Access Restriction

Author Mahalakshmi, C. ♦ Ramaswamy, M.
Source CiteSeerX
Content type Text
File Format PDF
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Virtual Private Network ♦ Secure Transmission ♦ Network Simulator-2 ♦ Related Certificate ♦ Private Dedicated Network ♦ Data Packet ♦ Alternative Direction ♦ Practical World ♦ Performance Index ♦ Minimum Bandwidth Path ♦ Hose Architecture ♦ Data Transmission ♦ Wired Virtual Private Network ♦ Uninterrupted Data Transfer
Abstract Abstract — The paper attempts to streamline the process of data transmission in a wired Virtual Private Network (VPN), with a view to foresee the occurrence of attacks and attach a sense of security to its travel. It translates the sequence of generation of keys in the process of routing and be-hives a sequence to wait for the related certificates before the transfer of data packets It avails the facilities in the hose architecture to relay the methodology in the minimum bandwidth path and ensure an uninterrupted data transfer over the leased lines in the private dedicated network. The design allows the stream of message to continue in alternative directions between the chosen source and destination in the event of occurrence of disruptions. The procedure springs up with computation of performance indices through Network Simulator-2 (NS-2) to exhibit the viability of the formulation for use in the practical world.
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study