Computer Science Third Year Seminar on Wireless Communication Mobile IP

Introduction to Seminar on Wireless Communication Mobile IP:

When we internet in our mobiles we are provided with IP number that is the unique identification of the device. It consists of nodes and nodes consist of network information and user information. Whenever you get connect to the internet you get connect to the host and IP address is provided and when you disconnect the host and connect to the other network then your previous IP address does not work with new network and you will not receive any data.

But in the case of mobile IP you can freely jump from one host to another host. Mobile IP has three parts mobile node: it jumps from one link to other link while you get connected to the same IP. Home agent maintains the list of the mobile nodes and keeps the current location of its address. Foreign agent: it tells the home agent about the location of the mobile node, or provides the address of the mobile nodes.

Working: they work in three steps; agent discovering: they determine whether the agent is connected to the network or not. They will look after the service and IP address of the foreign agents. After that it is moved to the registration: registration:now the nodes are configured and secured with home agents.

Home agent checks the registration and then provides authentications. Tunneling:  In these mobiles nodes send data to its IP address and they are addressed to the home network. First the data are encapsulated when they leave from the node and the DE capsulate when they reach the destination. In this data is transferred to its location.

Applications:  IP used in the 3G, DVB or WLAN and many other like VPN and VoIP.

Advantages: they are strongly secured and required to be registered. 

Download  Computer Science Third Year Seminar on Wireless Communication Mobile IP.

B.tech CSE Final Year Seminar on Wireless Body Area Network

Introduction to Seminar on Wireless Body Area Network:

It is technology that is used in the medical field for the treatment and monitoring of the various diseases. This is the system that can be used to monitor the problems. Bluetooth is also the application that can be used in the WBAN especially when we do wireless based treatments.

WBAN are divided in two parts: body sensor units and central sensor units. Body sensors are used to monitor the data acquisition, control and transmission of the user needs. Central sensors are used to data calculation, they collect all the data and process them after that perform the operations it require. WBAN is used for short range communications. Its rate is 1 M symbols/s at the rate of 1 Mb/s. during ECG operation signals are received at the rate 360 Hz and 11 bit/s at the speed of 3.84 Kbps.

ECG data are compressed so at to preserve the information and manage the bits we required after compression as ratio to the original. If it generated any error than the mathematics technique of root mean square is used for error handling. This also remove the complexity of the compressed data.

WBAN consist of lots sensors that are used to detect the data. Sensors that are used on the patient’s body should be of light weight and it must ensure the data security of the patient. Power consumed by the sensors should be decreased to work for longer time. The power used by the sensors should be below 1 mW. It should be able to store some energy. As we all know that human body is not friendly with wireless communication that uses Bluetooth or radio signals. We need to install the intelligence to the sensor that can behave according to the patient’s problem.

Download  B.tech CSE Final Year Seminar on Wireless Body Area Network.

Final Year CSE Technical Seminar Report on Wireless Application Protocol

Introduction to Technical Seminar Topic on Wireless Application Protocol:

It is the internet services on the mobile phones, just like the browsing the web page on the desktop. Hyperlinks and buttons are displayed that can be pressed just like an experiencing desktop on the phone. It is the old and standard way to access net on the mobile. it is majorly used by the Nokia, Ericson, Motorola and the many new phones that are launched. We cannot say it is nice as it has lots limitations like bandwidth is less and connection is stable or get disconnected easily. It is very difficult to set internet via WAP for the first time.

Today’s GSM service doesn’t support WAP for the SMS. WAP services are expensive as compared to today’s technology.Of you are using WAP for the first time and you haven’t taken any plan then you will get shock after the first bill. It supports WML and HTML and also TeleVAS.  It has protocol that makes your browsing interactive with different applications.

Wireless session protocol: it is the sandwich layer that provides various links for operating connection. They provide two types of services: to operate connection-oriented service for the WTP and connection less service that is non-secure for WDP.  WTP class 0 is the transaction service that is unreliable and it does not generate any message and once the connection made then it cannot be aborted. WTP class 1: it is the reliable service and it also don’t show any result. WTP class 2: it is reliable and it generates one result or message to the request and response.

WAP security is based on the TLS standard protocols that include the features like data integration and provides privacy on the WAP gateway and store the authentication of the client. 

Download  Final Year CSE Technical Seminar Report on Wireless Application Protocol .

Windows Vista Introduction Seminar Reference Material for CSE Students

Introduction to Windows Vista Introduction Seminar Topic:

It is the operation system developed for the customers by the window after windows XP. It is developed for the personal computers, laptops, tablets for the general people. Anyone can purchase these operating systems. Development of this operating system is completed in 2006 but it was released after one year after lot of testing. Microsoft takes 5 years to develop these operating systems. Many new features were added to this, new interface graphics are of best quality than XP. New tools are added like DVD maker, networking, audio and video enhancement. It is based on the .net framework version 3. It has added many new features related to the security.

This operating faced lot of criticism and thus it fails in the market as it not user friendly as required.  It has lot of restrictions related to the security and its purchase. Thus the rate of success is less than the Windows XP.

It has new feature called breadcrumb trail that is used in the address bar for every folder. It means that you just need to press the name of any folder if exist then it will jump directly to that folder no need to scroll up and down. It also has aero glass that makes the interface look more interactive and 3D. If you want to switch any open program then you can use flip 3D view for that. You just need to press windows + TAB instead of ALT+TAB.

In the home screen it has side bar that is used to place the gadgets that are few pre installed in the systems. It has search option that can search whole system related to your query. You just need enter the file name it will search the whole computer. Welcome center that display all the information of the system specification.

Download  Windows Vista Introduction Seminar Reference Material for CSE Students.

CSE Engineering Final Year Seminar on Windows Registry with Report

Introduction to Seminar on Windows Registry:

It is the heart and brain of the systems. It makes the system runs and performs various operations. It contains all the setting of the windows. You can also say that it is the type of database. They are hidden in the systems and normal must keep distance from it. If you operate setting without any prior knowledge then some application of your windows might not work. Earlier MS-DOS was into the field before interface come. Then we use Config.sys to access the system files like drivers and Autoexec.bat to prepare the system, get necessary environment variables.

Registry we have keys that denote that are folders which have same values or rules. A key name is written in ANSI format other than the symbols like /, *?. A key contain more than one value and every value has name. REG-DWORD stores the value of number that is double and REG SZ is the strings. You can leave the value NULL or blank. REG_DWORD_BIG_ENDIAN shows the have most significant figures. REG_DWORD_LITTLE_ENDIAN shows that have least significant figures. REG_ EXPAND_SZ it is the variable length indicator. It also includes have environment variables.

REG_FULL_RESOURCE_DESCRIPTOR: it stores the drivers that are installed in the system. REG_MULTI_SZ: has the strings and there binary values. REG_QWORD are used for the quadruple words. They are similar to the DWORDs. DWORD contain 32 bits and it contains 64 bits.

In windows we can use two types of concepts per-user and per-computer. Per-user settings are used for the specified example. It determines what user selects to display. Per-computers settings are set for the computers and they are fixed cannot be changed. Windows contain local security that even don’t allow the administrators to change it or use it, view it, you need to take ownership of that.

Download  CSE Engineering Final Year Seminar on Windows Registry with Report.

B.tech CSE Final Year Seminar Topic on Windows DNA

Introduction to  Seminar Topic on Windows DNA:

It is the internet application by windows. It is just the image or replica of the windows that allows vendors to develop new business application and other programs that suits best for the windows. They can design anything according to the environment. It is first application that can be integrated the clients using internet. Using DNA model we can develop our own product that can be send to anyone on the network.

This gives companies advantage to add new features to their applications. It helps the organization to develop programs for the clients at low price and use the resources properly and try to reduce the amount of developers. 

Components: it has HTML pages and server pages that are active. Computer components, their services and important directory services are also there. Services related to the security features are added. Its systems messages are stores and components related to the data access.

Windows provide the other companies to connect with ODBC and allow their application to connect and store their data in to the data base. it supports almost all the data bases. You can use any programming language interface to have your data base. You need to have all the drivers related to the data base for connecting data base to the windows. Microsoft provides OLE DB that allows various developers to implement programming techniques to databases.

Today COM is used in the across 200 million computers and it show 655 growth every year and it will grow about $3 billion by 2001. There are lots of applications that work on COM and used in the most of the industries. It have many tools available in the market and enables programmer to create application for the next generation. It is used in whole part of the world.

Download  B.tech CSE Final Year Seminar Topic on Windows DNA.

B.Tech Computer Science Seminar Topic on Wireless Intelligent Network

Introduction to Seminar Topic on Wireless Intelligent Network:

It is also a wireless network known as WIN. A telecom industry TIA known for standard committee TR 45.2 developed this network. This in intelligent network this means that it uses interfaces of standard quality and are vendor independence. It allows using new services rapidly and can modify existing services also. Customers can choose their own services to according to their requirement.

Services: WIN was used in the 1980s by the wireless industry. WIN provides billing process; call routing, custom call which includes call tracing, incoming call management and outgoing call management. It uses voice recognition techniques and ASR systems. By this we can speak and dial to anyone without using keyboard. We can also PIN number to call anyone or to call any VCFC number. We can also put restriction to the user until he didn’t get verified by his voice. This require subscriber to be registered. When we call the subscriber our identity or name is displayed to that user. You can put password to the incoming call till it he don’t put right password he can’t call you. We can send short text to the users.

Peripherals: it uses SSP for switching function. SCP is used for delivering the service to the users. IP collects information from the user and then translates it and then send to other parts of the networks. STP is used for managing the signaling devices that send signal between the operators. This network uses location registers that keep tracking the motion of the users.

This network is nice as they provide less time for connection and delivery to the services. Less costly and new services are always ready to be deployed. Network is flexible so it cannot be fraud ads they track each and every thing on the network.

Download  B.Tech Computer Science Seminar Topic on Wireless Intelligent Network.

Wi-Max Research Paper Topics for Computer Science Students

It is the wireless network based on the broadband just like mobile network that are accessed using towers similarly it has towers that provide network to its user to have broadband connection. This is especially designed for the rural areas where broadband connection through wires can’t reach.  This is best for the mobile as they are full mobile, now they can have broadband connection anywhere they go. They are just plug and play DSL modem, with lots of base stations are developed at different locations, to provide full coverage to the user. This will boost the service of the mobile operators.

Wi-Max can provide minimum bandwidth of 1.75 MHz to its every channel and 10 MHz to maximum. While in some licensed countries it can provide the bandwidth of 5 GHz.  They are secure and robust as they have data encryption which provides security to its network. They are reliable as they provide service to its customer over longer distance. User need to have PC cards. They use radio physical layer and MAC layer that full fills all the needs of applications. Their modulation is based on the OFDMA.

IEEE 802.16 MAC:  they are multipoint wireless links that require high speed data download and upload speed. They can accommodate around 100 terminals per channel that can be used by the multi user together. They use IP connectivity VoIP that make it secure and robust.

They use TDM/TDMA for the efficient usage of bandwidth. They provide adaptive modulation which provides higher speed of data rates and improves the channel condition and the capacity. Data are encrypted it means they are secure.  They use smart antennas that are too fast and less costly and don’t let interference to work and system gain for deployments.

Download  Wi-Max Research Paper Topics for Computer Science Students.

Wi-Max PPT Presentation

It is the broadband service that is wireless. They work like cellular companies providing network via large towers over the longer distances. They create towers ad place at different locations using standard antennas. We just need to get connect to the hot spot via laptop or mobile. It works also on mobile, means you can roam anywhere you want and have high speed connectivity. This will be the best in the rural area where cable can’t reach.

It is based on the IEEE 802.16 standard. It is developed in April 2002. They work on the frequency range between 2-11 GHz. It is the best for the mobile user who want mobile internet anywhere any time and that too such fast network. It has overcome all the limitations of the broadband. They are simple plug and play just like DSL modem. It has also boost the service of the mobile operators, now they have added more features to their network.  

Wi-max uses mac, it means we need to take permission before we could connect to the network. It also has the feature of data encryption means data are send in the encrypted from the server and again decrypted at the client side. It uses IP address to connect to the user.

For connecting such network we need to have PC cards in our laptops or computers. It used spectrum both of licensed and unlicensed for the signal transmission. Few big companies have licensed spectrum and few don’t have. They work on 2-11GHz bands. It is both licensed and unlicensed. This is not completely developed yet. It includes modulation that is single carrier. They MAN-OFDM that is the multiplexing technique, it can multiplex 256 point at a time. Another is MAN-OFDMA that is also similar to it but it transforms 2048 points.

Download  Wi-Max PPT Presentation.

Content Centric Network Latest Technical Seminar Topic Computer Science 2012

Introduction to Content Centric Network Technical Seminar Topic:

This is the new approach that is fast, secure and has nice performance. This allows us to migrate the data to flow automatically from one location to another location when we are moving like mobile devices. They use practical approach to store the data at every level and help in decreasing the traffic and therefore response from the user is increased. Whenever we ask for the data it ask from the network and if the data is present in the cache memory then saving is achieved.

This communication is formed from the request of the users. Two types of CCN packets are used: interest and data. When the user ask for the data by giving its interest to an available connectivity then only data is send in response to the interest.  Both interest and data can be identified by their content or name.

Features:  they have security with the data over the user who asks for the data. All the data are verified at every node of the network. They carry both static and dynamic content between the users. They work like distributes systems, so they are universal in nature. Data is exchanged very fast.

Applications: we can make voice calls using CCN. They are used on audio and video streaming over the internet or HTTP streaming. They use high bandwidth connection as videos can’t be cached. They are used for online gaming. Large numbers of players can play together with high rate of data transfer. They can be used for file virtualization. An object file can be shared between the different vendors.

CCN networks are secure and they have very less congestion. Data is delivered easily and are reliable. But they are costly at the beginning. They can be used in the future for the tele-education purpose.

Download  Content Centric Network Latest Technical Seminar Topic Computer Science 2012.