CodeByte

Write your code smartly

Category Archives: Networking

Policy-Based Security Management in MANETs

Abstract:

It’s a fact that internationally, Mobile Ad-hoc networks are gaining lot of progress and adaptation rate is increasing because of the fast growing rate of business. Data communication is the major thing every one look to acquire while interacting with each other so whenever wireless devices get together can make up a network for instantly changing information.  The wireless devices are not fixed at their places and having some other issues to handle during this network life. As MANETs are the open networks can be formed using two or more mobile devices therefore, it raises the challenge of network management. These mobile devices can easily run out of batteries and location can change any time. Also during these open network communications security issues can also rise like eavesdropping, spoofing and denial-of-service attacks. Therefore, it is the main challenge to trust the communicated node before changing information. Policies based network management is normally used in fixed environment of networks so it is another challenge to implement policies based network management is MANETs considering the security issues.

To access full paper please subscribe for free and send your email to get the paper.

ji_jibran1990@hotmail.com

 

Hyper Text Transfer Protocol

HTTP is a foundation of communication on internet considering a client-server model. It is used to transfer or exchange hypertext by building network using links called hyperlinks.

Client may be a browser and the website can be a server. The client request through a message using HTTP to the server which uses HTML and provides a response in the form of status of the request and it can be a content with a message or data.

A HTTP client sends a request by building a TCP connection and HTTP waits for a request, after receiving the request a response from the server is made to the client by which the request-response clock starts which make up a HTTP session. Unless a clock of request-response is not stopped a session is alive else it is killed.

A response can be a HTML web page which is displayed on the client browser.

Domain Name Servers

DNS is a system which is used by the computers and devices using internet to assign the IP addresses to the domain names. The Internet is based on the IP addresses therefore it requires that a domain name must me translated into IP address so it is easily located.

DNS works like a phone book as it assigns a IP address to a domain name so that computer can communicate to the domain selected. But unlike phone book it updates it self without effecting the end user.

When a system is connected to home network (ISP) it sends the information to router which assigns the network address which also includes the DNS information so that it can acknowledge when to translate the domain name to IP address.

It is easy to remember the alphabetical names of the domain such as http://www.example.com rather than the IP address such as  70.42.251.42.

You can avoid the look up process performed by the browser when you put in a domain name e.g http://www.google.com  (try it) by directly providing the IP address of that domain.

DNS translates these domain names using a huge database also assigning the time allocated for the domain name  hence there are multiple addresses are assigned to a single domain name.

File Transfer Protocol

FTP is used to transfer files and web pages to server over a TCP based network such as internet. FTP is used to upload and download files from the server to the simple client development machine. It has separate controls and connections using user name and password authentication to connect to server and upload and download files.

There are some FTPs which allows to enter the server without authentication of any username and password valid, therefore might verify for the email address but it makes un-secure way of connecting to the server.

DHCP( Dynamic Host Configuration Protocol)

DHCP is an automated method of assigning the addresses i.e IP addresses to the devices connected in a network which decreases the overhead of the manual work done by the network administrator. It has a central database of devices attached to the network and helps to avoid replica of the resource assignment to the devices.

The hosts that does not use DHCP for address assigning can still use DHCP to obtain other configuration information.

It is very useful even in small networks as it can easily add new machines to the network. When the computer or device tries to attach to a network the DHCP sends a query to the DHCP server to get the information of the client system such as default gateway, domain name, name servers. After receiving the valid information DHCP assigns the computer a address and the time it will be valid till including subnet mask.

It uses two ports , port 67 to send data to servers and port 68 to receive data to client. Its communication is connectionless in nature.

Design a site like this with WordPress.com
Get started