Centralized Intruder Detection System for Gated Communities Using IR sensors

  • Description about the project:

The main purpose of the Centralized Intruder Detection System for Gated Communities Using IR sensors  Information Technology project is to develop an application called Intrusion Alert Management System for Gated Communities, which is based on IR sensors and RFID technologies by integrating with the centralized monitoring system, allows the monitors to react and reach to the problem areas promptly and exactly to the location, as the system raises alarms if there are any intruders as the IR sensors catches the movements and RFID tags authenticates.

  • Technologies Used :
Operating System :Windows XP SP2 Pro & Windows Vista
Database Server :MS-SQL server 2005
Programming Technologies :ASP.NET with C#.NET
Tools :MS-Visual Studio .Net 2008

Cross Database Manipulator Using Common Interface

  • Title  of the project :         Cross Database Manipulator Using Common Interface
  •  Technology used :            Visual Studio2008,
  • Programming:                    C#
  • Database Server:               MS SQL, Oracle Databases for Testing

           Description of the project:    This Cross Database Manipulator Using Common Interface Final Year Engineering c#.Net project is being developed under Visual Studio tool to fulfill the basic needs of a student who wishes to learn basics of databases and also the needs of a non Database Administration DBA software engineer. Here the data can be stored in the database, to store the data we have used SQL server 2005, this can be used as a substitute for multiple dedicated database explorers saving lot of money and system resources and in Testing Phase we have implemented Oracle database part.

Assembly Dissection Tool .Net Project

  • Title of the project: Assembly Dissection Tool .Net Project.
  • Technology:  Visual Studio2008.
  • Database Server: SQL Server 2005.
  • Programming language: C#.Net

           Description of the Project:

                                    This Assembly Dissection Tool .Net Mini Project aims at developing an application framework that is cantered on developing class diagrams by supplying Dll’s (Dynamic Link Library) of the project which analyses tree views. This project is developed by using the Concept called Reflection. Using this application developer can easily reuse the already existing code in the development of their product. This reduces the amount of money and time spent on the Final Year Engineering Assembly Dissection Tool .Net Project

ATM Simulation System .Net Mini Project

DESCRIPTION:

           ATM simulation system is windows based application was developed in Visual Studio ASP.Net & SQL Server. In this our transaction will be stored in database and retrieve by their identify number or name. The objective of this final year mini ATM project is to prepare a software or application, which could maintain data & provide a user friendly interface for retrieving customer related details just in   few seconds, with 100% accuracy. So it is not time consuming   process.

Title of the project: ATM Simulation System .Net Mini Project

 Front End Tools Used: Visual Studio .Net 2008

Programming Language:ASP.Net & C#.Net

 Operating System used: Windows XP

Database: SQL SERVER

Client-Server based Instant Messenger

Client-Server based Instant Messenger Description:

  • Instant Messenger is a multi-threaded socket application. It allows multiple clients to connect a single server application.
  • Internet based instant messengers like Yahoo Messengers used for professional communication.
  • When there is no internet connectivity, communication becomes a problem.
  • The main aim to build a client-server based instant messenger is to avoid the lapse of connectivity and to prevent flow of information.

Software Requirements:

                  Network Layer                  :    TCP/IP

                  Operating Systems            :   Windows 2000, XP

                  Language Specification     :    jdk1.5

                  Tool Kit                             :    Netbeans 5.0

Municipal Administration System

  • Title Of The Project: Municipal Administration System
  • Technologies Used:  ASP.NET, C#.NET, VB.NET and MS-SQL SERVER 2005

Description:

      Municipality Administrative System automates the entire process keeping in the view of database integration apporach.The application has rich User Interface and provides access to the internet and provides good security for the user information as data is not available in the client machine.

This project is categorized into 7 modules:

  • Municipality Administrator module.
  • Municipality officer’s module.
  • Citizen module.
  • Web Registration module.
  • Assets and Inventory module.
  • Advertisement Tax module.
  • Authentication module.

       The working employee on municipality is called as municipality officer. They can perform different functionalities on municipality. The employee need to calculate the tax percentage of an advertisement tax belongs to that municipality. Calculating depreciation, sales of assets, purchase of products, purchase returns and wastage of products.

Responsibilities in project:

Information gathering, designing, unit testing and implementation.

Remote DBA Alert Java Project

  • Name of the ProjectRemote DBA Alert Java Project.
  • Language/Tools Used: J2EE, J2ME.               
  • Platform: Windows NT/2000.

Remote DBA Alert Java Project Description        :

A Remote Database support service provides all the functions of a full-time Database Administrator (DBA) including monitoring, maintenance. The Remote Database consists of a central operations center and a Database Administrator (DBA) team, both of which are shared in order to support multiple clients on a 24×7 basis. It is used to provide cost effective, security, reliability and expert remote Database Administrator (DBA) services. It is hard to find a single Database Administrator (DBA) who has the breadth of expertise in all areas of oracle that needed. A lot of time and money is spend on hiring process. Remote Database Administrator (DBA) will manage the DB at a fraction of cost, of doing it in-house.               

DBA can access the database using carriers like TATA, Airtel, Hutch etc. Remote DBA alert systems will be most useful to the DBAs who do not want to be in contract with any one organization and wants to render their services to different organizations.

Simulation of the Ethernet C Project

Simulation of the Ethernet

This Simulation of the Ethernet C Project is to simulate the Ethernet model explained in the class room. In this project, I was able to implement the interaction of Station-Process (SP) with the Communication Bus Process (CBP) through Socket programming. 

The SP is developed in C and the CBP is developed in C++. TCP is the transport protocol implemented for this project. In this project, when both SP and CBP are activated, any file sent on Station Process will be displayed on CBP.

Readme File:

For compiling and executing the project, below are the commands:

Compile CBP file:

g++ -pthread cbp.cpp

Execute:

./a.out 7000   (we can use any port number instead of 7000 here)

Compiling SP file:

gcc  stationprocess.c

Execute:

./a.out  cbpname cbp_port-no file_requested

Eg:          ./a.out cbp 7000 data.txt

To view output: vi slogfile

Simulation Results:

g++ -pthread cbp.cpp

./a.out 7000

Socket created 4

Socket binded

Waiting for data on port….

gcc  stationprocess.c

./a.out cbp 7000 data.txt

Host not foundRead 28 bytes that are [void bal(float amount);
 ]
Read 0 bytes that are []
Total Bytes Read = 28

Download Simulation of the Ethernet C Project with source code

voice over internet protocol voip technology

SESSION BORDER PROTCOL AND CARRIER PEERING:

Important security issues for voice over internet protocol voip technology transactions are carrier peering and Session Border Control. Hence before we proceed, it is necessary to clarify the concepts of the above two issues. The ability to interconnect networks is known as the Carrier Peering (Handley, M.1998 p.2). Interconnecting their switching nodes directly is a possibility however found vague and such interconnections do not provide the required control. Hence the utilization of interconnects or peer points to control the traffic. Digital manipulation, parameter interpretation, screening, route prioritization are found to be complex to be processed by Peering. The primary role of peering device is to secure the carrier’s networks and adapt to the specific requirement and protocol changes that are based on the peering point and its location in the network topology. The role is based on SIP protocol which is standard for VoIP communications.

Below are certain factors are a necessity on the functionalities of Carrier peering:

An intrinsic ritual that raises call costs and degrades performance that bundles data into packets according to a specific protocol, causes delay and back to back conversions through a pair of media gateways. Internetworking problems are solved when signals are converted from SIP to H.323 that is widely used in VoIP protocols.

With reference to VoIP and mobile communications, Security Carrier Peering functions as:

Billing: To generate billing records when the service is used to make calls

Routing: when ring tones, announcements are used on a mobile network.

Going to Session Border Controls, commonly also termed as Session Awareness Firewalls, like any security firewall, the device is designed to primarily secure the network. Issues such as Denial of Service and unauthorized interference by illegal users can be eliminated when the SBC performs its functions.  All medium and signaling passes when SBC provides a single or a range of IP addresses. Other functions of SBC are similar to the Carrier Peering, for example- billing and routing devices, traffic flow management.

Sonus and Juniper are 2 such companies that provide the above mentioned services; both these companies are based in California, USA. Session Border Control Solutions is a comprehensive package that includes guarantee in service, hosts NAT traversal mechanism, managed enterprise IP telephony, and most importantly legal formalities.

Effect of security architecture on cross-layer signaling in network centric systems

CROSS-LAYERED SECURITY ARCHITECTURE:

Important values are given to the mobile communications using wireless technology with VoIP. Mobile communications suffer from severe performance unlike infrastructure based networks due to their dynamism. Usage of energy can be a limiting factor for sensor nodes, while routes become unstable and shared media is prone to interference (Leyden, J. et al p.1). Cross-layer architecture are widely used today for minimizing such mentioned barriers, impact of such barriers on the performance, increases the measurability and reliance of networks in mobile communications( Leyden, J. et al, p.1). Layered architecture is advantageous in cases of design complexities which were highlighted earlier in the enterprise and carrier layer architecture.

  This increases modularity, better maintenance when compared to monolithic stacks. Explaining further on modularity, permits the combination of various protocols, improves the overall performance of the network stack as the errors are now easily traceable given the flexibility. Hollow errors causing bit errors, collisions, delays, lowered thorough put, are certain problems caused by the simple layered architecture.

Mainly due to the fact that application is shared. To distinguish from simple layer, the cross layering offers the unique comfort in these parameters, algorithms can be contributed by giving inputs by sharing information over different layers. The method of sharing information is synchronized and structured, the enrichment of the layered architecture is sustained, and architecture longevity guaranteed.

Cross-Layered architecture

For an enterprise to maintain a network-wide, global view of a multiple metrics such as load balance, battery status and routing destinations, a cross layered architecture can be used. One must consider both the global and local view to examine the simple designs of the cross layered architecture. To use local optimization such as load balance, refer to local view that contains very specific nodes, while the tendency to propagate data by collecting number of samples of data from specified local nodes refers to the global view. Common data security architecture is frequently used to by many mobile communication companies to ingrain the cross layered objectives.