Show simple item record

AuthorAbu Al-Saud, Khalid
AuthorTahir, Hatim Mohd
AuthorEl-Zoghabi, Adel A.
AuthorSaleh, Mohammad
Available date2024-03-26T11:56:48Z
Publication Date2008
Publication NameProceedings of the 2008 International Conference on Security and Management, SAM 2008
ResourceScopus
URIhttp://hdl.handle.net/10576/53541
AbstractRouting is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this paper, we evaluate the performance of EIGRP routing protocol in the case of secured and non-secured routing traffic. This is done through studying and analyzing EIGRP routing traffic with and without security rules. A network model of four Cisco routers, from both software and hardware perspectives, has been employed and a traffic generation and analysis tools have been developed and used to generate traffic data and to measure the delay for performance evaluation. The results show that the average delay in the secured case can become significantly larger than the unsecured case even in steady state conditions. The differences between the delays are exponential and reach a steady state towards the end of the experiment.
Languageen
Publisherdblp computer science bibliography
SubjectEIGRP
Performance Evaluation
Routing Updates
Secured Routing Updates
TitlePerformance evaluation of secured versus non-secured EIGRP routing protocol
TypeConference Paper
Pagination292-297


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record