Wireless Network & Security: Literature Review on DHCP, DNS, and VRRP

Verified

Added on  2023/06/07

|6
|1472
|214
AI Summary
This literature review covers the previous task done by research analysts with limitations laid down by their work. The DHCP (Dynamic Host Configuration Protocol) is a network protocol the permits a network administer to automatically give an Internet Protocol address to a computing device from certain range of numerical set for a particular network. DNS (Domain Name System) is the ranking decentralized naming program for computers as well as resources linked to internet. VRRP (Virtual Router Redundancy Protocol) is computing device networking protocol that offers automatic assignment of present Internet Protocol routers to involving hosts. The problem statement discusses the limitations of manual IP address assignment and the benefits of redundant networking.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
WIRELESS NETWORK & SECURITY
by Student’s Name:
Code Course name
Professor’s name
University
City, State
Date
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
LITERATURE REVIEW
DHCP
The literature review covers the previous task done by research analysts with limitations laid
down by their work. The DHCP (Dynamic Host Configuration Protocol) is a network protocol
the permits a network administer to automatically give an Internet Protocol address to a
computing device from certain range of numerical set for a particular network [11]. To begin
with, an Internet Protocol address is one of the significant parameters in an Internet Protocol
network and communication becomes impossible without the appropriate use of the Internet
Protocol addresses [5]. Generally, a network controller sets each computing device manually
with an Internet Protocol from a fixed address space. This technique lacks elements for self-
coordination and therefore the DHCP is the initial step toward self-coordination of the Internet
Protocol. With the aid of DHCP, the gadgets are capable to automatically gain an Internet
Protocol from an administrator [9]. The sovereign characteristic of Adhoc network needs the
availability of an Internet Protocol address auto structuring technique. In adhoc networks, we
require a way that has to comply with an extremely dynamic environment as well as unreliable
network architectures [7] A nice internet protocol address auto structuring of a protocol should
set a node with an Internet Protocol while upholding the following characteristics.
i. Less latency for assignment of the address
ii. Less convey overhead on an assignment of the address
iii. Fewer levels of Internet Protocol address collisions
DNS
Document Page
DNS (Domain Name System) is the ranking decentralized naming program for computers as
well as resources linked to internet. A peer to peer network is a category of decentralized as well
as distributed network structure which operates as both suppliers as well as consumers of items
to the integrated user-server model where user nodes query for items which are availed by the
server. In peer to peer network, data is shared amongst several peers that access the items
directly with aid of another network with every server [2]. Peer to peer networking use the
internet for user-based computing work and in current world personal devices have the speedy
processor, huge hard disk as well as vast memory so that they can operate general computing
operations such as e-mail as well as web browsing [10]. An administrator computer normally has
the vast number of items and must react to the resources for the information transaction among
various client computers. Customer computers send a request for the items or data from the
computing acting as servers [8].Peer to peer networks are program-based networks made on the
last portion of the systems, that output message routing as well as delivery. Peer to peer network
structures are the forming blocks in the structure as well as the implementation of P2P programs.
Apparent peer to peer sub-nodes is held on DHTs and instances of DHTs are Chord as well as
Pastry [12]. Peer to peer network contributes the details as well as resources to the central point
as well the point of the network.
VRRP
VRRP (Virtual Router Redundancy Protocol) is computing device networking protocol that
offers automatic assignment of present Internet Protocol routers to involving hosts [4]. A defect
in a network program will stop customers from reaching significant data. In any institution users
will rely on a network for various operations, that makes great presence is one of the initial
criteria [1]. The availability aids to obtain as well as to sustain the aims which are going hand in
Document Page
hand with the business target. This implies that 24/7 given a priority in any institution, fast
network availability lead to every network reliable services activity to operate well and decrease
the opportunity for downtime that is created by an error. Generally, the redundant network offers
an important value in business, because of little, self-healing system, speedy recovery times also
business secures money over the long period [3]. Cable breaking, as well as wrong
administration of network gadgets, is always origination of failure in internet connections
functions, similarly, the procedure for looking for errors it becomes costly and more difficult,
thus less carelessness of the risk price creation stoppages as well as economically necessary
outages. The utilization of redundant real-time networking makes the router wire separate [6].
Problem statement
Traditionally, network configurators used to set Internet protocol addresses manually to every
computer which consumed a lot of time. Outside Dependency - Currently, there are 12 DNS
Root Server administrators for the 13 Root Server letters, with in excess of 400 occurrences sent
all around. Contrasted with the number of associated gadgets, AS systems, and recursive DNS
servers, the quantity of root occasions is a long way from adequate. Availability misfortune
between one self-ruling system and the IANA root name servers more often than not results in
loss of nearby administration inside the neighborhood organize, notwithstanding when an inward
network is great. Additionally, this sort of outer reliance will present additional system activity
cost when BGP steering is wasteful.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
[1] P. S. Bose, “Refugees in Vermont: mobility and acculturation in a new immigrant
destination,” Journal of Transport Geography, vol. 36, pp. 151–159, 2014.
[2] D. N. Chan, L. Y. Lui, and W. K. So, “Effectiveness of exercise programmes on shoulder
mobility and lymphoedema after axillary lymph node dissection for breast cancer:
systematic review,” Journal of Advanced Nursing, Feb. 2010.
[3] Y. T. Chang, J. W. Ding, C. H. Ke, & I. Y. Chen, “A survey of handoff schemes for
vehicular ad-hoc networks,” In Proceedings of the 6th international wireless
communications and mobile computing conference, June 2010, pp. 1228-1231.
[4] P. Dubey, S. Sharma, & Sachdev, Review of first-hop redundancy protocol and their
functionalities,” International Journal of Engineering Trends and Technology
(IJETT), 4(5), 1085-1088, 2013.
[5] M. L. C. Ellett, “A literature review of the safety and efficacy of using propofol for
sedation in endoscopy,” Gastroenterology Nursing, 2013, 33(2), 111-117.
[6] I. Gridchyna, A. M. Cloutier, L. Nkeng, C. Craig, S. Frise, & Y. Moride,
Methodological gaps in the assessment of risk minimization interventions: a systematic
review,” Pharmacoepidemiology and drug safety, 2014, 23(6), 572-579.
[7] L. Hernandez, H. Villanueva, & S. Estrada, “Proposal for the Design of a New
Technological Infrastructure for the Efficient Management of Network Services and
Applications in a High Complexity Clinic in Colombia,” In Proceedings of the
Computational Methods in Systems and Software, September, 2017, pp. 74-85.
Document Page
[8] S. M. Jan, F. Y. Khan, , M. A. Bhat & R. Behal, Primary tuberculous gingival
enlargement-A rare clinical entity: Case report and the brief review of the literature,”
Journal of Indian Society of Periodontology, 2014 18(5), 632.
[9] C. E. Reese, P. R. Jeffries, & Engum, Learning together: Using simulations to develop
nursing and medical student collaboration,” Nursing education perspectives, 2014, 31(1),
33-37.
[10] R. Scroggins, Virtualization technology literature review,” Global Journal of Computer
Science and Technology, 2013
[11] J. N. P. Soon, S. H. R. Abdulla, C. P. Yin, W. S. Wan, P. K. Yuen, & L. E. Heng,
Implementing of Virtual Router Redundancy Protocol in a Private University,” Journal
of Industrial and Intelligent Information Vol, 1, 2013.
[12] G. R. Tabor & M. H. Baba-Ahmadi ,“Inlet conditions for large eddy simulation: a
review,” Computers & Fluids, 2014, 39(4), 553-567.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]