CFP last date
20 May 2024
Reseach Article

Result Analysis of Virtual IP Address Configuration Protocol

by Satinder Kaur, Tanu Preet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 2
Year of Publication: 2013
Authors: Satinder Kaur, Tanu Preet Singh
10.5120/10607-5321

Satinder Kaur, Tanu Preet Singh . Result Analysis of Virtual IP Address Configuration Protocol. International Journal of Computer Applications. 64, 2 ( February 2013), 26-31. DOI=10.5120/10607-5321

@article{ 10.5120/10607-5321,
author = { Satinder Kaur, Tanu Preet Singh },
title = { Result Analysis of Virtual IP Address Configuration Protocol },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 2 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number2/10607-5321/ },
doi = { 10.5120/10607-5321 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:22.060311+05:30
%A Satinder Kaur
%A Tanu Preet Singh
%T Result Analysis of Virtual IP Address Configuration Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 2
%P 26-31
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc networks are known to make as their own network without any defined infrastructure. They can be rapidly vanished and rebuild again. There are some set of applications for MANETs which are diverse, ranging from small static networks that are constrained with the sources of power, large scale mobile, and highly dynamic nature networks. The great success in the working of mobile adhoc network varies on the cooperation of nodes for providing best services to the other nodes. Since mobile ad hoc networks make it possible for the devices to join or leave the domain without required permission, node in the domain cannot considered to be trusted Conventional security approaches do not address all concerns of ad hoc networks since both benign and malicious parties have full admission to communicate with peers. The wireless channel is accessible to both legitimate network users and malicious attackers. Attackers may intrude into the network through the subverted nodes. In spite of the dynamic nature, mobile users can use this network for anytime, anywhere services as a security purpose and as they are in motion from one place to another. In this research work, there are two techniques which are implemented: Generation of IP addresses virtually and Allocation of IP address virtually. In these techniques, research is based on implementation of virtual IP address on basis of above discussed algorithms. The technique proposes the methodology of allowing to generation and allocation of IP address virtually. The simulation results have demonstrated some important characteristic. This technique decreases the number of computations which are used in table i. e. every time there is no need to check from the table that whether this address is already allocated or not.

References
  1. Suman Deswal and Sukhbir Singh," Implementation of Routing Security Aspects in AODV", International Journal of Computer Theory and Engineering. Vol. 2, No. 1, February, 2010.
  2. A Rajaram, Dr. S. Palaniswami. " Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol" (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (2), 2010.
  3. C. E. Perkins and K-Y. Wang, "Optimized Smooth Handoffs in Mobile IP," Proc. 4th IEEE Symp. Computers and Communications (ISCC 99), IEEE CS Press, 1999, pp. 340-346.
  4. C. E. Perkins and D. B. Johnson, "Mobility support in IPv6," Proc. 2nd Ann. Int'l Conf. Mobile Computing and Networking (Mobicom 96), ACM Press, 1996, pp. 27-37.
  5. C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination- Sequenced Distance-Vector (DSDV) Routing for Mobile Computers," Proc. ACM SIGCOMM '94 Conf. Communications Architectures, Protocols and Applications, ACM Press, 1994, pp. 234-244.
  6. D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks," Ad Hoc Networking, C. E. Perkins, ed. , Addison-Wesley, 2000, pp. 139- 172.
  7. Z. J. Haas and M. R. Pearlman, "ZRP: A Hybrid Framework for Routing in Ad Hoc Networks," Ad Hoc Networking, C. E. Perkins, ed. , Addison-Wesley,2000, pp. 221-253.
  8. K. Weniger, "Passive duplicate address detection in mobile ad hoc networks," in IEEE WCNC, (Florence, Italy), February 2003.
  9. Thoppian, M. R. ; Prakash R. ;, "A distributed protocol for dynamic address assignment in mobile ad hoc networks,"Mobile Computing, IEEE Transactions on , vol. 5, no. 1, pp. 4-19, Jan. 2006
  10. Ghosh, A. ; Talpade R; Elaoud M. ; Bereschinsky M. ;, "Securing ad-hoc networks using IPsec," Military Communications Conference, 2005. MILCOM 2005. IEEE , vol. , no. , pp. 2948- 2953 Vol. 5, Oct. 2005
  11. Jung, Y. C. ; Peradilla M. ;, "Tunnel Gateway Satisfying Mobility and Security Requirements of Mobile and IP-Based Networks," Journal of Communications and Networks, vol. 13, no. 6, pp. 583-590, Dec. 2011
  12. C. E. Perkins, J. T. Malinen, R. Wakikawa, E. M. Belding-Royer and Y. Sun,"IP Address Autoconfiguration for Ad Hoc Networks, draft-ietfmanetautoconf- 01. txt," Internet Engineering Task Force, MANETWorking Group, July 2000.
  13. N. H. Vaidya, "Weak duplicate address detection in mobile ad hoc networks", tech. rep. , University of Illinois at Urbana-Champaign, January 2002.
  14. K. Weniger, "Passive Duplicate Address Detection in Mobile Ad Hoc Networks", in Proc. of IEEE WCNC 2003, New Orleans, USA, March 2003.
  15. S. Nesargi and R. Prakash, "MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network," in Proceedings of IEEE INFOCOM, volume 2, pages 23-27, New York, USA, June 2002.
  16. M. Mohsin and R. Prakash, "IP Address Assignment in a Mobile Ad Hoc Network," in Proceedings of Military Communications Conference (MILCOM 2002), volume 2, pages 856-861, Anaheim, California, USA, October 2002.
  17. J. P. Sheu, S. H. Tu and L. H. Chan, "A Distributed IP Address Assignment Scheme for Ad Hoc Networks," in Proceedings of the 2005 11th International Conference on Parallel and Distributed Systems (ICPADS'05), volume 1, pages 439-445 Vol. 1, July 2005.
  18. R. Droms. Dynamic host configuration protocol. RFC 1531,Oct. 1993.
  19. S. Thomson and T. Narten. IPv6 stateless address autoconfiguration. RFC 2642, Dec. 1998.
  20. S. Cheshire, B. Aboba, and E. Guttman. Dynamic configuration of link-local IPv4 addresses. Internet Draft: draftietf-zeroconf-ipv4-linklocal-13. txt, Feb. 2004.
  21. M. Mohsin and R. Prakash. IP address assignment in a MANET. In IEEE Milcom, Anaheim, California, USA,2002.
  22. S. Nesargi and R. Prakash. MANETconf configuration of hosts in a MANET. In IEEE Infocom, New York, USA, 2002.
  23. C. Perkins, J. Malinen, R. Wakikawa, E. Belding-Royer, and Y. Sun. IP address autoconfiguration for ad hoc networks. Internet Draft: draft-ietf-manet-autoconf-01. txt, Nov. 2001.
  24. C. E. Perkins, J. T. Malinen, R. Wakikawa, E. Belding- Royer, and Y. Sun. IP address autoconfiguration for ad hoc networks. IETF Internet Draft, draft-ietf-manet-autoconf- 01. txt, Nov. 2001.
  25. C. E. Perkins, E. M. Royer, and S. R. Das. Ad hoc ondemand distance vector (AODV) routing. draft-ietf-manetaodv- 06. txt, July 2000.
Index Terms

Computer Science
Information Sciences

Keywords

IPv6 Foreign Agent Home Agent Mobile IP Virtual IP