Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Harini, P.
- Validating the Rule set with BDD & Usage with GEM for Improving Efficiency of Firewalls
Abstract Views :156 |
PDF Views:3
Authors
Affiliations
1 JNTUK, St.Ann‘sCollege of Engineering & Technology Chirala, Andhra Pradesh, IN
2 JNTUK, St.Ann‘s College of Engineering & Technology Chirala, Andhra Pradesh, IN
1 JNTUK, St.Ann‘sCollege of Engineering & Technology Chirala, Andhra Pradesh, IN
2 JNTUK, St.Ann‘s College of Engineering & Technology Chirala, Andhra Pradesh, IN
Source
Networking and Communication Engineering, Vol 4, No 8 (2012), Pagination: 463-470Abstract
World is running on internet in real sense since all the important and major tasks of life are carried out through internet. All the major and huge businesses depend on internet but at the same time internet is a big threat for these conglomerates. Because hackers and scams can ruin the online businesses and they could face great deal of data loss. In order to avoid such sort of internet corruption, firewalls are designed as to protect the networks from hackers and scams. Firewall is basically a blockade which restricts the outside forces from accessing your network and attacking your data. By filtering packets the firewalls can improve security and performance. However, as the size of the rule list increases, it becomes difficult to maintain and validate the rules. Ordered binary decision diagrams (BDDs) – a compact method of representing and manipulating Boolean expressions – are a potential method of representing the rules. Geometric Efficient Matching Algorithm (GEM) uses near-linear space, and only needs approximately 13 MB of space for rule-bases of 5,000 rules. Moreover, with use of additional space improving heuristics, the space requirement can be reduced to 2-3 MB for 5,000 rules. This paper presents a new approach not only to analyze and to validate rule sets and also resultant rule sets are passed as an input for Geometric Efficient Matching Algorithm for improving the efficiency of firewalls.Keywords
Firewall, BDDs, Internet Corruption, GEM.- Consistency Management Strategies for Data Replication in MANET
Abstract Views :174 |
PDF Views:3
Authors
Affiliations
1 St. Anns College of Engg & Technology, JNTU Kakinada, IN
2 St. Anns College of Engineering & Technology, JNTU Kakinada, IN
3 NIMRA College of Engineering & Technology, IN
1 St. Anns College of Engg & Technology, JNTU Kakinada, IN
2 St. Anns College of Engineering & Technology, JNTU Kakinada, IN
3 NIMRA College of Engineering & Technology, IN
Source
Networking and Communication Engineering, Vol 3, No 13 (2011), Pagination: 850-853Abstract
Data replication drastically improves data availability in a mobile ad hoc network. However, since mobile hosts’ mobility causes frequent network partitioning, consistency management of data operations on replicas becomes a crucial issue. In such an environment, the global consistency of data operations on replicas is not desirable by many applications. Thus, new consistency maintenance based on local conditions such as location and time need to be investigated. This paper attempts to classify different consistency levels according to requirements from applications and provides protocols to realize them.Keywords
Mobile Ad Hoc Networks, Consistency Management, Data Replication, Mobile Computing.- Multicast Multi-Path Power Efficient Routing in MANET
Abstract Views :174 |
PDF Views:3
Authors
Affiliations
1 St. Anns College of Engineering & Technology, IN
2 St. Anns College of Engg. & Technology, IN
3 St. Anns College of Engineering. & Technology, IN
4 NIMRA College of Engineering & Technology, IN
1 St. Anns College of Engineering & Technology, IN
2 St. Anns College of Engg. & Technology, IN
3 St. Anns College of Engineering. & Technology, IN
4 NIMRA College of Engineering & Technology, IN