IIT CSE Project Report on Packet Scheduling Algorithms to Support QOS in Networks

Introduction to Packet Scheduling Algorithms to Support QOS in Networks Project:

The best effort traffic is made possible only with the traditional packet switching networks. Communication services are required by the newer applications and it also allows the end consumers to transmit data with guarantee performance which is given in terms of bandwidth, delay delay variations and rate of loss. The packet algorithm choice should be packed scheduled and that can be used as switching nodes which is a crucial aspect in providing the quality service.

A literature survey covering is conducted by us and it includes various kinds of scheduling disciplines that provides guarantees of performance to the clients. In this paper, we have also compared scheduling disciplines that are selected for experimental studies using the process of simulation. Class based querying, weighed fair queueing and rate controlled static priority queueing are some of the disciplines that are chosen for study. CBR, ABR, UBR and VBR are some of fthe traffics that are chosen for experiments, video traffics, audio source models. RCSP extension designed for using as a model of new traffic. The use of this extension has also been studied for scheduling the flow of real-time. It uses CBQ  in a link sharing paradigm.

In this paper we have a packet scheduling algorithm that is used for routers in a network. For providing high quality service these algorithms are important in terms of delay variation, delay loss rate and bandwidth. Various scheduling disciplines have been surveyed and presented.

A simulation of the test bed platform is used for our study and it is made possible only with some selected scheduling disciplines. A common platform providing option is the main aim of this thesis and it also helps in comparing the performance level of scheduling disciplines. It helps in serving several traffic mixes along with their QOS requirements respectively. The simulation NS 5 is developed at the Lawrence Berkeley network laboratory.

Spam/Junk Mail Filter CSE Mini Project Report

To block spam the filter implemented is used and it is also called as unsolicited email. It makes use of statistical approaches which is known as Bayesian filtering, blocking the spam is the main function of this system. At the beginning the program has to be properly trained using non-spam and spam mail sets. Further this is put in database and the the more the number of training you get the more will be level of performance.

At the arrival of a new mail it is tokenized and by looking into the database the probability of each word is found. After finding out the entire probability if it reaches more than .9 then it is termed as a spam. A proper training can block 99 % of the the mails that are spam along with 0 false positives. Spam is a common problem that is growing with time.

For email users various solutions have been proposed. The main part that we all know is not to accept messages from unknown people a sit increases the chances of spam to a large extent. Spam filtering is this a great way to reduce the spamming problem.

As soon as you have enough non spam messages and spam messages you can start using a Bayesian filter. It is necessary that before you start using this filter you correctly classified the messages. Make sure that you get 100 or even more of each of messages and also that it is not an unidentified feature of the messages. Just for example: if you do not use non-spam messages for over 6 months and spam messages then the algorithm can determine that messages with old dates are non spammed messages while messages with new dates are spam messages. Do not mix the pad numbers with the duplicate ones as it will overtrain the filter of the message features.

NIT BE CSE Project Topics and Report on Simulation of Wireless Sensor Network

In the occasion that you’re whatever me, you’ve surely made a unequivocally out of the plastic revamped post, submitted it to a few Search engines and trusted that people might impressively show up at your district and buy whatever its you were broadcasting. Accompanying a couple of weeks go by and simply a few stray people show up at your destination, you pick to try and “update” your connected presence around your crucial enchanting word in trusts that you particularly well may rank well in 1 of the millions of net quest provisions. A contrasting couple of weeks go by and still no fortunes.

As of at this time you reasonable give up and pick to either fabricate a better connected presence around a differing target business or unequivocally lose all trust and stop. Genuinely, news blast, as you’ve possible deciphered by now, this is not the track to go out concerning doing things. In our case, we should make a weight mishap distinguished online element. Our weight incident distinguished net space will primarily pitch a weight hardship eBook. When we start causing and to be gathering substance for the connected substance we should do a little mystery word research. This is VERY crucial and may also not be skipped. To do our watchword research we should visit a few online documents.

They have an altogether excellent catchphrase too and best of all, its unlimited! Once we’ve downloaded this customizing, we can drop in the most non particular key word for our net space into the customizing. In our example, our fundamental word may be “weight disaster”. Great, now that you’ve encountered this eBook, I can confirmation you that you know more than 99% of all system masters joined. You now expertise to absolutely smoke your competitors in the network indexer war and you’re virtually guaranteed attainment in the occasion that you go hand in hand with each and every trace of the guidance indicated in this course.

As I stated at the beginning of this eBook, its unmitigated separating that you take this direction unquestionably and verifiably put into action every single part you’ve thought about. Some of it may show up easy, and some may show up a touch complex, but unequivocally take all articles 1 step around then. EVERTHING I’ve demonstrated to you works, and works broadly well, so now you have no explanations behind snatching that beat ranking for whatever mystery word you pick! Don’t be that 99% of webmasters that are too much drowsy to veritably do any of the above what they pick up and get over there and start governing the aforementioned web looking devices!

Signature Verification NIT B.tech Final Year Computer Science Project Report

In office automation recognition of software and document analysis is highly required. To process handwritten small samples with efficiency great ability is required and it includes those that are found on envelopes, checks and so on. In the current research this is the major driving force. There is a large variation between the handwriting samples that is creating a great hamper. Researchers are now carrying on with their research work to find various techniques that can improve the computer’s ability to recognize as well as representing handwritten samples.

The use of artificial neural network has shown a great impact in one of the approaches. In this approach an artificial neural network is used that can trained to locate similarities and patterns between various written samples. In this project we will explore the topic of automated signature with the help of artificial neural network.

This new system is designed to recognize the signature automatically from a JPEG image. The recognition part is based on the neural network and enhancement can be made to the system by making modifications in the algorithm weight adjustments. There are certain limitations that prevailed in this system but I believe that had given my best to make this system efficient and more meaningful. The same neural network can be used to recognize the applications of the pattern.

Only a slight modification can be required. This kind of system is quite useful and it is helpful for big  MNC companies and even small business and organizations can  take its advantages. Nowadays frauds have to a high extent and people can easily copy signatures and make malicious use of it but with the introduction of this system it can no longer be done. Moreover, this system promises to increase the efficiency and communication system. This system can make work easier to handle.

CSE Project for NIT B.tech Students on Shopping Cart Management System with Full Report

Introduction to Shopping Cart Management System Project:

I have implemented the system of order management and online shopping cart system in this project that offers a community for trading. At the same time it also provides an option to sell and buy products through the online shopping system. Registered users can only get the permission to take participation in the process. On the other hand the sellers who are registered can add his items with entire details that usually consist of the product description as well as the seller’s description.

Buyers can also enter into the system and browse as well as search the items he desired to purchase. Users can add products to his cart followed by checkout system. While entering the payment and shipping details you must ensure that you are a registered member. After the deal the system will send a message to the seller. Administrator acts as a third user of this product and he can also add subcategories, categorize, disable, products etc.

This project aims at making the work environment of the shopping market more better. It even computerizes the main portion of the activities that are the part of the daily routine task of the market.  This site will make the searching for the products more easier and similarly the stock management will also become simpler. For computerization, the arguments are more accurate and fast. It provides the exact details of the required informations along with extendable storage life, without any non-retrieval risk.

In turn this will easily increase the productivity. Paperwork can make communication more reliable and simple. It also eases the load of work pressure of the already existing system. Manpower is highly required therefore for the purpose of data entry shipping products and maintenance to the customer’s house. This part of the work cannot be substituted with the system labor.

NIT CSE B.tech Project on Server Monitoring with Full Report

Introduction to Server Monitoring Project:

The way of monitoring the service is known as server monitoring and it helps in keeping a check on the client who are connected to with the server. Usually  the database of the clients who are accessing the servers have their data maintenance in the database thus the server monitoring also enable to get the database for getting the informations. The number of times each client accessed the server is also recorded.

At the same time it keeps a track about the total data amount that has been sent to the client by the server. The maximum load capacity of the server at different intervals. The port through which the client is connected is used to keep the log file of all the clients. In order to know the server load this software is used. It enables the administrator of the network to know the amount of load. At the same time he can also come to know the clients who are using the service of the server as well as the access time.  He can also keep a track on the amount of data being sent to the clients along with those who access the servers on a regular basis.

The use of gcc compiler is mandatory because the C language that I used.

IP or TCP protocol is used

For making graphical interface easier wish command should be installed.

Unix is used as an OS.

It is also important to install Mysql in the system.

You must know the root password.

As it is easier to make use of the database instead of files that is why mysql is used. It is also easy for retrieving and querying the results. The C language is basically used as it is compatible with the interface of the programming language mysql. It can further modify to work with the windows.

CSE Project Concepts on Localized Sensor Area Coverage With Low Communication Overhead

Introduction to CSE Project Concepts on Localized Sensor Area Coverage With Low Communication Overhead:

For the transmission radii and arbitrary sensing of ratios we propose area coverage protocols for various localized servers. The time synchronized feature is assumed for sensors and at the start of each round active sensors are highly determined. The communication overhead required for this approach is very small as it does not involve the knowledge of the prior existence of the neighborhoods. Before the time expires each message is listened to that is sent by the other nodes.

A random timeout is also selected for each node. Sensing area of a sensing nodes that is not fully covered or partly disconnected with the asset of sensors decides to stay active in the round of consideration. A message is also transmitted that announces the status of activity.depending on the fact that whether retreat or negative messages will be transmitted or not there are four variants. Without or with a negative acknowledgement transmission covered nodes decide to sleep. After getting to hear from the neighbors it can be observed with the that they have become covered. It can also decide to change the original decision and at the same time send a retreat message.

Experiments with MAC layer shows the result of a similar group of active sensors. With the method we can easily lower the number of messages that enable in deciding the activity in comparison to the protocols that are existed locally. Here the nodes send a message of hello followed by the passive node negative acknowledgement.

A localized algorithm is proposed for the maintenance of the connected areas that comes under the ratios of sensing radii and communication. Apart from competitive ratios, active nodes also approach to induce low overhead communication along with robustness especially when the collision of the message is considered. Emphasizing on the positive acknowledgements are the main approach to the novelty.

CSE Final Year Project Idea on Protection of Database Security

The correlation that exists among data can be exploited with malicious use and it can further infer the series of sensitive information making the data accessible innocuous. An interference violation detection system is developed that protects the sensitive content of data. Semantic knowledge and schema database and is based on data dependency. Moreover, we also create a model of semantic interference  that represent the interference channels.

The inference graph is then instantiated with the SIM and it enables in query time inference violation detection. When a user poses a query the system of detection will examine queries related to his/her past log. At the same time it will calculate the inferring sensitive information. If the probability of the inference increases the pre-specified threshold then the query will be denied. The query answers can be shared among the users which can enhance the probability of the inference.

A model is developed by us that can evaluate the inference based collaborative on the sequences of queries of collaborators as well as their collaboration task sensitive levels. Studies of experiments reveal the authoritiveness of information as well as communication fidelity that is available in two key factors. It affects the achievable collaboration level.

In this paper we present a method that obstructs the users from inferring sensitive informations. In comparison to the deterministic approach in our previous works we include the relations of non-deterministic system into the interference channel. From the probabilistic data dependency we extract interference channel  and they are known as the semantic knowledge and the database schema. This is used for constructing a semantic inference model, also called SIM in abbreviated form. The possible channels of inference can be linked with the SIM from any attribute, set of the attributes of pre-assigned sensitives. The SIM attributes parematers can be computedin terms of relational table, consist of rows and columns.

 

NIT Final Year CSE Project Topic on Security in Wireless Networks with Report

Introduction to Security in Wireless Networks Project:

There is a huge importance to implement the protocols for the wireless network system and it exists even till today. Mechanism and algorithms that are webbed altogether to suite the current wireless security system have several flaws. There is a severe need of increasing the already existing protocols in the wireless network domain. The security aspect of the framework authentication is also analyzed here.

The authentication is made for wireless networks that include 802.1x and 802.11. 802.11 is the method of authentication and the use of open authentication, SSID, client MAC verification and shared key authentication have their own vulnerabilities share. Port based authentication is supported by 802.1x and it includes management key features that suffers lack of mutual authentication as well as hijacking attacks. The one way authentication is inadequate as it is only the server who can authenticate the client.

The server’s identity cannot make sure by the clients. Our security system and authentication are further proposed and explained. A study about EAP and RADIUS protocols is also present. For EAP-TTLS the the 802.1x protocol is suitable and for the RADIUS protocol the most ideal in the authentication server. We choose EAP-TTLS as the most choiceable protocol and it is made only after a thorough study of various protocols that are mentioned.

The authentication protocols are studied to know their vulnerabilities which are documented in this paper. The study reveals that combination of the IEEE 802. 1x/EAP-TTLS protocol and RADIUS protocol are the main way of approaching for an authentication and security mechanism design. A mutual and strong authentication is provided through the setup. It’s also secure the resources of Ethernet from malevolent users. The man in the middle stacks, directory attacks and session hijacking are some of the various kind of attacks that it mitigates. 

Security Addons to Wireless LANS B.tech NIT Project with Documentation

Introduction to Security Addons to Wireless LANS Project:

This project aims to design a wireless networking system and implement the same in NIT which is at Calicut. Access points, antennas, bridges are some of the equipments that are used in order to secure the position of the design that we are creating. This is the main motto of the project and moreover the part of implementation focuses its concern in wireless LAN security that consists of wireless tools along with the authentication server.

This server is developed by focusing on the requirements of a software lab. It also enable to share the access of internet keeping in the time restriction for individual users. This is made possible with the use of wireless and wired network as well. Again it can be controlled with the help of password and login. Client logging and monitoring of packet are some of the provided advantages.

The AC blocking limit the users in working with the wireless networks. Usually access point scanning utility that enables to access the points within a range. This is a part of the wireless tools and its parameter can also be chained with the settings.

The technologies of a LAN are the fastest developing areas in the network of computers and there are a lot of specifications and standard that have been evolved. It includes 802.11b, 802.11a etc. The benefits of flexibility and mobility is provided throughout but still it is facing the flaws from the aspect of security which includes spoofing, unauthorized access and data integrity. This project is concerned with designs of wireless designs which is a safe and secure way of implementation. The security software that is used here consist of an authentication server access point scanning utility, MAC address blocking utility etc. it allowed shared internet use for all the  wireless and wired users.