Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Analytical models

Articles 1 - 1 of 1

Full-Text Articles in Information Security

Evaluation Of Routing Protocols With Ftp And P2p, Tyler Wilson, Eman Abdelfattah, Samir Hamada May 2018

Evaluation Of Routing Protocols With Ftp And P2p, Tyler Wilson, Eman Abdelfattah, Samir Hamada

School of Computer Science & Engineering Faculty Publications

One of the decisions that need to be made when designing and configuring a computer network in which routing protocol should be used. This paper presents a simulation of a high load File Transfer Protocol (FTP) Application and a high load Peer to Peer (P2P) Application using Riverbed Academic Modeler 17.5. The simulation is configured and run in a World environment to replicate a global network. Each simulation employs either RIP, OSPF, or EIGRP routing protocol. The queuing delay, throughput, link utilization, and IP packets dropped are used as performance parameters to determine which routing protocol is the most efficient …