Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 256-259.

Previous Articles     Next Articles

Research and Analysis on Differences of Domain Routing Protocol OSPF and IS-IS

LI Yan-gang, DENG Wen-ping, WANG Hong and LIU Ya-ping   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Currently,OSPF is the most widely used domain routing protocol in the world,but the advantages of IS-IS are increasingly getting more attention.This article compares OSPF and IS-IS on the working mechanism,the convergence,scalability and security in detail.The practical analysis and experimental results show that OSPF and IS-IS have the advantages of fast convergence and safety features.OSPF has more abundant routing strategies,variety of regional types,PDU and circuit types.OSPF is more suitable for small and medium-sized network and enterprise using.IS-IS is relatively more simple,stable and scalability.In the massive route objective circumstances,IS-IS is more efficient than OSPF and more suitable for deployment of network operators and ISP.

Key words: Domain routing protocol,IGP,OSPF,IS-IS

[1] Doyle J.OSPF and IS-IS Choosing an IGP for Large-Scale Networks[M].孙余强,译.北京:人民邮电出版社,2014
[2] 谢希仁.计算机网络(4版)[M].北京:电子工业出版社,2003:206-219
[3] Oran D,et al.IETF RFC1142.D.OSI IS-IS Intra-domain Routing Protocol [S].1990,2
[4] Smit H,Li T.IETF RFC 3784.Intermediate System to Intermediate System (IS-IS) Extensions for Traffic Engineering (TE) [S].2004
[5] Li T,tkinson R.IETF RFC 5304.IS-IS Cryptographic Authentication[S].2008,10
[6] Li T,Atkinson R.IETF RFC 3567.Atkinson.Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication[S].2003,7
[7] Yu J.ISO 10589.IS-IS Technical Document[S].2008,2
[8] Gredler H,Goralski W.The Complete IS-IS Routing Protocl[M].Berlin:Springer-Verlag,2004
[9] Jacobson D.Introduction to Network Security[M].迎礼友,赵红宇,译.北京:电子工业出版社.2011
[10] Parkhurst B.Routing first-step[M].刘红伟,译.北京:人民邮电出版社,2005:125-178
[11] Thomas M,Thomas II.CCIE#9360.OSPF Network Design Solutions(Second Edition)[M].罗洋,CCIE#25318,译.北京:人民邮电出版社,2013
[12] 王之梁,尹霞,范伦挺,施新刚.网络路由收敛性能测试研究[J].厦门大学学报,2007(S2):20-21
[13] Parkhurst W R,Ph D.CCIE#2969.Cisco OSPF Command and Configuration Handbook[M].孙余强,译.北京:人民邮电出版社,2012
[14] Sridharan A,Guerin R,Diot C.Achieving Near-Optimal Traffic Engineering Solutions for Current OSPF/IS-IS Network[J].Transactions on Network,2005,13(2):234-247

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .