T. Sreenivasula Reddy

Learn More
The most powerful and common approach to countering the threats to network / information security is encryption [1]. Even though it is very powerful, the cryptanalysts are very intelligent and they were working day and night to break the ciphers. To make a stronger cipher it is recommended that to use: More stronger and complicated encryption algorithms,(More)
Application-Layer Protocol Negotiation (ALPN) labels for Session Traversal Utilities for NAT (STUN) usages, such as Traversal Using Relays around NAT (TURN) and NAT discovery, are defined in this document to allow an application layer to negotiate STUN usages within the Transport Layer Security (TLS) connection. ALPN protocol identifiers defined in this(More)
—In Round Robin scheduling, the time quantum is fastened then processes area unit scheduled specified no process get CPU time quite only once quantum in one go. If time quantum is simply too massive, the time interval of the processes is too much which cannot be tolerated in interactive atmosphere. If time quantum is simply too little, it causes(More)
This document proposes an extension to DHCPv4 Relay information so that a PCP client learns the relevant PCP server deployed in the context of traffic offload. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as(More)
  • 1