Performance Evaluation of Secured versus Non-Secured EIGRP Routing Protocol
نویسندگان
چکیده
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this paper, we evaluate the performance of EIGRP routing protocol in the case of secured and non-secured routing traffic. This is done through studying and analyzing EIGRP routing traffic with and without security rules. A network model of four Cisco routers, from both software and hardware perspectives, has been employed and a traffic generation and analysis tools have been developed and used to generate traffic data and to measure the delay for performance evaluation. The results show that the average delay in the secured case can become significantly larger than the unsecured case even in steady state conditions. The differences between the delays are exponential and reach a steady state towards the end of the experiment.
منابع مشابه
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this paper, we co...
متن کاملSimulation Based EIGRP over OSPF Performance Analysis
Routing protocol is taking a vital role in the modern communication networks. A routing protocol is a protocol which is responsible to determine how routers communicate with each other and forward the packets through the optimal path to travel from a source node to a destination node. Among the routing protocols, Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (O...
متن کاملAn Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communication and Minimized Power Consumption
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery ...
متن کاملAdvanced Secured Model for On-Demand Distance Vector Routing Protocol in Manet
A mobile ad-hoc network is a group of mobile nodes which can communicate between them without the help of any centralized infrastructure. It consists of number of mobile nodes with exceptional quality of selfmanaging and self-organizing network. Military operations and disaster management are the important applications of MANET. In preventing routing attacks routing protocols plays a significan...
متن کاملEnhanced DSR for MANET with Improved Secured Route Discovery and QoS
Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless network. Due to absence of any fixed node, each node acts as a router, providing routing capability for the MANET. Various protocols for discovery of routes between any two MANET nodes have been designed. These protocols are...
متن کامل