt to
any subnet additions. However, as routing roles are not dependent on the area type,
IS-IS includes another feature to define routing hierarchy and manage the way routing
is performed. This is accomplished with the introduction of levels.
2.2.3.4 Levels
IS-IS includes two levels of hierarchy, level 1 and level 2. The first is used to
characterize intra-area routing where the second is used for inter-area routing. Level
1/2 is used for both types of routing. Every IS is defined by one of these levels,
depending on its role in the topology, and so are its links. The level of every IS also
defines the type of relationship that will be formed with the IS-IS configured ISs.
Level 2: On the other hand, level 2 ISs contain a level 2 Link-State Database only.
This means that level 2 IS’s have knowledge of the topological information of other
IS-IS areas but not from theirs. More than that, Area IDs of level 2 routers do not
have to match in order to form an adjacency. However there is no way that a level 2
router is isolated from the other level 2 routers. An area containing only level 2
routers can be considered as similar to the OSPF backbone area, as far as it concerns
its functionality that includes spreading routing information from one area to another.
However, this theoretical backbone can be extended with the addition of another level
2 or level 1/2 IS, and any connection to it is not mandatory. It has to be noted here,
that an area containing only level 2 routers can exist only in IP routing environments
and not in solely OSI routing networks.
Level 1/2: In IS-IS, an IS can belong to only one area so there is no ABR router
concept in terms that it has interfaces to more than one area. However an IS can be
configured as level 1/2. This means that such an IS stores both a level 1 and level 2
Link-State Databases and is able to form adjacencies with all level 1, level 2 and level
1/2 ISs. Therefore, a level 1/2 IS contains topological information of the area it
resides in and also of other areas. Communication with a level 1 IS leads to the update
of the level 1 database, communication with a level 2 IS leads to the update of the
level 2 database and accordingly communication with another level 1/2 will update
both Link-State Databases. This feature makes a level 1/2 IS simulate the behavior of
an ABR in OSPF. The level 1/2 IS is usually placed at the edge of the area, and is
responsible for forwarding packets from the area’s level 1 ISs to inter-area
destinations. (Hannes Gredler, 2005)
The following figure shows a simple IS-IS configured AS example.
28
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
29
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Hello Packets: Hello packets are exchanged between ISs during neighbor discovery
in order to start forming adjacencies, and vary depending on the type of the link as
well as the type of the routing relationship. For broadcast links there are two
subcategories. First, level 1 LAN IIHs (Intermediate System to Intermediate System
Hello packets) are used in broadcast links which connect ISs in order to form a level 1
adjacency. On the other hand, level 2 LAN IIHs are exchanged on the same type of
links but for level 2 adjacency establishment. On point-to-point links, point-to-point
IIHs are used to form both level 1and level 2 adjacencies. Not to be confused by these
categories, are the ESH (End System Hello) and ISH (Intermediate System Hello)
packets, which are being sent and received between hosts and routers in order to
discover each other. IS circuits can be configured to allow or ban a specific type of
Hello packets in order to optimize performance.
Link-State Packets: LSPs, referred also as Link-State PDUs, have exactly the same
functionality that LSA packets have in OSPF. In IS-IS LSPs come in two versions,
depending on the routing information that they carry, having however the same packet
format. Specifically, level 1 LSPs are flooded by each IS within their area in order to
inform the rest ISs about their adjacent routers, their attached IP subnets (when
talking about Integrated IS-IS) and carry area, metric and authentication information.
Level 1 Link-State Databases are built by them in the area and are identical at the time
of convergence. The second category consists of level 2 LSPs which are exchanged
between level 2 ISs by neighbor flooding, and carry information about the level 2
topology. Thus, the level 2 Link-State Database is updated by their facilitation on the
communicating ISs. It has to be noted that level 1/2 ISs produce both types of LSPs.
Sequence Number Packets: SNPs are used to facilitate the Link-State Database
synchronization between ISs. They come in two forms, CNSPs (Complete Sequence
Number Packets) and PNSPs (Partial Sequence Number Packets), and each one of
them is divided in level 1 and level 2 sub-categories depending on which Link-State
Database they are describing accordingly, just like LSPs. CNSPs contain a summary
of every LSP in the Link-State Database that includes an LSP Identifier, a Sequence
Number, a Checksum and a Remaining Lifetime field. CNSPs are exchanged once
during the establishment of an adjacency and before any other LSPs have been
exchanged. This way ISs are informed about the topological information that each one
of them contains. For broadcast networks, CNSPs are only sent by the Designated IS
of the network. On the other hand, PSNPs contain only summaries about a specific
LSPs and facilitate the Link-State Database synchronization procedure, either as
requests for missing LSPs or to acknowledge receive LSPs. (Abe Martey, 2002)
30
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Broadcast Networks: Broadcast networks are multi-access networks that support both
broadcasts and multicasts. In every broadcast network, a Designated IS (DIS) is
elected, that plays a similar role to a DR in OSPF. The election process is based on
link configured priorities that have a default value of 64, and in the case of a tie, the
IS with the higher MAC address wins the election. In contradiction to OSPF, there is
no Backup Designated IS, and a new election must be performed if the DIS goes
down. In IS-IS, a Broadcast Network is considered a pseudonode in the Link-State
Database and every IS in it has to advertise a link to it. The DIS has the role of
flooding the LSPs and Hello Packets for the pseudonode except its own packets, and
establishing and maintaining adjacencies. Of course, different DISs are elected for
level 1 and level 2 topologies and the two may be the same or vary. (Gough, 2003)
2.2.3.7 Operation
As IS-IS is based on OSI model, its functions are divided to two categories that
resemble the two sub-layers of the OSI network Layer, the sub-network dependent
layer and the sub-network independent layer. The most vital functions of each sub-
layer are presented below.
Neighbouring Process: ISs send, every 10 seconds by default, Hello packets on their
attached interfaces, declaring this way their identity and capabilities as well as the
parameters of the link. If the two ISs agree on the parameters, they become adjacent.
Unlike OSPF, it is not demanded for all capabilities to match in order to form an
adjacency. For example Hello interval times may vary on the two ISs but the
adjacency will be established. As described above, adjacencies are level 1 and level 2.
For level 1, Area IDs must match where for level 2 that is not necessary. After the
adjacency is established, Hello packets are still used to maintain it as keep-alive
messages. Moreover, a Hold Time value is included in the Hello packets in order to
inform neighbour about the time they need to wait until they should declare the
sending IS as dead. Finally, two ISs are fully adjacent only when the Link-State
Database synchronization is accomplished. Hello packets are multicasted to all
neighbours even by ISs that belong to the same broadcast network, with the elected
DIS sending the appropriate SNPs to ensure the reliable transfer of LSPs.
31
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
incremented by one in every new instance of the LSP until it reaches the maximum
value, where IS-IS stops for a period in order for the LSPs to age in Link-State
Databases. They also contain a Checksum value, and a Remaining Lifetime field that
starts from 0 and rises to a MaxAge value (1200 sec. by default), and defines when
the LSP is going to be deleted from the Link-State Database if not refreshed. As
mentioned in a prior section, CSNP summaries are sent periodically in order to
synchronize the Databases with newer LSPs and PSNPs are sent for
acknowledgement and request of needed LSPs. In a broadcast network the CSNPs are
sent by the DIS.
Shortest Path First Algorithm: IS-IS uses the same SPF algorithm as OSPF in order
to build an SPF tree and calculate the shortest routes to the known destinations. After
the Link-State Database update procedure has finished, the ISs run a separate instance
of the SPF algorithm for the level 1 and level 2 databases, depending of course on
which of them do they support. The difference with OSPF resides on the metric used
to perform the calculations. More specifically, IS-IS uses a metric called default,
which takes the default value of 10 for every link. It also supports three optional
metrics, namely delay, expense and error that characterize the delay, the actual cost
and the error rate of the link respectively. However, using all metrics is not
recommended as the SPF algorithm has to be run separately for each one of them
increasing this way the CPU and memory overload. By running the SPF algorithm,
ISs calculate the level 1 and level 2 routes and inject them into their routing tables.
(Doyle, 2005)
32
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
level of the LSP, this information is carried either inside an IP Internal Reachability
Information TLV for level 1 and inside an IP External Reachability Information TLV
for level 2. (Callon, 1990)
IPv6 Capability: The adaptability of the Hello packets and LSPs to be modified to
include extra TLV fields, has given a huge advantage to IS-IS to the point that it can
carry newer addressing schemes network addresses without changing at all the
operation of the protocol. Therefore, the upcoming arrival of IPv6 found IS-IS almost
ready, in contradiction to OSPF that needed to be extended to a completely new
version. Specifically, another TLV was added to the IS-IS routing packets, equivalent
to the ones for IPv4. This TLV is named IPv6 Reachability TLV and includes the
global IPv6 addresses prefix, a metric and two bits to signify if the routing
information comes from a higher Level or from another routing protocol. Finally, the
IPv6 equivalent TLV for the IP Interface Address TLV is called IPv6 Interface
Address TLV and it has identical format, except the fact that it is modified to contain
16-byte long IPv6 addresses. IPv6 TLVs can coexist with IPv4 TLVs for dual-stack
networks (Hopps, 2008)
For the rest of this paper, IS-IS and Integrated IS-IS definitions will be used
interchangeably, as IP is the dominant protocol that the majority of the Internet uses.
2.2.4 IPv6
2.2.4.1 History
The IPv6 protocol creation was initially motivated by the upcoming exhaustion of the
IPv4 address space. Although IPv4 can theoretically offer 4.3 billion addresses, a
variety of factors lead to the exhaustion of this space. Firstly, the initial allocation of
IPv4 was divided to 60% of the space given to United States of America government
organizations and 40% given for the rest of the world. The purchase of large un-
needed blocks of IPv4 addresses (Class A addresses) by certain organizations further
increased the IPv4 exhaustion problem while a redistribution strategy is not practical
and implementable today. Moreover, an ever increasing number of devices such as
laptops, tablets and smart-phones have need for Internet connectivity and therefore the
need for an IP address. A characteristic example of the IPv4 shortage problem is that
in 2006 with the available address space reaching exhaustion, only 14% of the total
human population had access to Internet. More than that, in 2011 Internet Assigned
Numbers Authority (IANA) allocated the last blocks of IPv4 addresses to the
Regional Internet Registries (RIRs) and the reserve that RIRs hold is the last
addresses that remain to be given to ISPs. Until now, many attempts and temporary
solutions have been proposed and implemented in order to extend IPv4 lifetime. In
more depth, in RFC 3022 published in 2001, NAT (Network Address Translation)
was defined so that one or a small group of public IPv4 addresses could server many
private-addressed hosts in the Internet. NAT is a widely implemented technology
even if it suffers from a variety of problems regarding applications and protocols such
as IPSec. VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-
domain Routing) have also facilitated in using the most out of each allocated address
space without wasting addresses, and the wide use of private addresses have reduced
the public IPv4 address allocation need in a great manner. However, the Internet
scientific community was aware of the upcoming dead-end from the 1990s. IETF had
created the IPng (Internet Protocol – Next Generation) and ALE (Address Lifetime
33
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Expectation) working groups in order to determine the available time space until the
IPv4 addresses would be exhausted, as well as to suggest a solution to the problem.
Eventually in 1995 and 1988 respectively, RFC 1883 and RFC 2460 were published
to define the new IPv6 protocol which would replace IPv4 and would also include a
variety of improvements. (Hagen, 2006)
2.2.4.2 Addressing
In IPv6 protocol there are three types of addresses depending on the way they behave
during the routing procedure. Those types are namely unicast, multicast and anycast.
As noticed the last category is new in comparison with IPv4. Additionally, broadcast
addresses do not exist in IPv6 because it was estimated that they created problems in
IPv4 that significantly affected network performance, and it was decided to be cleared
and their functions to be undertaken by multicast and anycast.
Unicast: The unicast address defines a specific interface, so that when a packet is
destined to it, the packet will be sent to the characterized interface where the address
is assigned. Depending on their scope, unicast addresses are divided to the following
three sub-categories.
Global Unicast: Global unicast IPv6 addresses are unique globally, routable in
the Internet and assigned by an ISP. The range of the global unicast addresses
includes the addresses starting with 2000::/3.
Link-Local Unicast: Every IPv6 interface is also always assigned a link-local
unicast address which is not routable and is used for neighbour discovery and
auto-configuration functions. The range of the link-local unicast addresses
includes the addresses starting with FE80::/10 .
Unique-Local Unicast: Unique-local unicast addresses, also called as site-
local, were introduced in order to resemble the role of private IPv4 addresses
although different scientists argue about the need of this group, as they
introduce complexity to an already complex protocol. Unique-local unicast
addresses are used to address packets that flow within an organization site and
cannot be routed further than it. The range of the unique-local unicast
addresses includes the addresses starting with FE80::/10.
As discussed earlier, the most vital reason from moving to IPv6 was the exhaustion of
IPv4 addresses. Therefore, the new IPv6 addressing scheme should have a format that
would offer a vast number of addresses, so that exhaustion would not be a concern for
the predictable future. Consequently, IPv6 addresses were designed to consist of 128
bits instead of the 32 bits of the IPv4 addresses. IPv6 addresses are represented as a
row four 2-byte long hexadecimal values separated with a colon. Thus, the IPv6
address takes a form of XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX. For
convenience an all-zero 2-byte field can be replaced with a double colon (::).
Additionally, instead of a subnet mask, IPv6 supports a prefix notation (e.g. /64) that
identifies the subnet prefix length. The IPv6 unicast format has been defined in
several RFCs, however the one that dominated splits the 128 bits IPv6 address into 3
separate fields. The first n high-order bits consists a field called Global Routing
Prefix, the next m high-order bits consist the Subnet ID and the last 128 –n –m bits
consist the Interface ID. The following figure shows the default IPv6 address format.
34
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
The Global Routing Prefix field bits are allocated to individuals or organizations that
request a specific address space. Most commonly, those first n bits are assigned by the
Internet Service Provider itself and represent a site, a group of networks, and can’t be
more than 48 bits. The Subnet ID bits define the subnet in which the address belong in
the site and are used only for internal routing. Finally, the Interface ID field
characterizes the network interface where it is assigned on, and for IPv6 global
unicast addresses equals 64 bits.
The range of the multicast addresses includes the addresses starting with FF00::/8.
2.2.4.3 Features
Packet Header: The IPv6 packet header format is differentiated from the IPv4 one.
The header is designed in order to be more simplified and also support the extra
35
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
features that IPv6 protocol offers. The first 4-bit Version field specifies the Version of
the IP protocol and consequently equals 6. The second 8-bit Traffic Class field is used
to provide QoS features, giving the ability to sourcing or forwarding routers to give
priority to specific IPv6 packets. The default value of the 8 bits is zero, but that can
change by routers on the way of the route. The next 20-bit Flow Label field has a
default value of 0, is used again for providing QoS to packet flows and is commonly
used for real-time application data. Following, the 16-bit Payload Length field
contains the actual length of the IPv6 packet excluding the header, the 8-bit Next
Header field defines the type of header that follows the actual IPv6 header and the 8-
bit Hop Limit field includes a value that is decremented by one each time that the
packet is forwarder by a router until reaching zero and being dropped. Finally, the
IPv6 packet header includes the 128-bit Source and Destination IPv6 address of the
packet. The following figure shows the format of the IPv6 packet header. (S. Deering,
1998)
Extension Headers: As mentioned on the previous section, the Next Header packet
header field identifies the additional header that may follow the default IPv6 header.
IPv6 protocol makes use of extension headers in order to add options which give
improved processing to IPv6 traffic by the destination node. IPv6 supports the six
different extension headers that follow. The Hop-by-Hop Options header is the only
header that is processed by all nodes in the route and is mostly used for RSVP and
MLD protocols, where the Routing Header defines a list of intermediate routers that
should be visited in the route. Moreover, the Fragment header defines the way the
packet is fragmented and the way it should be reassembled by the destination, as in
IPv6 no fragmentation is performed by the intermediate routers, and the Destination
Options header includes options to be processed by the destination and is especially
useful in mobile IPv6. Finally, the Authentication and Encrypted Security Payload
headers can be used to define the authentication and encryption methods that are
implemented on the IPv6 packet.
36
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Router Solicitation packets between hosts and routers, and the exchange of Neighbour
Advertisement and Neighbour Solicitation packets between routers and routers in
order to advertise data-link layer addresses. This way ARP (Address Resolution
Protocol) that suffered various security flaws is not needed in IPv6. Additionally, ND
plays a vital role in stateless autoconfiguration, DAD and mobile IPv6. (Hagen, 2006)
2.2.5.1 Mechanisms
As discussed in the previous section, the domination of IPv6 is inevitable although the
exact time that this will happen cannot be predicted. However, more and more
organizations and companies work towards establishing IPv6 capability in their
network in order to be ready for the change. Even though the IPv6 protocol is a
solution to the IPv4 address exhaustion problem as well as a huge improvement, its
creators did not design it to be backward-compatible with the previous version. This
disadvantage makes impossible the communication between IPv4 and IPv6 address
configured devices. This issue has given a push to the scientific community in order
to create a variety of migration strategies from IPv4 to IPv6. As the Internet and the
global community consists of a vast number of networks, there will be a most likely
long time period that networks configured with IPv4 will have to coexist and
communicate with networks working on IPv6. It is predicted that in the beginning of
the change there will be IPv6 “islands” in the IPv4 network “ocean”, but this fact is
going to change periodically. Until the final IPv6 domination, practical solutions will
have to be used in order to enable communication between heterogeneous networks
and applications. There is a big amount of research being held to define the best IPv4-
to-IPv6 migration and coexistence techniques. The solutions that have been proposed
until now can be divided in three major categories, each one of which offer different
mechanisms recommended for different migration situations. This section of the paper
intends to give an overview of the most popular published techniques.
2.2.5.1.1 Dual-Stack
The simplest IPv4-to-IPv6 technique is called dual-stack. This technique demands the
configuration of routers and hosts so that they support both IPv4 and IPv6. This way,
a dual-stack network is actually a pair of logical networks, one IPv4 and one IPv6
enabled, running over the same network infrastructure. Most specifically hosts,
routers and other network devices have both IPv4 and IPv6 addresses configured, and
use one or another depending of the network that they are communicating with. The
correct protocol stack is selected based on the DNS types returned by DNS lookups.
Consequently, a dual-stack router holds both IPv4 and IPv6 routing tables which are
used according to the IP version that the router is about to forward. The following
figure shows the logical structure of a dual-stack router that is communicating with an
IPv4-only and an IPv6-only device.
37
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
2.2.5.1.2 Translation
The second migration method proposed includes the translation of one protocol to
another (IPv4 to IPv6 and vice versa), by both translating the packet header and
payload. This mechanism is mostly used to enable communication between an IPv4
only network and an IPv6 only network. The translation category includes several
different transition techniques with different functions.
SIIT: Stateless Internet Protocol/Internet Control Messaging Protocol
Translation (SIIT) enables the communication of an IPv4 host with and IPv6
host by using a bidirectional translation mechanism implemented on IP and
ICMP packets of both versions. The SIIT algorithm translation process doesn’t
affect upper layer checksums except for some application like FTP that embed
IP addresses in upper layers and make vital the use of Application Layer
Gateways (ALGs). An IPv4 can easily be translated in a special IPv6 that
embeds the original IPv4 address in the lowest 32 bits. In the opposite
situation, a temporary IPv4 address is assigned to the IPv6 device in order to
send packets to an IPv4 network.
BIS: Bump in the Stack (BIS) is a mechanism based on SIIT that allows an
IPv4 application on a host to communicate with an IPv6 application to a
destination host. During this procedure, the first host gets the IPv6 address of
the destination via a DNS lookup and associates this address with an IPv4
address gained from a pool. Eventually the SIIT algorithm is used for the
translation of the IPv4 address to the mapped IPv6 address.
BIA: Bump in the API (BIA) is designed to accomplish the same purpose as
BIS, but this time for an IPv6 host with IPv4-onl supporting applications
rather than for an IPv4-only host. The most discrete difference between BIA
and BIS, is that the translator in BIA is placed between the application layer
and the transport layer, where in BIS the translator functions in the Internet
Layer.
NAT-PT: Network Address Translation–Protocol Translation (NAT-PT)
employs the same logic that NAT is using in IPv4-only networks. In IPv4
NAT an IPv4 address is translated in another IPv4 address where in NAT-PT,
an IPv4 address is translated in an IPv4 address and vice versa. Moreover
NAT-PT requires no changes on the configuration of the hosts and
38
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
2.2.5.1.3 Tunnelling
The last popular migration strategy is tunnelling. Tunnelling is mainly used to
facilitate communication of IPv6 hosts that reside in different networks via an IPv4
network infrastructure. The opposite procedure is also supported. The main idea
behind this concept is the encapsulation of IPv6 datagrams in IPv4 formed datagrams
that can be transferred over IPv4 networks, and vice versa. Depending on their
functions tunnelling is also subdivided in numerous technologies, the most important
of which are described below.
Static Tunnelling: Static tunnelling is a technique used to connect two IPv6
hosts over an IPv4 network with a permanent link. The source and the
destination hosts are manually configured with IPv4 addresses. The hosts’
routing table on the tunnel’s endpoints defines which packets will be
tunnelled.
Automatic IPv4 Tunnelling: Automatic IPv4 tunnels make use of the special
IPv6 addresses with the fixed ::/96 prefix and the lower 32 bits resembling the
destination node’s IPv4 address. Thus, a node can send IPv6 packets to these
destination addresses, which will be encapsulated in IPv4 packets and sent to
the IPv4 address that is identified by the 32 lower bits of the IPv6 destination
address.
39
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
The following figure shows the general function that respond to all Tunneling
mechanisms, including the encapsulation and decapsulation procedure. IPvX and
IPvY reenact the different versions of IP, and the H1, H2, TE1 and TE2 abbreviations
reenact the Host 1, Host 2, Tunnel Endpoint 1 and Tunnel Endpoint 2 on the figure.
40
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
2.2.6 Conclusion
The Theoretical Background part aimed to give a thorough overview of all subjects
that this paper deals with. As the performance evaluation of two routing protocols is
the center of the presented work, the definition of routing is given and the different
routing protocol types are explained. In the sequel, the OSPF and IS-IS protocols,
their structure and operation are described in order to give the reader a deep
understanding of their functions and facilitate the drawing of inferences about their
performance. Thereinafter, the framework in which the two routing protocols will be
examined is presented. More precisely, the IPv6 protocol, its addresses and benefits
are collocated, as it constitutes a vital part of the dual-stack networks under which the
experiments will be taken. Additionally, a general review of the most popular IPv4 to
IPv6 migration mechanisms is given in order to offer an overall view of their
operations that expedites their comparison and contrast which leads to the selection of
the appropriate mechanism for use in the experiments in this project.
41
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
42
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
simple migration model as it only demands enabling IPv6 on the existing equipment,
as well as the most applicable to corporate, ISP and home networks. The issues that
appear on this strategy have to do with the ability of some application to switch to
IPv4 when IPv6 connections are unreliable, and with the need to enable IPv6 on every
device, fact that will require the advertising of the address to the DNS even if that is
not broadly needed. Furthermore, dual-stack allows direct addressing of devices,
bypassing this way the need of NAT. Eventually, the dual-stack mechanism is
described as the recommended IETF specified approach as well as the most popular.
(J. Arkko, 2011)
Another conference presented paper reviewed attempts to present the three main IPv6
transition techniques, namely dual-stack, tunneling and translation. The paper
describes the ability of dual-stack nodes to use either IPv4 or IPv6 stack depending on
the traffic received and notes that it is effective as well as the basis for all other
migration mechanisms, as they require at least a part of the nodes to be configured as
dual-stack. Likewise, it presents the DSTM (Dual Stack Transition Mechanism)
which allows dual-stack hosts to receive non-permanent addresses from a DSTM
server in order to address the IPv4 shortage problem during the migration. Besides
that, this research presents the tunneling solution as a simple solution for the first
stage of the migration where IPv6 islands will have to communicate over the IPv4
ocean. As stated, the advantage of this technique is that modification is needed only at
the tunnels end-points, but the disadvantage is the inability to establish direct
communication between an IPv4 and an IPv6 host. Finally, different NAT-PT
translation technologies are described. Specifically, Static NAT-PT achieves one-to-
one IPv6 to IPv4 address mapping where Dynamic NAT-PT makes use of a pool of
IPv4 addresses (XiaoHong, 2013)
43
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Lite and 4over6 mechanisms, where the MAP-E technique used to address these
issues lacks deployment flexibility. The eventual recommendation of this paper is the
dual-stack configuration of the backbone network and a tunneling mechanism such as
6rd for the edge network of an ISP. (Peng Wu, 2013)
Research has also been made to define the most appropriate IPv6 migration technique
between dual-stack and tunneling solutions in the scope of a campus network. It is
suggested that both techniques are useful in specific situations and they can be
combined in order to achieve the most cost-effective result. Dual-stack is considered
by the researchers to be the most understandable, direct and interoperable way that
can be used to assure a smooth transition, although it adds cost, complexity and CPU
overhead. On the other hand, the easy-to-use tunneling technique has the significant
disadvantage of incapability to achieve communication between IPv6-only and IPv4-
only hosts. The migration strategy that is recommended is starting with IPv6-only
areas connected to the IPv4 network via tunnels and the gradual deployment of IPv6
and use of dual-stack for the IPv4 parts of the campus network. (Dai, 2011)
Continuing the literature review regarding the comparison of the different IPv4-to-
IPv6 migration procedure, a survey over their capability in MANs was also examined.
The dual-stack mechanism in this research paper is described as the most direct
solution for all network devices and applications. It is supposed to be the ideal
solution giving the availability to dual-stack users to access either IPv4 or IPv6
networks. From a technical and investment point of you according to the research,
dual-stack is considered to be the best migration technique, as there is no need for
separate network configuration of the hosts and also the existing equipment can be
used just by enabling IPv6, saving this way funds. On the other hand, in cases that the
existing Layer 3 devices cannot support IPv6, the use of either 6to4 or ISATAP
tunnels is proposed, although it is admitted that firstly they are not an ideal proposal
and also need some dual-stack nodes to function. Eventually, dual-stack is
recommended for the core network, with users connecting to backbone via the
tunnels. (Zhonghua Guo, 2012)
Finally, useful research regarding the election of the best transition technique has
been conducted by University of Colorado students, which interviewed important
people of the networking industry such as Fred Baker, Chris Tuska and Jason Weil.
The paper discusses well-known migration technologies as well as some IPv4
Extension technologies that are not recommended as they don’t encourage the
evolution to IPv6. According to the results of this survey, dual-stack is considered to
be the most popular in the networking world and the most broadly deployed, due to
the rapidly introducing of IPv6 enabled devices. NAT64 translation technology on the
other hand, is not recommended as several protocols like SIP and Skype can’t be
traversed because of lack of IPv6 support. 6rd tunneling technology is thought to be
an inexpensive technique as it only demands upgrading of two devices, but is mostly
preferred for the very early stages of IPv6 transition and also introduces latency.
Furthermore, the DS-Lite tunneling mechanism facilitated by NAT44, although is
used by some ISPs it is noted that it adds management cost and complexity.
Eventually, the completed survey showed that dual-stack is the absolute winner
among all techniques and the one experienced industry networking scientists
recommend for companies willing to migrate to IPv6. (Jinesh Doshi, 2012)
44
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
The second research paper presented here intends to compare the performance of the
dual-stack solution against the two most popular IPv6/IPv4 tunneling methods,
namely 6to4 an ISATAP tunnels. The experiment and analysis of this research aim to
give results about the network performance comparison for IPv4 and IPv6 traffic over
networks configured with each one of the above mentioned migration methods. The
metrics counted are round-trip delay and throughput. Additionally, the paper notes
that the same network structure was used in all three scenarios. This structure consists
of two Windows PCs residing in different subnets and each one connected with a
separate router. The routers were connected over an IPv4 network for the 6to4 and
ISATAP, where the routers are accordingly configured as 6to4 and ISATAP routers.
Moreover, the hosts for the tunneling scenarios were IPv6 only. On the other hand, for
the dual-stack scenario the network that connects the two routers, the routers
themselves and the hosts are configured as dual-stack IPv6/IPv4. The experiment was
implemented on real equipment although the routers were not real hardware routers
but high-performance PCs that simulated routing functions. Furthermore, the method
used for throughput measuring was accomplished by sending TCP packet with a
payload varying between 64 and 1408 bytes, and the average was calculated for each
scenario after 10 implemented tests. On the other hand, the method used for round-
trip delay was accomplished by sending ICMP and ICMPv6 packets with a 1024
bytes packet size, and the average was calculated for each scenario after 100
45
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
implemented tests. The diagrams produced from the experiments of these projects
show that for IPv6 traffic 6to4 and ISATAP tunnels achieve similar throughput values
where dual-stack solution offers higher throughput than both of them. Again, for the
round-trip delay measurement using IPv6 traffic, 6to4 and ISATAP tunnels result in
similar measurements, where dual-stack achieves lower round-trip delay than both of
the tunneling methods. Eventually, this research shows that dual-stack networks have
overall network performance than 6to4 and ISATAP tunnel networks, and also that
IPv6 traffic performs better than IPv4 on dual-stack. (Yingjiao Wu, 2011)
46
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
IPv6 Transition
Advantages Disadvantages Suitability
Categories
Simple Need for IPv4 Suitable for the
Easy to understand and configure addresses on every backbone of
Inexpensive node enterprise, ISP and
Scalable Superfluous address home networks
Lower packet-loss rates advertisement to Best for the main
Dual – Stack Higher throughput rates DNS stage of migration
Lower round-trip delay times More CPU-memory
Direct communication between overhead
nodes
Recommended solution
Connectivity between IPv4-only and Vulnerable to DoS Only for early
IPv6-only devices attacks stages of the
Enables ISPs to change customers’ Performance migration
IPv4 global addresses with private depending on the
address binding
table size
Low scalability
Incapability to
Translation traverse IPv6 not-
supported
applications
Bears all foibles of
NAT
Adds complexity
and management
cost
Need of modification only at the No connectivity Suitable for
tunnel’s endpoints between IPv4-only connecting
Inexpensive solution and IPv6-only “islands” of one IP
Simple devices version via an
Vulnerable to DoS, “ocean” of another
Tunneling spoofing and man- IP version
in-the-middle Suitable for ISP
attacks edge networks
Need of dual-stack Best for the early
routers stages of the
Introduces latency migration
2.3.2.1 Considerations
As discussed in previous sections, OSPF and IS-IS consist two link-state protocol
with the same route calculation mechanism but based on different protocol stacks.
Historically, IS-IS is selected by many ISPs for their core networks where OSPF is
the most popular protocol for enterprise networks. OSPF seems to be the preferred
protocol among the two, due to the fact that is a proven effective routing protocol and
is based on the TCP/IP model. Most network engineers are more familiar to the
dominant IP protocol rather than CLNP, making this way companies to select OSPF
in order to facilitate their networks’ management. However, it is believed that for
modern networks and applications that tend to be more and more demanding in terms
of resource consumption and need of low latency, performance should be a vital
factor when selecting a routing protocol. This gets even more important for dual-stack
networks which will be the majority of the enterprise network world, and which by
nature introduce additional performance overhead. This chapter intends to review the
research that has been carried on the comparison of the two protocols when running
over the existing IPv4 networks and on how they cope with IPv6 traffic. It is expected
that this research part will produce some assumptions about the proficiency of OSPF
47
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
and IS-IS when configured on dual-stack networks, that can be compared with the
project’s experiment results, in order to lead to safer conclusions.
The comparison of the two protocols has been a matter of debate through the years,
but nowadays the subject still preoccupies the networking community. IS-IS, although
used primarily in ISPs’ networks, is being reviewed by researchers about the
possibility of a broader deployment. A recent publication has attempted to emphasize
IS-IS advantages and why it should be considered as an alternative to OSPF. It is
suggested that IS-IS is an extensible routing protocol that offer huge support to the
global IPv6 deployment. Furthermore, as discussed in the Theoretical Background
chapter its hierarchical structure helps to reduce the exchanged routing information. In
terms of security, IS-IS is also strong, as it supports clear-text authentication by using
specialized TLVs, and is extensible to new authentication forms that are being
researched by IETF. Except that, in comparison to OSPF, IS-IS routing information is
not carried over IP but is encapsulated in layer 2, making a possible attacker task
difficult, as they should directly connect to an IS-IS router to start any malicious
activities. Apart from the obvious advantages, researchers believe that IS-IS also has
disadvantages that may have played a role in its reduced popularity. Notably, IS-IS
level 1 adjacencies do not carry external route information and this can only be done
by injecting these routes to the level 2 topology, in comparison to OSPF that can
achieve this goal by using not-so-stubby-areas. Furthermore, it is noted that IS-IS
does not support virtual links like OSPF. However, this is believed to be of less
importance as IS-IS doesn’t require to achieve connectivity with a backbone area.
Back to IS-IS advantages, the LSP lifetime can grow up to 18.2 hours unlike OSPF
that is limited to 1 hour, making this way IS-IS more scalable for bigger areas.
Moreover, IS-IS can make use of the Overload bit to signal memory exhaustion of a
router and also includes a feature that enables routers in full-mesh topologies to
receive only one LSP copy, where OSPF has no such capabilities. Eventually, this
research points out that IS-IS may be a more efficient solution as it can be extended
for future needs by adding new TLVs in comparison to OSPF that needs the creation
of new LSAs, by the most obvious example being that of the IPv4 and IPv6
coexistence capability. It is suggested that the above discussed characteristics should
make the scientific and industry community reconsider IS-IS place in the networking
world, especially for larger networks. (Singh, 2013)
Even though several research paper signalize IS-IS superiority, the OSPF - IS-IS
comparison topic is controversial and research papers that support the opposite also
exist. Based on an example research paper, OSPF is compared with other IGPs,
namely IGRP, EIGRP and OSPF and is suggested to be better than all of them. This
research emphasizes on the advantages of OSPF due to its hierarchical structure that
facilitates reducing the routing data traffic, as well as on the fast convergence times
that it offers. Thereinafter, it attempts to build a comparative table with the
characteristics of each mentioned IGP in order to conduct a comparison, and conclude
to the most efficient of them. The paper suggests that OSPF’s greater advantage is
that it is open, making possible this way its deployment to networks that include
routers and other network devices by various vendors. These characteristics are used
by the research as arguments that lead to the conclusion that OSPF is superior to
IGRP and EIGRP. (Neha Grang, 2013) However, the presented comparative table
regarding the comparison with IS-IS only presents differences in the type of the
hierarchy format, the Dead Timer times and the metric used, and no other supremacy
48
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
points are discussed. Thus, it is believed by the author of the current project, that this
information is inadequate to lead to a conclusion about which protocol among OSPF
and IS-IS is prime.
More than that, another general research review paper about IGP and BGP protocols
dedicates a part in the popular OSPF - IS-IS comparison. Except the disclosure of the
main characteristics and differences of the two protocols, this research paper presents
a brief comparison by showing some of their advantages and disadvantages. More
specifically, the research suggests that in OSPF, routers may belong to multiple areas
in comparison with IS-IS Intermediate Systems that belong to only one area, and this
fact results in higher power consumption. Furthermore, it is noted that OSPF area
boundaries fall on the routers where IS-IS area boundaries fall on the links, which
could lead in higher delay times in the sending and receipt of the packets for the latter.
Additionally, IS-IS is considered by the paper as more flexible because holding timers
don’t need to be identical on all routers. Finally, an argument is made which supports
that OSPF is superior than IS-IS in security terms due to the fact that OSPF runs over
IP. (Abdulrahman Alkandari, 2012) However, this statement is believed by the author
of this project to be untrue, as IP is more vulnerable to various types of attacks and
also is more popular and more hackers have better knowledge of it.
Relatively recent research has been focused on the comparison of the OSPF and IS-IS
protocols in terms of performance in ISPs’ IPv4 networks. This research notes the
importance of selecting the right routing protocol to assure the temporal efficiency of
a network in the distribution of data, as well as the superiority of dynamic routing
protocols over static routing due to the fact that they are able to easily adapt network
changes. The performance comparison of the two protocols has been conducted with
the help of the OPNET modeler network simulator. More specifically, the same
topology of 21 routers spread across different states of the USA, has been configured
with each protocol one after the other in order to produce comparative metrics. The
research aimed to produce results regarding the router and network and router
convergence activities and duration times, as well as queuing delay times on point-to-
point links. The results of the experiment showed that OSPF demands more network
activity regarding the messages sent between the routers until the network has reached
convergence, and also the network and router convergence duration times are 6 and 5
times higher than the ones of IS-IS respectively. In addition, in the specific
experiment IS-IS presented much higher throughput than OSPF, with the second
resulting in lower queuing delays than the first. (Thorenoor, 2010) The different
metric results regarding convergence are possibly related to the hierarchical format
that each protocol is using. More precisely, in OSPF internal routers in an area have to
learn about routes to every possible destination, where internal IS-IS routers only
need to know about the closest level 1/2 IS, speeding this way the network
convergence procedure. Except that, IS-IS only requires the exchange of one LSP
during the convergence procedure where OSPF demands many different LSA types to
be exchanged between the routers.
Although most of the research implies that IS-IS presents better characteristics and
performance than OSPFv2, the performance of OSPFv3 should also be taken into
account when comparing the two protocols, especially nowadays that IPv6 becomes a
constant part of modern networks. One more motive for this research review, is that
there is no published research about the IS-IS – OSPFv3 performance in IPv6
49
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
networks. Based on this fact, researchers have conducted experiments to discover any
performance improvements of OSPFv3 in comparison to OSPFv2. The experiments
were implemented by using OPNET Modeler and by creating a simple OSPF
topology including five areas, specifically two non-backbone areas and a backbone
area, and five routers in total. Then, the same topology was configured separately with
OSPFv2 on one occasion and OSPFv3 on the other, and performance metrics were
calculated in order to compare the two protocols’ performance, by running 10 minutes
simulations. In terms of convergence duration and amount of traffic sent, the two
versions of OSPF presented similar results. As far as it concerns the LSDB size,
measurements were taken according to the research on an internal router, and the
results showed that OSPFv3 LSDB is 27% smaller than the OSPFv2 LSDB. Such
behaviour can be explained due to the fact that OSPFv3 does not store any network
addresses carried in Router LSAs in the LSDB. Moreover, even if IPv6 addresses are
bigger than IPv4 ones, similar measurements were taken for memory consumption for
both protocols, fact that may be explained by the facilitating role of the OSPFv3 Link
LSA. However, OSPFv3 presents greater routing table sizes due to the inclusion of
both global unicast and link-local unicast addresses, and it was also proved that it
produces more updates than OSPFv2 in case of a router failure. (Chen Haihong, 2013)
Eventually, this research suggests that OSPFv2 and OSPFv3 present similar
performance and predicts that OSPFv3 will be one of the most popular routing
protocols in the near future due to its effectiveness. Nevertheless, important metrics
such as throughput and round-trip delay have not been measured in order to produce
more clear results.
50
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
topologies and traffic patterns in order to conclude to a rule for deciding between the
protocols for different circumstances.
The topic of the OSPF – IS-IS battle becomes even more argumentative with the
advent of IPv6, as the nature of the two protocols introduces more differences and
benchmarks between the two. As mentioned in previous sections, OSPF had to be
evolved to a brand new version OSPFv3. On the other hand, IS-IS only needed minor
modifications, namely the addition of a couple of TLVs in order to support IPv6. This
very contradiction can be the start of a brand new research circle regarding the two
routing protocols performance. As far as it concerns OSPFv3 performance for IPv6
traffic, some research has been undertaken as well as comparison with other IGPs like
EIGRPv6 and the older OSPFv2. However, as IPv6 is still under development
regarding its deployment, research that could facilitate in the optimum decision
between different IGPs is again in infancy. Especially, when it comes to IS-IS
performance on IPv6, academic research approaches zero.
This paper intends to trigger this kind of research, starting from the performance
evaluation of the protocols in dual-stack environment. The time space until the
complete domination of IPv6 may be vast and it is believed that scientific disquisition
contribution should resonate to networks of the foreseeable future. Big companies that
bestir themselves in the networking field, already organize seminars and publish white
papers that discuss the comparison of OSPF and IS-IS under an IPv4/IPv6 coexistence
environment and the considerations that should be taken when choosing between
them. The two most important reasons that have revitalized the networking world’s
interest on this rather old debate, is firstly the improvements that OSPFv3 may offer
and secondly the effect that the way of the two protocols deployment can have on
performance and configuration ease. More precisely, there are two forms of deploying
OSPF on dual-stack networks. The first one involves the configuration of OSPFv2 for
processing IPv4 traffic and the exact configuration of OSPFv3 for IPv6 packets on the
same network devices. The second form allows the use of OSPFv3 with Address
Families capability, for processing both IPv4 and IPv6 traffic. This solution gives the
advantage of running just one protocol in dual-stack networks. However, both those
two ways of OSPF deployment on dual-stack, demands the implementation of two
different routing instances running at the same time. As dual-stack networks are
usually based on identical IPv4 and IPv6 topologies, the double instance solution
leads to more CPU power demand, more bandwidth and memory utilization, as
double sending of routing advertisement and double route calculation occurs. On the
other hand, IS-IS configured on dual-stack networks, only employs one routing
instance that is able to calculate both IPv4 and IPv6 routes simultaneously, saving this
way resources. Similar considerations have already been made by networking groups
in released Internet Drafts. (Manav Bhatia, 2006) Moreover, the Address Families
OSPFv3 solution is still a new technique with limited vendor support. Although big
networking companies such as Cisco and Juniper allow the configuration of Address
Families, only brand new routing software versions are able to support the extension
(e.g. Cisco IOS 15.1). This means that a company would need to update the routing
software in all its routers to implement the solution, resulting in a possible non
affordable cost. As a consequence, several companies nowadays reconsider the
migration from OSPF to IS-IS in order to achieve bets performance, lower cost and
take advantage of its benefits.
51
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Within this framework, this paper intends to provide proof regarding the performance
of the two protocols when configured on a dual-stack enterprise network. The results
of this survey and experiments may be used as guidelines for companies in order to
select the best performing protocol for their networks in the upcoming future. The
paper also aims to bring again to the fore, the discussion on the subject, and lead to
reconsideration regarding the old “IS-IS for ISP networks – OSPF for enterprise
networks” theorem.
2.3.3 Conclusion
The Related Work chapter aimed to achieve a complete review of the research on the
field, of the last five years. Firstly, scientific papers related to the different proposed
IPv4 to IPv6 mechanisms were reviewed in order to draw conclusion about which is
the most recommended solution by the scientific community and what are its
advantages and disadvantages. As long as the dual-stack method was selected based
on the general scientific opinion, its performance was compared to the one of other
competitive mechanisms. Dual-stack performs better than them according to all
performed recent research, thus it was selected as the background for the following
experiments between the OSPF and IS-IS routing protocols. Review of the
implemented academic research was also done for those protocols, by focusing on the
strong - weak points and performance of them in IPv4 environments, with the general
outcome of the review being the superiority of IS-IS. The lack of related research
work on the comparison of OSPF and IS-IS in IPv6 and on IPv4-IPv6 coexistence
networks was also noticed, and created the motivation for the network experiments
that follow on the Implementation chapter.
52
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
3 Implementation
3.1 Simulation with OPNET
This chapter of the paper is devoted to the performance evaluation and comparison of
OSPF and IS-IS routing protocols in a dual-stack network. The method that was used
to examine their functions and performance in a realistic environment was network
simulation. More precisely, OPNET Modeler 14.5 was selected as the appropriate
simulation program in order to conduct the experiments. OPNET Modeler and IT
Guru are software programs created by OPNET Technologies Incorporation, a
company that specializes in network simulator software used by universities and
companies that need to simulate network environments and protocols for performance
evaluation, testing and research. OPNET Modeler constitutes a network simulation
program based on C and C++, which offers a convenient GUI in order to facilitate
users to conduct network experiments. OPNET Modeler includes model libraries that
represent various network hardware devices from many vendors and various
communication protocols. Thus, the OPNET Modeler users are able to simulate large
network environments with network devices and routing protocols of will, without the
need of pursuing real equipment, saving this way cost. The specific program also
gives the capability to add or modify existing models, and bases its simulations on the
Discrete Event Simulation system which uses defined processes to model network
events. Additionally, traffic patterns can be simulated by the use of network layer
traffic flows, by well-defined applications or by transport layer application demands.
The sequence of the needed acts needed for a network simulation, includes the design
and configuration of the network topology, the selection of the desired measured
metrics, the simulation run and the analysis of the calculated statistics. Eventually,
OPNET Modeler is considered a reliable program when it comes to network
evaluation, usually met on computer networking publications and also used by
industry. These advantages of the program led the author to select it as the tool to
facilitate the intended experiments.
53
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Pure Network Metrics: As pure network metrics are described in this paper the
network performance metrics that are measured on the initial network topology when
no traffic is implemented or when the traversing traffic does not have an effect on
them. These metrics’ values remain the same regardless of the application and traffic
rates that are running on the network. Metrics of this type can give an overall view of
the performance of the configured routing protocols configured on the network, and
depend on the specifically selected topology. During the experiment conduction of
this project, the following pure network metrics were calculated:
Convergence Duration: In routing protocol terms, convergence is the state
that routers configured with a dynamic routing protocol reach, where they all
have the same topological knowledge of the network or AS that they run on.
Different routing protocols follow different procedures until they converge. In
any case, the convergence state represents the phase where the appropriate
information have been exchanged between participating routers, routing tables
have been built, and thus, all routers are in stable state and can begin routing.
The time needed for a network configured with a routing protocol in order to
reach convergence is called convergence duration. Convergence duration can
lead to conclusions about the protocol’s speed, because the sooner
convergence is achieved, the sooner data can be forwarded. Furthermore,
convergence duration can indicate how fast a network can return to a
functioning stable state after a link or router failure has occurred.
Convergence Activity: Based on the above mentioned information,
convergence activity can also be measured in order to show the timestamps
during the experiment, where convergence procedure routing information is
being exchanged between the network’s nodes. The importance of this metric
is similar to this of the convergence duration metric.
Routing Table Size: Another metric that can be calculated on the initial pure
network topology, is the routers’ routing table size. This metrics literally
shows the number of route entries that a routing table holds. This specific
value can also give a hint about the routing protocols’ speed. As routers search
their routing tables sequentially when seeking an available route to forward a
packet, a routing protocol that introduces less entries in the routing table, will
self-evidently achieve a higher routing speed. Again, the routing table size is
54
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
depending on the size of the topology and not on the type or amount of sent
traffic.
End-to-End QoS Metrics: Apart from the pure network metrics, network performance
evaluation demands the measurement of metrics that have to do with the actual
performance of the network when transferring data. In order to achieve a realistic
network simulation, traffic flows have to be emulated. The end-to-end QoS metrics
concern the reaction, speed and efficiency of the routing protocol configured network,
when specific type of traffic is forwarded from a source to a destination. During the
experiment conduction of this project, the following end-to-end QoS metrics were
calculated:
Throughput: Throughput is one of the more important and common network
performance metrics. Measured in bits/sec or in packets/sec, it represents the
amount of bits or packets that are successfully transferred over a link. High
throughput values indicate efficient network function as packets sent reach
their destination without being dropped and retransmitted for various reasons.
Low throughput on the other hand shows lower speed and more utilization of
the network capacity.
End-to-End Delay: Another metric exactly corresponding to network speed,
is end-to-end delay. This metric is calculated for every client-server pair where
a traffic flow is running between them. End-to-end delay is measured in
seconds and represents the actual time passed from the creation of the packet
until its receipt at the destination. Obviously, lower end-to-end delay values
indicate a better network performance. The lower the end-to-end delay, the
faster the receipt of a packet.
End-to-End Delay Variation: This metric, also known as “jitter”, refers to the
dispersion of delay between different IP packets of a traffic flow. An average
value for this metric can be calculated for every client-server peer group.
Obviously, high jitter is not desirable and it has a negative effect especially on
UDP traffic and real-time applications.
CPU Utilization: CPU utilization actually represents CPU overhead. A routing
protocol can be evaluated based on this metric, according to the burden that it
applies to the participating routers. The CPU utilization metric in OPNET
Modeler shows the percentage of the CPU part that deals with IP packet
forwarding. High CPU utilization values can lead to latencies as well as in
dangers such as a router overload and failure. (Adarshpal S. Sethi, 2013)
55
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
order to produce results that reflect to a large part of today’s company networks. In
addition, the enterprise network choice was dictated by the need to further investigate
the convention of using IS-IS for ISP networks and OSPF for enterprise networks.
Therefore, the Enterprise option was selected when deciding the size of the simulated
network topology, with an actual area of 100 km2. This option is showed in the
following figure.
For the needs of the experiment a baseline small enterprise network topology was
configured. As both OSPF and IS-IS are hierarchical routing protocols, a network
topology consisting of three areas was designed, so that it could simulate a similar
routing scenario for each one of them. The baseline topology obeyed to the commonly
used in enterprise networks, Cisco three-layer hierarchical model, although the very
specific functions of this model such as the security options of the distribution layer
and the connectivity to the Internet by the core layer are not in the scope of this paper.
Eight Cisco 7200 routers were selected for the simulation, as Cisco hardware is
usually preferred by a large amount of businesses, and the connections between them
were selected to be serial Digital Signal 3 (DS3) links supporting a 45 Mbps
bandwidth. As is usual in enterprise networks, the access layer of the topology that is
used to connect the end-devices to the main network was linked with the Distribution
Layer by using Fast Ethernet 100Mbps links. Moreover, the two subnets in the first
area of the baseline topology included four hosts each (OPNET ethernet_wkstn_adv
model), and the two subnets of the second area included one Server each (OPNET
ethernet_server_adv) for the needs of the experiments. All those end-devices were
offered connectivity to the access layer routers by four simple Cisco Catalyst 2940
Layer 2 switches. OPNET Modeler makes able the addition of hardware by the use of
its Object Palette that is shown in the following figure.
56
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Regardless, of the configured routing protocol, the concept of the experiments was
based on the initial idea of designing a completely dual-stack network. Therefore, all
participating routers and servers were configured manually with both IPv4 and IPv6
addresses. Regarding the IPv6 addresses, the link-local unicast addresses were
assigned automatically, where the global unicast addresses were set manually in a
non-EUI64 format in order to facilitate the author’s troubleshooting. On the other
hand, the intention of the author regarding the hosts was different. In order to ensure
that the produced results would reflect a dual-stack network in which both IPv4 and
IPv6 traffic is transferred, and in order to be able to measure the QoS performance
depending on the two types of IP traffic, one subnet was configured as IPv4-only and
the other as IPv6-only. This specific design, gives the ability to produce pure IPv4 an
IPv6 traffic running simultaneously through the network, and at the same time to
examine separately the performance depending on the IP version. The following
figure shows the baseline topology that was used for both OSPF and IS-IS experiment
scenarios. As seen in the figure, OPNET Modeler offers various visualization options
in order to facilitate understanding. Specifically, in the following figure, the different
address type of each link is colored, namely IPv4-only links are colored blue, IPv6-
only links are colored green and dual-stack links are colored orange.
57
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
destination. The QoS of each one of them was measured for the IPv4 and IPv6
subnets respectively. In order to achieve this, application demand flows were
configured from every single IPv4-only host to the first dual-stack server, and also
from every IPv6-only host to the second dual-stack server. TCP and UDP flows were
implemented in two separate scenarios on the baseline topology. This decision offered
the ability to afterwards configure OSPF and IS-IS and examine the performance of
IPv4 and IPv6 traffic as well as TCP and UDP traffic for each one of them.
Eventually, the discussed application demands are also visualized by OPNET, as blue
dotted lines. By editing their attributes, options such as the Transport Layer protocol,
the Duration, Request, Response and Traffic parameters can be modified. Although
the evaluation of all different applications is not in the scope of this paper, it was
decided to generate traffic that mimics modern enterprise networks traffic patterns.
Thus, research was advised in order to determine the TCP and UDP packet sizes and
distribution functions. Based on the recent research, 44% of the total data packets in
enterprise networks are smaller than 100 bytes and 37% of the total traffic consists of
packets close to 1500 bytes. According to this statistic, traffic patterns follow a
bimodal distribution with the majority of the packets having the mentioned sizes. As
OPNET doesn’t give the option of bimodal traffic distributions, half of the clients
were set to constantly produce 100 bytes TCP or UDP requests, and the other half
were set to produce 1500 bytes ones, in order to emulate the common traffic pattern.
(David Murray, 2012) The responses of each server were sized to the mean 736 byte
value. Furthermore, traffic transmissions were set to begin at the 100th second and
finish at the end of the simulation. As far as it concerns the TCP/UDP request creation
rate, it was configured to be based on an exponential distribution with a mean value of
100 requests per hour, in order to evaluate the protocols’ performance when traffic
keeps increasing. The following screenshots presents an example of an application
demand’s attributes.
In addition, the following figure shows the baseline topology when configured with
TCP application demands including only discrete traffic, as explained above. The
corresponding topology for UDP demands looks identical.
58
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
59
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
It has to be noted here that the router interface that connects the IPv4-only subnet was
selected to run only OSPFv2 and the router interface that connects the IPv6-only
subnet was selected to run only OSPFv3, so that no unnecessary traffic is sent to the
subnets. This is the only modification made to the behavior of the protocol. Based on
the aims of the project, OSPF and IS-IS were measured based on their default design
with minimal tuning performed, for example the cost value was set to default.
Appropriate modifications and tuning may result in better results on metrics for one or
the other protocol and mislead to incorrect conclusions, so this option was avoided
during the practical part of the project. As far as it concerns the OSPFv2 and OSPFv3
network configuration, it was assumed that they are set in identical topologies.
According to this fact, the baseline topology was divided for both routing instances in
three areas. The following figure captures the OSPF topology, and is sketched in
order to visualize each area. More specifically, Routers 1, 2 belong to area 1, Routers
7, 8 belong to area 2 and Routers 4, 5 belong to the backbone area 0. Routers 3 and 6
are ABRs and thus belong to both areas 1, 0 and areas 2, 0 respectively.
60
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
figure shows OPNET window that allows the IS-IS parameters configuration on the
routers.
The cost was set again to default for IS-IS, and the only modification done was to set
the circuit type of the links to “level 1” between level 1-2 and level 1 routers, and to
“level 2” between level 1-2 and level 2 routers in order to avoid unnecessary neighbor
relationships between the routers. Below is presented the sketched IS-IS topology
including the set areas.
61
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
timestamps when a selected router fails and recovers. Therefore, for the needs of the
experiments, Router 4 that belongs to the backbone OSPF area and 49.0010 IS-IS
accordingly was set to fail at the 3600th, 36000th, and 72000th second of the 24 hours
total simulation. The failures were assumed to last 1 hour, so the timestamps when the
router recovered from the failure were set to the 7200th, 39600th, and 75600th second
accordingly. Such simulation gave the opportunity to examine the time that the dual-
stack networks need to get back to stable functional state depending on the routing
protocol and type of traffic, by measuring average convergence duration times. It is
noted that the selection of Router 4 was made based on the fact that such a failure
literally interrupts all traversing data flows. The OPNET utility is called Failure
Recovery and can be found in the Object Palette. The following figure shows the
mentioned tool.
62
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
specifically, in the traffic-less scenarios the simulation time was set to 10 minutes, as
the metrics calculated were convergence duration and activity as well as routing table
sizes, which are determined clearly on the first few seconds of the simulation. On the
other hand, for the TCP/UDP traffic scenarios, the simulation time was set to 24
hours. This choice was dictated by the fact that more accurate results would be
gathered after a plausible time space, as QoS metrics values stabilize after the
convergence procedure has finished. It is emphasized that a respectable number of
simulations where run for every scenario. In every case, the produced results were
identical, as the traffic patterns follow the same mathematical distribution, and thus,
the results that are presented in the following chapter are derived from one experiment
that is representative of all run simulations. The simulation parameters were chosen
from the following menu.
3.3.7 Results
3.3.7.1 Introduction
This section presents the results that were produced by the simulations in all selected
simulation scenarios. The presented diagrams derive from the exact OPNET Modeler
output.
63
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
The above diagram shows that the network activity that corresponds to the
convergence procedure is completed in less than 10 seconds when IS-IS is configured,
where in the OSPF scenario, it approaches 1 minute. The following diagram presented
gives a more precise view on this fact.
Convergence Duration
64
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
This diagram confirms the convergence activity time results. More specifically, IS-
IS’s blue dot indicates that its convergence duration is 5.4 seconds, where the OSPF’s
red dot is set to 49 seconds. This means that OSPF converges in more than 800%
increased time than IS-IS, which constitutes a massive difference. This result’s
reflection to the actual network performance, is that routing in a newly configured IS-
IS network will be able to start 8 times faster than in a newly configured OSPF
network, fact that adds to the overall speed of the routing protocol.
Figure 32 - Average ABR/Level 1-2 Router Routing Table Size (No Traffic)
65
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
During the traffic-less OSPF and IS-IS dual-stack network simulation scenarios,
routing table sizes were also calculated. As shown in the above diagrams,
measurements were taken in representative Backbone, ABR and Internal routers for
OSPF, and in representative level 2, level 1-2 and level 1 routers for IS-IS
accordingly. The metrics were measured in all different types of routers in order to
draw conclusions for the overall behavior of the protocols regarding the routing table
size, as each type of router contains a different number of route entries dictated by
each protocol’s foundational function. From the results it is obvious that the ABR and
level 1-2 routers have similar routing table size, due to the fact that in both OSPF and
IS-IS these types of routers have similar functions and shoulder the responsibility of
storing each available route for other areas’ destinations. However, the OSPF
backbone router presents a slightly higher average routing table size than the
corresponding IS-IS level 2 one, and the OSPF Internal Router holds almost double
route entries than the corresponding IS-IS level 1 router. The latter is explained by the
default function of IS-IS areas that behave like OSPF totally stubby areas, as level 1
routers only have knowledge of the routes to destinations in their area. Although, the
above presented results examine only the default OSPF and IS-IS network behavior,
and although routing table size is not considered the metric which has the most effect
in network comparison, IS-IS can be considered faster than OSPF depending on these
values too. The importance of this advantage would me more obvious in a larger
topology with a greater number of routes, as routers have to perform a top-down
sequential check in their Routing Table in order to choose the appropriate next-hop
destination when forwarding a packet. Due to this fact, searching a larger routing
table can introduce latency.
66
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
The above diagram shows the CPU utilization of Router 4, a backbone router in the
OSPF scenario, and Level 2 router in the IS-IS one. As it can be seen, OSPF presents
higher CPU utilization values than IS-Is in the start of the simulation, when
convergence procedures are in progress. This may be based on the fact, that the OSPF
backbone router, unlike IS-IS, runs two different routing instances, increasing this
way the CPU overhead. However, after 24 hours of simulation the CPU utilization
values for the two protocols seem to almost match, with the OSPF scenario presenting
67
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
slightly lower CPU utilization. In both cases the CPU utilization stabilizes to
0.0004% for OSPF and to 0.00045% for IS-IS, rather low values which would be
much higher in a more realistic and traffic demanding network. However, OSPF
seems to perform moderately better than IS-IS in terms of CPU utilization, in TCP
traffic dual-stack environments. This OSPF advantage may be beneficial in larger and
more stressed topologies, adding this way to speed and minimizing the danger of a
node failure or overload. Nevertheless, according to the theoretical knowledge, these
results are possibly reversed in larger networks with bigger amounts of traffic.
Throughput
The above diagram reveals a huge differentiation between IS-IS and OSPF dual-stack
network when running TCP traffic. Namely, in the long run, IS-IS achieves a
throughput of more than 190 bps where OSPF touches 120 bps in the end of the
simulation where stabilization has been reached. In percentages, this means that IS-IS
presents at least 58% increased throughput than OSPF’s one. As throughput
constitutes a key metric when determining network performance, IS-IS can be
considered to perform very much better than OSPF in terms of successfully delivered
packets, fact that minimizes packet retransmissions and congestion, and improves the
total network speed.
68
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
End-to-End Delay
The above results diagrams present end-to-end delay measurements for the four IPv4
hosts of the dual-stack network. The first diagram belongs to the OSPF scenario
where the second belongs to the IS-IS one. From the produced results it can be seen
that each host’s traffic flows suffer from a different end-to-end delay value, in both
scenarios. This behaviour is possibly based on the fact that the dual-stack networks
are based on the Best-Effort QoS model, which functions with First-In-First-Out
(FIFO) queues. Router FIFO queues give priority to the traffic that first reach them, so
this end-to-end delay variation can be explained by the fact that each host sends traffic
with a small time difference which defines the priority that they are offered. Another
69
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
reason for this differentiation is the configured of the TCP packets, as the 1500 bytes
long ones may need to be fragmented, adding delay to the total end-to-end delay.
Furthermore, after 24 hours of simulation, end-to-end delay values stabilize to
constant value, allowing the author to calculate a mean value of the metric to facilitate
the OSPF – IS-IS comparison. More precisely, the mean IPv4 end-to-end delay for
OSPF is calculated to approximately 1.6 ms, same as the IS-IS the mean value. From
this measurements, it can be assumed that OSPF and IS-IS perform similarly in terms
of end-to-end delay.
70
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Similarly to the end-to-end delay results that were presented, the above diagrams
show the jitter values for every IPv4 hosts in the OSPF configured dual-stack network
firstly, and the IS-IS configured dual-stack network secondly. The same explanation
as for end-to-end delay variation between different hosts, responds also for the jitter
case. Again, mean values were calculated for the OSPF and IS-IS scenario. These
computed mean jitter value for both OSPF and IS-IS equal approximately 0.4 ms.
Consequently, both protocols seem to behave the same as far as it concerns IPv4 TCP
traffic jitter.
Throughput
A similar picture to the one presented for the IPv4 traffic is also revealed for IPv6
traffic, when it comes to incoming throughput at the receiving server. Although both
routing protocols have a lower throughput compared to the IPv4 one throughout
simulation, the IS-IS throughput value tends to match with the presented IPv4
throughput value in the end of the experiment reaching 180 bps. On the other hand,
OSPF presents significantly lower throughput with its value falling down to 70 bps.
For the OSPF – IS-IS comparison, this fact means that IS-IS has again 157%
increased throughput compared to OSPF throughput for IPv6 TCP traffic flows, a
much greater performance.
71
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
End-to-End Delay
Using the same method as with IPv4 traffic, end-to-end delay mean values were
computed from the four IPv6 peer groups, for both OSPF and IS-IS protocols, by
advising the stabilized values shown in the above diagrams. The resulting mean for
both routing protocols equals 1.7 ms, leading to the conclusion that OSPF and IS-IS
present similar performance regarding delays for IPv6 TCP traffic.
72
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
As seen in the above diagrams, jitter for every IPv6 client was also measured on the
Dual-Stack Server 2 for OSPF and IS-IS scenarios. Computing the mean values of the
four IPv6 clients for each case, it was found that the mean OSPF IPv6 jitter equals
0.39 ms and IS-IS IPv6 jitter equals 0.41 ms. Like the corresponding IPv4
measurements, it can be assumed OSPF performs insignificantly better than IS-IS in
terms of jitter, and that IPv6 jitter in general close to IPv4 jitter.
73
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
The above presented results, show the OSPF and IS-IS convergence behaviour when a
Backbone/Level 2 router fails and recovers three times during the simulation. From
the experimental results it can be seen that both protocols tend to converge faster than
their initial convergence duration, in the long run. Especially OSPF convergence
duration decreases dramatically each time it needs to converge. Nevertheless, IS-IS
achieves a minimum convergence duration of 1 second, where OSPF’s one reaches a
20 seconds minimum value. In this case, OSPF still has a 1900% increased
convergence duration time compared to IS-IS, so it can be considered to perform
immensely worse than the latter even in realistic long term failure-recovery scenarios.
74
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
As shown above, OSPF and IS-IS present almost identical CPU utilization on the
backbone/level 2 Router 4 when running on a dual-stack network which forwards
UDP traffic, reaching a 0.0003% CPU utilization for the specific traffic loads.
Approaching the TCP traffic scenarios, OSPF and IS-IS seem to perform similarly in
terms of CPU utilization but safer results could be drawn in a more traffic stressed
network.
75
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Throughput
The above diagram indicates that IS-IS dominates over OSPF in terms of throughput
for IPv4 UDP traffic flows achieving again a 42% increased throughput value
compared to OSPF. In numbers, IS-IS has a throughput of approximately 200 bps,
where OSPF reaches 140 bps, corresponding to a much less percentage of
successfully received packets.
End-to-End Delay
76
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
The above produced results indicate that IPv4 UDP end-to-end delay times for OSPF
and IS-IS routing protocols are again almost identical. The mean end-to-end delay
time computed from the values of the four different IPv4 hosts, equaled 1.9 ms for the
OSPF and IS-IS scenarios. Consequently, it can be said that both protocols perform
similarly regarding delay times.
77
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Regarding jitter, which is a metric of high importance for UDP based applications, the
mean values calculated from each one of the above diagrams equaled approximately
0.00375 ms for both OSPF and IS-IS. As seen, OSPF and IS-IS jitter values almost
match in the long run of the simulation.
Throughput
78
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
From the above experimental results, the conclusion is that IS-IS achieves a 125%
increased throughput compared to OSPF’s respective value, having a value of 180
bps in comparison to OSPF’s 80 bps. As concluded in all previous throughput
measurements, IS-IS shows superiority over OSPF in terms of throughput.
End-to-End Delay
As far as it concerns IPv6 UDP end-to-end delay, the mean values derived from the
above diagrams equalled approximately 2 ms for OSPF and IS-IS. Like previous end-
to-end delay calculations, both protocols perform equally.
79
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Finally, mean jitter values were calculated from the values derived from the quartet of
IPv6 hosts for both routing protocols. OSPF’s mean jitter value equalled 0.01 ms and
the IS-IS’s corresponding value equalled 0.00725 ms. As it is understood, OSPF and
IS-IS protocols perform homogeneously as far as it regards UDP IPv6 traffic jitter on
dual-stack networks, with IS-IS having a small precedence that could be indicative of
an advantage in larger and more stressed networks.
80
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
As expected, in the Router 4 failure scenario, results are similar to the TCP traffic
scenario, as the convergence activity is depending on the protocol fundamental
functions and not on the traversing traffic. Thus, IS-IS converged again in almost
1900% faster time than OSPF.
81
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Convergence Duration after a Router Failure: The time that a network needs to
converge after a router or link failure is also a vital comparative measure, as failures
happen continuously in real world networks. The effectiveness of a network to
recover in a functional and ready to route state is a guarantee to minimum interruption
of services. According to the produced simulation results, IS-IS achieves to converge
up to 1900% faster than OSPF after a router failure, given the fact that both protocol
convergence times are lower than the initial convergence duration times. The same
explanation as in the previous metric implies here too. The reflection to real network
82
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
scenarios is that IS-IS manages to provide routing services much faster than OSPF
when a router goes down.
Routing Table Sizes: Regarding the Routing Tables Sizes, IS-IS demonstrated again
lower values that could hasten the route lookup procedure and increase protocol
speed. This originated from the fact that IS-IS areas have stub characteristics. Of
course, this advantage reflects again only the default, without modification protocol
functions. However, IS-IS performs better in this field too, especially in dual-stack
where both routing protocols need to store routes for IPv4 and IPv6 destinations.
CPU Utilization: The result of the CPU utilization measured metric was a surprise, as
IS-IS and OSPF performed similarly for all TCP and UDP traffic scenarios. This was
unforeseen, as OSPF was expected to demonstrate higher CPU overhead due to the
fact that it runs an OSPFv2 protocol instance, as well as an OSPFv3 one, that should
result in a double load on CPU. Nevertheless, results on CPU utilization may differ
when larger topologies are implemented and larger amounts of traffic are traversed.
End-to-End Delay and Jitter values: As far as it concerns end-to-end delay and jitter
times, OSPF and IS-IS seem to be almost equally effective, for IPv4, IPv6, TCP and
UDP traffic. Minor differences were presented in jitter for IPv6 traffic, as OSPF
performs slightly better for TCP traffic and IS-IS performs slightly better for UDP
traffic. Even from these small differentiations, IS-IS can be assumed to have a better
potential performance, as low jitter is most important to UDP applications such as IP
telephony and video conferencing. It is believed that IS-IS’s potential advantage
would be more obvious in larger network simulations with real-time application
traffic emulation.
Throughput: Regarding throughput, IS-IS dominated over OSPF on both TCP and
UDP traffic experiments. In the first case, IS-IS achieved 58% higher throughput than
OSPF for the IPv4 clients’ traffic flows, and 157% higher throughput for the IPv6
clients’ traffic flows. In the second case, OSPF seems to slightly minimize this
difference but again, the corresponding IS-IS throughput values appear to be 42% and
125% increased to OSPF’s values accordingly. These statistics give an important
advantage to IS-IS compared to OSPF, as low throughput means a lower percentage
of successfully delivered packets that can be interpreted to retransmissions,
congestion and of course latency. It is noted, that analogous statistics were delivered
from researchers when comparing the two protocols in larger IPv4 ISP networks, with
the throughput values being different (more than 600 bps for IS-IS and less than 100
bps for OSPF), but with the same relative difference.
In general, the produced simulation statistics show that IS-IS performs equally and in
various metrics much better than OSPF when configured on a dual-stack enterprise
network. This comes to add to the already published work about the two protocols
comparison that favored IS-IS in most cases. The results of this paper’s simulations
should be taken under considerations by companies and organizations trying to create
dual-stack networks in order to accommodate the IPv6 transition. Thorough
conclusions will be included in the final chapter of the dissertation.
83
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
3.4 Conclusion
The Implementation chapter was completely dedicated to the experimental practical
work of the project. Initially, the simulation software that was used for the
experiments was presented and its selection was justified. Subsequently, a theoretical
background for the measured network performance metrics was given and the
network topologies used during the simulations were presented. Moreover, a thorough
presentation and justification of the different simulated network scenarios was
reported, together with instructions on the way the simulation tool was exploited.
Additionally, the exact result diagrams derived from the network simulator were
presented along with a brief critical comment, and eventually, comprehensive tables
including overall simulation results were created. Finally, explanation of the results’
impact in the OSPF and IS-IS dual-stack network performance was given in order to
expedite the project’s conclusions.
84
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
4 Conclusions
4.1 Evaluation of the Project
Evaluating the dissertation project, it is believed that the main set aims and objectives
were accomplished successfully, despite any obstacles that came up.
As far as it concerns the literature review about the OSPF and IS-IS
performance evaluation, several difficulties were met during the project’s
research. One important barrier to the progress, was the fact that the research
on routing protocols’ performance comparison over IPv4-IPv6 coexistence
environments was minimal, and specifically research related to OSPF and IS-
IS approached zero. Consequently published scientific work review on the
OSPF – IS-IS comparison was limited to studies regarding theoretical contrast
of the two protocols based on their fundamental functions, and on a single
paper that refers to the performance evaluation of the two protocols over IPv4
ISP networks. Nevertheless, the lack of similar research over IPv6, IPv4-IPv6
coexistence networks as well as over enterprise networks, confirms the
importance of the project’s conducted experiments and their contribution to
the scientific research.
85
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Moreover, it is believed that this paper can be a starting point for further
research on routing protocol comparison over IPv4/IPv6 or IPv6-only
environments, as it presents original experimental results on a field where
research is at its very beginning.
In a more general framework, OSPF, IS-IS as well as other effective routing protocols
such as EIGRP can be tested for dual-stack, but also for other IPv6 transition
techniques or a combination of some of them, as it is believed that such mixed
86
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
environments will be wide spread too. Finally, for the future, research should focused
on the performance of the protocols on IPv6-only environments in order to facilitate
readiness in selecting and further developing the appropriate routing protocol on time.
87
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
References
A. Lindem, S. M. (2010, April). Support of Address Families in OSPFv3. Internet
Requests for Comments, RFC 5838.
Callon, R. W. (1990, December). Use of OSI IS-IS for Routing in TCP/IP and Dual
Environments. Internet Requests for Comments, RFC 1195.
Dai, K. (2011). IPv4 to IPv6 Transition Research Based on the Campus Network.
2011 International Symposium on Intelligence Information Processing and Trusted
Computing.
David Murray, T. K. (2012). The State of Enterprise Network Traffic in 2012. 18th
Asia-Pacific Conference on Communications (APCC) (pp. 179 - 184 ). Jeju Island :
IEEE.
Eiji Oki, R. R.-C. (2012). Advanced Internet Protocols, Services, and Applications.
Wiley.
Hopps, C. (2008, October). Routing IPv6 with IS-IS. Internet Requests for Comments,
RFC 5308.
88
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Loshin, P. (2004). IPv6 : theory, protocol, and practice, Second Edition. Morgan
Kaufmann.
Neha Grang, A. G. (2013). Compare OSPF Routing Protocol with other Interior
Gateway Routing Protocols. International Journal of Engineering, Business and
Enterprise Applications (IJEBEA), 13(147), pp. 166-170.
89
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
90
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Appendix 1
Project Proposal
1. Student details
Please suggest a title for your proposed project. If you have worked with a supervisor
on this proposal, please provide the name. NB you are strongly advised to work with a
member of staff when putting your proposal together.
91
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
2013) Routing is facilitated by the use of Routing Protocols which are subdivided in
two main categories: Distance vector and link-state Protocols. Link-state protocols
are widely deployed in organizations due to the fact that they are more ressistant to
bad routing decisions in opposition to Distance-vector protocols, as routers contain a
complete topological map of the network. (Doyle, 1998) Among the Link-state
protocol family, two protocols have been competing each other over time: OSPF and
IS-IS.
OSPF(Open Shortest Path First) runs on the dominant TCP/IP model and uses a
hierarchical structure by dividing an Autonomous System into areas, in order to
make routing more efficient, limiting the database of routers in the borders of each
area. Therefore, a backbone area is defined so that every other area has to be
connected with it via Area Border Routers (routers with interfaces both to the
Backbone and to another area). Routers that participate in the OSPF scheme
exchange Hello Packets with neighbors in order to establish routing relationships and
synchronize their databases. At regular intervals, routers send Link-State Updates to
other routers so that eventually all routers in each area hold the same topological
information map of the local network. When the network map has been build,
Dijkstra algorithm is used to calculate the shortest-path to each destination address.
(Thorenoor, 2010)
On the other hand, OSPF’s competitor, IS-IS(Intermediate System to Intermediate
System) protocol doesn’t carry routing information over IP as it is itshelf a Layer 3
protocol, and is completely based on the older OSI model. IS-IS uses a completely
different terminology by defining the devices that are participating in the routing
process, as End Systems and Intermediate Systems. More than that, instead of using
IP addressing, it uses the CLNP addressing scheme by assigning NSAP addresses to
each node and not each interface. However, IS-IS is neutral regarding the type of
addresses that it can carry, meaning that also carry IP addresses. Like OSPF, IS-IS is
hierarchical, allthough the definition of areas is different, and no backbone area is
needed in the design. Intermediate Systems that are participating in IS-IS routing, are
defined as Level 1, Level 2 and Level 1/2 Intermediate Systems, and thus, the
procedure of routing is devided to Routing within areas and Routing between areas.
In IS-IS, Intermediate Systems form routing relationships with neighbors using Hello
Packets, and synchronize their databases using Link-State Packets and Sequence
Number Packets. (Shamim, 2002)
Both OSPF and IS-IS have been successful and preferred by ISPs and organization
for many years, and a lot of research has been made to determine which one is more
efficient and scalable. However, the advent of IPv6 addressing has been anoher
differentiating factor between the two, that can make one preffered than the other for
enterprise networks too. On one hand, OSPF had to be completely redesigned to a
new version (OSPFv3) in order to support IPv6. As far as it regards dual IPv4 and
IPv6 enviroments, both OSPFv2 and OSPFv3 have to be used at the same time. On
the other hand, IS-IS only needed to add another TLV(a parameter in the LSPs) to
carry IPv6 prefixes (Kalogeras, 2007), making this way able to run efficiently in
IPv4 and IPv6 networks. This project aims to investigate what impact the use of IPv6
has on both protocols performance, and determine if migration from one to another is
recommended for the dual-stack networks, as IPv4-IPv6 coexistence environments
will dominate for a long time until the final complete IPv6 reconfiguration.
92
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
6. References
Please supply details of all the material that you have referenced in sections 6 and 7
above. You should include at least three references, and these should be to high
quality sources such as refereed journal and conference papers, standards or white
papers. Please ensure that you use a standardised referencing style for the presentation
of your references, e.g. APA, as outlined in the yellow booklet available from the
School of Computing office and
http://www.soc.napier.ac.uk/~cs104/mscdiss/moodlemirror/d2/2005_hall_referencing.
pdf
Doyle, J. (1998). Routing TCP/IP. Cisco Press.
Kalogeras, D. (2007). Open Shortest Path First v3. 2nd South Eastern Europe 6DISS
Workshop. Plovdiv,Bulgaria.
Lammle, T. (2013). CCNA R&S Study Guide. Sybex.
Shamim, F. (2002). Troubleshooting IP Routing Protocols. Cisco Press.
Thorenoor, S. G. (2010). Communication Service Provider’s choice between OSPF
and IS-IS Dynamic Routing Protocols and implementation criteria Using OPNET
Simulator. Second International Conference on Computer and Network Technology.
93
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
7. Ethics
If your research involves other people, privacy or controversial research there may be
ethical issues to consider (please see the information on the module website). If the
answer below is YES then you need to complete a research Ethics and Governance
Approval form (available on the website:
http://www.ethics.napier.ac.uk).
Does this project have any ethical or NO
governance issues related to working
with, studying or observing other people?
(YES/NO)
8. Supervision timescale
Please indicate the mode of supervision that you are anticipating. If you expect to be
away from the university during the supervision period and may need remote
supervision please indicate.
Please save this file using your surname, e.g. macdonald_proposal.doc, and e-mail it
to the module leader in time for the next proposal deadline.
94
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Appendix 2
Project Time -Plan
95
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Appendix 3
Simulation Scenarios’ IPv4 Addressing
96
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
Appendix 4
Indicative OSPF Backbone Router (4) Routing Tables
97
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
98
Performance Comparison of OSPF and IS-IS Routing Protocols in Dual-Stack Enterprise Networks
Paris – Alexandros Roussinos – 40134490 – MSc Advanced Networking
99