Mobile Based LAN Monitoring Project

Mobile Based LAN Monitoring projects main aim is to implement a wireless application through which entire LAN network can be monitored with a simple wireless handheld network which works from anywhere irrespective of distance. Say, you have a LAN setup at your office. 

Sitting at home you want to learn the LAN status.

Administrator can send the Control Commands like Start process, Kill process from his/her Cell Phone to Control the entire LAN and receive all the notifications from LAN.

Features Controlled From Cell Phone:-

  •  Process List: Get the list of all the processes running on the remote machine.
  • Activate Process: Activate different processes in either the server machine or any of the client’s.
  • Kill Process: Kill the desired processes on either the server or clients.
  • Read: You can read the drives, folders, files of any of the client machines/ the server machine from the cell.
  • Open-File: A small text file residing in any of the client or the server machine can be opened on your cell phone.
  • Shut Down the client machines from mobile
  • Role Performed:- Analyst, Programmer, Tester

Image Stream Transfer Using Real Time Protocol

Image stream transfer using Real Time Protocol networking projects the main idea is to implement a new protocol called ITP which is especially for transfer of images.

Image downloads are most common on the web which works on traditional TCP methods for transferring images data is transmitted in the form of byte stream abstraction, comparing overall performance this method will restrictive for image data.

In order to improve the image transmission mechanism in this paper, we will explain about design and implementation of image transfer protocol which works efficiency on congested or wireless networks.

In this protocol ALF (application level framing), ADU (application data unit) and PSNR(peak signal to noise ratio) are used to implement an effective protocol. This protocol also works on UDP.

download Image stream transfer using real-time protocol Reference document.

Active Packets Improve Dynamic Source Routing For Ad Hoc Networks

Active Packets Improve Dynamic Source Routing for Ad hoc networks paper explains about to implement a new idea for improving the packet routing mechanism by reducing route cache problem in Dynamic source routing method.

DRS is one of the mostly used packet routing methods in ad-hoc wireless network which will help in taking requests and allocate a route for packet transmission. 

DSR systems should take every request which is handled by Route caches in DSR system. As the network size is increased route caches are inefficient a slow.

In this paper, we introduce new  Route caches in DSR are used to reduce flooding of route requests. But with the increase in network size and node mobility, cached routes quickly become stale or inefficient.

In this paper, we propose a new method using active packets. Active packet rooms are created around the network and collect network topology information. 

Using the information from active packets while traveling in the network, network nodes will update route caches which will decrease miss rates and route discovery flooding is reduced.

download Active Packets Improve Dynamic Source Routing for Ad hoc networks reference documentation.

Energy Efficient Multipath Routing Algorithm For Wireless Sensors

Energy Efficient multipath routing algorithm for wireless sensors paper explains about implementing a new algorithm for improving the efficiency of packet routing in multipath networking systems. 

In this paper, we take a view that in networking routing using shortest path with minimum energy will cause a problem when the present node is busy and time taken for finding alternative path will increase.

In this case, multi path routing will be helpful which will distribute traffic among different paths.

In this paper we cover new efficient methods in multipath networking which utilizes different paths between source and sink, this method is used because of low traffic overhead. 

This protocol works with low energy and provides efficient and reliable transmission.

Other factors in this system include using available energy more efficiently and finding out multiple routes more efficiently based on the received nodes information.

Performance of these new algorithms is checked using simulators and the result shows this new method is more efficient compare to existing methods.

download Energy efficient multipath routing algorithm for wireless sensors reference document.

 

Efficient And Secure Content Processing And Distribution By Cooperative Intermediaries

Data Security Networking Project Abstract:

Efficient and secure content processing and Distribution by cooperative Intermediaries projects main idea implement a new approach for improving data security while transferring data on the network. 

Data security is one of the important factor for any web application. In this project we mainly concentrate on two issues content adaptation and caching by intermediaries.

In this approach, we perform data intermediaries on various portions of data and we provide experimental details on the result of new approach while data is transmitted on the network.

In this application, proxies play a major role for retrieving secure information from a server using an access control system. 

Each proxy uses transcoding technique where each proxy is implemented with three transcoders for improving data security.

Three techniques we use in this project are watermarking, file conversion and text to audio conversion.

download Efficient And Secure Content Processing And Distribution By Cooperative Intermediaries.

 

Intrusion Detection System for MAC Layer Networking Project

The project named Intrusion Detection System for MAC Layer projects main idea is to prevent the network resources from illegal penetration and to provide efficient communication.

In wireless network there are many cases where packet loss or hacking packets had become a common problem which creates a reason for re checking implemented protocols in distributed systems. This paper will explain how different protocols in a network layer are affected because of misbehavior of nodes and MAC layer. In order to analyze the problem more accurately we will look after performances at each node and MAC layer using frame work and provide a optimal rule to for dealing in worst case attack in the MAC layer.

Suspicious E-Mail Detection Java Project

Suspicious e-mail Detection Java Project is a web-based project developed using java. 

The main aim of this project is to suspect the emails which consists of offensive, anti-social elements and blocks them from being sent and identifies the suspicious user.

Now a days it had became common on getting suspicious mails and there are many fraud cases lauched in past few years. 

This problem has become a serious issue for internet giants like Yahoo Gmail and hot mail also. So researchers are going on to deal this problem more effectively.

This system works on detecting keywords such as bomb, RDX, lottery ..etc. Admin will have the option to check emails of this spam emails and restrict them and find out from which IP it was sent. This application

download Suspicious e-mail detection java project report and paper presentation.

Data Leakage Detection Project Using ASP.Net

Data leakage Detection Project is a networking project developed using java as front end and MS – Access as back end. 

The aim of this project is to detect the agents who have leaked the data of an organization to some other party.

Existing system: In this system, it is possible to detect hackers but the information we get from cookies is less for taking any serious action against hackers who are involved in data leakage. 

There is need to improve the existing system to implement a secure data leakage detection application.

Proposed System:

This system will provide more amounts of hackers who are part of data leakage and take serious action against them.

In this proposed system we use different methods to find out the hackers for example by generating fake objects, encryption of data and watermarking techniques.

download data leakage detection asp.net project paper presentation.

Evaluating the Vulnerability of Network Traffic Using Joint Analysis of Security and Routing Protocol

Evaluating the vulnerability of network traffic using joint analysis of security and routing protocol project explains about attacks that are creating serious issues for confidential information on network traffic.

In this project, we will compare packet transmitted on network line with current passing from a circuit mapping and check the vulnerability of the traffic using circuit mapping.

In this system, we implement vulnerability metric as a function of the routing and implement cryptography protocol for improving the security of the system.

This application is implemented in four modules using Java as a programming language.

Project  Modules:

  1. Network Module
  2. Key Assignment Module
  3. Adversarial Module
  4. Route Vulnerability Metric(RVM)

download Project Report on Evaluating the vulnerability of network traffic using joint analysis of security and routing protocol project.

Dynamic routing with security consideration Java Project

  • Project Title: Dynamic routing with security consideration Java Project.
  • ENVIRONMENT: Java, HTML, Java Script

DESCRIPTION:

The Purpose of this Dynamic routing with security consideration Java project is to propose a dynamic routing algorithm to improve the security of data transmission. We define the eavesdropping avoidance problem as follows: a source node, and a destination node, the problem is t minimizing the path similarity without introducing any extra control messages, and thus to reduce the probability of eavesdropping consecutive packets over a specific link. This final year Engineering project was developed in java.

Modules:

  • Network Module
  • Dynamic Routing
  • Randomization Process
  • Routing Table Maintenance
  • Load on Throughput

Developer Responsibility: we are going to propose dynamic routing algorithm that could delivery paths for data transmission networks. We have taken this entire project into two those are Network module & Dynamic module.

In network module distributed application architecture that partitions tasks between server side and client side. In dynamic routing module we can propose a distance vector algorithm to improve the security of data transmission.