Dsp Processor Implementation Of A Modem For Narrow Bandwidth Channel Report

Introduction to Dsp Processor Implementation Of A Modem For Narrow Bandwidth Channel Project:

The networks which we use for transmission are public switching telephone networks and they transmit only analog data. A modem is device which can modulate and demodulate a signal and allows the transmission and reception of data over public switched telephone networks. The modem converts the analog input stream into digital data on public switched telephone network. In this paper we will look into voice based modem system for transmission and reception of data between two computers.

Brief on modems:

The first modem designed would allow a stream of data a converts it into a tone and transmits it and at it gets converted into digital data at the receiver. The first modem has a baund rate of 300 bits per second and they were not available at a affordable rate and today electronic modems are available which have a baund rate of 9600 and available a cheaper cost. We have two types of modem configurations one is symmetric modem configuration in which there will be symmetry between the upstream and the downstream conversion of data.

Whereas in asymmetric modem configuration there will be a need of analog to digital and digital to analog conversions each time when the signal is sent over the public switched telephone network. In the voice based modem system we will use a DSP acquit ion system for performing the coding and sampling of the signal. Analog to digital and digital to analog converters are used for conversion of the data at the modems. In this we will use BPSK modulation technique for transmission of the data.

Conclusions:

Today’s modems are available at cheaper costs and they are efficient for performing the conversion process in the public switched telephone networks. This is the best device for conversion of analog to digital data we can transmit data at a higher speeds.

Download  Dsp Processor Implementation Of A Modem For Narrow Bandwidth Channel Report.

Term Paper on Distributed Operating Systems on Locking In the Multithreaded Free BSD Kernel

Introduction to Term Paper on Distributed Operating Systems on Locking In the Multithreaded Free BSD Kernel:

The main objective of this paper is to give idea of locking in the multithreaded free BSD kernel.  There is SMP support in free BSD and kernel in this is referred as SMPng . Generally, this SMP should allow multiple threads to be executed in the kernel concurrently. But the problem if the kernel is given concurrent access is there data structures are corrupted if two concurrent threads attempt to modify the same shared data structure.  Hence MP capable CPU’s are used to solve these problems.

Brief into Distributed Operating Systems on Locking In the Multithreaded Free BSD Kernel

 Generally, in SMP the synchronization primitives like mutexes, condition variables, shared/exclusive locks, and semaphores are introduced first. Then the spin mutex which is used for protecting the scheduler queues, sleep queues, etc and sleep mutex are added. Next the interrupt handlers are placed into the interrupt threads. The MP capable CPU’s uses two mechanisms they are atomic operations and memory barriers.

In atomic operation, CPU performs such that all the results are made visible to other CPU’s. Atomic operations are used as best building blocks for higher level synchronization primitives because of the reason that they can modify only one variable. Memory barriers are used to control the memory accessing order.

Two tools are specified for lock diagnosing they are lock assertions and witness. In this lock assertion one can assert the recursive/non-recursive lock to thread if it does not own a lock. In witness, the order in which locks are acquired is checked.

Download  Term Paper on Distributed Operating Systems on Locking In the Multithreaded Free BSD Kernel.

Seminar on Domain Name System

Introduction to Domain Name System Seminar:

The main objective of this paper is to give idea of domain name system. Generally, usage of networks is growing day to day, these internet uses ip address. These IP addresses consists of numbers and there may be some problem in remembering these addresses. When internet usage was less then it was easy to solve this issue they have followed a technique by writing the host name and address in a file named hosts.txt.

But as there is vast growth in internet usage became more this type of approach was found to be not useful. Hence in order to avoid these problems, Domain name systems have been developed.

Brief into Domain Name System

Domain name system is generally defined as set of protocols and services on a particular network. By using this DNS protocol clients and servers can communicate with each other. A domain name space is created by all the domains stored in the database.  The domain names created should be unique because there is only unique IP address.

The full domain name is separated by dots . These databases are stored on the DNS servers which are managed by internet information center. Different zones are present such that it defines a group of domains.  A zone file is made and all the information about the node in domain is stored in this file. There are different domain names such as com, net, edu, gov, int ,org based on the types of organizations which use them for example com is used by commercial organizations . 

Download  Seminar on Domain Name System.

Seminar Report on Domain Name System

Introduction to Seminar Topic on Domain Name System:

The main objective of this paper is to give idea of domain name system. Generally, usage of internet is growing day by day, these internet uses ip address. These IP addresses are in numeric and there may be problem in remembering these addresses. When internet usage was less then to solve this issue they have followed a technique by writing the host name and address in a file named hosts.txt.

This type of technique was quite satisfactory when few hundred machines are connected to the network. But as the network usage is growing and thousands of machines are being connected, there rose a problem. Hence in order to avoid these problems, Domain name systems have been developed.

Brief into Domain Name System

Domain name system is defined as set of protocols and services on a network. By using this system users can use some names instead of using the IP addresses. The DNS domain database has all the domain names stored in it. A domain name space is created by all the domains stored in the database.

These databases are stored on the DNS servers which are managed by internet information center. They follow international standard 3166. There can be sub domains to each domain. Different zones are present such that it defines a group of domains. They are different domain names such as com, net, edu, gov, int, org based on the types of organizations which use is used by commercial organizations.

Download  Seminar Report on Domain Name System .

Information Technology Technical Seminar Report on Open Source Software

Introduction to Technical Seminar Topic on Open Source Software :

The main objective of this paper is to give idea of open source software. Generally ,many of the software’s which we use today are licensed and we need to buy them. To avoid these open software is developed such that any user can use these without buying licenses. Open source acts as a alternative to commercial software.

Today many of the operating systems like Linux, open Solari , symbian etc are open source operating systems. Software’s like php, phyton and ruby are developed which are open source. Servers like apache, tomcat, and word press are open source. Some of the client software’s like Mozilla, stockwish, peazip etc are open source software’s.

Brief into open source software:

In open source software the source code is made available to anyone.  One can edit, modify the code at free of cost.  One cannot redistribute the software because of some license based restrictions. Only the original manufacturer is given full rights to redistribute because if the software is not registered with OSI by original manufacturer there may be chance of registering it with OSI by claiming that they are original manufacturers. Many of the companies like Red hat, IBM etc are giving the software for free but they are charging for support service.

Advantages and Applications:

One can use this software without buying the license. Source code can be edited, modified which can make many developers to add new features. The main advantage of using open source software is that it can be easily redistributed. This kind of system is followed in health and science, digital content, beverages, electronics etc.

Download  Information Technology Technical Seminar Report on Open Source Software  .

Technical Seminar Topics For CSE on Wireless Protocols

Introduction to Technical Seminar Topics on Wireless Protocols:

The main objective of this paper is to give idea of wireless networks. As the usage of networks is growing , the demand of wireless networks is increasing. At present our network depends on routers and nodes. If the number of nodes increases routers also increases which leads to circuit complexity. The speed also gradually decreases .It is very difficult to add or change the nodes. Hence in order to avoid these problems we have developed basic Simulation of Routers with QoS in Java. Java is used because it is platform independent and it has powerful database connectivity. Linux operating system is used due to its open-source.

Brief into the Protocols:

The QoS routing protocol is more important for a wireless network. This Qos routing protocol consists of bandwidth calculation and bandwidth allocation. Performance of this QoS is verified by simulation. By using this simulation process we can calculate the bandwidth transfer. Bandwidth is calculated based on number of timeslots.

The administrator is given right to add or remove nodes, removing the link etc. Just by moving the cursor and with a single click, we can add or remove nodes which make the user more comfortable. Java programming language acts as a graphical user interface. The best routing path can be found by making the weight of node to zero.

Advantages:                  

It increases the speed of the networks for transmitting data to the end users. By using this protocol methods we can easily add or delete the nodes and we need not reconfigure the network for each time we add or delete the node.

Download  Technical Seminar Topics For CSE on Wireless Protocols .

Ethical Hacking Presentation

Introduction to Ethical Hacking Presentation :

The main objective of this paper is to give idea of ethical hacking. As there is huge growth in usage of computers, software’s are also developed more. Security is being lacked in these software’s and this leads to being hacked. Ethical hacking lets us to find the security vulnerabilities caused by various sources. The vulnerabilities found are patched to increase the security. A good ethical hacker need to know all the methods used by hacker.

Ethical hacking is said to be legal. Many of the organizations are now hiring some of the ethical hackers to stop the hackers who break into their systems. A good ethical hacker should have good knowledge on operating system, Linux, firewalls, routers, mainframes, network protocols and project management.

Brief into Ethical Hacking:

A hacker first collects the information of the company which has to be hacked, then he makes a blue print of ip address and services which company uses. After this he tries to convince servers such that they give some information. According to all the information collected from all the sources, he then tries to access by cracking password. Some of the tools which ethical hackers use are stampede for collecting the information about the host address etc, email tracker for tracking the address of the server from which email has been sent.

Advantages and disadvantages:

Ethical hacking is the most efficient technique for providing security to the organizations from getting hacked. It is very difficult to get professionals trained on ethical hacking.

Download  Ethical Hacking Presentation  .

Generic Optical Terminal Seminar Topic

Introduction to Generic Optical Terminal Seminar Topic:

The main objective of this paper is to give idea of generic optic terminal.  In this coarse pointing and fine pointing functions are used. The coarse pointing assembly has large angular range but a small band width whereas the fine pointing assembly has a small angular range and large band width.

Brief into Generic Optic terminal:

The altitude of the space craft is first determined and it is given to coarse pointing assembly. Two sensors acquisition and tracking sensors are used which detects the lone of sight of an incoming optical beam. The data to be transmitted is done through laser subsystem. Each laser module contains a laser diode, collimating lenses and focusing lenses. A quarter wave plate is placed in between the diplexer and fine point assembly.  

The fine point controller the fine point assembly based on the information given from the tracking sensor and the acquisition system. The position  and the altitude is determined by the altitude determination system. The diplexer is used because it can provide efficient transmission of one type polarized light and rejects another type polarized light. 

Download  Generic Optical Terminal Seminar Topic .

Blue Eyes Technology Report

Introduction to Blue Eyes Technology Seminar Topic:

The main objective of this paper is to give idea of Blue eyes. Today, the computers which we use are not enough intelligent though they perform tasks faster.  Hence Blue eyes technology has been developed. In this the ability to understand human emotions is given such that we can interact directly with the computer.

For example, If we touch the mouse it can understand what user is expecting. Blue eyes technology uses biometric sensors such that they can cause incredible effect in detecting emotions. 

Brief into Blue Eyes

It mainly consists of two parts data acquisition unit and central system unit. Data Acquisition Unit consists of physiological parameter sensor, voice interface and ID card interface etc. ID card interface provides a separate id to user and pin code is provided. Jazz multi sensor for sensing different physiological parameters. Voice interface is used to transmit the operator’s voice.

This mobile unit is used to receive the information from sensor, for managing Bluetooth connections and to handle personalized ID cards. Central system unit consists of real time buffers for processing the incoming data  Connection manager for managing connections and to receive data, data logger module processes the information, data analysis module for processing the output of the sensor and for identifying emotions, alarm dispatcher module is used to check alarm conditions and provide desired output, visualization module makes operator to access the database easily.

Download  Blue Eyes Technology Report .

DNA Based Computing Seminar Topic

Introduction to DNA Based Computing Seminar Topic:

DNA computing is the most advanced computing technique in the fields of cryptography and stenography used for finding the unbreakable algorithms. DNA computing is the most advanced encryption algorithm and is highly secure and this can be used in various fields in the future. For performing DNA computing high tech lab equipment are required and many computational limitations are combined. In this paper we will discuss about DNA and how this computing method and is highly secured than other conventional encryption algorithms.

DNA and computing method:

All organisms in the planet are bind together with a same kind of genetic blue print. This blue print coding decides the structure of the organism whether he is human or an animal or a plant. But the information regarding the cell is known through DNA (Deoxyribo nucleic acid). From the DNA information the cells form the protein material upon which the life is formed.

The DNA is formed of millions of linked nucleotides and these are made of four nitrogen bases and one carbon sugar and a phosphate group. Depending upon the nitrogen base these are named. DNA based cryptography has high level of computational ability and has incredible information storage media.

The DNA stenography is build by using a simple code to convert the letters of combinations of four bases and by this DNA based code is designed.

Conclusions:

The DNA computing has many applications in the fields of biology, chemistry and medicine. The research in DNA computing resulted in to build a molecule with desired features. The DNA authentication is the most secure method in the market and its use will expand in the future. 

Download  DNA Based Computing Seminar Topic .