Performance evaluation of secured versus non-secured EIGRP routing protocol

Routing is the process of forwarding data across an inter-network from a designated source to a final destination.Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special car...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Saud, Khalid Abu, Mohamad Tahir, Hatim, El-Zoghabi, Adel A., Saleh, Mohammad
Format: Conference or Workshop Item
Language:English
Published: 2008
Subjects:
Online Access:http://repo.uum.edu.my/15127/1/00b49a.pdf
http://repo.uum.edu.my/15127/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Routing is the process of forwarding data across an inter-network from a designated source to a final destination.Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints.In this paper, we evaluate the performance of EIGRP routing protocol in the case of secured and non-secured routing traffic.This is done through studying and analyzing EIGRP routing traffic with and without security rules.A network model of four Cisco routers, from both software and hardware perspectives, has been employed and a traffic generation and analysis tools have been developed and used to generate traffic data and to measure the delay for performance evaluation.The results show that the average delay in the secured case can become significantly larger than the unsecured case even in steady state conditions.The differences between the delays are exponential and reach a steady state towards the end of the experiment.