IJSRSET151575 | Received: 16 October 2015 | Accepted: 26 October 2015 | September-October 2015 [(1)5: 375-382] © 2015 IJSRSET | Volume 1 | Issue 5 | Print ISSN : 2395-1990 | Online ISSN : 2394-4099 Themed Section: Science and Technology 375 A Study on Monitoring of Visitors in Dynamic Network Dr. M. Sivasakthi 1 , M. Nester Jeyakumar 2 1 Asst. Professor & Head, Department of MCA, MASS College of Arts and Science, Chennai, Tamilnadu, India 2 Asst. Professor, Department of Computer Science, Loyola College, Chennai, Tamilnadu, India ABSTRACT Wireless Network is very broad area, which include set of nodes those communicate through radio waves. Dynamics and Portability are important aspect of Wireless Network. In this paper we present a monitoring system for a dynamic network, in which a set of domain nodes shares the responsibility for producing and storing monitoring information about a set of visitors. This information is stored persistently when the set of domain nodes grows and shrinks. Such a system can be used to store traffic or other logs for auditing, or can be used as a subroutine for many applications to allow significant increases in functionality and reliability. The features of the system include authenticating visitors, monitoring their traffic through the domain, and storing this information in a persistent, efficient, and searchable manner. From a theoretical outlook our system performs fighting fit, but it would certainly be interesting to see how it would perform in real life. Keywords: Survivable Monitoring, Network Intrusion Detection, Emergency Communication I. INTRODUCTION In dynamic network, network configuration being rearranged at every time when subscriber moves into different base station. Dynamic overlay networks have recently attracted a lot of attention due to the enormous interest in peer-to-peer systems and wireless ad-hoc networks. We present a monitoring system which collects and stores information about visiting participants in a network. The information is made available upon request and can be subsequently analyzed and used for any purpose by an administrator. Methods for authentication ensure that visitor nodes are identified before being allowed to communicate; message encryption within the network ensures that no node can impersonate a domain node or send messages through the domain nodes except through the proper monitoring process. Depending on how the information collected by the system and it is being used, there are several applications such as persistent audit logs, network intrusion detection, and emergency systems. 1.1 Problem description We assume that there is two different kinds of nodes, visitors and domain nodes, and that the visitors are untrusted and the domain nodes are trusted. The task of the domain nodes is to monitor all activities of the visitors which involve the network. They also store a distributed database containing recorded monitoring information for all visitors. There are three components to this monitoring process: Traffic of the visitors has to be cached. The intercepted traffic must be processed to produce relevant monitoring information. This information must be stored permanently. We focus primarily on the last of these, studying a distributed database and algorithms for the storage of this information. The requirements of such a database are as follows: Authentication: The system must be able to identify visitors accurately to ensure that stored information can be correctly matched to a visitor. Search ability: The database must be searchable, in the sense that an administrator must be able to acquire all