MANET Mobile Ad hoc Network Technical Seminar

Description: The research paper MANET Mobile Ad hoc Network Technical Seminar descries what mobile ad-hoc network is. The research paper suggests that MANET is a multihop packet based mobile network that can be used both for communication and while moving at the same time. And all this without any fixed kind of infrastructure. MANET are mobile networks that can be established and removed at a specific site without a need for any centralized system.

It is suggested in the research paper that as for other packet data networks, one –to-one communication in a MANET is achieved by unicast routing each single packet. Routing in MANET is challenging due to the constraints existing on the transmission bandwidth battery power and CPU time and the requirement to cope with the frequent topological changes resulting from the mobility of the nodes.

Nodes of a MANET cooperate in the task of routing packets to destination nodes since each node of the network is able to communicate only with those nodes located within its transmission radius R, while the source and destination nodes can be located at a distance much higher than R.

The routes of conventional protocols are tailored in order to meet the requirements of MANET. . To guarantee that routing tables are up to date and reflect the actual network topology, nodes running a protocol continuously exchange route updates and re calculate paths to all possible destinations. The main advantage of the proactive protocols is that a route is immediately available when is needed for data transmissions.

Conclusion: The research paper concludes on a note that it is a bit problematic in MANET to guarantee the validity of cached paths at a node and this alone ensures a good performance. As with any other technology MANET too has its inherent defects and shall be rectified certainly over a period of time.

Download MANET Mobile Ad hoc Network Technical Seminar

Nano Technology Miniaturization Technology

Description: The research paper Nano Technology Miniaturization Technology describes what nano technology is. It is suggested in the research paper that nano technology is miniaturization technique. It is aligning the atoms in the most effective way in a very limited place. Extraordinary devices will thus be created using the techniques of nano technology. The research tube talks about carbon tubes and nano transistors which are indispensable ingredients to the field. Nanotechnology broadly refers to the manipulation of matter on the atomic and molecular scales i.e. where the objects of interest are 0.1-100 nanometer n size. Atomic diameters represent the lower end of this range at tenths of nanometers.

Man has created wonders by changing the molecular structure in material synthesis. Molecules could be aligned in such a way as to produce desired result in the areas of strength, ductility, reactivity, conductivity and capacity. This idea facilitates creating devices that would occupy an unimaginably small space. The nano technology operations theater in vogue today are still in their incipient stage and have the capacity to scale up magnificently.

The research paper talks about two concepts involved in nano technology.

  1. Positional Assembly
  2. Self-replication

This involves getting the atom to the right place, make all the laws of physics and chemistry applicable to extract efficiency, and have manufacturing costs in place and see to it that it does not exceed the cost of raw materials and other things.

Achievements of Nano technology:

Nano technology is used in the spheres of probe microscopy in the form of —the scanning tunneling microscope (STM) and the atomic force microscope (AFM). Drexler has proposed the Assembler, a nanosize mechanical machine, which could manipulate atoms precisely. These machines could be told to build anything. To control these miniature run-abouts, Drexler has designed the nanocomputer.

Conclusion: The research paper concludes on a note that nano technology can do wonders in the fields of computer science engineering, although the domain is still in embryonic stage as of now.

Download Nano Technology Miniaturization Technology.

Technical Report on Live Linux CDROM

Description: The research paper talks about Live Linux CD-ROM. The research paper suggests that bootable CDROMS with small Linux rescue system is gaining popularity in both business size and regular size CD ROMS.

About LINUX CD ROM:

The research paper Technical Report on Live Linux CDROM suggests that the Live LINUX CD ROMS are becoming popular because of these things:

  • RAM prices are all time low and 512MB RAM costs less.
  • CDROM drives are becoming very fast and current read speed is topping at 72X.
  • CDROM IDE drives are very cheap; CDROM with 52X read speed is available at cheap prices.

It is suggested in the research paper that DVD-ROM is also getting very cheap and can carry 5 Gigabytes of Linux software and is three times faster than CDROM drive. Linux CD ROM is very effective over other similar devices, easy to install and can be upgrade via Linux Kernels every three months. And it’s a hassle free procedure.

A very unique and exciting thing about LINUX CD ROM is suggested in the research paper. It is suggested that “Live Linux CDROM” promotes RAPID Operating System UPGRADE. One can upgrade an OS in less than 5 seconds!! “Live Linux CDROM” introduces the concept of mass upgrade and RAPID ACTION. Simply discard the old “Live Linux CDROM” and use the new CDROM and you have upgrade already.

What are the requirements of a Live LINUX CD ROM:

The paper posits the following requirements:

  • Live Linux CDROM”
  • CPU
  • Mother board
  • NIC (Network Interface Card) (Not compulsory!)
  • CDROM drive (IDE or SCSI)
  • RAM (32 MB minimum for full graphics and 16 MB minimum for console mode)

Conclusion: The research paper concludes on a note that LINUX CD ROM features are very appealing and will be accepted on a massive scale in the years to come.

Download Technical Report on Live Linux CDROM.

What is Lamp Technology LINUX Apache MYSQL PHP

Description: The research paper What is Lamp Technology LINUX Apache MYSQL PHP describes in depth what Lap technology is. It derives its name from four applications LINUX, MYSQL, Apache and PHP. It is suggested in the research paper that together these tools provide world class web platform. It is suggested in the research paper that running on the Linux operating system, the Apache web server, the MySQL database and the programming languages, PHP or Perl deliver all of the components needed to build secure scalable dynamic websites. LAMP has been touted as “the killer app” of the open source world.

 What Lamp does:

Lamp helps the companies in more than one way and it has been given high regard improving the quality of functioning per se. It is suggested in the research paper that With many LAMP sites running E-business logic and Ecommerce site and requiring 24×7 uptime, ensuring the highest levels of data and application availability is critical. For organizations that have taken advantage of LAMP, these levels of availability are ensured by providing constant monitoring of the end-to-end application stack and immediate recovery of any failed solution components. Some also supports the movement of LAMP components among servers to remove the need for downtime associated with planned system maintenance.

 It is suggested in the paper that In the open source world, the Linux-Apache-MySQL-PHP (LAMP) environment has been greatly accepted. LAMP provides developers with a traditional two tiered application development platform. There is a database, and a “smart” webserver able to communicate with the database. Clients only talk to the webserver, while the web server transparently talks to the database when required. The following diagram illustrates how a typical LAMP server works.

 Conclusion:

The research paper concludes on a note that LAP will continue to attract customers for its high reliability and of course cost effectiveness.

Download What is Lamp Technology LINUX Apache MYSQL PHP.

What is Java Security Simple Engineering Seminar

Description: The research paper What is Java Security Simple Engineering Seminar talks about Java Security. The research paper talks about the components of Java. The components comprise the development environment which has development lifecycle, Java language features class files and byte code the execution environment the Java Virtual Machine (JVM) interfaces and architectures e.g., Java beans, RMI, JDBC, etc.

It is suggested in the research paper that Java is a high-level programming language. The source code of the language is English-like (syntax is similar to C). Java is compiled and interpreted .Source code is compiled into byte code (low-level, platform independent code). Byte code is interpreted (real machine code produced at run time). Java has certain unique features it is fast and portable (“write once run anywhere”). There is in Java dynamic linking (no link phase at compile time). Java Program consists of class definitions. Each class is compiled into a separate class file. Classes may refer to each other; references are resolved at run-time.

Java Program is object-oriented, multi-threaded, strongly typed. Exception handling in Java is very similar to C/C++, but cleaner and simpler. It has no more structure and union. No more (stand alone) functions. No more multiple inheritances. No more operators overloading. No more pointers. Garbage collection objects in Java are no longer in use and are removed automatically from memory.

The class files in Java language contain magic number (0xCAFEBABE), JVM major and minor version. Constant pool contains, constants (e.g., strings) used by this class, names of classes, fields, and methods that are referred to by this class. It is used as a symbol table for linking purposes. Many bytecode instructions take as arguments numbers which are used as indexes into the constant pool. It has class information (e.g., name, super class, access flags, etc.), description of interfaces, fields, and methods, attributes (name of the source file) and bytecode.

Conclusion: The research presentation concludes by quoting ActiveX.

Download What is Java Security Simple Engineering Seminar.

Java Networking Seminar For Btech Students

Description: The research presentation Java Networking Seminar For Btech Students talks about Java Networking. The research presentation suggests that Java Networking is used to Networking Based Applications and they are used in all advanced topics like jdbc, rmi, servlets, corba etc. The presentation suggests that Java Networking can be used to develop all types of applications. Java Networking based applications can be used for any protocol. The presentation speaks about different types of Network.

  1. Homogeneous Network
  2. Heterogeneous Network

 A Homogeneous Network aims at maintaining same types of architecture and a heterogeneous network works over different types of architecture. An internet is an example of heterogeneous architecture. Connection oriented communication is reliable mode as data will transfer to one end. Example of such is HTTP, FTP, SMP3, POP3.Connectionelss communication is possible through pocket routers example DNS, RNI, SNMP. Transmission control protocol is the standard for transferring the data. It has four layers. Transport layer, network layer, link layer and physical layer. Open system interconnect model has seven layers they are : application, presentation, session, transport layer, network layer, data link layer, physical layer.

 It is suggested in the presentation that a System without TCP/IP settings cannot be used to execute network based applications. As Network Based Applications are developed on Application Layer protocols which are standard uses TCP/IP stack and it needs IP Address to indentify every system in network. Communication in between two systems either on TCP or UDP will be based on IP Address and Port number.

Why are network based applications developed:

Network Based Application are developed either for distribution of data or for exchanging the information. These Applications can work among the hosts (Systems connected to network) and also portable on internet also as both are based on TCP/IP protocol. Applications can be developed for servers and clients but internally it has to depend on protocols used in servers.

Conclusion: The presentation ends on a note describing User Datagram Protocol (UDP).

Download Java Networking Seminar For Btech Students.

ITANIUM- The 64 bit Microprocessor CSE-ECE Technical Topic

Description: The research paper ITANIUM- The 64 bit Microprocessor CSE-ECE Technical Topic speaks about Itanium the 64 bit Microprocessor. It has been suggested in the research paper that Itanium’s 64-bit Itanium Processor Family (IPF) architecture, the basis of Intel’s future, high-performance microprocessor family a broad range of technical and commercial applications at 1.0GHz. The starting place for the team was a comprehensive understanding of the capabilities of the .18um bulk technology transistors and interconnects with a view toward exploiting these capabilities to the fullest.  The Itanium processor began shipping in end-user pilot systems in late 2000. Intel intends to follow Itanium with additional processors in the Itanium family: McKinley, Madison and Deer field in late 2002.

 We are living in the age of information explosion and today there is a greater need of sharing data than never before. Hence the current 4 GB 32 chip microprocessor has to be replaced with something more enduring. Itanium microprocessor is just an answer to questions pertaining to storage. Itanium’s memory and storage gives it the advantageous position as it is having now. Beyond very large memory (VLM) support, however, other traits, including a new Explicitly Parallel Instruction Computing (EPIC) design philosophy that will handle parallel processing differently than previous architectures, speculation, predication, large register files, a register stack and advanced branch architecture.

 IA-64 also provides an enhanced system architecture supporting fast interrupt response and a flexible, large virtual address mode. The 64-bit addressing enabled by the Intel Itanium architecture will help overcome the scalability barriers and awkward, maintenance-intensive partitioning directory schemes of current directory services on 32-bit platforms. , Intel has been assiduous in providing backward compatibility with 32-bit binaries (IA-32), from the x86 families. 

 Conclusion: The research paper concludes proclaiming the virtues of IA-64. The microprocessor gives effective solutions to processor parallelism. If speed and quality are the only things that matter, IA-64 is the answer.

Download ITANIUM- The 64 bit Microprocessor CSE-ECE Technical Topic.

Semantic Web Application Web 3.0 Final Seminar

Description: The research paper comments over the new Semantic Web Application Web 3.0 Final Seminar The research paper speaks about the various versions a particular application has. CDs and other output devices have versions too. The research paper questions about the knowledge of web versions and clarifies that the web has versions too. Aversion is just an evolved form of something that is in performance, today. Web 3.0 is one such breakthrough.

 Although Web 3.0 did not hit the markets it has a potential to take away everything existing by storm. Web 3.0 is pretty similar to web 2.0, but unlike Web 2.0, it uses RDF, which is a W3Consortium language. This RDF plays key role in shaping. Blogging (web log) helps the search engine to give the right information to the web user. The excellent factor of web 3.0 is that it can read the content of the web-pages and the user can design his desirous webpage. Web 3.0 is not much far; it would come in upcoming years although they are sites which are based on the web 3.0.

 Web 3.0 is the next generation we which hasn’t come into the limelight as of now. Unlike Web 2.0, Web 3.0 facilitates faster access and also enables the user to design his own page. The bandwidth of Web 3.0 will be 10 megabits precisely. Web 3.0 simplifies the web functionalities. The term ‘Semantic Web’ refers to “Defined” Web that is an alliance of World Wide Web Consortium (W3C) and others to provide a standard for defining data structures on the Web.

 Conclusion: The research paper concludes on a note that the web will take over the traditional data storing and sharing techniques. Web 3.0 is going to emerge as a winner for the multiple tool and access facilities that it offers the user.

Download Semantic Web Application Web 3.0 Final Seminar.

Internet Protocol (IP) Security Technical Presentation

Description: The research paper Internet Protocol (IP) Security Technical Presentation speaks about IP Security. IP means Internet Protocol. There is an all time rise in the matters shared and discussed over the internet. Security concerns have always occupied place aloft. When there is a huge sharing of data, there is a huge vulnerability associated too. The information that is passing through wires and many connected systems is highly vulnerable to third party access or attack. Information shared can be robbed for personal benefits and permanent damage to the company. Some information, confidential one, when leaked can irreversibly damage a company’ repute and functioning. The research paper suggests that security concerns have always occupied the researchers’ primary concern. A system should be made secure owing to the following reasons:

1.      Information should not be modified en route.

2.      Information passing through a network should not be accessible to unauthorized viewers.

3.      It should be encrypted as not to allow any deletion or addition.

About Internet Protocol:

Data integrity, authentication and confidentiality are the primary goals of security mechanism. Designed by the Internet Engineering Task Force (IETF) for the Internet Protocol, IPSec supports network-level authentication, data integrity, and encryption. IPSec integrates with the inherent security of the IP data gram to provide the ideal platform for safeguarding intranet and Internet communications. IP Security is deployed below the transport level, network managers (and software vendors) are spared the trouble and expense of trying to deploy and coordinate security one application at a time. The IPSec framework does not specify exactly which encryption algorithms must be used by its implementations. Instead, it provides an empty infrastructure where the desired algorithms may be set.

Conclusion: The research paper concludes on a note that IPSec is growing demand per se. But IPSec unleashes significant problems while working alongside other encryption devices.

Download Internet Protocol (IP) Security Technical Presentation.

Firewalls Internet Security

Description: The research paper Firewalls Internet Security talks about Firewalls and the way they provide internet security. The research paper casts light on the contemporary increase, a colossal rise in internet based transaction. A huge confidential information flows through the web and they are poopers hiding in every nook and corner with an evil intention to pounce over and grab all the valuable information that might help them create their business and paralyze permanently the business of others. The research paper suggests stringent authentication measures to safeguard valuable data and information in order to give the user both access control and security to the information that he/she shares.

 Firewalls is one commendable research outcome that gives personalized security solutions. A firewall is a hardware device or a software program running on the secure host computer that sits between the two entities and controls access between them. Here the two entities are nothing but a private network and the public network like Internet. The firewall can be a software firewall and the hardware firewall. The first computer firewall was a non-routing Unix host with connections to two different networks. One network card connected to the Internet and the other to the private LAN. To reach the Internet from the private network, you had to logon to the firewall (Unix) server. You then used the resources of the system to access the Internet. For example, you could use X-windows to run Netscape’s browser on the firewall system and have the display on your workstation. With the browser, running on the firewall it has access to both networks.

Conclusion: The research paper concludes on a note that the security levels over internet have become highly jeopardized. Now children of age 13 can hack PCs by contaminating the routes with potential viruses that can crash hundreds of PCs at a time. In a scenario like this firewalls offers good security measures.

Download Firewalls Internet Security Technical Seminar For Final Year Students.