0% found this document useful (0 votes)
308 views3 pages

Dynamic Routing With Security Considerations

This document discusses a dynamic routing algorithm with security considerations that includes 5 modules: 1) a network module describing client-server networks, 2) a dynamic routing module proposing a distance-vector based algorithm, 3) a randomization process module describing randomizing packet delivery to prevent eavesdropping, 4) a routing table maintenance module revising routing table construction based on Bellman-Ford, and 5) a load on throughput module investigating the effect of traffic load on throughput for the proposed algorithm.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
308 views3 pages

Dynamic Routing With Security Considerations

This document discusses a dynamic routing algorithm with security considerations that includes 5 modules: 1) a network module describing client-server networks, 2) a dynamic routing module proposing a distance-vector based algorithm, 3) a randomization process module describing randomizing packet delivery to prevent eavesdropping, 4) a routing table maintenance module revising routing table construction based on Bellman-Ford, and 5) a load on throughput module investigating the effect of traffic load on throughput for the proposed algorithm.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

Dynamic Routing with Security Considerations

Modules:
1. Network Module
2. Dynamic Routing
3. Randomization Process
4. Routing Table Maintenance
5. Load on Throughput

Module Description:

1. Network Module

Client-server computing or networking is a distributed application


architecture that partitions tasks or workloads between service providers
(servers) and service requesters, called clients. Often clients and servers
operate over a computer network on separate hardware. A server machine
is a high-performance host that is running one or more server programs
which share its resources with clients. A client also shares any of its
resources; Clients therefore initiate communication sessions with servers
which await (listen to) incoming requests.

2. Dynamic Routing
To propose a distance-vector based algorithm for dynamic routing to
improve the security of data transmission. We propose to rely on existing
distance information exchanged among neighboring nodes (referred to as
routers as well in this paper) for the seeking of routing paths. In many
distance-vector-based implementations, e.g., those based on RIP, each node
maintains a routing table in which each entry is associated with a tuple, and
Next hop denote some unique destination node, an estimated minimal cost to
send a packet to t, and the next node along the minimal-cost path to the
destination node, respectively.

3. Randomization Process
The delivery of a packet with the destination at a node. In order to minimize
the probability that packets are eavesdropped over a specific link, a
randomization process for packet deliveries, in this process, the previous
next-hop for the source node s is identified in the first step of the process.
Then, the process randomly picks up a neighboring node as the next hop for
the current packet transmission. The exclusion for the next hop selection
avoids transmitting two consecutive packets in the same link, and the
randomized pickup prevents attackers from easily predicting routing paths
for the coming transmitted packets.

4. Routing Table Maintenance


In the network be given a routing table and a link table. We assume that the
link table of each node is constructed by an existing link discovery protocol,
such as the Hello protocol in. On the other hand, the construction and
maintenance of routing tables are revised based on the well-known Bellman-
Ford algorithm.
5. Load on Throughput

Investigate the effect of traffic load on throughput for our proposed DDRA;
the traffic is also generated based on variable-bit-rate applications such as
file transfers over Transmission Control Protocol (TCP). The average packet
size is 1,000 bytes, and source-destination pairs are chosen randomly with
uniform probabilities.

You might also like