Types of Routing Protocols to maintain Message Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 11
Abstract
Every machine on the Internet has a unique number assigned to it, called an IP address. Without a unique IP address on your machine, you will not be able to communicate with other devices, users, and computers on the Internet. You can look at your IP address as if it were a telephone number, An IP address is a fascinating product of modern computer technology designed to allow one computer (or other digital device) to communicate with another via the Internet. IP addresses allow the location of literally billions of digital devices that are connected to the Internet to be pinpointed and differentiated from other devices. In the same sense that someone needs your mailing address to send you a letter, a remote computer needs your IP address to communicate with your computer.
Authors and Affiliations
Ramanpreet Kaur, Cherry Goyal, Harjeet Kaur , Mandeep Singh
Stability of Vitamins in Pharmaceutical Preparations- A Review
Vitamins are one of the few groups of food constituents in which it is possible to demonstrate quantitatively deterioration in content over a period. The rate of this reduction in vitamin content is influenced by a numb...
A Novel Approach to Increase the Embedding Capacity in Digital Watermarking Using DWI-IWT
watermarking is a development that supplements cryptography by embeddings impalpable flags in work. Information covering strategies have starting late ended up being imperative in different application zones. Propelled...
Causes of Coupling Failures and Preventive Actions
Couplings are critical parts of any transmission system, providing the smooth transmission of power from drive to driven equipment. If properly designed, selected and maintained, the coupling can last long and give sati...
“AUTOBOOK” The Messaging Machines (Using GSM and Arduino)
In a world that is advancing towards technological development in every second, ‘time’ has become very expensive. Incorporating automation in an existing complaint registering mechanism through networking is our main id...
An Efficient Anonymity Protection Technique Using Attribute Based Encryption in Mobile AdHoc Networks
MobileAdhoc Network represents complex distributed and decentralized system which leads to secure issues in the routing, many existing Anonymous routing protocols relying on either hop-by-hop encryption has proposed to...