Types of Routing Protocols to maintain Message Security

Abstract

Every machine on the Internet has a unique number assigned to it, called an IP address. Without a unique IP address on your machine, you will not be able to communicate with other devices, users, and computers on the Internet. You can look at your IP address as if it were a telephone number, An IP address is a fascinating product of modern computer technology designed to allow one computer (or other digital device) to communicate with another via the Internet. IP addresses allow the location of literally billions of digital devices that are connected to the Internet to be pinpointed and differentiated from other devices. In the same sense that someone needs your mailing address to send you a letter, a remote computer needs your IP address to communicate with your computer.

Authors and Affiliations

Ramanpreet Kaur, Cherry Goyal, Harjeet Kaur , Mandeep Singh

Keywords

Related Articles

Performance Analysis of Flat Plate Solar Water Collector using Trapezoidal shape and Semicircular Tubes

The flat plate collector forms the heart of any solar energy collection systems designed for operation in the low temperature range, from ambient to 60oc, or the medium temperature range, from ambient to 100oc. A well e...

Design of a Crane Hook of Different Materials and Stress Analysis Using ANSYS Workbench

Crane hook is a prominent component used for lifting the loads. They often undergo failure due to stress concentration. Hence a study on stresses induced in them helps us better understand how to prevent failure. The ai...

Adapting New Generation Technologies in Smart Farming

Modern challenges of the present situation of our country is to improve the plant growth with low cost because as the population of the country is increasing need for the vegetation is becoming a major criteria, with th...

Electing a Cluster Head for Efficient Data Transmission in Wireless Networks

A cluster denotes a group of independent servers interconnected through a dedicated network to work as one centralized data processing resource. Clustering is a popular strategy for implementing parallel processing appl...

A Review Paper on Cryptography for Data Security

Cryptography is the technique with which we can convert the message into secret text which is not understandable to unauthorized users. It is the technique for hiding data and information from unauthorized users. When w...

Download PDF file
  • EP ID EP22823
  • DOI -
  • Views 173
  • Downloads 4

How To Cite

Ramanpreet Kaur, Cherry Goyal, Harjeet Kaur, Mandeep Singh (2016). Types of Routing Protocols to maintain Message Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(11), -. https://www.europub.co.uk/articles/-A-22823