Design & Implementation Of DAA Protocol Mr.P.Anilkumar

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 10-Oct 2013
Design & Implementation Of DAA Protocol
Mr.P.Anilkumar#1, Mr. K. Sudhakar*2
#
M.Tech Student, Department of ECE & St.John’s College of Engineering & Technology
Yerrakota, Yemmiganur, Kurnool,A.P,India
Abstract— False data can be injected by compromised sensor
nodes in various ways, including data aggregation and relaying
in wireless sensor networks. Since data aggregation is essential to
reduce data redundancy to improve data accuracy, false data
detection is critical to the provision of data integrity and efficient
utilisation of battery power and bandwidth. To support
confidential data transmission, the sensor nodes between two
consecutive data aggregators verify the data integrity on the
encrypted data rather than the plain data. Performance analysis
as shows that DAA detects any false data injected up to ‘T’
compromised nodes, and that the detected false data are not
forwarded beyond the next data aggregator on the path. Despite
that false data detection and data confidentiality increases the
communication overhead; simulation results shows the DAA can
still reduce the amount of transmitted data up to 60% with the
help of data aggregation and early detection of false data. The
main objectives of this paper are- false data detection, integrate
the detection of false data with data aggregation and
confidentiality, to present the novel security protocol DAA to
integrate data aggregation, confidentiality and false data
detection and to reduce the amount of transmitted data over the
wireless sensor networks with the help of data aggregation and
early data detection of false data, to a significant improvement in
bandwidth utilisation and energy consumption. Compromised
sensor nodes in wireless sensor networks, can distort the integrity
of data by injecting false data. Previously known techniques on
false data detection do not support data confidentiality and
aggregations, even though they are usually essential to wireless
sensor networks. However, this paper has presented the novel
security protocol DAA to integrate data aggregation,
confidentiality and false data detection.
Keywords— DAA, Data integrity, network-level Security,
confidentiality, aggregation, bandwidth.
I.
INTRODUCTION
Wireless sensor networks are vulnerable to many types of
security attacks, including false data injection, data forgery,
and eavesdropping. Sensor nodes can be compromised by
intruders, and the compromised nodes can distort data
integrity by injecting false data. The transmission of false data
depletes the constrained battery power and degrades the
bandwidth utilization. False data can be injected by
compromised sensor nodes in various ways, including data
aggregation and relaying. Because data aggregation is
essential to reduce data redundancy and/or to improve data
accuracy, false data detection is critical to the provision of
data integrity and efficient utilization of battery power and
bandwidth. In addition to false data detection, data
ISSN: 2231-5381
confidentiality is required by many sensor networks
applications to provide safeguard against eavesdropping.
Fig.1 forming sensor pairs
Above Fig. 1 is an example of forming sensor pairs to
authenticate data for the false data detection scheme in, where
data aggregation is not allowed if it requires any change in the
data.
This Work is the first of its kind to integrate the detection
of false data with data aggregation and confidentiality. Data
confidentiality prefers data to be encrypted at the source node
and decrypted at the destination. However, data aggregation
techniques usually require any encrypted sensor data to be
decrypted at data aggregators for aggregation. The existing
false data detection algorithms address neither data
aggregation nor confidentiality. Although they could be
modified easily to support data confidentiality, it is a
challenge for them to support the data aggregation that alters
data. For instance, the basic idea behind the false data
detection algorithm in is to form pairs of sensor nodes such
that one pair mate computes a message authentication code
(MAC) of forwarded data and the other pairmate later verifies
the data using the MAC, as illustrated in Fig. 1. In this scheme,
any data change between two pairmates is considered as false
data injection, and therefore, data aggregation is not allowed if
it requires alterations in the data. Hence, the false data
detection algorithm cannot be implemented when a data
aggregator between two pairmates changes the data.
Data aggregation is implemented in wireless sensor
networks to eliminate data redundancy, reduce data
transmission, and improve data accuracy. Data aggregation
results in better bandwidth and battery utilization, which
enhances the network lifetime because communication
constitutes 70% of the total energy consumption of the
network. Although data aggregation is very useful, it could
cause some security problems because a compromised data
aggregator may inject false data during data aggregation.
When data aggregation is allowed, the false data detection
technique should determine correctly whether any data
alteration is due to data aggregation or false data injection. A
http://www.ijettjournal.org
Page 4519
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 10-Oct 2013
joint data aggregation and false data detection technique has
to ensure that data are altered by data aggregation only.
This Work introduces a data aggregation and
authentication protocol (DAA) to provide false data detection
and secure data aggregation against up to T compromised
sensor nodes, for T>=1 . The value of T depends on security
requirements, node density, packet size, and the amount of
tolerable overhead.
In this Work it has been assumed that some sensor nodes
are selected dynamically as data aggregators, and the nodes
between two consecutive data aggregators are called
forwarding nodes simply because they forward data. To detect
false data injected by a data aggregator while performing data
aggregation, some neighbouring nodes of the data aggregator
(called monitoring nodes) also perform data aggregation and
compute MACs for the aggregated data to enable their pair
mates to verify the data later.
DAA also provides data confidentiality as data are
forwarded between data aggregators. To provide data
confidentiality during data forwarding between every two
consecutive data aggregators, the aggregated data are
encrypted at data aggregators, and false data detection is
performed over the encrypted data rather than the plain data.
Whenever the verification of encrypted data fails at a
forwarding node, the data are dropped immediately to
minimize the waste of resources such as bandwidth and
battery power due to false data injection.
A. Objectives of the Work
The main objectives of the Work are
 False data detection.
 To integrate the detection of false data with data
aggregation and confidentiality.
 To present the novel security protocol DAA to integrate
data aggregation, confidentiality, and false data
detection.
 To reduce the amount of transmitted data over the
wireless sensor network with the
help of data
aggregation and early detection of false data, to a
significant improvement in bandwidth utilization and
energy consumption.
II.
DESIGN OF DAA PROTOCOL
Wireless sensor networks are usually deployed in remote
and hostile environments to transmit sensitive information,
sensor nodes are prone to node compromise attacks and
security issues such as data confidentiality and integrity are
extremely important. Hence, wireless sensor network
protocols, e.g., data aggregation and authentication protocol,
must be designed with security in mind.
This Work presents a data aggregation and authentication
protocol (DAA) to provide false data detection and secure
data aggregation against up to T compromised sensor nodes.
Data aggregation techniques usually require any encrypted
sensor data to be decrypted at data aggregators for aggregation.
Data confidentiality prefers data to be encrypted at the source
node and decrypted at the destination. Data aggregation is the
ISSN: 2231-5381
process of summarizing and combining sensor data in order to
reduce the amount of data transmission in the network.
A System Architecture of DAA
. To support false data detection, secure data aggregation,
and confidentiality against up to T compromised sensor nodes,
DAA forms 2T+1 pairs of sensor nodes by the neighbouring
and forwarding nodes of Au and Af.
This Work introduces a data aggregation and
authentication protocol (DAA) to provide false data detection
and secure data aggregation against up to T compromised
sensor nodes, for T ≥ 1. The value of T depends on security
requirements, node density, packet size, and the amount of
tolerable overhead. We assume that some sensor nodes are
selected dynamically as data aggregators, and the nodes
between two consecutive data aggregators are called
forwarding nodes simply because they forward data.
To detect false data injected by a data aggregator while
performing data aggregation, some neighboring nodes of the
data aggregator (called monitoring nodes) also perform data
aggregation and compute MACs for the aggregated data to
enable their pair mates to verify the data later. DAA also
provides data confidentiality as data are forwarded between
data aggregators.
To provide data confidentiality during data forwarding
between every two consecutive data aggregators, the
aggregated data are encrypted at data aggregators, and false
data detection is performed over the encrypted data rather than
the plain data. SYSTEM Design
III.
SYSTEM DESIGN
A. Introduction
System design is the stage of the Work when the
theoretical design is turned out into a working system. Thus it
can be considered to be the most critical stage in achieving a
successful new system and in giving the user, confidence that
the new system will work and be effective. This stage
involves careful planning, investigation of the existing system
and it’s constraints on implementation, designing of methods
to achieve change over and evaluation of changeover methods.
B. Block Diagram
Fig. 2 shows the functional block diagram of DAA
protocol. It contains the following modules,
 Networking Module.
 Stream Module.
 Message authentication codes Module.
 Key recovery Module.
 Authentication Module.
1) Networking Module: Client-server computing or
networking is a distributed application architecture that
partitions tasks or workloads between service providers
(servers) and service requesters, called clients. Often clients
and servers operate over a computer network on separate
hardware.
http://www.ijettjournal.org
Page 4520
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 10-Oct 2013
Monitoring Server
Server
Router
IP
Address
Cryptographic
scheme
File
transfer
File
receive
Client
IP
Address
Cryptographic
scheme
Fig. 2 Block Diagram of the System
Fig. 2 shows the functional block diagram of DAA
protocol. It contains the following modules,
 Networking Module.
 Stream Module.
 Message authentication codes Module.
 Key recovery Module.
 Authentication Module.
1) Networking Module: Client-server computing or
networking is a distributed application architecture that
partitions tasks or workloads between service providers
(servers) and service requesters, called clients. Often clients
and servers operate over a computer network on separate
hardware.
A server machine is a high-performance host that is running
one or more server programs which share its resources with
clients. A client also shares any of its resources; Clients
therefore initiate communication sessions with servers which
await (listen to) incoming requests. To support data
aggregation along with false data detection, the monitoring
nodes of every data aggregator also conduct data aggregation
and compute the corresponding small-size message
authentication codes for data verification at their pair mates.
2) Streaming Module: A stream cipher is a symmetric
encryptor (i.e., the transmitter and receiver share the same
secret key). The key forms a seed which generates a
pseudorandom key-stream. At the transmitting end, this key
stream is XOR-ed with the clear text stream, yielding a cipher
text stream. The receiver, having the same seed key, generates
synchronously the same key-stream. XOR-ing with the
received cipher text yields the clear text back. Stream ciphers
operate at a higher speed than block ciphers and have
relatively low hardware complexity.
3) Message authentication codes Module: A short section of
the output is stored, without entering a long key-stream into a
CRC circuitry; the one-way feature of the transformation is
still kept. However, a relatively short string does not exhibit
randomness properties and rather represents a limited event
that may have a problematic pattern. Therefore, generating a
ISSN: 2231-5381
relatively long key-stream and entering it into a CRC circuitry,
which preserves the randomness of its input, is desired.
4) Key recovery Module: Recovering S from a compressed
version of the cipher’s output key-stream, even if the
compression is based on a simple linear CRC, cannot have a
lower complexity than the recovery of S from a fully given
key-stream. As the latter is expected to be infeasible for
secure cipher, the irreversibility of the transformation is at
least as strong as the underlying security of the cipher.
5) Data aggregation and Authentication Module: MAC (M K)
is a one-way transformation of the message M and a secret
key K. The implementation this transformation can be based
on various approaches. Hash Message Authentication Code
(HMAC) is a hash transformation parameterized with a secret
key. That is, it is an implementation of MAC (M K). In this
paper, we treat a standardized HMAC, The security of such
implementations has been revised, stating that the attacks “do
not contradict the security proof of HMAC, but they improve
our understanding of the security of HMAC based on the
existing cryptographic hash functions.
I.
RESULTS AND D ISCUSSIONS
In this chapter the simulation results of the Data
aggregation and authentication protocol are discussed.
A Testing Results of DAA Protocol Software
Testing is a critical element which assures effectiveness of
the proposed system in meeting its objectives. Testing is done
at various stages in the System designing and implementation
process with an objective of developing a transparent, flexible
and secured system. The purpose of testing is to discover
errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a
way to check the functionality of components, sub assemblies,
assemblies and/or a finished product. It is the process of
exercising software with the intent of ensuring that the
software meets its requirements and user expectations and
does not fail in an unacceptable manner.
WLANs have revolutionized the way people are using their
computers to communicate. As WLANs eliminate the need of
wires for connecting end users, they provide a very easy,
viable access to the network and its services. A wireless LAN
or WLAN is a wireless local area network, which is the
linking of two or more computers without using wires.
WLAN utilizes spread-spectrum modulation technology
based on radio waves to enable communication between
devices in a limited area, also known as the basic service set.
This gives users the mobility to move around within a broad
coverage area and still be connected to the network. Wireless
has become popular due to ease of installation and mobility.
To transport the data on a wireless network radio frequency,
microwave and infrared are used as a transportation media.
After establishing the WLAN network connection between
server and the clients, clients can request for any files or data
from the server.
http://www.ijettjournal.org
Page 4521
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 10-Oct 2013
B Simulation Results for Secure Data Transmission
Run the Server and Client source code programs. After
running the Server and Client source code programs, we can
observe the Client home window and Server home window as
shown in Fig. 3 and Fig. 4 respectively.
Fig. 4 shows the client design snap snapshot. In this figure
we can observe the following blocks:
 Select receiving path
 Received Key Value
 Generate key and
 Validate
1) Client (computer): A client is an application or system that
accesses a remote service on another computer system, known
as a server, by way of a network. The term was first applied to
devices that were not capable of running their own standalone programs, but could interact with remote computers via
a network (WLAN). These dumb terminals were clients of the
time-sharing mainframe computer.
 Server
 Generate key
 Connect to client
Fig. 4 Snapshot of Server Home Window
5) Server: A computer program running as a service, to serve
the needs or requests of other programs (referred to in this
context as "clients") which may or may not be running on the
same computer. In computer networking, a server is a
program that operates as a socket listener. The term server is
also often generalized to describe a host that is deployed to
execute one or more such programs.
Fig. 3 Snapshot of Client Home Window
2) Select receiving path: To access a remote service from
another computer (Server), client has to choose the receiving
path. Client can select any drive or folder as the receiving path
to save the received file or data.
3) Generate Key: Before transmitting the actual file server
computes the key value and encrypts the file. Encrypted file is
transferred over the network to the destination. During data
forwarding between every two consecutive data aggregators,
the aggregated data are encrypted at data aggregators and false
data detection is performed over the encrypted data rather than
the plain data. Whenever the verification of encrypted data
fails at a forwarding node, the data are dropped immediately.
Client receives the transmitted file as well as generated key at
the server. To verify the received data client has to recompute
the key value for the received file. Therefore the main
function of the Generate key icon at the client is to generate
key value for the received file.
4) Validate: To verify the correctness of the received file, it is
necessary to compare the generated key value at the receiver
(client) side and received key value. Click on the validate icon
on the client window it compares the generated key with the
received key, if they are equal then it displays “successfully
received full data” , otherwise it displays a warning message
“founded file has been corrupted”.
Fig. 4 shows the client design snap snapshot. In this figure
we can observe the following blocks:
ISSN: 2231-5381
Fig. 5 Snapshot for File Selection
A server computer is a computer, or series of computers,
that link other computers or electronic devices together. They
often provide essential services across a network, either to
private users inside a large organization or to public users via
the internet. For example, when user enters a query in a search
engine, the query is sent from your computer over the internet
to the servers that store all the relevant web pages. The results
are sent back by the server to user computer.
At the Server it is necessary to select a file for transmission.
To select a file from the server click on the Open button on
the server home window then it shows a list of documents as
shown in Fig. 5. In Fig. 5 it is observed that SAMPLE
SCREEN.doc file is selected for transmission. Next step is to
encrypt the file and generate a pseudorandom key value.
6) Generate Key: Before transmitting the actual file server
computes the key value as shown in Fig. 5 . We can see that
the generated key value is 2591193488. Server transmits
generated key as well as the encrypted file via WLAN.
http://www.ijettjournal.org
Page 4522
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 10-Oct 2013
receiving path and generated key 2591193488. Client again
recomputed the key value for the received data and is same as
that of the received key value 2591193488. Therefore it
indicates the successful reception of the full data. It also
shows the message “No False Data, Received successfully”.
Fig. 6 Snapshot for Generated Key Value at the Server
7) Connect to client: It shows the list of client IP addresses
that are connected to the server as shown in Fig. 7. We can see
there are two clients are connected to the server with IP
address 192.168.1.3 and 192.168.1.4. From the list of client
IP’s, we must select any one client IP as destination address.
We can observe the transmitted IP is 192.168.1.4.
Fig. 9 Snapshot of Client Home Window for Successful Reception of the Data
Fig. 10 Snapshot of Average Received Data V/S Key Value
Fig. 7 Snapshot of Client List Window
In Fig. 8 we can observe the selected destination IP
address 192.168.1.4 and server transfers the encrypted file to
this IP address. By transmitting encrypted data rather than the
plain data DAA protocol provides confidentiality. Encrypted
data is aggregated at each of the sensor node (client). In this
protocol aggregation is a technique used to solve the
Implosion and Overlaying problems in WSN. Implosion
means reception of the multiple copies of the same file and
overlaying means reception of the multiple files with same
name. The proposed protocol eliminates these two problems
by aggregating the sensor data at each node. The aggregated
data are encrypted at data aggregators and false data detection
is performed over the encrypted data rather than the plain data.
Whenever the verification of encrypted data fails at a
forwarding node, the data are dropped immediately to
minimize the waste of resources such as bandwidth and
battery power due to false data injection.
Fig. 11 shows the snapshot of the graph of average received
data and the key value. It clearly shows that both key values
are same. Therefore no false data is injected to the transmitted
data.
C Simulation Results for Data Aggregation and False Data
Detection
As we know that data aggregation eliminates the implosion
and overlaying problems in Wireless sensor networks. To
illustrate this in simulation consider the same file transmission
to the same destination IP address, which already contains a
copy of this file. From Fig. 11, we can observe that the
received key value is 2591193488 but the generated key value
is 2257643084. Therefore Data aggregation and authentication
protocol eliminates the implosion and overlaying problems. It
detects that the received file has been corrupted and it shows
the message box “Error: False data received”.
Fig. 8 Snapshot showing Destination IP Address
Saturday, June 02, 2012
Fig. 11 Snapshot of False Data Detection
Fig. 9 shows the reception of the correct data. We
can observe the client is receiving transmitted data to
ISSN: 2231-5381
http://www.ijettjournal.org
Page 4523
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 10-Oct 2013
MTIET, Palamaner and the Staff members of ECE Dept.
MTIET, family members, and friends, one and all who helped
us to make this paper successful.
REFERENCES
[1]
[2]
Fig. 12 snapshot of graph of Average received data and Key Value
Fig. 12 shows the snapshot of the graph of average
received data and key value. It clearly shows that both key
values are different. Therefore it indicates founded file has
been corrupted and Error: False data reception. Therefore
Data aggregation and authentication protocol integrates data
aggregation, confidentiality and false data detection. It also
reduces the amount of data transmitted over the Wireless
sensor network with the help of data aggregation and early
detection of false data.
II.
CONCLUSION
In wireless sensor networks, compromised sensor nodes
can distort the integrity of data by injecting false data.
Previously known techniques on false data detection do not
support data confidentiality and aggregation, even though they
are usually essential to wireless sensor networks. However,
this Work has presented the novel security protocol DAA to
integrate data aggregation, confidentiality, and false data
detection. DAA appends two FMACs to each data packet.
To reduce the communication overhead of algorithm SDFC,
the size of each FMAC is kept fixed. Each FMAC consists of
sub-MACs to safeguard the data against up to compromised
sensor nodes. The performance analysis indicates that the
computational and communication overhead of DAA is not
substantial, thereby making the implementation of DAA
feasible.
The proposed protocol also provides data confidentiality as
data are forwarded between data aggregators. To provide data
confidentiality during data forwarding between every two
consecutive data aggregators, the aggregated data are
encrypted at data aggregators, and false data detection is
performed over the encrypted data rather than the plain data.
Whenever the verification of encrypted data fails at a
forwarding node, the data are dropped immediately to
minimize the waste of resources such as bandwidth and
battery power due to false data injection.
The simulation result shows that the amount of transmitted
data over the wireless sensor network is reduced with the help
of data aggregation and early detection of false data.
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
TEXT BOOKS REFERRED:
[18]
[19]
ACKNOWLEDGMENT
We sincerely thank K.Sudhakar, HOD ECE, SJCET, Mrs.
Geetha, Asso. Professor, Mr. Hemanth.J Asst. Professor,
MTIET, Palamaner, Chittoor, Principal MTIET, Management
ISSN: 2231-5381
Saut Ozdemir and Hasan Cam, Senior Member, “Integration of False
Data Detection with Data Aggregation and Confidential Transmission
in Wireless Sensor Networks”, IEEE/ACM Trans. on networking,
vol.18, No.3, June 2010.
F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A
survey on sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp.
102–114, Aug. 2002.
F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical en-route detection and
filtering of injected false data in sensor networks,” in Proc. IEEE
INFOCOM, 2004, vol. 4, pp. 2446–2457.
S. Zhu, S. Setia, S. Jajodia, and P. Ning, “Interleaved hop-by-hop
authentication against false data injection attacks in sensor networks,”
ACM Trans. Sensor Netw., vol. 3, no. 3, Aug. 2007.
H. Yang and S. Lu, “Commutative cipher based en-route filtering in
wireless sensor networks,” in Proc. IEEE VTC, 2004, vol. 2, pp. 1223–
1227.
Z. Yu and Y. Guan, “A dynamic en-route scheme for filtering false
data in wireless sensor networks,” in Proc. IEEE INFOCOM,
Barcelona, Spain, Apr. 23–27, 2006, pp.1 12.
C. Intanagonwiwat, D. Estrin, R. Govindan, and J. Heidemann,
“Impact of network density on data aggregation in wireless sensor
networks,” in Proc. 22nd Int. Conf. Distrib. Comput. Syst., Jul. 2002,
pp. 575–578.
A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, “SPINS:
Security protocols for sensor networks,” Wireless Netw. J., vol. 8, pp.
521–534, Sep. 2002.
W. Diffie and M. Hellman, “New directions in cryptography,” IEEE
Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644–654, Nov. 1976.
L. Hu and D. Evans, “Secure aggregation for wireless networks,” in
Proc. Workshop Security Assurance Ad hoc Netw., Orlando, FL, Jan.
28, 2003, pp. 384–394.
B. Przydatek, D. Song, and A. Perrig, “SIA: Secure information
aggregation in sensor networks,” in Proc. SenSys, 2003, pp. 255–265.
H. Çam, S. Ozdemir, P. Nair, D.Muthuavinashiappan, and H. O. Sanli,
“Energy-efficient and secure pattern based data aggregation for
wireless sensor networks,” Comput. Commun., vol. 29, no. 4, pp. 446–
455, Feb. 2006.
D. Seetharam and S. Rhee, “An efficient pseudo random number
generator for low-power sensor networks,” in Proc. 29th Annu. IEEE
Int. Conf. Local Comput. Netw., 2004, pp. 560–562.
R. Rajagopalan and P. K. Varshney, “Data aggregation techniques in
sensor networks: A survey,” IEEE Commun. Surveys Tutorials, vol. 8,
no. 4, 4th Quarter 2006.
P. Gauravaram, W. Millan, J. G. Nieto, and E. Dawson, “3C—A
provably secure pseudorandom function and message authentication
code: A new mode of operation for cryptographic hash function,”
Cryptology ePrint archive, Rep., 2005.
Sadoski, Darleen. Client/Server Software Architectures--An Overview,
Software Technology Roadmap, 1997-08-02. Retrieved on 2008-09-16.
Comer, Douglas E.; Stevens, David L. (1993). Vol III: Client-Server
Programming and Applications. Internetworking with TCP/IP.
Department of Computer Sciences, Purdue University, West Lafayette,
IN 47907: Prentice Hall. pp. 11. ISBN 0134742222.
[20]
[21]
[22]
User Interfaces in C#: Windows Forms and Custom Controls by
Matthew MacDonald.
Applied Microsoft® .NET Framework Programming (Pro-Developer)
by Jeffrey Richter.
Practical .Net2 and C#2: Harness the Platform, the Language, and the
Framework by Patrick Smacchia.
Data Communications and Networking, by Behrouz A Forouzan.
Computer Networking: A Top-Down Approach, by James F. Kurose.
http://www.ijettjournal.org
Page 4524
Download