Seminar on Storage Area Networks

Introduction to  Storage Area Networks Seminar Topic:

Presently, in many organisations the storage capacity is increasing in a very big rate.  Network storage solutions are the one which can cure this state and provide a flexible connecting storage. There are three storage technologies available i) DAS ii) SAN iii) NAS.

In Direct Attached Storage, the Data is stored in hard disk which is attached to the individual server.  The data stored in the individual servers cannot be accessed when the server fails. Storage Area Network is a Network dedicated for storage devices. Additional Storage devices can also be attached to this network. Network Attached Storage is a local area network the data stored in the individual system connected to the LAN can be accessed.

Fibre Channel interface are used in Storage Area Network for Enterprise class storage arrays. With internal connection many modest priced storage array are available. Storage Arrays are the Logical unit for the host servers appears as a disk volume. Many number of external Fibre channel interface are available in Storage arrays in order to connect the host to the disk. Storage array controllers also provide features such as snapshots, clones, mirroring.

Centralised Backup System is linked to SAN to allow operational features in backup and restore operations.  Present backup systems are different, complex and very difficult to manage. The growth of internet, email, personal devices and integrated business made the data growth and there is a need to store and retrieve them.

As the Value of each data varies, Data Categorisation Strategy method is used to categorise the data into High criticality, Medium criticality, Low criticality and some time Mission critical/continuously available.

Reduced hardware costs, Reduced manage storage, Increased productivity, 24hours availability are some of the benefits of the Storage Area Network. But Installation and the configuration of this network is very difficult and time consuming one. 

Download Seminar on Storage Area Networks .

Virtual Medical Home Project Report

Introduction to Virtual Medical Home Project:

This application is done by rational unified process. This RUP unifies the generic process models supports the good design with three view namely dynamic, static and practice model. The RUP also hold four phases like inception, elaboration, construction and transition.

The need of the virtual medical home is to provide the health care to the people mainly in the villages via internet where the hospitals are few or nil. Four elements are included to implement VMH namely patient, internet, webcam, doctors and kiosk manager. To use this service we need markup languages, http/https protocols for communication interface, database and java.

In ancient time there is only net used to store the patient records who used to go to the hospitals directly but in this model we have included webcam software kiosk manager to treat the patient by sitting in their home itself with the help of database 2,RAD, WASCE, rational software model technologies. In this the patients records are maintained as authorized used.

Work Flow: The user, doctor and the kiosk manager need to register their details to get the login ids. These id are sent to administration for reification now the user is provided with kiosk id, password and user id. When the patient feel to see the doctors. Patient need to enter their user name and password to get the appointment from the desired doctor to know whether the doctor is available or not if the doctor is in available the patient request will be sent to the doctor id and he gives the appointment time.

At the appointment time the patient and the doctors interact through the java application and GUI interface. The doctor can also diagnose the patient through webcam by generating the complaint id. This id will be sent to the admin for the record and reification and the admin replies to the user according to the reification of the compliant. The prescription also sent to the patient though id.

Download Virtual Medical Home Project Report software requirement specifications .

Technical Seminar on Blue Eyes Technology

Introduction to Technical Seminar on Blue Eyes Technology:

The ability of the first generation RADARS are limited to detect only the object and they cannot sense the speed of the object.  From which we can only measure the echo on the screen and it don’t provide us much accuracy.

The intensity of the sound means the frequency of the sound waves seems to change when either the source or the observer are in relative motion. This wat we called as Doppler’s effect.

First the signal is sent from the unit to the moving object and then it receives the one which get reflects back. The speed of the object is obtained by comparing the signal sent and the one which we received.

Anti-radars: i) jamming device ii) detectors. Jamming Devices – SHF oscillators help in transmitting the signals to the speed cameras and collapse the measurement. Besides that the RADAR can detect these jamming signals and signal the police about this. A detector as a simple SHF receiver. These contain a microwave detector and alarm.

RADAR is not affected by rain or any other weather condition. Mist doesn’t have any relative motion with respect to radar and so there no affect in the measurement. The range of the RADAR to sense the speed of the object depends on i) the power of SHF oscillators’ ii) sensitivity of the detector. Power is low in oscillators and which are used in radars. The main problem in the Detector is signaling to noise ratio. RADAR works when a object nears it.

When several objects are moving at several speeds encounter at the RADAR shows the resulting Doppler signal consist of a mixture of signals at various frequencies. Presently the device gets collapsed and determines it as faulty. But now there are systems like DSP, to measure the speed of several objects simultaneously.

Download Technical Seminar on Blue Eyes Technology .

CSE Seminar Idea on Architectural Styles in Software Engineering

Introduction to Architectural Styles in Software Engineering:

Data flow Systems, Call-and-return systems Independent components, Virtual Machines, Data-centred systems are the Common Architecture Styles.  Architectural styles are set of system for pattern of Structural organisation. It contains the information about the components and the connectors and the set of constraints how they are combined.

Some of the common styles are i) Pipe and Filters ii) objects iii) implicit invocation iv)  layering v) repositories vi) interpreters vii) process control.

Pipes and Filters: Connectors are termed as pipes and Components are termed as Filters. This system assist reuse, concurrent execution, specialized analysis.

Data Abstraction and Object-Oriented Organization: Data and the operations associated with it are formulated into abstract data type called Object. Components are the objects. Connectors operated thorough certain procedure calls called methods.

Layered Systems:  It is organised in an order that each layer should serve the layer above. Connectors are lead by Protocols and inform layer interaction. Constraints are limiting interactions between the layers.

Repositories: It has two different components i) central data structure ii) collection of independent components which operate on the data-store. Traditional database can be used as a repository when input transactions select the processes to execute.  Repository can be a blackboard when the state of the data-store is for selecting processes. Blackboard model has three components i) knowledge source ii) Black board Data Structure iii) Control.

Interpreters: Imaginary machine created in software is interpreters. It shortens the gap between the computing engine and the programmers. It decodes the programme into machine language.

Heterogeneous Architectures: Combination of different styles are involved in creating a system. Components are developed using different methods. Connectors are decomposed into different systems. A single component can use different architectural connectors.

Download CSE Seminar Idea on Architectural Styles in Software Engineering  .

Seminar Report on Real-Time Operating System

Introduction to  Real-Time Operating System Seminar Topic:

All the domestic systems that we use in the society are real-time systems and these follow timeliness. Real-time Operating system is to be designed for these real-time systems. These systems get the external inputs and process these into output with time constraints. If the timeliness is not maintained then the system is said to be failure. And there are three types of time constraints i) Hard ii) Soft iii) Firm.

Real-time Programme is p and it gets inputs in every t interval of time and event requires c computational time. Dead line for completing the computation is D. Predictability is a main concept in real-time system.

Design issues in Real-time system: All the behaviour of the system must be predictable. To achieve this all the components must be time bounded.  All the inputs are received by the systems and processed for outputs within a specified time else the system results in failure. Real-time behaviour is mandatory while designing a critical safety system.

Scheduling: These methods are introduced for maintaining the timeliness of the system. Depending on the system behaviour different scheduling paradigms are used.  Most scheduling problems are Numerical Process- complete.  Many algorithms are used to support the scheduling paradigms.

Real time Operating System is the integral part of the real-time system. These are different for the time-sharing systems. The main part of it is to process and schedule and to meet the requirement within the delay time.

Three types of operating system are i) small proprietary kernels ii) real-time extensions to commercial timesharing operating   systems iii) research kernels

Reflective architecture method is used to build a complex and flexible real-time system.  A  system  build on  reflective  architecture  is  reflects  upon  its  own  current  state  and  that  of  the  environment  to process the input correctly without time delay.

Download Seminar Report on Real-Time Operating System .

Seminar Report on RSA Algorithm

Introduction to  RSA Algorithm Seminar Topic:

The RSA scheme is a block chipper in which the texts are integers between 0 to n-1 for some n. RSA public key and RSA secret key are the two pairs of integers in this scheme.

Key generation i) two prime numbers were selected such that X ≠ Z. ii) predict n = X*Z. iii) – Predict Ø (n) = (X-1) (Z-1). What is Ø (n)?           Ø (n) is called the Euler’s Totient function. Two integers say X,Z are  relatively prime if and only if common positive integer factor is one. iv) choose any number e when gcd (Ø (n), e) =1; 1 < e < Ø (n). v) Predict the value of d – de ≡ 1 mod Ø (n) or d ≡ e^-1 mod Ø (n). In predition of‘d’ we need the multiplicative inverse of ‘e’ modulo Ø (n). vi) Public key of RSA is {e, n}. vii) Private key of RSA is {d, n}. 

Encryption Procedue: If we desire to send a message as m, then Ciphertext(C)= M^e mod n.

De encryption Algorithm: If the ciphertext is C, then the original message or the plaintext- M=C^d mod n. 

Application: encryption and de encryption of the message is done using the RSA algorithm for making the communication secure. It is used for digital signature and key distribution. Remote banking and e-commerce are the areas were RSA Algorithm used.

RSA Algorithm is more secure method of encryption and de encryption for communication system. It is more secure than DES and others. Elliptic Curve Cryptography(ECC) is a competing one for RSA.

Download Seminar Report on RSA Algorithm .

Seminar Report on Routing Protocols in Mobile Ad Hoc Network

Introduction to Routing Protocols in Mobile Ad Hoc Network  Seminar Topic:

AD HOC network is basically a wireless network for a group meeting without a central administration. There is no need a based station in Ad Hoc network, hence it is easy to build it where ever necessary. Although it doesn’t use a central base station, it needs to follow a set of rules for information transfer. These are constructed under a name Routing protocol. 

AD HOC networks can be formulated with many routing protocols but these are categorized into i) Table driven router protocol ii) On-demand routing. In the case of table driven router protocol each node need to maintain one or more tables to store routing information whereas in the case of on demand routing the route is created when desired by the source node and maintains the path by router maintenance. 

In Destination Sequenced Distance Vector (DSDV) each node knows only the information (distance) about the other node in which they are directly connected. And the distance of the node which is not directly connected are initialized to infinity. Each node updates its directly connected neighbor when changes occur in the network by least cost distance vector. This occurs until the convergence occurs. 

In DSR router protocol full series of path between the source and the destination node is to be needed. Route discovery and route maintenance are the procedures used.  Awareness of the existence of the alternate path helps to use in case of the link failure. 

In the case of zone router protocol is the hybrid protocol combination of the proactive and reactive protocols and local topology can be used for route maintenance.  Short routes can be discovered using the topology.

Based on the goal of the ad hoc network needed the best one protocol can be adopted from the different router protocol stated.

Download Seminar Report on Routing Protocols in Mobile Ad Hoc Network .

AODV Routing Protocol for Video Application Implementation and Design

Similar simulation setup can be created for voice the applications and the routing protocol chosen in this context is AODV. Low resolution video is selected across the application configuration and the routing protocol used is AODV and the corresponding screenshot is as given below

AODV Routing Protocol for Video

Routing protocol for video applications is selected as AODV and the corresponding screenshot is as shown below

AODV Routing Protocol for Video Application

Now the performance metrics are chosen for video application and the corresponding screenshot is as given below

AODV Routing Protocol for Video Application Implementation and Design

The following performance metrics can be used for evaluating the QoS of video application

  • Packet delay variation
  • Packet end to end delay
  • Traffic received bytes per sec
  • Traffic received packets per sec
  • Traffic sent bytes per sec
  • Traffic sent packets per sec

As with mobile nodes, similar performance metrics can be used for the rest of the scenarios in video applications as well. We only have to change the routing protocols to DSR and TORA.

Similarly run the results for evaluation against the simulation time after you create all required protocols.

Introduction to Jitter Data Communication

Introduction to Jitter Data Communication:

In general jitter can be defined as the variation in time for the packet arrival due to congestion over the voice over IP networks. This variation should be low enough for a better quality of service across the voice application and this value is compared for the three scenarios like AODV, DSR and TORA and the resultant graph is as shown below

jitter in data communication

It can be observed from the above graph the average jitter is more across the hybrid routing protocol like TORA and it is minimum with the case of AODV routing protocol. It can be evaluated that due to the complex nature of hybrid routing protocols and high routing process implemented across the TORA the overall jitter value has increased.

It can also be observed that jitter value has increased a lot at the initial stages of simulation for TORA routing protocol and later it was reduced due to the proactive nature of the protocol. When the case with AODV and DSR are considered the overall jitter value is constant and low enough when compared to TORA. When the three routing protocols are considered the overall jitter value is less with AODV routing protocol.

From this analysis it is clear that, to improve the quality of service across the voice applications AODV routing protocol is suggestible.

What is MOS Value

Introduction to MOS Value:

MOS value indicates the overall quality of the voice line and in general this value ranges from 0 to 5, where 0 indicates poor quality and 5 indicates excellent quality of voice. This particular value is calculated for the three scenarios and the corresponding comparison graph is as shown below

mos value

From the above graph it is clear that, the average MOS value is more when the routing protocol is AODV. The average MOS value is more at the beginning of the simulation and later it was reduced for all the three scenarios due to the wireless LAN server behavior.

But when the average values are considered the quality of the voice line is more with the case of AODV and it is reduced with the case of DSR. From the overall analysis it is clear that, to enhance the MOS value of the voice application AODV is best suited routing protocol.