ABSTRACT Network
ABSTRACT Network
ABSTRACT Network
SOURCE
FILE
ENCRYPTION
UPLOAD
FILE
CHOOSE
GIVE 4 SECRET
KEY DESTINATION
NODE NETWORK
SEND FILE
(Via IP Address)
ENTER SOURCE IP
AND PORT NO.
KEY
MATCHED DESTINATION
ALGORITHM
The algorithm operates in a very simple manner. When a node first starts, it
only knows of its immediate neighbors, and the direct cost involved in reaching
them. (This information — the list of destinations, the total cost to each, and
the next hop to send data to get there — makes up the routing table, or distance
table.) Each node, on a regular basis, sends to each neighbor node its own current
assessment of the total cost to get to all the destinations it knows of. The
neighboring nodes examine this information and compare it to what they already
'know'; anything that represents an improvement on what they already have, they
insert in their own routing table(s).
SYSTEM CONFIGURATION
HARDWARE CONFIGURATION
SOFTWARE CONFIGURATION