Performance evaluation of secured versus non-secured EIGRP routing protocol
Routing is the process of forwarding data across an inter-network from a designated source to a final destination.Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special car...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2008
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/15127/1/00b49a.pdf http://repo.uum.edu.my/15127/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Routing is the process of forwarding data across an inter-network from a designated source to a final destination.Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints.In this paper, we evaluate the performance of EIGRP routing protocol in
the case of secured and non-secured routing traffic.This is done through studying and analyzing EIGRP routing traffic with and without security rules.A network model of four Cisco routers, from both software and hardware
perspectives, has been employed and a traffic generation and analysis tools have been developed and used to generate traffic data and to measure the delay for performance evaluation.The results show that the average delay in the secured case can become significantly larger than the unsecured case even in steady state conditions.The differences between the delays are exponential and
reach a steady state towards the end of the experiment. |
---|