Client-Server based Instant Messenger

Client-Server based Instant Messenger Description:

  • Instant Messenger is a multi-threaded socket application. It allows multiple clients to connect a single server application.
  • Internet based instant messengers like Yahoo Messengers used for professional communication.
  • When there is no internet connectivity, communication becomes a problem.
  • The main aim to build a client-server based instant messenger is to avoid the lapse of connectivity and to prevent flow of information.

Software Requirements:

                  Network Layer                  :    TCP/IP

                  Operating Systems            :   Windows 2000, XP

                  Language Specification     :    jdk1.5

                  Tool Kit                             :    Netbeans 5.0

Removal of Bleed-Through in Scanned and Ancient Documents

Topic : “Removal of Bleed-Through in Scanned and Ancient Documents”

Scope of Work: Generally ancient documents and old manuscripts stored in libraries. Because of the low quality of the paper, the information contained in these documents is not efficient to read. By scanning such documents, the deciphering text becomes tedious. By using the online digital libraries, most of the people around the world potentially access any document from anywhere.  The first step is to create a digital library, we must have to get the document into digital format. The actual method of digitizing the document is not very important, but it is very important to state the quality of the scans must be fairly. The age of the documents and the fact that they may contain writing on both sides. This causes the Bleed-Through. Bleed-through occurs when ink from one side of the document leaks through to the other side.

Description:

  • Removal of Bleed-through documents and ancient documents using Thresholding.
  • Experimentation and testing of Image Registration and Segmentation through Bleed-Through Removal Algorithm.

Results:

  • The Image Registration and Segmentation techniques are suitable for removing the Bleed-Through Documents.
  • These results (Formulation and Experimental) proved that the removing the ancient documents.

Municipal Administration System

  • Title Of The Project: Municipal Administration System
  • Technologies Used:  ASP.NET, C#.NET, VB.NET and MS-SQL SERVER 2005

Description:

      Municipality Administrative System automates the entire process keeping in the view of database integration apporach.The application has rich User Interface and provides access to the internet and provides good security for the user information as data is not available in the client machine.

This project is categorized into 7 modules:

  • Municipality Administrator module.
  • Municipality officer’s module.
  • Citizen module.
  • Web Registration module.
  • Assets and Inventory module.
  • Advertisement Tax module.
  • Authentication module.

       The working employee on municipality is called as municipality officer. They can perform different functionalities on municipality. The employee need to calculate the tax percentage of an advertisement tax belongs to that municipality. Calculating depreciation, sales of assets, purchase of products, purchase returns and wastage of products.

Responsibilities in project:

Information gathering, designing, unit testing and implementation.

Remote DBA Alert Java Project

  • Name of the ProjectRemote DBA Alert Java Project.
  • Language/Tools Used: J2EE, J2ME.               
  • Platform: Windows NT/2000.

Remote DBA Alert Java Project Description        :

A Remote Database support service provides all the functions of a full-time Database Administrator (DBA) including monitoring, maintenance. The Remote Database consists of a central operations center and a Database Administrator (DBA) team, both of which are shared in order to support multiple clients on a 24×7 basis. It is used to provide cost effective, security, reliability and expert remote Database Administrator (DBA) services. It is hard to find a single Database Administrator (DBA) who has the breadth of expertise in all areas of oracle that needed. A lot of time and money is spend on hiring process. Remote Database Administrator (DBA) will manage the DB at a fraction of cost, of doing it in-house.               

DBA can access the database using carriers like TATA, Airtel, Hutch etc. Remote DBA alert systems will be most useful to the DBAs who do not want to be in contract with any one organization and wants to render their services to different organizations.

How to Strat Your Final Year Project

Review -1
  1. Introduction
  2. Existing System
  3. Proposed System
  4. Adv & Dis. Adv
  5. S/w & H/w Req

( 5 to 8 pages)

1st week
Seminar -1
  1. Introduction
  2. Existing System
  3. Proposed System
  4. Adv & Dis. Adv
  5. S/w & H/w Req

 

1st week
Review-2
  1. Problem identification & solution according to base paper theory

( 4 to 6 pages  document)

3rd week
Review-3
  1. System Design with modules (DFD’s or UML diagrams)
5th week
Seminar-2
  1. Problem identification & solution w.r.f base paper
  2. System Design (DFD’s or UML diagrams)
5th week
Review-4 Implementation &or coding(5 to 10 pages) 7th week
Review-5 Implementation or coding 9th week
seminar-3
  1. System design
  2. Code or implementation of 50% of project
9th week
Review-6
  1. Implementation or coding
  2. Output screen
  3. Test document

(5 to 10 pages)

11th week
Review-7
  1. A rough document of entire document

(55 to 75 pages)

13th week
Seminar-4
  1. Total code or implementation
  2. Output screen
  3. Conclusion
13th week

 
Note:

  1. For every project review students should meet their respective internal guides on or before specified deadline. (During the specified week).
  2. The project seminars are in the week end of the specified week.

Security Considerations for Voice Over IP Systems

Security Considerations for Voice Over IP Systems: In this world of technology, Voice over Internet Protocol gives rise to different types of risks. First, because of their intricacy and immatureness, Voice Over IP brings a lot of new threats to the active IP networks. Secondly, being a same platform for both voice and data applications, latest risks make the whole network open to new ways. However there are so many measures for the network manager to keep the threats at a minimum level which includes setting-up of different  devices at main interfaces, executing of planned safety requirements on weak Voice Over IP devices, and the initial formulation and enforcement of benchmark actions to bound disclosure of the IP network to attacks. The following are some of the policies and procedures to be applied to maintain security over IP networks:

Maintain current PATCHES levels:

This is the basic level where in insufficient software bits make to network to give exposed to needless risks. These network attacks seem so clever in targeting software to achieve definite aim instead of simply making random trouble. So it is very important to make a prudential approach in viewing and installing patch releases to keep the network applications and the total investment away from risks (Computer society, 2008).

Antivirus system (Installation and its up gradation):

From the VoIP point of view, this anti-virus system helps in protecting the components of voice from those that are very weak to attacks. For example, Juniper Networks Net screen firewalls incorporate anti-virus software in Voice Over IP installation and it’s up gradation along with all other aspects/ elements.

SMBR: A novel NAT traversal mechanism for structured Peer-to-Peer communications

NAT TRANSVERSAL MECHANISM AND ITS SECURITY IMPLEMENTATION:

Previously details of the importance of router usage in infrastructure were provided based on case studies. However by inserting the flow of transport protocols or by translation, other entities called the middle boxes affected the quality of voice packets. IP tunnel, endpoints, markets, proxies, caches, transport relays, etc are widely used to types of middle boxes. (HIP Research group, 2006).This is generally known to public as stumbling blocks to an efficient VoIP communication. The more common terminology for the middle boxes is the VoIP across Network Address Translators,(HIP Research Group,2006) will be discussed next.

Below are certain recommendations made for SMBR: A novel NAT traversal mechanism for structured Peer-to-Peer communications with regards to the security activities that are intrinsic to traversal of NAT mechanisms (HIP Research group, 2006):

To create NAT bindings that are highly sensitive with reference to security actions and opening pinholes in firewalls (i.e., as mentioned earlier regarding firewall rules, allowing packets to traverse).

Using UDP encapsulation to correlate outgoing and incoming signal values reduces complexity of the overall protocol.

NAT extension utility.

END USER AND HOP BY HOP AUTHENTICATION TECHNIQUES:

The report will include a few successful techniques utilized by the end user and hop by hop authentication techniques (Computer Society, 2006).

“Longer IP addresses, 128 bits compared to 32bits: There has been a growth of over 4billion and will continue to grow up to 9billion by 2050, not to include the cross-layered architectural functions which could be sole cause of such increase.

New Support options and data integrity extensions to regulate the traffic flow labeling of packets is a useful option, known as flow labeling capacity. Processing power increases if the headers are simplified. Plug and play automatic configurations are auctioned for a faster VoIP transfer known as a automatic configuration.

The technique that carries information to be processed on each and every node along with a packet traversal path is known as Hop-by-Hop.

Effect of security architecture on cross-layer signaling in network centric systems

CROSS-LAYERED SECURITY ARCHITECTURE:

Important values are given to the mobile communications using wireless technology with VoIP. Mobile communications suffer from severe performance unlike infrastructure based networks due to their dynamism. Usage of energy can be a limiting factor for sensor nodes, while routes become unstable and shared media is prone to interference (Leyden, J. et al p.1). Cross-layer architecture are widely used today for minimizing such mentioned barriers, impact of such barriers on the performance, increases the measurability and reliance of networks in mobile communications( Leyden, J. et al, p.1). Layered architecture is advantageous in cases of design complexities which were highlighted earlier in the enterprise and carrier layer architecture.

  This increases modularity, better maintenance when compared to monolithic stacks. Explaining further on modularity, permits the combination of various protocols, improves the overall performance of the network stack as the errors are now easily traceable given the flexibility. Hollow errors causing bit errors, collisions, delays, lowered thorough put, are certain problems caused by the simple layered architecture.

Mainly due to the fact that application is shared. To distinguish from simple layer, the cross layering offers the unique comfort in these parameters, algorithms can be contributed by giving inputs by sharing information over different layers. The method of sharing information is synchronized and structured, the enrichment of the layered architecture is sustained, and architecture longevity guaranteed.

Cross-Layered architecture

For an enterprise to maintain a network-wide, global view of a multiple metrics such as load balance, battery status and routing destinations, a cross layered architecture can be used. One must consider both the global and local view to examine the simple designs of the cross layered architecture. To use local optimization such as load balance, refer to local view that contains very specific nodes, while the tendency to propagate data by collecting number of samples of data from specified local nodes refers to the global view. Common data security architecture is frequently used to by many mobile communication companies to ingrain the cross layered objectives.

Voice Over Internet Protocol Final Year Project

The digital revolution forced the people to find means for digital communication this led to the emergence of Internet Protocol (IP) based data networks which differ in many ways. The introduction of voice over internet protocol (VOIP) has made it possible to use the IP networks for all the telephonic calls.

Evolution

In the late 2003 or the early 2004 the VOIP services over broadband services was introduced. However the technology found its place only in the year 2009, when many corporate services started using VOIP for long distance communication and as we are human and it is in our nature that we don’t get satisfied with anything so we can expect more development in the technology and hence the future for VOIP is very bright. The need for the growth of the technology could also be due to the increase in the number of users subscribing. As the eMarketer’s estimate shows, the number of residential VoIP subscribers is expected to grow rapidly from 37.8 million paid subscribers in 2006 to 152.6 million in 2011. This also buids pressure on the providers for providing quality service to the user so services are finding different ways not only to attract new users but also to satisfy existing users.

 Aim of the project:

This Voice Over Internet Protocol Final Year Project is to investigate security involvement in VOIP. The procedures are for a secure, safe and reliable. VoIP is to propose the security methods. Based on the safety measure requirements 13 securities have been shortlisted and the thesis has furthered alongside to account any key data that required development. Routinely showing up measure is the security parameter, quality of service values, like latency, voice echoes and packet loss. To arrive at the accurate choice measures over the above parameters the thesis has been elaborated in aspects of Project Design and simulation. Researcher has put into use proprietary software which includes Visual Route, Minitab and VoIP Calculator.

Research Objectives:

As noted in the disadvantages, it is important to focus more on security and quality issues with reference to the VOIP technology to streamline to data pertinence for using a deployment project. The project aims at fulfilling the objective on a step by step approach of each objective:

          a) Over viewing/examining of VoIP technology.

          b) Recognizing common security threats, previously failed procedures.

          c) Review based on existing VoIP encryption methods and their efficiency.

          d) Recognizing problems with VoIP protocols.

          e) Designing a method.

          f) Lastly to simulating the design into a project.

Project on Controlling IP Spoofing through Interdomain Packet Filters

Border Gateway Protocol (BGP):

The Border Gateway Protocol decides the best destination, and emerges with the database table(IP routing), datagram packets are only moved forward based the IP table, BGP table does not based on routes.

IEEE Project on Controlling IP Spoofing through Interdomain Packet FiltersAs each node is a distinct notation, the BGP will determine only a single best path. For deciding ther best path the BGP uses tie-breaking algorithm, this process is continued until the best metrics are concluded to forward the data to the destination. The below are conditions are considered while checking the conditions:

  • Always the first is treated as the best path, if any path exist after the first path then they are compared to the firstly path and selects the best path between them.
  • To check whether the route is valid or not valid
  • With the help of IGP (Interior Gateway Protocol) the route must be synchronized.
  • The route must be appeared in the table (routing table).
  • The next node must be a reachable destination.

The below menu will be used to determine the best path:

  • The highest weight paths are to be preferred.
  • Next, the highest local preference paths are to given importance.

Download Java Final Year Project on Controlling IP Spoofing through Interdomain Packet Filters