CFP last date
20 December 2024
Reseach Article

Enhancing Security & Robustness in ISDN Networks

Published on May 2012 by Anand Nayyar
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 1
May 2012
Authors: Anand Nayyar
3b7aa26e-e759-4586-8d5f-fcc3562347b4

Anand Nayyar . Enhancing Security & Robustness in ISDN Networks. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 1 (May 2012), 21-25.

@article{
author = { Anand Nayyar },
title = { Enhancing Security & Robustness in ISDN Networks },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 1 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 21-25 },
numpages = 5,
url = { /proceedings/rtmc/number1/6622-1005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Anand Nayyar
%T Enhancing Security & Robustness in ISDN Networks
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 1
%P 21-25
%D 2012
%I International Journal of Computer Applications
Abstract

In the current time, Computer Networks are influencing the lives of Human Beings to a great extent, the evolution of public Integrated Services Digital Network (ISDN) with complete end to end digital connectivity provides a magnificent platform for networking and reliable data communications. The main objective behind this Research paper is to develop and implement methodologies in a new frame-based algorithm for successful data protection to be transmitted via ISDN which can be embedded into ISDN customer premises equipment (CPE) or at the server end of the switching equipment which will make public ISDN network look like a private network to the users and also create a secured database at the background and in turn results in the enhancement of the ISDN networks. In this paper, we present the overview of technology of ISDN, the security concerns and possible standards for ISDN security specific with most commonly used NOVELL NETWWARE ARCHITECTURE which allow data along with voice to be transmitted over the ISDN basic rate interface (BRI) line to be encrypted so that only the authenticated receiver can decrypt it.

References
  1. King T J: 'An overview of advanced data networks', BT Technol J, 16, No 1, pp 9—15 (January 1998).
  2. 'I. 421 Standard', BTNR 190, Vol 3 (1984).
  3. Day J D and Zimmermann H: 'The OSI Reference Model', Proc of IEEE, 71, pp 1334—1340 (December 1983).
  4. Simpson W: 'The Point-to-Point Protocol (PPP)', RFC 1661 (July 1994).
  5. Lloyd B and Simpson W: 'PPP Authentication Protocols', RFC 1334 (October 1992).
  6. Sklower K, Lloyd B, McGregor G, Carr D and Coradetti T: 'The PPP Multilink Protocol (MP)', RFC 1990 (August 1996).
  7. Postel J: 'Internet Protocol', RFC 791 (September 1981).
  8. Hedrick C L: 'Routing Information Protocol', RFC1058 (June 1988).
  9. Malkin G: 'Routing Information Protocol Version 2 — Carrying Additional Information': RFC 1723 (November 1994).
  10. 'IPX Router Specification', Version 1. 10 (November 1992).
  11. Moy J: 'Open Shortest Path First (OSPF) version 2', RFC 1583 (March 1994).
  12. Forrester S E et al: 'Security in data networks', BT TechnolJ, 16, No 1, pp 52—75 (January 1998).
  13. Case J D, Fedor M, Schoffstall M L and Davin C: 'Simple Network Management Protocol (SNMP)', RFC 1157 (May 1990).
  14. BT Technol J Vol 16 No 1 January 1998.
  15. Fernandez, I. B. Subbarao, W. V. : 'Encryption based security for ISDN communication: technique and application' (Apr 1994).
Index Terms

Computer Science
Information Sciences

Keywords

Isdn Data Communications Network Security Novell Netware Architecture Data Networking