Dynamic Routing with Security Considerations full report
#1

Dynamic Routing with Security Considerations
Abstract:
Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, An analytic study on the proposed algorithm is presented, and experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.
Algorithm / Technique used:
Distance-vector-based algorithm for dynamic routing.

Algorithm Description:
A distance-vector-based algorithm for dynamic routing to improve the security of data transmission. We propose to rely on existing distance information exchanged among neighboring nodes (referred to as routers as well in this paper) for the seeking of routing paths. In many distance-vector-based implementations, e.g., those based on RIP, each node Ni maintains a routing table in which each entry is associated with a tuple and Next hop denote some unique destination node, an estimated minimal cost to send a packet to t, and the next node along the minimal-cost path to the destination node, respectively.


Existing System:

Existing work on security-enhanced data transmission includes the designs of cryptography algorithms and system infrastructures and security-enhanced routing methods. Their common objectives are often to defeat various threats over the Internet, including eavesdropping, spoofing, session hijacking, etc. Among many well-known designs for cryptography based systems, the IP Security (IPSec) and the Secure Socket Layer (SSL) are popularly supported and implemented in many systems and platforms. Although IPSec and SSL do greatly improve the security level for data transmission, they unavoidably introduce substantial overheads, especially on gateway/host performance and effective network bandwidth. For example, the data transmission overhead is 5 cycles/byte over an Intel

Pentium II with the Linux IP stack alone, and the overhead increases to 58 cycles/byte when Advanced Encryption Standard (AES) is adopted for encryption/decryption for IPSec.


Proposed System:

We will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks, without introducing extra control messages.
Hardware Requirements

SYSTEM : Pentium IV 2.4 GHz
HARD DISK : 40 GB
FLOPPY DRIVE : 1.44 MB
MONITOR : 15 VGA colour
MOUSE : Logitech.
RAM : 256 MB
KEYBOARD : 110 keys enhanced.

Software Requirements


Operating system :- Windows XP Professional
Front End : - Java Technology.
read full report
http://ntur.lib.ntu.edu.tw/bitstream/246...8/1/15.pdf
http://scribddoc/23930131/Dynamic-Routing-With-Security-Considerations
http://whitepapers.zdnetabstract.aspx?docid=1155287
http://zdnetasiawhitepaper/dynamic-routing-with-security-considerations_wp-1155287.htm
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dynamic routing security consideration ppt for pdf for free, dynamic routing report doc, seminar dynamic routing with security considerations, dynamic routing with security consideration pdf, dynamic routing with security considerations ppt download, is dynamic routing with security considerations implemented, slides on dynamic routing with security considerations,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Dynamic Routing with Security Considerations full report - by project topics - 01-04-2010, 10:46 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,817 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 47,127 08-01-2018, 02:33 PM
Last Post: RaymondGom
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,644 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 869 14-02-2017, 04:56 PM
Last Post: jaseela123d
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,899 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 43,110 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Employee Cubicle Management System full report computer science technology 4 5,206 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 26,604 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,573 29-11-2015, 02:37 PM
Last Post: Guest

Forum Jump: