This document proposes routing and security software components that can be integrated into remote laboratories and e-laboratories. It describes implementing routing and security management services using virtual routers. These services allow centralized network management while labs are distributed. The services provide address management of connected nodes, routing of packets between networks, encryption of transmitted information, management of public/private keys, and support for mobile devices through WAP. The services are defined using WSDL and can be accessed programmatically using languages like C# and Visual Basic.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes an article that investigates security algorithms for WiMAX networks. It begins by describing the architecture of WiMAX networks, including the user terminals, access service network, and connectivity service network. It then discusses vulnerabilities in the WiMAX standard, including issues at the physical layer and weaknesses in authentication and key management protocols. The document reviews some common denial of service attacks on WiMAX, such as attacks using ranging request/response messages. It also summarizes some existing encryption protocols like DES, TDES, RC2, and RC4. Finally, it suggests the need to address denial of service attacks prior to authentication as a way to improve WiMAX security.
The document discusses various topics related to computer networks including metropolitan area networks, wide area networks, wireless networks, home network categories, network software, protocol hierarchies, connection-oriented and connectionless services, service primitives, and reference models such as OSI and TCP/IP. It provides details on the seven layers of the OSI model including the functions and services provided by each layer.
Soft handover scheme for wsn nodes using media independent handover functionsAlexander Decker
1) The document proposes adding IEEE 802.15.4 wireless sensor network capabilities to an IEEE 802.21 media independent handover function stack to enable continuous data transfer when wireless sensor nodes move out of communication range.
2) The proposed node architecture stacks IEEE 802.15.4 protocols alongside media independent handover functions to trigger handovers to other wireless links like IEEE 802.11, IEEE 802.16, or 3GPP networks when the sensor nodes lose connectivity with their coordinator.
3) An MIIS server maintains network information that the media independent handover functions can access to select alternative networks for handover when the home wireless sensor network is unavailable.
11.soft handover scheme for wsn nodes using media independent handover functionsAlexander Decker
1) The document proposes adding IEEE 802.15.4 wireless sensor network capabilities to the IEEE 802.21 media independent handover standard in order to enable continuous data transfer when wireless sensor nodes move out of communication range.
2) It describes a mobile node architecture that integrates IEEE 802.15.4, IEEE 802.11, IEEE 802.16, and 3GPP interfaces along with media independent handover functions. This allows wireless sensor nodes to handover between different wireless technologies to maintain connectivity.
3) When a wireless sensor node moves out of range of its coordinator, the application layer will trigger the media independent handover functions to search for alternative networks using IEEE 802
Wireless Deauth and Disassociation Attacks explainedDavid Sweigert
This document summarizes a research paper on denial of service (DoS) attacks in wireless mesh networks. It discusses how management frames in wireless networks are unencrypted, allowing attackers to spoof frames and launch DoS attacks like deauthentication and disassociation attacks. It provides details on how these attacks work by spoofing management frames and terminating legitimate connections. It also reviews related work on implementing these attacks using tools and analyzing their impact on network performance. The goal of the research was to implement these attacks on a real wireless mesh testbed and propose a security algorithm to detect such attacks.
Wireless Disassociation and Deauthentication AttacksDavid Sweigert
This document proposes a lightweight solution called the "Letter-envelop protocol" to defend against deauthentication/disassociation attacks on 802.11 wireless networks. The protocol uses a one-way hard function based on prime factorization to authenticate management frames. When a device wants to disconnect, it sends the frame along with a "letter" that divides the previously exchanged "envelope" number, proving its identity. The protocol modifies the association process to exchange envelopes without requiring new cryptographic capabilities from legacy devices. Experimental results show the protocol effectively prevents spoofing of disconnect frames.
The document discusses the hierarchical network model and modular approach to network design. It describes the key characteristics and functions of the access, distribution, and core layers. The access layer provides user access and aggregation, the distribution layer controls access and provides policy-based connectivity, and the core layer focuses on fast and efficient data transport. The document also discusses how to design networks using functional modules based on the Cisco SONA framework.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes an article that investigates security algorithms for WiMAX networks. It begins by describing the architecture of WiMAX networks, including the user terminals, access service network, and connectivity service network. It then discusses vulnerabilities in the WiMAX standard, including issues at the physical layer and weaknesses in authentication and key management protocols. The document reviews some common denial of service attacks on WiMAX, such as attacks using ranging request/response messages. It also summarizes some existing encryption protocols like DES, TDES, RC2, and RC4. Finally, it suggests the need to address denial of service attacks prior to authentication as a way to improve WiMAX security.
The document discusses various topics related to computer networks including metropolitan area networks, wide area networks, wireless networks, home network categories, network software, protocol hierarchies, connection-oriented and connectionless services, service primitives, and reference models such as OSI and TCP/IP. It provides details on the seven layers of the OSI model including the functions and services provided by each layer.
Soft handover scheme for wsn nodes using media independent handover functionsAlexander Decker
1) The document proposes adding IEEE 802.15.4 wireless sensor network capabilities to an IEEE 802.21 media independent handover function stack to enable continuous data transfer when wireless sensor nodes move out of communication range.
2) The proposed node architecture stacks IEEE 802.15.4 protocols alongside media independent handover functions to trigger handovers to other wireless links like IEEE 802.11, IEEE 802.16, or 3GPP networks when the sensor nodes lose connectivity with their coordinator.
3) An MIIS server maintains network information that the media independent handover functions can access to select alternative networks for handover when the home wireless sensor network is unavailable.
11.soft handover scheme for wsn nodes using media independent handover functionsAlexander Decker
1) The document proposes adding IEEE 802.15.4 wireless sensor network capabilities to the IEEE 802.21 media independent handover standard in order to enable continuous data transfer when wireless sensor nodes move out of communication range.
2) It describes a mobile node architecture that integrates IEEE 802.15.4, IEEE 802.11, IEEE 802.16, and 3GPP interfaces along with media independent handover functions. This allows wireless sensor nodes to handover between different wireless technologies to maintain connectivity.
3) When a wireless sensor node moves out of range of its coordinator, the application layer will trigger the media independent handover functions to search for alternative networks using IEEE 802
Wireless Deauth and Disassociation Attacks explainedDavid Sweigert
This document summarizes a research paper on denial of service (DoS) attacks in wireless mesh networks. It discusses how management frames in wireless networks are unencrypted, allowing attackers to spoof frames and launch DoS attacks like deauthentication and disassociation attacks. It provides details on how these attacks work by spoofing management frames and terminating legitimate connections. It also reviews related work on implementing these attacks using tools and analyzing their impact on network performance. The goal of the research was to implement these attacks on a real wireless mesh testbed and propose a security algorithm to detect such attacks.
Wireless Disassociation and Deauthentication AttacksDavid Sweigert
This document proposes a lightweight solution called the "Letter-envelop protocol" to defend against deauthentication/disassociation attacks on 802.11 wireless networks. The protocol uses a one-way hard function based on prime factorization to authenticate management frames. When a device wants to disconnect, it sends the frame along with a "letter" that divides the previously exchanged "envelope" number, proving its identity. The protocol modifies the association process to exchange envelopes without requiring new cryptographic capabilities from legacy devices. Experimental results show the protocol effectively prevents spoofing of disconnect frames.
The document discusses the hierarchical network model and modular approach to network design. It describes the key characteristics and functions of the access, distribution, and core layers. The access layer provides user access and aggregation, the distribution layer controls access and provides policy-based connectivity, and the core layer focuses on fast and efficient data transport. The document also discusses how to design networks using functional modules based on the Cisco SONA framework.
The document discusses using Bayesian inference and Dempster-Shafer theory to establish trust relationships and achieve security in mobile ad hoc networks (MANETs). It proposes combining direct observation using Bayesian inference with indirect observation using Dempster-Shafer theory to calculate trust values for nodes. The approach is tested in simulations using the AODV routing protocol, showing improved packet delivery ratio, throughput, and end-to-end delay compared to existing systems.
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
UNIT I INTRODUCTION 7
Examples of Distributed Systems–Trends in Distributed Systems – Focus on resource sharing – Challenges. Case study: World Wide Web.
The document provides an overview of computer networks and networking concepts. It discusses what a network is, different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also describes the Open Systems Interconnection (OSI) model and its seven layers. Finally, it discusses reference models for networking including the OSI model and TCP/IP model, and provides examples of different types of networks.
The paper explores network virtualization issues related with the Cloud Computing paradigm (mainly intended as IaaS). Finally, we consider this framework from a network monitoring perspective.
The paper is an outcome of the CoreGRID working group at ERCIM.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
The document provides an introduction to computer networks. It discusses what a network is, why networks are needed, and how they are classified based on scale, connection method, and relationship. The key types of networks covered are personal area networks, local area networks, campus area networks, metropolitan area networks, wide area networks, and virtual private networks. Basic network hardware components are also introduced.
The document provides an overview of Cisco's CCNA certification options and networking concepts including the OSI model. It discusses that Cisco offers a single exam or two exam option for CCNA certification. It then defines the OSI model layers and their purposes, with a focus on the lower layers including physical, data link and network layers. Sample exam questions are also provided related to the OSI model and protocols.
Ethernet was not developed for time-critical, deterministic or safety-relevant applications . TTEthernet expands classical Ethernet with powerful services to meet all new requirements in critical system design.
Computer network is a distributed system consisting of loosely coupled computers and other
devices. Any two of these devices, which we will from now on refer to as network elements or
transmitting elements, can communicate with each other through a communication medium. In
order for these connected devices to be considered a communicating network, there must be a set
of communicating rules or protocols each device in the network must follow to communicate wit
another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short. Figure 1.1 shows a computer
network
The document provides an overview of IP addressing and networking concepts. It begins with an agenda that includes layers, TCP/IP layers, what IP is, IPv4 structure, binary basics, IP classes, subnetting and tools. It then discusses layers models like OSI and TCP/IP, describing each layer. It defines what an IP is, the structure of an IPv4 address in binary, and common networking terms like ports, protocols, and IP classes. The document provides a high-level introduction to fundamental IP networking concepts.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Internet of things protocols for resource constrained applications Pokala Sai
A detailed documentation on internet protocols at present happening of internet of things applications and a bit comparison of protocols using basic requirements
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
This document discusses access point (AP) selection algorithms in wireless mesh networks (WMNs). It analyzes the limitations of the traditional AP selection method defined by IEEE 802.11, which is based solely on received signal strength. The paper studies AP selection as a key problem in WMNs and identifies important parameters that should be considered, such as link quality, load balancing, cross-layer interactions, and dynamic association. It also provides directions for designing new AP selection metrics that are better suited for WMN environments.
This document discusses security issues in ad-hoc networks. It begins by outlining some key problems in ad-hoc network routing including lack of infrastructure, dynamic topology changes, wireless communication vulnerabilities, and implicit trust between nodes. It then analyzes specific attacks like modifying routing protocol messages. Several solutions are proposed, including concealing network topology using security agents or zone routing, and using watchdog and pathrater mechanisms to identify and isolate misbehaving nodes to improve throughput. The watchdog detects nodes that fail to forward packets by listening to transmissions, while pathrater avoids routing through misbehaving nodes to choose more reliable paths.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
Active Network is a novel approach of networking to mobile users in which the nodes are programmed to perform custom operations on the messages that pass through the node. It provides an architectural support for dynamically deploying new protocols in an existing network topology. The routers in an active network can download and execute code that is contained in the packets passing through them, thus rendering the node recognized and run totally new protocols without making any changes to the architecture of the network. Because the network's behavior can be altered at any time, active networks could be used to provide dynamic quality of service (QoS) or to support dynamic solutions to traffic congestion. This research implements and tests such specialized Active Networks security service known as the firewall and the ping service in Active Network. Active Network environment will be implemented on a small scale test scenario in order to study the performance and characteristics of active networks
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
The document discusses the OSI reference model and TCP/IP reference model. It provides details on the 7 layers of the OSI model including the application, presentation, session, transport, network, data link, and physical layers. It also describes the layers of the TCP/IP model including the application, transport, internet, and data link/physical layers. The document compares the OSI and TCP/IP models and explains how data is encapsulated and transmitted using the TCP/IP protocol suite.
The document discusses using Bayesian inference and Dempster-Shafer theory to establish trust relationships and achieve security in mobile ad hoc networks (MANETs). It proposes combining direct observation using Bayesian inference with indirect observation using Dempster-Shafer theory to calculate trust values for nodes. The approach is tested in simulations using the AODV routing protocol, showing improved packet delivery ratio, throughput, and end-to-end delay compared to existing systems.
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
UNIT I INTRODUCTION 7
Examples of Distributed Systems–Trends in Distributed Systems – Focus on resource sharing – Challenges. Case study: World Wide Web.
The document provides an overview of computer networks and networking concepts. It discusses what a network is, different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also describes the Open Systems Interconnection (OSI) model and its seven layers. Finally, it discusses reference models for networking including the OSI model and TCP/IP model, and provides examples of different types of networks.
The paper explores network virtualization issues related with the Cloud Computing paradigm (mainly intended as IaaS). Finally, we consider this framework from a network monitoring perspective.
The paper is an outcome of the CoreGRID working group at ERCIM.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
The document provides an introduction to computer networks. It discusses what a network is, why networks are needed, and how they are classified based on scale, connection method, and relationship. The key types of networks covered are personal area networks, local area networks, campus area networks, metropolitan area networks, wide area networks, and virtual private networks. Basic network hardware components are also introduced.
The document provides an overview of Cisco's CCNA certification options and networking concepts including the OSI model. It discusses that Cisco offers a single exam or two exam option for CCNA certification. It then defines the OSI model layers and their purposes, with a focus on the lower layers including physical, data link and network layers. Sample exam questions are also provided related to the OSI model and protocols.
Ethernet was not developed for time-critical, deterministic or safety-relevant applications . TTEthernet expands classical Ethernet with powerful services to meet all new requirements in critical system design.
Computer network is a distributed system consisting of loosely coupled computers and other
devices. Any two of these devices, which we will from now on refer to as network elements or
transmitting elements, can communicate with each other through a communication medium. In
order for these connected devices to be considered a communicating network, there must be a set
of communicating rules or protocols each device in the network must follow to communicate wit
another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short. Figure 1.1 shows a computer
network
The document provides an overview of IP addressing and networking concepts. It begins with an agenda that includes layers, TCP/IP layers, what IP is, IPv4 structure, binary basics, IP classes, subnetting and tools. It then discusses layers models like OSI and TCP/IP, describing each layer. It defines what an IP is, the structure of an IPv4 address in binary, and common networking terms like ports, protocols, and IP classes. The document provides a high-level introduction to fundamental IP networking concepts.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Internet of things protocols for resource constrained applications Pokala Sai
A detailed documentation on internet protocols at present happening of internet of things applications and a bit comparison of protocols using basic requirements
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
This document discusses access point (AP) selection algorithms in wireless mesh networks (WMNs). It analyzes the limitations of the traditional AP selection method defined by IEEE 802.11, which is based solely on received signal strength. The paper studies AP selection as a key problem in WMNs and identifies important parameters that should be considered, such as link quality, load balancing, cross-layer interactions, and dynamic association. It also provides directions for designing new AP selection metrics that are better suited for WMN environments.
This document discusses security issues in ad-hoc networks. It begins by outlining some key problems in ad-hoc network routing including lack of infrastructure, dynamic topology changes, wireless communication vulnerabilities, and implicit trust between nodes. It then analyzes specific attacks like modifying routing protocol messages. Several solutions are proposed, including concealing network topology using security agents or zone routing, and using watchdog and pathrater mechanisms to identify and isolate misbehaving nodes to improve throughput. The watchdog detects nodes that fail to forward packets by listening to transmissions, while pathrater avoids routing through misbehaving nodes to choose more reliable paths.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
Active Network is a novel approach of networking to mobile users in which the nodes are programmed to perform custom operations on the messages that pass through the node. It provides an architectural support for dynamically deploying new protocols in an existing network topology. The routers in an active network can download and execute code that is contained in the packets passing through them, thus rendering the node recognized and run totally new protocols without making any changes to the architecture of the network. Because the network's behavior can be altered at any time, active networks could be used to provide dynamic quality of service (QoS) or to support dynamic solutions to traffic congestion. This research implements and tests such specialized Active Networks security service known as the firewall and the ping service in Active Network. Active Network environment will be implemented on a small scale test scenario in order to study the performance and characteristics of active networks
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
The document discusses the OSI reference model and TCP/IP reference model. It provides details on the 7 layers of the OSI model including the application, presentation, session, transport, network, data link, and physical layers. It also describes the layers of the TCP/IP model including the application, transport, internet, and data link/physical layers. The document compares the OSI and TCP/IP models and explains how data is encapsulated and transmitted using the TCP/IP protocol suite.
TAEE 2011- State-of-the-Art Remote Laboratories for Industrial Electronics Ap...Mohamed Tawfik
This document summarizes a study on state-of-the-art remote laboratories for industrial electronics applications. It discusses how remote labs address gaps in engineering education by providing ubiquitous experimentation. Common architectures use LabVIEW or MATLAB for the lab server software and technologies like AJAX or LabVIEW's web interface for client-server communication. The document also provides examples of remote lab systems and outlines challenges in selecting server and communication technologies.
Integration of an e-learning Platform and a Remote Laboratory for the Experim...Federico Lerro
Nowadays, it is more common to use both
systems, a Learning Management System (LMS) and a
remote laboratory, independently. However, we understand
it is highly convenient for the students to have access and
perform real experimental practices in remote laboratories
from a LMS. This integration of both educational resources
constitutes one objective of a project developed by a joint
venture company-university: a technology company (“educativa”)
and a public university (UNR). The project is
based on the addition to the “Virtual Campus LMS”,
developed by “e-ducativa”, of a function that allows the
access and control, via Internet, to the “Remote Laboratory
of Electronic Physics” located in the university
headquarters. Technology is basically a self-communication
protocol that allows exchanging data in a standardized way
between the LMS software and the device control connected
to the remote equipment. The project includes the
implementation of an interface that allows the users of the elearning
platform to have access to it and to future
developments of remote laboratories. In this paper the
authors describe the technical implementation of the project
and provide educational criteria in order to integrate the
new development into the electronic engineering
curriculum.
The document discusses integrating remote laboratories into management systems. It describes challenges in integrating diverse lab interfaces and technologies like LabVIEW. The authors propose creating standard APIs to facilitate integrating remote labs, especially LabVIEW-based ones, into remote laboratory management systems like Sahara. This would allow labs developed across universities to be more easily shared and managed through a common system.
The document summarizes a report by IMARC Group on the global pharmaceutical market between 2011-2017. Some key points:
- The global pharmaceutical market is expected to grow at 6% annually through 2017, exceeding $1.1 trillion in sales.
- The market will undergo transitions like a shift to emerging markets, increased focus on biopharmaceuticals, and preference for generics over branded drugs.
- The report provides an analytical overview of pharmaceutical market trends in regions/countries globally based on historical sales and forecast sales for 2007-2017 with a focus on top companies and therapeutic areas in each country/region.
This document discusses remote laboratories and their implementation in engineering education. It notes that remote labs help bridge the gap between educational curricula and real-world industry by allowing experimentation without constraints of location or time. Several challenges in developing remote labs are outlined, including selecting lab server software and integrating labs with learning management systems. Examples of remote lab architectures and systems like iLab, Labshare, and WebLab Deusto are provided. The benefits of standards-based integration of remote labs into online education are discussed.
Configure Tally.NET Features
1) Connect Company on Tally.NET
2) Create and Authorise Remote Users
3) Access Company data Remotely
Tally.NET is an enabling framework which establishes a connection through which the remote
user can access the Client's data without copying / transferring the data. In other words, the
remote user can access the company data, provided the Company is open and connected on
Tally.NET.
Cardivascular bioimplant market analysis publisherRenub Research
Renub Research (http://www.renub.com/report/global-cardiac-bio-implant-devices-implantable-cardioverter-defibrillators-implantable-cardiac-pacemakers-heart-valve-coronary-stent-peripheral-stent-ventricular-assist-device-market-forecast-clinical-trials-ma-115) has announced the addition of the "Global Cardiac Implant Devices (Implantable Cardioverter Defibrillators, Implantable Cardiac Pacemakers, Heart Valve, Coronary Stent, Peripheral Stent, Ventricular Assist Device) Market Forecast, Clinical Trials, M&A" report to its offering
This document provides instructions for setting up IBM Tivoli Remote Control in small to mid-sized environments. It describes the components of IBM Tivoli Remote Control and the IBM Tivoli Management Framework. It also explains the process of a remote control session, from opening the remote control tool to establishing a connection between the controller and target. The goal is to demonstrate how easy it is to deploy IBM Tivoli Remote Control and realize clear ROI by integrating it with an existing Tivoli infrastructure.
GOLC 2012 - On Standardizing the Management of LabVIEW-based Remote Laborator...Mohamed Tawfik
This document discusses standardizing the management of remote laboratories built using LabVIEW through remote laboratory management systems (RLMSs). It outlines the need for a standard application programming interface (API) layer to wrap LabVIEW-based remote labs and make them compatible with different RLMSs. The layer would define a common set of communication tools from LabVIEW, such as VI server and web services, to connect remote labs to RLMSs while addressing factors like simultaneous access, security, and session management. Developing such an API layer could help share and manage the many existing LabVIEW-based remote labs across various university platforms.
The document summarizes the methodology used in a study assessing the impact of school libraries on student learning in Malaysia. The study used semi-structured interviews and observations. Interviews were conducted with principals, teachers, librarians, and students at multiple secondary schools to examine perceptions of how the school library contributes to learning. Observations were also made of library use during the school week. The methodology aims to fill gaps in understanding the relationship between school libraries and learning through qualitative data collection and analysis.
This document summarizes findings from a study on the use of learning management systems (LMS) in Malaysian higher education institutions. Some key findings include:
- All institutions had an LMS, with most using open source platforms like Moodle. Half had been using their LMS for over 3 years.
- The most common LMS components were communications, course delivery, and content development. However, integration with other systems like libraries was low.
- Most faculty and students felt the major LMS features worked well. While most faculty used the institutional LMS, others supplemented it with tools like social media.
- The top challenges to LMS adoption were faculty satisfaction with existing teaching methods and lack of time/IT expertise
A Decentralized Application for Secure Private and Group Messaging in a Peer-...IRJET Journal
This document proposes a decentralized application for secure private and group messaging in a peer-to-peer environment. The application uses WebRTC for peer-to-peer connections, a blockchain for secure group messaging, and provisionary data nodes to allow messaging when recipients are offline. Algorithms like RSA, AES-256, and SHA-256 are used for encryption, hashing, and signatures. The application aims to provide privacy, reliability, and availability without single points of failure through its decentralized design.
Secure Data Communications in Mobile Ad-Hoc NetworksIRJET Journal
The document discusses secure data communication protocols for mobile ad-hoc networks (MANETs). It proposes two protocols: Secure Message Transfer (SMT) and Secure Single-Path Protocol (SSP). SMT transmits data over multiple paths simultaneously using redundancy to ensure delivery even if some paths fail. SSP has lower overhead by using a single path but provides reliability comparable to SMT. The protocols provide end-to-end security without trusting intermediate nodes and can maintain reliable low-latency communication even when many nodes disrupt data transfers maliciously or unintentionally. Evaluation shows SMT delivers over 93% of messages without retransmission, even with 50% of nodes failing, and over 98% with limited retransmissions if
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
The document summarizes research on secure routing protocols for data transmission in ad hoc networks. It discusses five main points:
1) It examines security threats to ad hoc routing protocols like AODV and proposes ARAN, an authenticated routing protocol that detects malicious actions through authentication, integrity checks, and non-repudiation.
2) It discusses implementing end-to-end security on mobile devices using the TLS protocol to secure transmissions.
3) It proposes OLSR, an optimized link-state routing protocol for large, dense ad hoc networks that reduces control packet sizes and flooding.
4) It develops a security mechanism using digital signatures and hash chains to secure AODV routing messages and
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
The document discusses techniques for providing location privacy in sensor networks against a global eavesdropper. It proposes four techniques - periodic collection, source simulation, sink simulation, and backbone flooding - to provide location privacy for monitored objects (source location privacy) and data sinks (sink location privacy). These techniques provide trade-offs between privacy, communication cost, and latency. Analysis and simulation demonstrate that the proposed techniques are efficient and effective for providing source and sink location privacy in sensor networks.
This document discusses network architecture and design. It covers component architectures, addressing and routing architectures, network management architecture, performance architecture, and security architecture. Some key points include:
- Component architecture describes how network functions are applied using hardware and software mechanisms.
- Addressing involves applying identifiers to network devices, while routing learns connectivity and forwards packets. Common addressing mechanisms include subnetting, super-netting, dynamic addressing, and private/public addressing.
- Network management architecture provides functions for controlling, planning, and monitoring network resources using mechanisms like monitoring, instrumentation, and configuration.
- Performance architecture allocates network resources to users and applications using mechanisms like quality of service, resource control, service level agreements, and policies.
The document discusses internetworking models and the OSI reference model. It provides details on each of the 7 layers of the OSI model:
1. The Application layer handles communication between applications and users.
2. The Presentation layer translates and formats data for transmission.
3. The Session layer establishes and manages communication sessions between devices.
4. The Transport layer segments data, establishes logical connections, and ensures reliable delivery between hosts.
In software-defined networking (SDN), network traffic is managed by software controllers or application programming interfaces (APIs) rather than hardware components. It differs from traditional networks, which use
switches and routers to control traffic. Using SDN, you can create and control virtual networks or traditional hardware networks. Furthermore, OpenFlow allows network administrators to control exact network behavior
through centralized control of packet forwarding. For these reasons, SDN has advantages over certain security issues, unlike traditional networks.
However, most of the existing vulnerabilities and security threats in the traditional network also impact the SDN network. This document presents the attacks targeting the SDN network and the solutions that protect against
these attacks. In addition, we introduce a variety of SDN security controls, such as intrusion detection systems (IDS)/intrusion prevention system (IPS), and firewalls. Towards the end, we outline a conclusion and perspectives.
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET Journal
This document proposes implementing a virtual private network (VPN) using IPsec to securely transfer data between two remote networks. IPsec VPN provides an encrypted tunnel for data transmission and ensures privacy, authentication, and integrity. The proposed topology connects two networks using Vyos routers, with the path between them secured through an IPsec VPN tunnel. Vyos is an open-source network operating system that can convert a physical PC into a router. Sensors in one network would collect data and a client on the remote network could access a webpage displaying the sensor data through the private, encrypted VPN tunnel. Cryptography is used for authentication, confidentiality, and integrity of the transmitted data.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
This document discusses security issues with the Constrained Application Protocol (CoAP) which is commonly used for Internet of Things (IoT) communication. It first provides background on CoAP, including its architecture and use of Datagram Transport Layer Security (DTLS) for security. However, the document notes that while DTLS provides some security, it is not fully sufficient to protect data at large volumes. The document then reviews literature on security issues at different layers of IoT systems, such as perception, physical, and network layers. Specific attacks discussed include jamming, node tampering, man-in-the-middle, denial of service, and eavesdropping. The aim of the paper is to analyze CoAP security
Here are the key steps I would take to design a computer network:
1. Define the goals and needs of the network. What needs to be connected? How many users? What applications and services will be used?
2. Map out the physical layout. Where are devices located? How will they connect - wired or wireless? Design a logical topology to organize devices.
3. Select network hardware. Choose switches, routers, access points suitable for the size and needs. Consider wired/wireless infrastructure requirements.
4. Design the IP addressing scheme. Plan subnetting and IP ranges for efficient use of available addresses.
5. Configure network segmentation. Use VLANs or separate subnets to logically separate traffic as needed for
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
This document proposes using Border Gateway Protocol (BGP) and inter-domain packet filters (IDPFs) to limit IP spoofing on the internet. IDPFs would be constructed using information from BGP route updates and deployed on border routers. IDPFs aim to minimize IP spoofing without requiring global routing information. The framework is designed so that it does not incorrectly discard packets with valid source addresses. With even partial deployment, IDPFs could reduce the level of IP spoofing on the internet.
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
This document provides an overview of computer networking theory and practice. It discusses the key components of a computer network, including network interface cards, hubs, routers, modems, and switches. These components work together to connect devices and allow for the exchange of digital information across computer networks. The document also covers different types of computer networks like local area networks, wide area networks, and wireless networks. It explains how networks are designed and configured, with a focus on important aspects like security, performance, and dependability.
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
This document provides an overview of computer networking theory and practice. It discusses the key components of a computer network including network interface cards, hubs, routers, modems, switches, and cables. It describes different types of networks like local area networks, wide area networks, and wireless networks. The document also covers the uses of computer networks like resource sharing, communication, the server-client model, e-commerce, and as a communication medium. Finally, it discusses the benefits of computer networks such as sharing resources, improved communication, increased security, remote access, and cost savings, as well as some potential disadvantages.
Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IJCER (www.ijceronline.com) International Journal of computational Engineering research
1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5
Routing and security for remote labs for teaching and research
(SRS-E-LABO)
Alassane Diop
Research Associate, Center for Research LICEF, TELUQ / UQAM,
Montréal, Québec, Canada
Abstract:
In this paper, routing services and security are software components that can be integrated in an e-laboratory or remote
laboratory as well as in mobile laboratories. We will show how to implement services to manage the routing and security using
virtual routers. The virtual routers that we propose allow designers to online laboratories to adapt or supplement their learning
environments or dedicated platforms using their services to route and secure access to physical devices and the information
passed to the various network nodes to remote laboratories. The concept to be presented, based on WCF (Windows
Communication Foundation), provides centralized network management at a single location while the remote labs are based on
networks and distributed systems.
Keywords: Remote labs, online laboratory, computer network, WAP, virtual router, security, e-laboratory, e-learning, WCF
1. Objectives and routing services security
This article aims to contribute to the development of service concepts, routing and security using software components that can
be integrated with laboratory environments online. These software components are presented in the form of services to manage
1) addressing the various nodes of connections, 2) the table router to forward packets from networks or sub networks connected
directly or indirectly to the primary node, 3) transmission security with an encryption of information, 4) public and private keys
for data privacy; 5) mobile devices and applications WAP (Wireless Application Protocol) and service use in web applications
by exploiting the available services. Routing services and security for remote labs for teaching and research online (SRS) are
reliable and secure transactional solutions that integrate across platforms and interoperate with existing infrastructure. The SRS
will be based on the WCF architecture (Windows Communication Foundation) which is compatible with all other existing
architectures because "The message parameters are defined by documents in XSD (XML Schema Definition), which allows any
system comprising XML (eXtended Markup Language) to manage documents. The message contract defines specific message
parts using SOAP (Simple Object Access Protocol), and allows finer control of them, when interoperability demands such
precision. "[1]. Figure 1 illustrates the main layers of the WCF architecture used to implement the various services of SRS.
Service contracts illustrated in Figure 1 have spoken publicly in WSDL (Web Services Description Language) [2], a format that
describes network services in terms of operating parameters on messages SOAP (Simple Object Access Protocol). This allows
designers to use that information to public contracts to build service oriented applications that ensures interoperability. T o
transfer information on intranets and the Internet, the services use protocols such as HyperText Transfer Protocol (HTTP) and
Transmission Control Protocol (TCP). Other types of transport mechanisms can be added via extension points of WCF
integrated.
Figure 1. WCF Architecture [1]
Issn 2250-3005(online) September| 2012 Page 1577
2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5
2. Communication services routing and security
The SRS can be used either ad hoc or infrastructure. Figures 1 and 2 show the two modes of communications services, routing
and security levels and applications to an established e-collaboration environment consisting of a platform for distance learning
(online platform), a site laboratory Remote (e-laboratory) and another site that hosts communication tools useful for
synchronous and asynchronous learning or collaborative research (Collab).
Ad hoc mode as the name suggests allows each item that uses routing services (SRS) to host and use its own services directly.
These can be shared or restricted in Intranet. The communication mechanism is very simple. To deploy routing services must
sequentially, initially, install a server that hosts all SRS available, then set the access "users", controls and security; mount the
virtual router using local services or remote, and finally implement the global environment which exploits a remote laboratory
using deletion of SRS. Information can be exchanged between sites represented by rectangles in Figure 2. Note that the
communication is bidirectional.
Figure 2. Communication services routing and security in ad hoc mode
The infrastructure mode shown in Figure 3 allows a centralized interconnection of SRS on a single server hosting services. This
communication mode is easier to maintain when updating the system. The SRS is divided for the various sites where the
possibility of overloading likely. In this case a policy of performance management and bandwidth can be introduced to give
priority levels to the sites. The communication mechanism is more complex to manage, compared to ad hoc mode, but the steps
to establish communication and use the services remain the same. Information can be exchanged between sites represented by
rectangles in Figure 3. To do everything passes through the central node of the SRS.
Figure 3. Communication Services Routing and Security Infrastructure mode
It is possible to combine the two basic modes for a mixed mode as shown in Figure 4.
Issn 2250-3005(online) September| 2012 Page 1578
3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5
Figure 4. Communication Services Routing and Security in Mixed Mode
3. Description of services routing and security
Five management points will be treated as mentioned in Section I of this paper.
3.1. Address management of the various nodes of connections
These are services for managing the global addressing of nodes sites. As input parameters, we have the IP address of the
equipment and the subnet mask that hosts SRS, the type of communication (Local, Remote, Internet-Remote Intranet VPN:
Virtual Private Network, etc. ...) as well as the connection mode (ad-hoc, Infrastructure, Mixed). As output parameters, we have
the IP address, physical address (MAC) and indicator connection (Connected or not connected). The information will be stored
in a database for tracking, transactions and security. These services allow us to have as well an overview of the system based on
information collected at nodes or sites. It is even possible to make the overall network diagram that uses SRS.
3.2. Management table router to forward packets from networks or sub networks connected directly or indirectly to node
These are services that manage the routing tables stored in a database routing. Virtual routes are defined to facilitate transport
and routing information. As input parameters, we have the source address of the original node and the address (es) recipient (s)
of the end node or end nodes. As output parameters, we have the packet flow of information from the nodes and the safety
information required. It is also possible to use the broadcast address (broadcast) to transmit information at different nodes of the
global network.
3.3. Security management system with a transmission of information encryption
These are services that manage the security of transmissions using an encryption system. All information transmitted from node
to node will be protected by an encryption algorithm using the management services described public and private keys to the
next depending on whether the information coming from the central server or a node of the central system. These services also
use the information generated by the management services of the routing table. So we need the source address, destination
addresses and information or applications that must pass at the nodes of the central system. Output, we have information
packets encrypted and then decrypted at that node by a service recipient decryption of packets.
3.4. Management of public and private keys
These are services that manage the public and private keys. All nodes are equipped with SRS security certificate checked and
authorized by a certificate authority or free. Services in place to manage effectively the keys generated by these authorities.
These certificates require a subscription to these certification authorities such as, for example, Entrust and VeriSign.
It is also possible, before moving to production, use some utilities to generate public and private keys as part of testing
applications.
3.5. Management of mobile devices and applications and WAP services use in web applications by exploiting the available services
These services allow you to manage the connections between the central node and mobile devices. Routing services support
mobile devices such as PDAs and cellular phones with WAP technology. The example of using WAP technology for online
training will be used to validate the service [3]. Mobile applications can also use the services of routing and security.
Issn 2250-3005(online) September| 2012 Page 1579
4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5
4. WSDL Structure of services routing and security
The structure of the various services put in place meets the international standard WSDL documents namely:
The WSDL document will be divided into two groups of sections. The top group consists of abstract definitions, while the
bottom group contains concrete descriptions. The abstract sections define SOAP messages (Simple Object Access Protocol)
completely independently of the platform and language.
The definition of a set of services that can be implemented by different web sites or applications. Each WSDL document can
have sections illustrated in the following diagram:
Figure 5. Structure of WSDL documents [1]
5. Results and conclusion
In this part of the article, the connection service owned management services addressing is presented. Figures 6 and 7 show the
tests with the “svcutil.exe” tool from visual studio. This tool allows you to quickly test the functionality of the services
developed.
Figure 6. Testing Service SRSCONNECT
Figure 7. Representation of results in XML format
Issn 2250-3005(online) September| 2012 Page 1580
5. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5
The service takes as input SRSCONNECT four parameters (information on the source node, the mode and type of
communication) and establishes a connection between two nodes (virtual router). If the connection is established, the service
outputs the logical and physical addresses of the remote site as well as the true indicator (connected) or false (not connected).
Figures 8 and 9 show an example of using the SRS services in C # and Visual Basic. Figure 6 shows how to add references of
routing services, while Figure 9 shows a web browser, the service description and a sample source code to call the SRS.
Figure 8. Reference Service SRSCONNECT on visual studio
Figure 9. Example of C # and Visual Basic provided by the online service
To test this service, the first thing to do is create a client and write the code to call the service. To do this, one possibility is to
use the “svcutil.exe” tool from the command line using the following syntax:
svcutil.exe http://localhost:8731/Design_Time_Addresses/Laboratoire.Routage.Service/Routeur/?wsdl
This will create a configuration file and a code file containing the class of customer. Adding the two files to a client application
and the generated client class to call up the service SRSCONNECT. The following table shows two examples, the first source
code written in C # and Visual Basic in the second
C# Visual Basic
class Test Class Test
{ Shared Sub Main()
static void Main() { Dim client As RouteurClient = New RouteurClient()
RouteurClient client = new RouteurClient(); 'Use the variable "client" to call operations on the service.
//Use the variable "client" to call operations on the service. Client.srsconnect(ipsource, marqueSource, Type,
Client.srsconnect(ipsource, marqueSource, Type, Mode, IpDestination);
Mode, IpDestination); ' Always close the client.
//Always close the client. client.Close()
client.Close(); } End Sub
} End Class
Table 1. Sample code to use the services of the routing software
Issn 2250-3005(online) September| 2012 Page 1581
6. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5
Routing services and security contribute to online laboratories in the field of networks and security. With its various services in
place, you can easily create an online laboratory that learners can use to do practical work and experimental without the need
for physical facilities or to go to physical laboratories [4] [5]. This option allows to extend the use of laboratories using a
platform accessible from a web browser or mobile device.
References
[1] Microsoft documentation, Architecture windows communication foundation, http://msdn.microsoft.com/fr-
ca/library/ms733128.aspx, site consultée en Septembre 2012
[2] Microsoft documentation, Description du langage WSDL (Web Services Description Language),
http://msdn.microsoft.com/fr-fr/library/bb469924.aspx, site consultée en Septembre 2012
[3] Diop Alassane, Distributed environment of learning suitable for telephony and mobile computing; International Journal of
Theoretical and Applied Information Technology (JATIT); E- ISSN 1817-3195 / ISSN 1992-8645; pp 057 – 064, Vol
39. No. 1 – Mai 2012.
[4] Diop Alassane, Livre, Laboratoires à distance de télématique et réseaux, Analyse, conception et étude de cas pratiques
pour l'enseignement en ligne. Edition : Éditions universitaires européennes; 2012; 144 pages; ISBN: 978-3-8417-8997-6;
Parution: Février 2012.
[5] Diop Alassane, Architecture of a virtual and remote laboratory; International Journal of Reviews in Computing (IJRIC);
ISSN : 2076-3328 | E-ISSN : 2076-3336; pp 017 – 021, Vol 10 – Juillet 2012.
Issn 2250-3005(online) September| 2012 Page 1582