Sunday, March 18, 2012

Although fully operational, the N2N

Although fully operational, the N2N development is not over. The authors are: Implementing N2N tunneling over other protocols such as HTTP and DNS in order to give users the ability to run N2N even on those partially open networks where only a few protocols such as email and web are allowed. Designing security mechanisms to avoid intruders and bugged edge nodes which could disable a community with node registration bombing. Enhancing supernode selection and registration algorithms, so that edge nodes dynamically select the fastest reachable supernode among the list of available supernodes [31]. Evaluating the porting of N2N onto small devices such as Apple iPhone and Linux-based network devices including DreamBox and Android phones when available.In a nutshell the plan is to allow N2N to run on: Most partially-open networks and give mobile users the ability to have secure access with a fixed N2N IP address, if configured, regardless of their location, e.g. at the airport lounge, in a hotel room or at the office. Hostile networks where attackers can try to break N2N community security. Embedded portable devices that can be used for letting users access their own private network from all applications in a secure way, without having to cope with the limitations of most networks that often allow only reduced Internet access

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.