UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 9 Issue 7
July-2022
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2207084


Registration ID:
405430

Page Number

a676-a686

Share This Article


Jetir RMS

Title

A Study on Enhancing LAN Using Cryptography and Other Modules

Abstract

Enhancing the LAN with Cryptography and Other Modules" presents essential solutions to eliminate the inadequacies of the current network management systems. Remote machine control is made easier for the administrator with this powerful network feature. There is a new suggested system called DSCSL that uses encryption, steganography, and LAN messaging (DSCSL) to ensure data security. When used together, these generally accepted methods aid in ensuring two-factor authentication (DFA). Companies, colleges, and other organizations can benefit from these security measures. Encrypting sensitive data in a scrambled form and hiding it behind a picture is a technique known as steganography. At To the fullest extent possible, the network is put to use. It is proposed to use.net to implement the proposed system's functionality. There are a total of six modules in this product. A different aspect of the network is addressed by each of the modules. Monitoring, monitoring, remote processing and file transmission are only few of the features that may be found in the many modules. The following are the advantages that our system offers over the ones already on the market. • The use of cryptography ensures the security of data during transmission via a network of interconnected nodes. • Why use the Internet when we may use the high-speed Local Area Network (LAN) that already exists in practically all businesses and institutions? • The broadcasting capability is 100 times faster than a peon distributing alerts to all employees, ensuring that messages are delivered on time and without error. Networks are becoming used for more than simply data exchanges. Data transfer may be put to good use in a variety of ways that are both entertaining and useful. Time synchronization is used in this case to allow the administrator to shut down a user system using a GPS receiver.

Key Words

Lan, Cryptography, Modules, Network, Wake on LAN, Magic Packet.

Cite This Article

"A Study on Enhancing LAN Using Cryptography and Other Modules", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.9, Issue 7, page no.a676-a686, July-2022, Available :http://www.jetir.org/papers/JETIR2207084.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Study on Enhancing LAN Using Cryptography and Other Modules", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.9, Issue 7, page no. ppa676-a686, July-2022, Available at : http://www.jetir.org/papers/JETIR2207084.pdf

Publication Details

Published Paper ID: JETIR2207084
Registration ID: 405430
Published In: Volume 9 | Issue 7 | Year July-2022
DOI (Digital Object Identifier):
Page No: a676-a686
Country: Akola, Maharashtra, India .
Area: Other
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000291

Print This Page

Current Call For Paper

Jetir RMS