Advanced Network Security Palladium Cryptography CSE Seminar Report

Introduction to Advanced Network Security Palladium Cryptography Seminar:

Technology is on the ascendancy ever since it came to the foray. New and innovative technologies have been invented all over the world across all sorts of platforms. With such advanced technology around there are also an adverse side to it, security treats are most common nowadays leaving the network fragile and vulnerable. Of late we have been hearing stories of hacker attack at various important government organizations and defense websites. There should be a proper security measures to counter these malicious attacks.

The concept of data security has attained an extremely paramount importance in this modern cyber world. The present scenario is very much vulnerable to unexpected malicious attacks even with all modern security measures. These malicious intruders include casual prying, snooping, commercial espionage etc.

To increase the security level of networks Microsoft suggested a new measure called Palladium which will help bring more security to their software, it is basically a new set of features that not only upheld security of data and the integrity of the system but also provides some much needed personal privacy. Palladium is integrated into windows kernel which couples with the hardware and various chipsets to form a secured subsystem.

The present security features in windows will not be compromised for this new feature and both will run hand in hand. Language and system interoperability is another feature of palladium; this means we can write the user specific programs for more security. The hardware components include a trusted space, sealed storage, secured input and output and attestation whereas software component includes trusted operating root or commonly known nowadays as nexus technology and trusted agents which provides encryption features. The hardware used in this security measure are computer chips, keyboard, scanner, printer and an altered CPU and palladium component store files in a cryptography mode. 

Palladium is useful in many areas like:

  • Financial services
  • Government agencies
  • Healthcare industry
  • Business process outsourcing

Download  Advanced Network Security Palladium Cryptography CSE Seminar Report.

Advanced Communication Redtacton Body Based Communication Seminar Report

Introduction to Advanced Communication Redtacton Body Based Communication Seminar:

There are various types of communication in this world, from wired communication to wireless communication to touch device communication. The latest addition to that is human area networking technology. A human area networking technology is basically using the human body surface to form a network transmission path which is high speed and safe. This name of this technology is RedTacton; TACTON technology mainly relates to the actions caused by the touch factor.

RED IN RedTacton refers to the communication warmth. Our body contains extremely weak fields and this forms the basis of RedTacton data transfer transmitter. Electro optic crystal’s optic properties are affected by such electrical fields and the contacts are closed physically ending up the communication process. The machines will contain chips of RedTacton and also includes a receiver which receives data emitted in digital format by the transmitter

Data communication speed up to 10 MB per second can be achieved by using RedTacton duplex communication. During its working a small electric field is induced on the body surface by the transmitter which in turn is picked up by the receiver. Electro optic properties are changed and converted the received signal to an electric signal. Nowadays there are transceivers which do the work of both receiver and transmitter under one roof. The CSMA/CD protocol are used to do the same and TCP/IP protocol are compliant with it.

There will be loss of electric fields inside the human body as discharge to the earth through our legs. This will result in a fluctuation in the electric field and a sensor that uses photonic electric field combined with a laser light beam detects these fluctuations. An insulating material is used to cover RedTacton electrode resulting in blocking any type of current flow from the transceivers to the body.  This technology can be used in many areas such as transfer of business cards by handshakes, printing multimedia documents, downloading files etc. 

Download  Advanced Communication Redtacton Body Based Communication Seminar Report.

Advance Network Storage Systems Seminar Report for CSE Students

Introduction to Advance Network Storage Systems Seminar Topic:

The storage capacity of a system has evolved over the years, if it required a room size device to store 1GB of data in the 1980’s, even 1TB can be stored in a small chip less then size of the tip of our finger. Many advanced storage systems have been invented and many are in the process of invention.

Nowadays there are lots of networks used for system to system communication and many prefer to store their important data in these network storage systems rather than standalone desktops. The biggest advantage of such storage mechanisms are that it can establish a straight forward communication among the devices used for storage and the client machines. Such storage mechanism in the server helps us to secure data and also take back up whenever we want.

Storage networking can be split into two major components:

SAN or Storage area network: Helps in delivering a high performance network and its main work area is among storage devices and server with the help of a new innovative technology called the fiber technology. It supports both local area network and wireless network. The main advantages of SAN are reliable data transfer, flexible configuration, high performance and scalability etc.

NAS or Network attached storage: Being directly in contact with the network, it allows users to easily get in touch with their files. TCP/IP forms the usual network for NAS and it does not compromise on security of the network. Main pros include simple maintenance procedures and file sharing capacity. 

The various types of storage include fixed format storage like JBOD or RAID and removable media. A high speed dedicated network is used for storage of data across a network and that too in a direct manner. A network interface card is absent and instead intelligent drive interface or controllers are used to connect storage devices.

Download  Advance Network Storage Systems Seminar Report for CSE Students.

CSE Seminar Report on Database Recovery

Introduction to Seminar Topic on Database Recovery:

Any place where we can store or retrieve the data is called a database. Often we come across the crashing of a database, i.e. the database gets corrupted or the data would be lost due to some reasons. This crashing of databases would lead to a huge loss in money, time and energy.  The process called database recovery refers to the correction or restoring a particular database to a position it has been previously in.

Database crashes can happen on various occasions namely: 

  • Hardware error
  • Software error
  • Logical errors
  • Media failure
  • Malware or virus attacks

In any cases the database must be restored to a perfect running consistent mode and database management system or DBMS plays a huge part in maintaining the reliability of each and every database concerned. DBMS also ensures the consistency of a database structure even if it is subjected to bugs and errors. 

These crashes can be generalized into many categories such as system crash, error on the part of the user, carelessness of the user, corruption of data due to some external factors, processing failure, some bugs in application software, network or media failure, natural disasters etc.

Algorithms are used in recovering a database and follow the ACID rule of the DBMS. The recovery algorithms as it is called would work first during the normal process of transaction and make sure that important info exists to recover in failure. This algorithm would help in restoring the database to a consistent level. For managing databases distributed across multiple computers in a network, distributed database management system is used. A database administrator would be present to manage all the problems related to the database. Multiple entity relationships are clustered into a single entity and this process is called entity clustering and this leads to a better secured system.

Download  CSE Seminar Report on Database Recovery.

Secure Key Exchange and Encryption For Group Communication In Wireless Adhoc Networks

Any types of network which are not interconnected with wires or cables are known as a wireless network. A wireless ad-hoc network is a type of wireless network in de centralized form and does not depend on a specific existing set up or infrastructure. The data routing and forwarding happens between each and every nodes and network connectivity forms the basis of this routing.

The communication channels although are transformed through open air which makes it vulnerable to threats and attacks. Many range of threats such as eves dropping and interfering knowingly happens across ad-hoc networks. As said earlier, the nodes do a double role as both host and routers. For forwarding and receiving the data packets through nodes are connected internally through a multi hop network path. As the threat is more to wireless systems than a wired one, a need of proper security measure is extremely important 

This proposed system deals with an encryption mechanism along with a key change between the data transfer among nodes. This is done by using an additional parameter in MAC address in the form of specific key message while forwarding data by the nodes. The authenticated neighbor nodes would be able to exchange the key and any type of circular formation is avoided. The biggest advantage is that there would be only a momentarily dynamic connection between the two neighboring nodes. 

An ad-hoc network uses the probability of multi hop radio delaying and in this the nodes can act without having any fixed or steady infrastructure. Security is the prime concern across these ad-hoc networks and by using this key exchange and encryption it is almost well secured across a communication that spreads in groups. Each node has to be smart enough while forwarding the data to the neighboring nodes. 

Download  Secure Key Exchange and Encryption  For Group Communication In  Wireless Adhoc Networks .

Technical Seminar Report on Address Resolution Protocol

Introduction to Technical Seminar Topic on Address Resolution Protocol:

The telecommunication process completely relies on different type of protocols such as HTTP, FTP, and IP etc. Address resolution protocol or ARP is one such telecommunication Protocol which allows the addresses in the network layer resolute into the link layer.  In the case of multiple access networks this process is absolutely crucial. The 4th version of the Internet Protocol that is IPv4 uses ARP with the main intention to trace the data link protocol merging of the network to hardware addresses.  In most operating systems, the addresses are altered or manipulating these.

Other technologies in which ARP has been implemented

  • Parc Universal Packet
  • Chaosnet
  • FDDI
  • X.25
  • Asynchronous transfer mode
  • DECNet

ARP behaves like an interface a touch below the network layer and between open system interconnection (OSI) link layer and network.  The same process is done mainly across an Ethernet network. The procedure of searching and finding an address of a networked system is called address resolution.  The client side process which is on the local computer sends information across the network to a computer far off and it is in this the address gets resolved with the help of this protocol. The server which receives the information would be able to the required address system and can provide It with the same henceforth. The server then sends this address to the client and thus results in ending an address request cycle.

Two types of addresses used by an Ethernet

  • Destination address or broadcast packet address
  • Hardware address or medium access control address

An address source link is created by the computer by transmitting all the packets and the packet which is received is compared as per the addresses. The different types of ARP messages are ARP request and reply and RARP request and reply. The standardization of the protocols are done with the help of common technical language in the OSI model. 

Download  Technical Seminar Report on Address Resolution Protocol.

CSE Term Paper on Adding Intelligence to the Internet Using Satellite

Introduction to Term Paper on Adding intelligence to the internet Using Satellite:

Satellite technology is one of the most advanced technologies in scientific study. Each year different types of satellites are launched into the space for multiple functions; most of them are communication satellites.The whole satellite history is divided into two generations, the first generation satellites offered very less band width of data across various nodes.

Moreover these satellites were ill equipped to reach out to the areas which had very limited terrestrial network.One of the main disadvantages of the first generations satellites were that due to the high orbit placement of the satellites resulted in high latency period and this increased the delays due to propagation which in turn affected the performance of data transfer from one point to another. 

Intelligence is fed into the link end points coming from these satellites in this proposed system and propagation delays were drastically reduced. Different numbers of satellites were used to monitor the progress and manage in handling data rather than a single satellite which in turn helped in increasing the data speed. The overall efficiency were bit more enhanced when caching took place across all link end points

The second generation satellites helps in distributing equal band width across all regions and it helps in adjusting the bandwidth to places where there are no or limited terrestrial network. There were places of congestion across the networks instantiated by the first generation satellites and that problem is corrected in the new generation one leading to a non-interrupted data flow time.

The very fact that these second generation brings in uniformity among band width across all networks itself is a major advantage. The end user behaviors are monitored properly and the intelligence is given to the link end points accordingly. Besides caching process this also includes push channel construction, multicast creation and usage, bandwidth scheduling etc. 

Download  CSE Term Paper on Adding intelligence to the internet Using Satellite.

Technical Seminar Topic on Adding Intelligence to the Internet

Introduction to Technical Seminar Topic on Adding Intelligence to the Internet:

Satellite transmissions help us to transfer or search data with a fraction of a second. There are hundreds of satellite launched every year from many countries which helps in media communication and internet. The 1st generation of the satellites could handle only data with limited bandwidth across many terrestrial loops.

The main disadvantage of such first generations satellites were I had high latency period as the orbits in which satellites were places were too far and this lead to propagation delays which affected the performance of the internet. In the proposed system, intelligence are fed into the link end points coming from this satellites which lead to removal of unwanted propagation delays.

A fleet or a group of satellite which operated at similar position was assigned to monitor the progress instead of a single satellite used in the first generation. At all end points, data caching happens and this led to an increase in speed in transfer of data. 

Equal band width across the systems in the world are provided by these second generation satellites and this process is done by making all the terrestrial networks well equipped  at places where there is limited or no terrestrial network, the band widths are adjusted  accordingly.  All blockage points or any type of hindrances are removed leading to an uninterrupted flow of data and also the time is considerably reduced.

The two types of users contain the person who provides the content and the person who is the ultimate beneficiary. A Kiosk is represented as an end user and the satellite point which is the content provider is called warehouse. The distributed algorithms are coded to operate partly on both kiosk and warehouses which leads to a proper communication and cooperation between each other nodes. The quality of service is kept high by the carriers and there would be a reduce in latency variance. The routers are augmented accordingly to the kiosk and warehouses. 

Download  Technical Seminar Topic on Adding Intelligence to the Internet.

Latest CSE Seminar Report on Adding Intelligence to Internet

Introduction to  Seminar Topic on Adding Intelligence to Internet:

All the sources we get through internet are via satellite transmissions. Satellites are powerful communication devices which over the generations have helped us in one way or another. The 1st generation of the satellites handled internet of limited bandwidth and single hope alternatives were used as links across many terrestrial loops. The latencies were huge since the satellites were positioned in a high orbit and this lead to a delay in propagation.

In the proposed system that is the second generation, the link end points coming from these satellites are enriched with intelligence which will cut off the delay in propagation. Instead of a single satellite, in this case a flock of satellites are used to monitor the documents and schedule the delivery time. Caching happens at all end points and user demands are anticipated to be concealed. 

All the terrestrial networks are equipped to provide equal band width across the globe and with the help geosynchronous satellites; the band width can be improved at places where there is limited terrestrial network.  Other advantage of such satellite is that single hop accesses are allowed in a direct manner which removes all the blockage points and maximize the access time. The whole internet traffic can be managed easily and effectively though this process. 

The providers who provides the content and the users who beneficent from it constitutes the whole system, sometimes there may be one or more end user beneficiaries. The end user is represented as a Kiosk and the satellite point is called warehouse. The distributed algorithms run both on these kiosk and warehouses which allows those two to communicate and cooperate with each other. The internet traffic itself is divided into web docs, push channels, real time, unreal time etc.  In these the web docs may be popular for long term or short term or may be also entirely unpopular. 

Download  Latest CSE Seminar Report on Adding Intelligence to Internet.

CSE Seminar on Adding Intelligence to Internet

Introduction to Seminar Topic on Adding Intelligence to Internet:

If there is one medium we can’t live without in today’s world, it’s certainly the internet. It has affected our lives so much so that we would struggle now in a world without internet.  The biggest problem we all face in internet is the hanging of websites due to unprecedented web traffic.  If we take internet as whole, the speed with which we can browse here in India is not the same one as we get in USA or UK.

The bandwidth we use and a person in America use is totally different and as a result the one with lower bandwidth has to suffer a lot while accessing a website. The proposed system finds a solution to the above problem with the aide of geosynchronous satellites and this leads to a totally new type of internet access.

In some parts of the world, the bandwidth available would be inadequate and the local networks there would be unable to provide a good terrestrial network. This new internet access system with the help of these satellites manages the link end points effectively by providing intelligent controls. The whole process keeps track of the user’s location and bandwidth and adjusts the internet access accordingly. The resources are used effectively and wisely according to the level of the end user.

Various processes include:

  • Monitoring the behavior of end user
  • Caching of the memory
  • The push channels are constructed dynamically
  • Multicast is used
  • Satellite bandwidth are scheduled accordingly 

A fleet of such satellites are used to monitor the resources daily; this will help to get a wider perspective than a single satellite being used. The proper decisions are made with pin point scheduling and multicast is also created dynamically to protect more bandwidth being used. The documents are cached at link end points and the demands of the user are met. 

Download  CSE Seminar Report on Adding Intelligence to Internet  .