SlideShare a Scribd company logo
1 of 7
Download to read offline
Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71
www.ijera.com 65 | P a g e
Secure Routing and Identifying Hacking In P2p System
Gowsiga Subramaniam*1
, Senthilkumar Ponnusamy 2
*1
Assistant Professor, Saveetha Engineering College, Chennai.
2
Professor&Head, Information Technology, SKR Engineering College, Chennai.
ABSTRACT
Packet forwarding is the procedure to route the packet from source to destination via routers. Getting the
systems ip address in a LAN and decides the source, destination and the intermediate systems for our routing
process. Using any database form the routing table with columns like source address, destination address and
router addresses. After creating the routing table enters the ip address in the respective columns. As per this
procedure by comparing ip addresses in the routing table the packet will be forward to next ip address. The ip
addresses in the routing table, are the path selected by the user according to the respective path the packet will
be forward and finally reach destination. Source generate a packet and forward to ip address which is in router
ip as per in routing table. Source need to know whether the packet received by authenticated router or not thus
each router send an acknowledgement packet to the source. Thus each and every router follows the same
procedure to avoid unauthenticated router access in a routing process. As per acknowledgement received from
each router source finds out the unauthenticated router access. As per security concern added the signature
scheme in a routing process. Before send the packet, source generates the signature with peer ID of destination
then forwards the packet to the ip address as per routing table. The packet will be decrypted only the system
matched with the signature otherwise just forwards the packet to the next system. Tracer routing is to find out
the unauthorized router access in a routing process. This is verifying by getting acknowledgment from each and
every router in the routing process by a source. Then source compare the acknowledgement with the predefined
routing table if any ip mismatch then it will be consider as unauthorized ip.
Keywords: P2P, Route Selection, Packet Forwarding, Hacking
I. INTRODUCTION
Client-server computing or networking is a
distributed application architecture that partitions
tasks or workloads between service providers
(servers) and service requesters, called clients. Often
clients and servers operate over a computer network
on separate hardware. A server machine is a high-
performance host that is running one or more server
programs which share its resources with clients. A
client does not share any of its resources, but requests
a server's content or service function. Clients
therefore initiate communication sessions with
servers which await (listen to) incoming requests.
The client-server model has become one of
the central ideas of network computing. Many
business applications being written today use the
client-server model. The most basic type of client-
server architecture employs only two types of hosts:
clients and servers. This type of architecture is
sometimes referred to as two-tier. It allows devices to
share files and resources. The two tier architecture
means that the client acts as one tier and application
in combination with server acts as another tier.
Database debugging is a server-based report
generation software system. It can be used to prepare
and deliver a variety of interactive reports. It is
administered via a LAN interface. Reporting services
features a LAN services interface to support the
development of custom reporting applications.
The reports tool is a way to provide
commonly used database queries in a regularly
updated, easy-to-use form. It is a companion to the
SQL Query service. Computer program that is used
to create statistical reports based upon the
information in a computer file. Most report generator
programs are written for use by people other than
programmers. The simplest report generators create
reports that illustrate the relationship between only
two variables in the database.
II. SYSTEM ANALYSIS
Peer-to-Peer (P2P) overlay systems offer a
substrate for the construction of large scale and
distributed applications. However, they pose new
challenge for security. Secure assignment node
identifiers and secure routing maintenance can be
achieved by minimizing the probability that nodes are
controlled by attackers. However, an adversary can
prevent correct message delivery throughout the
overlay. When one or more peers between initiator
and target are malicious, a message might be
dropped, polluted or forwarded to a wrong place.
Previous works on secure message routing
concentrated mainly on employing redundancy to
RESEARCH ARTICLE OPEN ACCESS
Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71
www.ijera.com 66 | P a g e
increase the probability of a message being delivered
successfully the target. The goal of message routing
is to maximize the probability of at least one copy of
the correct message reach the correct target. Presents
a multiple redundant router algorithm for Pastry.
Initiator sends a query to all of its neighbors in Pastry
overlay. Then each neighbor forwards the query
toward the target. If at least one copy of query arrive
target, the query is considered successfully delivered.
However, it will inevitably cause congestion and
burden system, especially in a bandwidth intensive
system. Disrupt the message routing, or take
advantage of locality to control some routes. Pretend
to be the target
Disadvantage:
 Destination once receives the packet makes key
match if accepted then conclude their no more
hacking in the routing.
 No approaches followed to detect the route
hacking.
III. METHODOLOGY
To make the routing strategy perform best,
we present an efficient routing strategy, called tracer
routing. Tracer routing enables the initiator to trace
the whole routing process. In each step, the
intermediate peer x not only forwards the query to the
next hop, but also returns the IP address of the next
hop to initiator. With the additional information, the
initiator has the knowledge about the whole routing
process. Each intermediate peer directly forwards the
query to the next hop, thus the query can be routed
quickly. Combined with the peer-ID based signature
scheme, tracer routing offers a good tradeoff between
routing efficiency and security. We propose to
address routing message attack by combined tracer
routing with Peer-ID based signature scheme. Note
that Peer-ID based signature scheme is not necessary.
Any techniques of verifying the Peer-ID of remote
peer can work with tracer routing.
Advantage:
 Source side detection and identification of
hacking gives more security of data transfer.
 With the additional information, the initiator has
the knowledge about the whole routing process.
 Each intermediate peer directly forwards the data
to the next peer, thus the data can be routed
quickly.
IV. STRUCTURED P2P NETWORK
SETUP
A peer-to-peer (abbreviated to P2P)
computer network is one in which each computer in
the network can act as a client or server for the other
computers in the network, allowing shared access to
various resources such as files, peripherals, and
sensors without the need for a central server. P2P is a
distributed application architecture that partitions
tasks or workloads among peers. Structured P2P
network contains self organizing peer’s network.
Each peer should be initialized with respective IP
address and port number for communication like files
sharing or messaging.
V. ROUTING SELECTION AND
PACKET FORWARDING
Routing tables are generally not used
directly for packet forwarding in modern router
architectures; instead, they are used to generate the
information for a smaller forwarding table which
contains only the routes which are chosen by the
routing method as preferred routes for packet
forwarding. Whenever a node or system needs to
send data to another node on a network, it must know
where to send it, first. If the node cannot directly
connect to the destination node, it has to send it via
other nodes along a proper route to the destination
node. Path selection between source and
destination is the procedure to follow on this module.
Getting the systems ip address in a structured
network and decides the source, destination and the
trusted intermediate systems for our routing process.
Packet forwarding is the procedure to route
the packet from source to destination via routers. As
per this procedure by comparing ip addresses in the
routing table the packet will be forward to next ip
address. The ip addresses in the routing table, are the
path selected by the user according to the respective
path the packet will be forward and finally reach
destination.
VI. ACKNOWLEDGEMENT PROCESS
Source generate a packet and forward to ip
address which is in router ip as per in routing table.
Source need to know whether the packet received by
authenticated router or not, thus each data received
router’s peer ID must be automatically send as
acknowledgement to the source. Thus each and every
router follows the same procedure to avoid
unauthenticated router access in a routing process. As
per acknowledgement received from each router
source finds out the unauthenticated router access.
VII. PEER ID BASED SIGNATURE
SCHEME
As per security concern added the signature
scheme in a routing process. Before send the packet,
source generates the signature with peer ID of
destination then forwards the packet to the ip address
as per routing table. The packet will be decrypted
only the system matched with the signature otherwise
just forwards the packet to the next system. We are
Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71
www.ijera.com 67 | P a g e
using DES data encryption standard cryptography
algorithm for secure data transfer.
VIII. TRACER ROUTING APPROACH
To make the routing strategy perform best,
we present an efficient routing strategy, called tracer
routing (below diagram). Tracer routing enables the
initiator to trace the whole routing process. In each
step, the intermediate peer x not only forwards the
query to the next hop, but also returns the IP address
of the next hop to initiator. With the additional
information, the initiator has the knowledge about the
whole routing process. Each intermediator peer
directly forwards the query to the next hop, thus the
query can be routed quickly. Combined with the
peer-ID based signature scheme, tracer routing offers
a good tradeoff between routing efficiency and
security. Tracer routing is to find out the
unauthorized router access in a routing process. This
is verifying by getting acknowledgment from each
and every router in the routing process by a source.
Then source compare the acknowledgement with the
predefined routing table if any ip mismatch then it
will be consider as unauthorized ip.
IX. IMPLEMENTATION
When the initial design was done for the
system, the client was consulted for the acceptance of
the design so that further proceedings of the system
development can be carried on. After the
development of the system a demonstration was
given to them about the working of the system. The
aim of the system illustration was to identify any
malfunction of the system.
After the management of the system was
approved the system implemented in the concern,
initially the system was run parallel with existing
manual system. The system has been tested with live
data and has proved to be error free and user friendly.
Implementation is the process of converting a new or
revised system design into an operational one when
the initial design was done by the system; a
demonstration was given to the end user about the
working system. This process is uses to verify and
identify any logical mess working of the system by
feeding various combinations of test data.
After the approval of the system by both end
user and management the system was implemented.
A product software implementation method is a
blueprint to get users and/or organizations running
with a specific software product. The method is a set
of rules and views to cope with the most common
issues that occur when implementing a software
product: business alignment from the organizational
view and acceptance from the human view.
The implementation of product software, as
the final link in the deployment chain of software
production, is in a financial perspective of a major
issue. The Implementation methodology includes
four phases - Discovery, System Development, User
Acceptance Testing and Production Rollout. It’s easy
to be overwhelmed by slick marketing presentations,
particularly when the sales force is talking about
things that most people don’t completely understand.
Showmanship gets in the way of real capabilities.
Unless the review team is judging each vendor
against the same list of needs, with the same
understanding of the significance of each rating,
“likeability” can win over capability.
These implementation phases are designed
to provide clients with a seamless transition from an
existing electronic or paper-based system to Sigmund
while ensuring all aspects of a client’s operations are
accounted for by the software. The Sigmund project
team, comprised of individuals with clinical, billing
and operations experience, is equipped with the skills
and tools to manage the entire process from system
requirements gathering to deployment. Sigmund
provides various levels of support, depending on
client needs, including client-side Project
Management.
The Discovery Phase is preceded by a
Project Kick-off Work-session that includes
application demonstrations, completion and review of
requirements and configuration questionnaires,
identification of key client documentation, as well as
consultation on possible process re-engineering
needs. The Project Kick-off provides your
organization with the opportunity to not only
introduce the Sigmund Project Team to your
organization, but also to define and structure your
organization’s Project Team.
System implementation is made up of many
activities. The six major activities used in project
development are as follows.
Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71
www.ijera.com 68 | P a g e
X. FLOW DIAGRAM XI. SAMPLE SNAPSHOTS
Route Configuration:
Sou
rce
Routing
Table
Message or
File Sending
Next
Router
Chec
k
DestI
P ==
Curre
nt IP
Message or File
Delivered
Reach
Destination
Cryptogr
aphy
Send
Ack to
source
Cryptogr
aphy
Ip
Addres
s
Encrypt
ion
Decrypt
ion
Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71
www.ijera.com 69 | P a g e
Route Hacking
SAMPLE CODING
Source Form:
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Text;
using System.Windows.Forms;
using System.Net.Sockets;
using System.IO;
using System.Threading;
using System.Net;
using System.Xml;
using System.Security.Cryptography;
using System.Data.OleDb;
using MySql.Data.MySqlClient;
using MySql.Data.Types;
namespace MessageRouting
{
public partial class SourceDesign : Form
{
System.Net.Sockets.TcpClient clientSocket = new
System.Net.Sockets.TcpClient();
NetworkStream serverStream;
private StreamWriter clientStreamWriter;
private static byte[] key = { };
private static byte[] IV = { 18, 52, 86, 120, 144,
171, 205, 239 };
private const string EncryptionKey =
"abcdefgh";
private MySqlConnection dataConnection;
public SourceDesign()
{
InitializeComponent();
}
private void SourceDesign_Load(object sender,
EventArgs e)
{
}
private void setDBConnection()
{
try
{
string connectionStr =
"server=localhost;database=secure;uid=root;passwor
d=root";
dataConnection = new
MySqlConnection(connectionStr);
dataConnection.Open();
}
catch (Exception e)
{
MessageBox.Show(e.StackTrace.ToString());
}
}
public static string toEncrypt(string
stringToEncrypt)
{
try
{
key =
System.Text.Encoding.UTF8.GetBytes(EncryptionK
ey);
DESCryptoServiceProvider des = new
DESCryptoServiceProvider();
byte[] inputByteArray =
Encoding.UTF8.GetBytes(stringToEncrypt);
MemoryStream ms = new
MemoryStream();
CryptoStream cs = new CryptoStream(ms,
des.CreateEncryptor(key, IV),
CryptoStreamMode.Write);
cs.Write(inputByteArray, 0,
inputByteArray.Length);
cs.FlushFinalBlock();
return
Convert.ToBase64String(ms.ToArray());
}
catch (Exception ex)
{
}
return "";
}
private void btnSend_Click(object sender,
EventArgs e)
{
try
{
Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71
www.ijera.com 70 | P a g e
MySqlDataReader dataReader;
string routeString = "";
string cmdStr = "Select * FROM routetable
where destination= '" + txtIpaddress.Text + "'";
setDBConnection();
MySqlCommand oleCmd;
oleCmd = new MySqlCommand(cmdStr,
dataConnection);
dataReader = oleCmd.ExecuteReader();
while ((dataReader.Read()))
{
routeString =
dataReader.GetValue(2).ToString();
}
string[] nextRoute = routeString.Split(new
char[] { ';' });
string[] nextIP = nextRoute[0].Split(new
char[] { ',' });
string hostName =
System.Net.Dns.GetHostName();
string myIP =
System.Net.Dns.GetHostByName(hostName).Addres
sList.ToString();
clientSocket = new
System.Net.Sockets.TcpClient();
clientSocket.Connect(nextIP[0],
Int32.Parse(nextIP[1]));
serverStream = clientSocket.GetStream();
clientStreamWriter = new
StreamWriter(serverStream);
clientStreamWriter.AutoFlush = true;
if (txtPath.Text.Length > 0)
{
FileStream stream = new
FileStream(txtPath.Text, FileMode.Open,
FileAccess.Read);
StreamReader reader = new
StreamReader(stream);
String ipAddress = reader.ReadLine();
reader.Close();
stream.Close();
txtMessage.Text = ipAddress;
}
string encStr =
toEncrypt(txtMessage.Text);
System.Net.IPAddress oAddr;
string sAddr;
string dnshostName = Dns.GetHostName();
oAddr = new
System.Net.IPAddress(System.Net.Dns.GetHostByN
ame(dnshostName).AddressList[0].Address);
sAddr = oAddr.ToString();
String ipValue = sAddr + "," +
PeerProcess.localPort;
clientStreamWriter.WriteLine("" + ipValue
+ "?" + routeString +"#"+ encStr.Length + "&" +
encStr + ":" + routeString);
clientSocket.Close();
}
catch (Exception ex)
{
Console.WriteLine(ex.StackTrace);
MessageBox.Show(ex.StackTrace.ToString());
}
}
private void btnClose_Click(object sender,
EventArgs e)
{
Visible = false;
}
private void btnPath_Click(object sender,
EventArgs e)
{
DialogResult digResult =
openFile.ShowDialog();
txtPath.Text = openFile.FileName.ToString();
}
}
}
XII. CONCLUSION AND SCOPE FOR
FURTHER WORK
Peer-to-peer overlay networks, both at the
network layer and at the application layer. We have
shown how techniques ranging from cryptography
through redundant routing to economic methods can
be applied to increase the security, fairness, and trust
for applications on the p2p network. Because of the
diversity of how p2p systems are used, there will be a
corresponding diversity of security solutions applied
to the problems. has presented the design and
analysis of techniques for secure node joining,
routing table maintenance, and message forwarding
in structured p2p overlays. These techniques provide
secure routing, which can be combined with existing
techniques to construct applications that are robust in
the presence of malicious participants.
In peer to peer system, load balancing is a
technique to distribute workload evenly across two or
more computers, network links, CPUs, hard drives, or
other resources, in order to get optimal resource
utilization, maximize throughput, minimize response
time, and avoid overload. In our system we
implement the system to check the overload and
retransmit the files to sub nodes in the network. As
future enhancement for client server communication
we will add symmetric key sharing as introduce
security. We don’t know the client is trusted one so
request and response between client and server must
flow under key sharing.
Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71
www.ijera.com 71 | P a g e
REFERENCES
[1] Elias M awas, “System Analysis and Design
” Galgotia publication, Second Edition
1996
[2] Harvey M. Deitel , Paul J. Deitel, Tem R.
Nieto “C# .NET How to Program” 2nd
Edition
[3] Richard Fairley, ”SOFTWARE
ENGINEERING CONCEPTS”, Tata Mc
Graw Hill Publication, Second Edition,1997
[4] "SQL Server "Katmai" to Deliver Entity
Data Platform and Support LINQ".
http://oakleafblog.blogspot.com/2007/05/sql
-server-to-deliver-entity-data.html.
Retrieved 2007-05-12.
[5] MSDN Library: Reporting Services Render
Method - See Device Information Settings
[6] Microsoft. "Microsoft .NET Framework 3.5
Administrator Deployment Guide".
http://msdn.microsoft.com/library/cc160717.
aspx. Retrieved 26 June 2008. S.
Somasegar. "Visual Studio 2010 and .NET
FX 4 Beta 1 ships!". Archived from the
original on 27 May 2009.
http://www.webcitation.org/5h5lV7362.
Retrieved 25 May 2009.
[7] Scott Guthrie: Silverlight and the Cross-
Platform CLR". Channel 9. 30 April 2007.
http://channel9.msdn.com/shows/Going+De
ep/Scott-Guthrie-Silverlight-and-the-Cross-
Platform-CLR.
[8] ECMA 335 - Standard ECMA-335 Common
Language Infrastructure (CLI)". ECMA. 1
June 2006. http://www.ecma
international.org/publications/standards/Ecm
a-335.htm. Retrieved 1 June 2008.
[9] "Technical Report TR/84 Common
Language Infrastructure (CLI) - Information
Derived from Partition IV XML File".
ECMA. 1 June 2006. http://www.ecma-
international.org/publications/techreports/E-
TR-084.htm.
[10] "ECMA-334 C# Language Specification".
ECMA. 1 June 2006. http://www.ecma-
international.org/publications/standards/Ecm
a-334.htm.
[11] M. Castro, P. Duschel, A. Rowstron, and D.
S. Wallach, Secure routing for structured
peer-to-peer overlay network. In
Proceedings of the fifth Symposium on
Operatating System Design and
Implementation, Dec 2002.
[12] D. Wallach, A survey of peer-to-peer
security isssues. In Proceedings of
International Symposium of Software
Security - Theories and Systems, Nov 2003.
[13] M. S. Artigas, P. G. Lopez, A. F. G.
Skarmeta, A Novel methodology for
constructing secure multipath overlays.
IEEE Internet Computing, 9(6):50-57,2005.
[14] E. K. Lua, T. Griffn, M. Pias, H. Zheng, and
J. Crowcroft, On-line secret sharing. In
ACM SIGCOMM-Usenix Internet
Measurement Conference 2005 (IMC2005),
Oct 2005.
[15] E. K. Lua and T. G. Griffn, Embeddable
overlay networks. In Proceedings of IEEE
Symposium on Computers and
Communications 2007, July 2007

More Related Content

What's hot

Speedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSpeedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSadan Kumar
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocolShweta Sharma
 
Improved secure address resolution protocol
Improved secure address resolution protocolImproved secure address resolution protocol
Improved secure address resolution protocolcsandit
 
A Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos AttackA Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos Attacktheijes
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Editor IJARCET
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting Newtechbed
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3SakthiVinoth78
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iiiJAIGANESH SEKAR
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their securitylovizabasharat
 

What's hot (19)

Speedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSpeedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhan
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocol
 
F0322038042
F0322038042F0322038042
F0322038042
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Unit 5 : Transport Layer
Unit 5 : Transport LayerUnit 5 : Transport Layer
Unit 5 : Transport Layer
 
Improved secure address resolution protocol
Improved secure address resolution protocolImproved secure address resolution protocol
Improved secure address resolution protocol
 
A Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos AttackA Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos Attack
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097
 
E41022938
E41022938E41022938
E41022938
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Networks
NetworksNetworks
Networks
 

Viewers also liked

Health Decisions Webinar: December 2012 union trusts
Health Decisions Webinar: December 2012 union trustsHealth Decisions Webinar: December 2012 union trusts
Health Decisions Webinar: December 2012 union trustsSi Nahra
 
Ne reason for the prohibition on pork 1
Ne reason for the prohibition on pork 1Ne reason for the prohibition on pork 1
Ne reason for the prohibition on pork 1Loveofpeople
 
印尼 難得一見的美景
印尼 難得一見的美景印尼 難得一見的美景
印尼 難得一見的美景Jaing Lai
 
新聞攝影
新聞攝影新聞攝影
新聞攝影Jaing Lai
 
Documentação complementar tia francisca
Documentação complementar tia franciscaDocumentação complementar tia francisca
Documentação complementar tia franciscaLeticia Maria de Campos
 
Operações da configuração do windows
Operações da configuração do windowsOperações da configuração do windows
Operações da configuração do windowsfrancissal
 
Words for julia
Words for juliaWords for julia
Words for juliaLorian
 
走进HP无线营销的炫色迷城
走进HP无线营销的炫色迷城走进HP无线营销的炫色迷城
走进HP无线营销的炫色迷城Madhouse Inc.
 
 Tecniche Per Allungare Il Pene
 Tecniche Per Allungare Il Pene 
 Tecniche Per Allungare Il Pene
 Tecniche Per Allungare Il Pene zippyclaw5792
 
гортензия идеальные цветы для свадьбы
гортензия идеальные цветы для свадьбыгортензия идеальные цветы для свадьбы
гортензия идеальные цветы для свадьбыAnna Hristyuk
 
男士 領_帶_vs_女士_蝴_蝶_結
男士  領_帶_vs_女士_蝴_蝶_結男士  領_帶_vs_女士_蝴_蝶_結
男士 領_帶_vs_女士_蝴_蝶_結Jaing Lai
 
Những điều cần biết sao mai
Những điều cần biết sao mai Những điều cần biết sao mai
Những điều cần biết sao mai Mít Ướt
 
Reunió pares 4 t maig 2012
Reunió pares 4 t maig 2012Reunió pares 4 t maig 2012
Reunió pares 4 t maig 2012CVA
 

Viewers also liked (20)

Health Decisions Webinar: December 2012 union trusts
Health Decisions Webinar: December 2012 union trustsHealth Decisions Webinar: December 2012 union trusts
Health Decisions Webinar: December 2012 union trusts
 
Bruma
BrumaBruma
Bruma
 
Ne reason for the prohibition on pork 1
Ne reason for the prohibition on pork 1Ne reason for the prohibition on pork 1
Ne reason for the prohibition on pork 1
 
印尼 難得一見的美景
印尼 難得一見的美景印尼 難得一見的美景
印尼 難得一見的美景
 
Realidad aumentada
Realidad aumentadaRealidad aumentada
Realidad aumentada
 
新聞攝影
新聞攝影新聞攝影
新聞攝影
 
Q04503100104
Q04503100104Q04503100104
Q04503100104
 
Documentação complementar tia francisca
Documentação complementar tia franciscaDocumentação complementar tia francisca
Documentação complementar tia francisca
 
El llibre digital a la universitat / Núria Gallart
El llibre digital a la universitat / Núria GallartEl llibre digital a la universitat / Núria Gallart
El llibre digital a la universitat / Núria Gallart
 
Operações da configuração do windows
Operações da configuração do windowsOperações da configuração do windows
Operações da configuração do windows
 
Words for julia
Words for juliaWords for julia
Words for julia
 
走进HP无线营销的炫色迷城
走进HP无线营销的炫色迷城走进HP无线营销的炫色迷城
走进HP无线营销的炫色迷城
 
 Tecniche Per Allungare Il Pene
 Tecniche Per Allungare Il Pene 
 Tecniche Per Allungare Il Pene
 Tecniche Per Allungare Il Pene
 
гортензия идеальные цветы для свадьбы
гортензия идеальные цветы для свадьбыгортензия идеальные цветы для свадьбы
гортензия идеальные цветы для свадьбы
 
男士 領_帶_vs_女士_蝴_蝶_結
男士  領_帶_vs_女士_蝴_蝶_結男士  領_帶_vs_女士_蝴_蝶_結
男士 領_帶_vs_女士_蝴_蝶_結
 
work
workwork
work
 
Souhrnný workshop MVSS
Souhrnný workshop MVSSSouhrnný workshop MVSS
Souhrnný workshop MVSS
 
Những điều cần biết sao mai
Những điều cần biết sao mai Những điều cần biết sao mai
Những điều cần biết sao mai
 
Access to agricultural finance
Access to agricultural financeAccess to agricultural finance
Access to agricultural finance
 
Reunió pares 4 t maig 2012
Reunió pares 4 t maig 2012Reunió pares 4 t maig 2012
Reunió pares 4 t maig 2012
 

Similar to L45026571

UNIT III DIS.pptx
UNIT III DIS.pptxUNIT III DIS.pptx
UNIT III DIS.pptxSamPrem3
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE IJERA Editor
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksIRJET Journal
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET Journal
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Mumbai Academisc
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Networkijtsrd
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdfapexjaipur
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGramya marichamy
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET Journal
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 

Similar to L45026571 (20)

Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P SystemNon Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
 
P01754110117
P01754110117P01754110117
P01754110117
 
UNIT III DIS.pptx
UNIT III DIS.pptxUNIT III DIS.pptx
UNIT III DIS.pptx
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
 
ROUTING
ROUTINGROUTING
ROUTING
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Network
 
new-Modified
new-Modifiednew-Modified
new-Modified
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENING
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

L45026571

  • 1. Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71 www.ijera.com 65 | P a g e Secure Routing and Identifying Hacking In P2p System Gowsiga Subramaniam*1 , Senthilkumar Ponnusamy 2 *1 Assistant Professor, Saveetha Engineering College, Chennai. 2 Professor&Head, Information Technology, SKR Engineering College, Chennai. ABSTRACT Packet forwarding is the procedure to route the packet from source to destination via routers. Getting the systems ip address in a LAN and decides the source, destination and the intermediate systems for our routing process. Using any database form the routing table with columns like source address, destination address and router addresses. After creating the routing table enters the ip address in the respective columns. As per this procedure by comparing ip addresses in the routing table the packet will be forward to next ip address. The ip addresses in the routing table, are the path selected by the user according to the respective path the packet will be forward and finally reach destination. Source generate a packet and forward to ip address which is in router ip as per in routing table. Source need to know whether the packet received by authenticated router or not thus each router send an acknowledgement packet to the source. Thus each and every router follows the same procedure to avoid unauthenticated router access in a routing process. As per acknowledgement received from each router source finds out the unauthenticated router access. As per security concern added the signature scheme in a routing process. Before send the packet, source generates the signature with peer ID of destination then forwards the packet to the ip address as per routing table. The packet will be decrypted only the system matched with the signature otherwise just forwards the packet to the next system. Tracer routing is to find out the unauthorized router access in a routing process. This is verifying by getting acknowledgment from each and every router in the routing process by a source. Then source compare the acknowledgement with the predefined routing table if any ip mismatch then it will be consider as unauthorized ip. Keywords: P2P, Route Selection, Packet Forwarding, Hacking I. INTRODUCTION Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients. Often clients and servers operate over a computer network on separate hardware. A server machine is a high- performance host that is running one or more server programs which share its resources with clients. A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers which await (listen to) incoming requests. The client-server model has become one of the central ideas of network computing. Many business applications being written today use the client-server model. The most basic type of client- server architecture employs only two types of hosts: clients and servers. This type of architecture is sometimes referred to as two-tier. It allows devices to share files and resources. The two tier architecture means that the client acts as one tier and application in combination with server acts as another tier. Database debugging is a server-based report generation software system. It can be used to prepare and deliver a variety of interactive reports. It is administered via a LAN interface. Reporting services features a LAN services interface to support the development of custom reporting applications. The reports tool is a way to provide commonly used database queries in a regularly updated, easy-to-use form. It is a companion to the SQL Query service. Computer program that is used to create statistical reports based upon the information in a computer file. Most report generator programs are written for use by people other than programmers. The simplest report generators create reports that illustrate the relationship between only two variables in the database. II. SYSTEM ANALYSIS Peer-to-Peer (P2P) overlay systems offer a substrate for the construction of large scale and distributed applications. However, they pose new challenge for security. Secure assignment node identifiers and secure routing maintenance can be achieved by minimizing the probability that nodes are controlled by attackers. However, an adversary can prevent correct message delivery throughout the overlay. When one or more peers between initiator and target are malicious, a message might be dropped, polluted or forwarded to a wrong place. Previous works on secure message routing concentrated mainly on employing redundancy to RESEARCH ARTICLE OPEN ACCESS
  • 2. Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71 www.ijera.com 66 | P a g e increase the probability of a message being delivered successfully the target. The goal of message routing is to maximize the probability of at least one copy of the correct message reach the correct target. Presents a multiple redundant router algorithm for Pastry. Initiator sends a query to all of its neighbors in Pastry overlay. Then each neighbor forwards the query toward the target. If at least one copy of query arrive target, the query is considered successfully delivered. However, it will inevitably cause congestion and burden system, especially in a bandwidth intensive system. Disrupt the message routing, or take advantage of locality to control some routes. Pretend to be the target Disadvantage:  Destination once receives the packet makes key match if accepted then conclude their no more hacking in the routing.  No approaches followed to detect the route hacking. III. METHODOLOGY To make the routing strategy perform best, we present an efficient routing strategy, called tracer routing. Tracer routing enables the initiator to trace the whole routing process. In each step, the intermediate peer x not only forwards the query to the next hop, but also returns the IP address of the next hop to initiator. With the additional information, the initiator has the knowledge about the whole routing process. Each intermediate peer directly forwards the query to the next hop, thus the query can be routed quickly. Combined with the peer-ID based signature scheme, tracer routing offers a good tradeoff between routing efficiency and security. We propose to address routing message attack by combined tracer routing with Peer-ID based signature scheme. Note that Peer-ID based signature scheme is not necessary. Any techniques of verifying the Peer-ID of remote peer can work with tracer routing. Advantage:  Source side detection and identification of hacking gives more security of data transfer.  With the additional information, the initiator has the knowledge about the whole routing process.  Each intermediate peer directly forwards the data to the next peer, thus the data can be routed quickly. IV. STRUCTURED P2P NETWORK SETUP A peer-to-peer (abbreviated to P2P) computer network is one in which each computer in the network can act as a client or server for the other computers in the network, allowing shared access to various resources such as files, peripherals, and sensors without the need for a central server. P2P is a distributed application architecture that partitions tasks or workloads among peers. Structured P2P network contains self organizing peer’s network. Each peer should be initialized with respective IP address and port number for communication like files sharing or messaging. V. ROUTING SELECTION AND PACKET FORWARDING Routing tables are generally not used directly for packet forwarding in modern router architectures; instead, they are used to generate the information for a smaller forwarding table which contains only the routes which are chosen by the routing method as preferred routes for packet forwarding. Whenever a node or system needs to send data to another node on a network, it must know where to send it, first. If the node cannot directly connect to the destination node, it has to send it via other nodes along a proper route to the destination node. Path selection between source and destination is the procedure to follow on this module. Getting the systems ip address in a structured network and decides the source, destination and the trusted intermediate systems for our routing process. Packet forwarding is the procedure to route the packet from source to destination via routers. As per this procedure by comparing ip addresses in the routing table the packet will be forward to next ip address. The ip addresses in the routing table, are the path selected by the user according to the respective path the packet will be forward and finally reach destination. VI. ACKNOWLEDGEMENT PROCESS Source generate a packet and forward to ip address which is in router ip as per in routing table. Source need to know whether the packet received by authenticated router or not, thus each data received router’s peer ID must be automatically send as acknowledgement to the source. Thus each and every router follows the same procedure to avoid unauthenticated router access in a routing process. As per acknowledgement received from each router source finds out the unauthenticated router access. VII. PEER ID BASED SIGNATURE SCHEME As per security concern added the signature scheme in a routing process. Before send the packet, source generates the signature with peer ID of destination then forwards the packet to the ip address as per routing table. The packet will be decrypted only the system matched with the signature otherwise just forwards the packet to the next system. We are
  • 3. Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71 www.ijera.com 67 | P a g e using DES data encryption standard cryptography algorithm for secure data transfer. VIII. TRACER ROUTING APPROACH To make the routing strategy perform best, we present an efficient routing strategy, called tracer routing (below diagram). Tracer routing enables the initiator to trace the whole routing process. In each step, the intermediate peer x not only forwards the query to the next hop, but also returns the IP address of the next hop to initiator. With the additional information, the initiator has the knowledge about the whole routing process. Each intermediator peer directly forwards the query to the next hop, thus the query can be routed quickly. Combined with the peer-ID based signature scheme, tracer routing offers a good tradeoff between routing efficiency and security. Tracer routing is to find out the unauthorized router access in a routing process. This is verifying by getting acknowledgment from each and every router in the routing process by a source. Then source compare the acknowledgement with the predefined routing table if any ip mismatch then it will be consider as unauthorized ip. IX. IMPLEMENTATION When the initial design was done for the system, the client was consulted for the acceptance of the design so that further proceedings of the system development can be carried on. After the development of the system a demonstration was given to them about the working of the system. The aim of the system illustration was to identify any malfunction of the system. After the management of the system was approved the system implemented in the concern, initially the system was run parallel with existing manual system. The system has been tested with live data and has proved to be error free and user friendly. Implementation is the process of converting a new or revised system design into an operational one when the initial design was done by the system; a demonstration was given to the end user about the working system. This process is uses to verify and identify any logical mess working of the system by feeding various combinations of test data. After the approval of the system by both end user and management the system was implemented. A product software implementation method is a blueprint to get users and/or organizations running with a specific software product. The method is a set of rules and views to cope with the most common issues that occur when implementing a software product: business alignment from the organizational view and acceptance from the human view. The implementation of product software, as the final link in the deployment chain of software production, is in a financial perspective of a major issue. The Implementation methodology includes four phases - Discovery, System Development, User Acceptance Testing and Production Rollout. It’s easy to be overwhelmed by slick marketing presentations, particularly when the sales force is talking about things that most people don’t completely understand. Showmanship gets in the way of real capabilities. Unless the review team is judging each vendor against the same list of needs, with the same understanding of the significance of each rating, “likeability” can win over capability. These implementation phases are designed to provide clients with a seamless transition from an existing electronic or paper-based system to Sigmund while ensuring all aspects of a client’s operations are accounted for by the software. The Sigmund project team, comprised of individuals with clinical, billing and operations experience, is equipped with the skills and tools to manage the entire process from system requirements gathering to deployment. Sigmund provides various levels of support, depending on client needs, including client-side Project Management. The Discovery Phase is preceded by a Project Kick-off Work-session that includes application demonstrations, completion and review of requirements and configuration questionnaires, identification of key client documentation, as well as consultation on possible process re-engineering needs. The Project Kick-off provides your organization with the opportunity to not only introduce the Sigmund Project Team to your organization, but also to define and structure your organization’s Project Team. System implementation is made up of many activities. The six major activities used in project development are as follows.
  • 4. Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71 www.ijera.com 68 | P a g e X. FLOW DIAGRAM XI. SAMPLE SNAPSHOTS Route Configuration: Sou rce Routing Table Message or File Sending Next Router Chec k DestI P == Curre nt IP Message or File Delivered Reach Destination Cryptogr aphy Send Ack to source Cryptogr aphy Ip Addres s Encrypt ion Decrypt ion
  • 5. Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71 www.ijera.com 69 | P a g e Route Hacking SAMPLE CODING Source Form: using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Text; using System.Windows.Forms; using System.Net.Sockets; using System.IO; using System.Threading; using System.Net; using System.Xml; using System.Security.Cryptography; using System.Data.OleDb; using MySql.Data.MySqlClient; using MySql.Data.Types; namespace MessageRouting { public partial class SourceDesign : Form { System.Net.Sockets.TcpClient clientSocket = new System.Net.Sockets.TcpClient(); NetworkStream serverStream; private StreamWriter clientStreamWriter; private static byte[] key = { }; private static byte[] IV = { 18, 52, 86, 120, 144, 171, 205, 239 }; private const string EncryptionKey = "abcdefgh"; private MySqlConnection dataConnection; public SourceDesign() { InitializeComponent(); } private void SourceDesign_Load(object sender, EventArgs e) { } private void setDBConnection() { try { string connectionStr = "server=localhost;database=secure;uid=root;passwor d=root"; dataConnection = new MySqlConnection(connectionStr); dataConnection.Open(); } catch (Exception e) { MessageBox.Show(e.StackTrace.ToString()); } } public static string toEncrypt(string stringToEncrypt) { try { key = System.Text.Encoding.UTF8.GetBytes(EncryptionK ey); DESCryptoServiceProvider des = new DESCryptoServiceProvider(); byte[] inputByteArray = Encoding.UTF8.GetBytes(stringToEncrypt); MemoryStream ms = new MemoryStream(); CryptoStream cs = new CryptoStream(ms, des.CreateEncryptor(key, IV), CryptoStreamMode.Write); cs.Write(inputByteArray, 0, inputByteArray.Length); cs.FlushFinalBlock(); return Convert.ToBase64String(ms.ToArray()); } catch (Exception ex) { } return ""; } private void btnSend_Click(object sender, EventArgs e) { try {
  • 6. Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71 www.ijera.com 70 | P a g e MySqlDataReader dataReader; string routeString = ""; string cmdStr = "Select * FROM routetable where destination= '" + txtIpaddress.Text + "'"; setDBConnection(); MySqlCommand oleCmd; oleCmd = new MySqlCommand(cmdStr, dataConnection); dataReader = oleCmd.ExecuteReader(); while ((dataReader.Read())) { routeString = dataReader.GetValue(2).ToString(); } string[] nextRoute = routeString.Split(new char[] { ';' }); string[] nextIP = nextRoute[0].Split(new char[] { ',' }); string hostName = System.Net.Dns.GetHostName(); string myIP = System.Net.Dns.GetHostByName(hostName).Addres sList.ToString(); clientSocket = new System.Net.Sockets.TcpClient(); clientSocket.Connect(nextIP[0], Int32.Parse(nextIP[1])); serverStream = clientSocket.GetStream(); clientStreamWriter = new StreamWriter(serverStream); clientStreamWriter.AutoFlush = true; if (txtPath.Text.Length > 0) { FileStream stream = new FileStream(txtPath.Text, FileMode.Open, FileAccess.Read); StreamReader reader = new StreamReader(stream); String ipAddress = reader.ReadLine(); reader.Close(); stream.Close(); txtMessage.Text = ipAddress; } string encStr = toEncrypt(txtMessage.Text); System.Net.IPAddress oAddr; string sAddr; string dnshostName = Dns.GetHostName(); oAddr = new System.Net.IPAddress(System.Net.Dns.GetHostByN ame(dnshostName).AddressList[0].Address); sAddr = oAddr.ToString(); String ipValue = sAddr + "," + PeerProcess.localPort; clientStreamWriter.WriteLine("" + ipValue + "?" + routeString +"#"+ encStr.Length + "&" + encStr + ":" + routeString); clientSocket.Close(); } catch (Exception ex) { Console.WriteLine(ex.StackTrace); MessageBox.Show(ex.StackTrace.ToString()); } } private void btnClose_Click(object sender, EventArgs e) { Visible = false; } private void btnPath_Click(object sender, EventArgs e) { DialogResult digResult = openFile.ShowDialog(); txtPath.Text = openFile.FileName.ToString(); } } } XII. CONCLUSION AND SCOPE FOR FURTHER WORK Peer-to-peer overlay networks, both at the network layer and at the application layer. We have shown how techniques ranging from cryptography through redundant routing to economic methods can be applied to increase the security, fairness, and trust for applications on the p2p network. Because of the diversity of how p2p systems are used, there will be a corresponding diversity of security solutions applied to the problems. has presented the design and analysis of techniques for secure node joining, routing table maintenance, and message forwarding in structured p2p overlays. These techniques provide secure routing, which can be combined with existing techniques to construct applications that are robust in the presence of malicious participants. In peer to peer system, load balancing is a technique to distribute workload evenly across two or more computers, network links, CPUs, hard drives, or other resources, in order to get optimal resource utilization, maximize throughput, minimize response time, and avoid overload. In our system we implement the system to check the overload and retransmit the files to sub nodes in the network. As future enhancement for client server communication we will add symmetric key sharing as introduce security. We don’t know the client is trusted one so request and response between client and server must flow under key sharing.
  • 7. Gowsiga Subramaniam et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.65-71 www.ijera.com 71 | P a g e REFERENCES [1] Elias M awas, “System Analysis and Design ” Galgotia publication, Second Edition 1996 [2] Harvey M. Deitel , Paul J. Deitel, Tem R. Nieto “C# .NET How to Program” 2nd Edition [3] Richard Fairley, ”SOFTWARE ENGINEERING CONCEPTS”, Tata Mc Graw Hill Publication, Second Edition,1997 [4] "SQL Server "Katmai" to Deliver Entity Data Platform and Support LINQ". http://oakleafblog.blogspot.com/2007/05/sql -server-to-deliver-entity-data.html. Retrieved 2007-05-12. [5] MSDN Library: Reporting Services Render Method - See Device Information Settings [6] Microsoft. "Microsoft .NET Framework 3.5 Administrator Deployment Guide". http://msdn.microsoft.com/library/cc160717. aspx. Retrieved 26 June 2008. S. Somasegar. "Visual Studio 2010 and .NET FX 4 Beta 1 ships!". Archived from the original on 27 May 2009. http://www.webcitation.org/5h5lV7362. Retrieved 25 May 2009. [7] Scott Guthrie: Silverlight and the Cross- Platform CLR". Channel 9. 30 April 2007. http://channel9.msdn.com/shows/Going+De ep/Scott-Guthrie-Silverlight-and-the-Cross- Platform-CLR. [8] ECMA 335 - Standard ECMA-335 Common Language Infrastructure (CLI)". ECMA. 1 June 2006. http://www.ecma international.org/publications/standards/Ecm a-335.htm. Retrieved 1 June 2008. [9] "Technical Report TR/84 Common Language Infrastructure (CLI) - Information Derived from Partition IV XML File". ECMA. 1 June 2006. http://www.ecma- international.org/publications/techreports/E- TR-084.htm. [10] "ECMA-334 C# Language Specification". ECMA. 1 June 2006. http://www.ecma- international.org/publications/standards/Ecm a-334.htm. [11] M. Castro, P. Duschel, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay network. In Proceedings of the fifth Symposium on Operatating System Design and Implementation, Dec 2002. [12] D. Wallach, A survey of peer-to-peer security isssues. In Proceedings of International Symposium of Software Security - Theories and Systems, Nov 2003. [13] M. S. Artigas, P. G. Lopez, A. F. G. Skarmeta, A Novel methodology for constructing secure multipath overlays. IEEE Internet Computing, 9(6):50-57,2005. [14] E. K. Lua, T. Griffn, M. Pias, H. Zheng, and J. Crowcroft, On-line secret sharing. In ACM SIGCOMM-Usenix Internet Measurement Conference 2005 (IMC2005), Oct 2005. [15] E. K. Lua and T. G. Griffn, Embeddable overlay networks. In Proceedings of IEEE Symposium on Computers and Communications 2007, July 2007