Centralized Intruder Detection System for Gated Communities Using IR sensors

  • Description about the project:

The main purpose of the Centralized Intruder Detection System for Gated Communities Using IR sensors  Information Technology project is to develop an application called Intrusion Alert Management System for Gated Communities, which is based on IR sensors and RFID technologies by integrating with the centralized monitoring system, allows the monitors to react and reach to the problem areas promptly and exactly to the location, as the system raises alarms if there are any intruders as the IR sensors catches the movements and RFID tags authenticates.

  • Technologies Used :
Operating System :Windows XP SP2 Pro & Windows Vista
Database Server :MS-SQL server 2005
Programming Technologies :ASP.NET with C#.NET
Tools :MS-Visual Studio .Net 2008

Cross Database Manipulator Using Common Interface

  • Title  of the project :         Cross Database Manipulator Using Common Interface
  •  Technology used :            Visual Studio2008,
  • Programming:                    C#
  • Database Server:               MS SQL, Oracle Databases for Testing

           Description of the project:    This Cross Database Manipulator Using Common Interface Final Year Engineering c#.Net project is being developed under Visual Studio tool to fulfill the basic needs of a student who wishes to learn basics of databases and also the needs of a non Database Administration DBA software engineer. Here the data can be stored in the database, to store the data we have used SQL server 2005, this can be used as a substitute for multiple dedicated database explorers saving lot of money and system resources and in Testing Phase we have implemented Oracle database part.

Assembly Dissection Tool .Net Project

  • Title of the project: Assembly Dissection Tool .Net Project.
  • Technology:  Visual Studio2008.
  • Database Server: SQL Server 2005.
  • Programming language: C#.Net

           Description of the Project:

                                    This Assembly Dissection Tool .Net Mini Project aims at developing an application framework that is cantered on developing class diagrams by supplying Dll’s (Dynamic Link Library) of the project which analyses tree views. This project is developed by using the Concept called Reflection. Using this application developer can easily reuse the already existing code in the development of their product. This reduces the amount of money and time spent on the Final Year Engineering Assembly Dissection Tool .Net Project

ATM Simulation System .Net Mini Project

DESCRIPTION:

           ATM simulation system is windows based application was developed in Visual Studio ASP.Net & SQL Server. In this our transaction will be stored in database and retrieve by their identify number or name. The objective of this final year mini ATM project is to prepare a software or application, which could maintain data & provide a user friendly interface for retrieving customer related details just in   few seconds, with 100% accuracy. So it is not time consuming   process.

Title of the project: ATM Simulation System .Net Mini Project

 Front End Tools Used: Visual Studio .Net 2008

Programming Language:ASP.Net & C#.Net

 Operating System used: Windows XP

Database: SQL SERVER

Client-Server based Instant Messenger

Client-Server based Instant Messenger Description:

  • Instant Messenger is a multi-threaded socket application. It allows multiple clients to connect a single server application.
  • Internet based instant messengers like Yahoo Messengers used for professional communication.
  • When there is no internet connectivity, communication becomes a problem.
  • The main aim to build a client-server based instant messenger is to avoid the lapse of connectivity and to prevent flow of information.

Software Requirements:

                  Network Layer                  :    TCP/IP

                  Operating Systems            :   Windows 2000, XP

                  Language Specification     :    jdk1.5

                  Tool Kit                             :    Netbeans 5.0

Municipal Administration System

  • Title Of The Project: Municipal Administration System
  • Technologies Used:  ASP.NET, C#.NET, VB.NET and MS-SQL SERVER 2005

Description:

      Municipality Administrative System automates the entire process keeping in the view of database integration apporach.The application has rich User Interface and provides access to the internet and provides good security for the user information as data is not available in the client machine.

This project is categorized into 7 modules:

  • Municipality Administrator module.
  • Municipality officer’s module.
  • Citizen module.
  • Web Registration module.
  • Assets and Inventory module.
  • Advertisement Tax module.
  • Authentication module.

       The working employee on municipality is called as municipality officer. They can perform different functionalities on municipality. The employee need to calculate the tax percentage of an advertisement tax belongs to that municipality. Calculating depreciation, sales of assets, purchase of products, purchase returns and wastage of products.

Responsibilities in project:

Information gathering, designing, unit testing and implementation.

Remote DBA Alert Java Project

  • Name of the ProjectRemote DBA Alert Java Project.
  • Language/Tools Used: J2EE, J2ME.               
  • Platform: Windows NT/2000.

Remote DBA Alert Java Project Description        :

A Remote Database support service provides all the functions of a full-time Database Administrator (DBA) including monitoring, maintenance. The Remote Database consists of a central operations center and a Database Administrator (DBA) team, both of which are shared in order to support multiple clients on a 24×7 basis. It is used to provide cost effective, security, reliability and expert remote Database Administrator (DBA) services. It is hard to find a single Database Administrator (DBA) who has the breadth of expertise in all areas of oracle that needed. A lot of time and money is spend on hiring process. Remote Database Administrator (DBA) will manage the DB at a fraction of cost, of doing it in-house.               

DBA can access the database using carriers like TATA, Airtel, Hutch etc. Remote DBA alert systems will be most useful to the DBAs who do not want to be in contract with any one organization and wants to render their services to different organizations.

Simulation of the Ethernet C Project

Simulation of the Ethernet

This Simulation of the Ethernet C Project is to simulate the Ethernet model explained in the class room. In this project, I was able to implement the interaction of Station-Process (SP) with the Communication Bus Process (CBP) through Socket programming. 

The SP is developed in C and the CBP is developed in C++. TCP is the transport protocol implemented for this project. In this project, when both SP and CBP are activated, any file sent on Station Process will be displayed on CBP.

Readme File:

For compiling and executing the project, below are the commands:

Compile CBP file:

g++ -pthread cbp.cpp

Execute:

./a.out 7000   (we can use any port number instead of 7000 here)

Compiling SP file:

gcc  stationprocess.c

Execute:

./a.out  cbpname cbp_port-no file_requested

Eg:          ./a.out cbp 7000 data.txt

To view output: vi slogfile

Simulation Results:

g++ -pthread cbp.cpp

./a.out 7000

Socket created 4

Socket binded

Waiting for data on port….

gcc  stationprocess.c

./a.out cbp 7000 data.txt

Host not foundRead 28 bytes that are [void bal(float amount);
 ]
Read 0 bytes that are []
Total Bytes Read = 28

Download Simulation of the Ethernet C Project with source code

security issues in voip ppt

Security Issues in voice over internet protocol (voip):

VOIP being at a beginning stage, security issues appear to be build in response to its growth. As per the information based on an interview of Frost and Sullivan by analyst Jon Arnold, Denial of service attacks against VoIP in reality is possible. To rectify the threat with Denial of Service, analyst Jon Arnold suggests that a system requires a terminal adaptor node. SPAM affects the SIP code, meaning it makes the language vulnerable to remote coding execution (Jeffrey Albers, Bradley Hahn, Shawn McGann, Rundond Zhu, Seungwoo Park, 2004).

Two primary methods of mitigating attacks that are used by network operators are destination based BGP black hole routing and access control lists (Borderware, 2006). When media pressure security threats are avoided only 1.5% of the organizations trust in the reporting procedures of violation to law enforcement. To allow carriers to detect and mitigate attacks companies come up with relevant packages like Peak flow SP, anti-DDoS software suites etc. (Borderware, 2006).

Interconnections between nodes are supported by an SS7 architecture that boosts the network security. This is the signal controlling system used in the United States and a few other countries in the world (Martinez). As it was mentioned earlier in the report VeriSign is the SS7 (Signaling system 7) authority for Skype. The SS7 architecture consists of something called as the packet switch network; this is a high speed network. This network is connected by 3 types of signaling links which are:

  • Service switching points
  • Signal Transfer Points (STP)
  • Service Control Points (SCP)

There has been a growth in demand for SS7 systems due to the use of data networks to transfer real time voice calls. The best part of the standard SS7 architecture is the free VoIP to VoIP calls (Werbach, K).  Hence SS7 architecture is a mandatory module to be included for signally protection.

First goal to be considered is the high quality calls expected by users in case of wireless security and a voice over wireless LAN deployment (Jacobs, 2006). The two most important functions of relevant VoWLAN security mechanisms are the radio frequency management and load balancing. Aruba networks specialize in these solutions and have a full range over this domain. In the wireless industry, Spectral link, Quote, Chart, Avaya, voice-badge maker Vocera and software designer TeleSym are few big partners to Aruba. Objective of providing security to the VoWLAN lies in the correct MAC addresses authentication and WEP analysis. Due to the codecs and the compression schemes used by Aruba’s partners, Aruba 5000 switch is capable of handling 5000 calls simultaneously. The problems with VoWLAN exist in its basic functionality. VoWLAN needs are much more complex when compared to the data over wireless networks. Providing an interoperability testing for the new IEEE 802.11 is the basic task of Wi-Fi. The new IEEE 802.11 equipment has already boomed on grounds of demand in the market. In order to allow expansion in its present market and the future, it is up to the technical task group in a Wi-Fi project.

Effect of security architecture on cross-layer signaling in network centric systems

CROSS-LAYERED SECURITY ARCHITECTURE:

Important values are given to the mobile communications using wireless technology with VoIP. Mobile communications suffer from severe performance unlike infrastructure based networks due to their dynamism. Usage of energy can be a limiting factor for sensor nodes, while routes become unstable and shared media is prone to interference (Leyden, J. et al p.1). Cross-layer architecture are widely used today for minimizing such mentioned barriers, impact of such barriers on the performance, increases the measurability and reliance of networks in mobile communications( Leyden, J. et al, p.1). Layered architecture is advantageous in cases of design complexities which were highlighted earlier in the enterprise and carrier layer architecture.

  This increases modularity, better maintenance when compared to monolithic stacks. Explaining further on modularity, permits the combination of various protocols, improves the overall performance of the network stack as the errors are now easily traceable given the flexibility. Hollow errors causing bit errors, collisions, delays, lowered thorough put, are certain problems caused by the simple layered architecture.

Mainly due to the fact that application is shared. To distinguish from simple layer, the cross layering offers the unique comfort in these parameters, algorithms can be contributed by giving inputs by sharing information over different layers. The method of sharing information is synchronized and structured, the enrichment of the layered architecture is sustained, and architecture longevity guaranteed.

Cross-Layered architecture

For an enterprise to maintain a network-wide, global view of a multiple metrics such as load balance, battery status and routing destinations, a cross layered architecture can be used. One must consider both the global and local view to examine the simple designs of the cross layered architecture. To use local optimization such as load balance, refer to local view that contains very specific nodes, while the tendency to propagate data by collecting number of samples of data from specified local nodes refers to the global view. Common data security architecture is frequently used to by many mobile communication companies to ingrain the cross layered objectives.