NIT Final Year CSE Project Topic on Security in Wireless Networks with Report

Introduction to Security in Wireless Networks Project:

There is a huge importance to implement the protocols for the wireless network system and it exists even till today. Mechanism and algorithms that are webbed altogether to suite the current wireless security system have several flaws. There is a severe need of increasing the already existing protocols in the wireless network domain. The security aspect of the framework authentication is also analyzed here.

The authentication is made for wireless networks that include 802.1x and 802.11. 802.11 is the method of authentication and the use of open authentication, SSID, client MAC verification and shared key authentication have their own vulnerabilities share. Port based authentication is supported by 802.1x and it includes management key features that suffers lack of mutual authentication as well as hijacking attacks. The one way authentication is inadequate as it is only the server who can authenticate the client.

The server’s identity cannot make sure by the clients. Our security system and authentication are further proposed and explained. A study about EAP and RADIUS protocols is also present. For EAP-TTLS the the 802.1x protocol is suitable and for the RADIUS protocol the most ideal in the authentication server. We choose EAP-TTLS as the most choiceable protocol and it is made only after a thorough study of various protocols that are mentioned.

The authentication protocols are studied to know their vulnerabilities which are documented in this paper. The study reveals that combination of the IEEE 802. 1x/EAP-TTLS protocol and RADIUS protocol are the main way of approaching for an authentication and security mechanism design. A mutual and strong authentication is provided through the setup. It’s also secure the resources of Ethernet from malevolent users. The man in the middle stacks, directory attacks and session hijacking are some of the various kind of attacks that it mitigates. 

Security Addons to Wireless LANS B.tech NIT Project with Documentation

Introduction to Security Addons to Wireless LANS Project:

This project aims to design a wireless networking system and implement the same in NIT which is at Calicut. Access points, antennas, bridges are some of the equipments that are used in order to secure the position of the design that we are creating. This is the main motto of the project and moreover the part of implementation focuses its concern in wireless LAN security that consists of wireless tools along with the authentication server.

This server is developed by focusing on the requirements of a software lab. It also enable to share the access of internet keeping in the time restriction for individual users. This is made possible with the use of wireless and wired network as well. Again it can be controlled with the help of password and login. Client logging and monitoring of packet are some of the provided advantages.

The AC blocking limit the users in working with the wireless networks. Usually access point scanning utility that enables to access the points within a range. This is a part of the wireless tools and its parameter can also be chained with the settings.

The technologies of a LAN are the fastest developing areas in the network of computers and there are a lot of specifications and standard that have been evolved. It includes 802.11b, 802.11a etc. The benefits of flexibility and mobility is provided throughout but still it is facing the flaws from the aspect of security which includes spoofing, unauthorized access and data integrity. This project is concerned with designs of wireless designs which is a safe and secure way of implementation. The security software that is used here consist of an authentication server access point scanning utility, MAC address blocking utility etc. it allowed shared internet use for all the  wireless and wired users.

Final Year Project Idea for Computer Science Students on Secure Mail Server with Report

Introduction to Secure Mail Server Project:

Conceivably you have a business with business settings in some areas, or possibly your family parts are spread crosswise over the planet. How do you keep in touch without running up tremendous telephone bills? Message is the response. It’s scarcely astonishing that message has come to be the most in vogue fix on the Internet. Electronic send or message for short points to the structure, transmission and receipt of conveyance utilizing electronic correspondence frameworks as the medium.

Message was first utilized within 1965 as a system for conveyance between different users of a time-imparting mainframe machine. Advanced in the late 1960s, the ARPANET PC arrangement is accepted to have made a huge donation to the growth of message. In 1971, Ray Tomlinson launched the utilization of the @ image to split the name of the user and their arrangement.

A letter you present is first picked up by the postal van and sent to the midway sorting office. From here all letters are sent to the urban communities specified in the locations. Letters accepted in every city is then sorted as per unique zones in the city then after that dispersed. Additionally every last trace of the messages you send first head out to the Mail Server of your Internet Server Provider. From here they are sorted and go over the Internet to the Mail Server of the aid supplier at the terminus.

Here they are saved in an electronic letter box. When your associate logs on to the Internet his message requisition, for example Microsoft Outlook or Eudora, then downloads the messages sent by you from his letter box to his machine. These days, electronic message has ended up being totally joined with business and private conveyance. Utilizing electronic message, you can access and send wires from at whatever location in the globe at whenever of day.

Scene Description Language NIT Final Year Project Documentation

Introduction to Scene Description Language Project:

How do you portray a scene without backing off the pace of your novel? What do you incorporate? What do you forget? Here’s a dapper trick: utilize your particular encounters as a guide. When we contact a revamped setting or newfangled background, all our faculties are on the caution. While we should not be aware of it, we are utilizing sifting that interaction as a part of our particular novel ways. We all interaction the planet through our five faculties, but a hard of seeing man will rely on different faculties more than these who have exceptional visual perception.

The scenario will figure which sense goes to the fore with your viewpoint element. Assuming that we’re in a bread shop, we have a tendency to perceive the scrumptious SMELLS before else other possibilities. Assuming that we’re walking home in the downpour, freezing and wet, we recognize the way things FEEL in opposition to our skin-frigid, damp, and wet. In the event that we’re in a dim room we rely on what we listen to.

When you are indicating your element’s responses, don’t programmed portray what he or she SEES. Consider the scenario, and choose if one of the different faculties may be more fitting. A large number of starting scholars fall into the trap of attempting to depict every little item. The aforementioned regularly end up being the areas that bookworms skip over, in light of the fact that they don’t prefer to sit down and peruse pages of melodious depiction regarding the field, or regarding the mansion that the victor spots her in. Nor do they need to peruse a laundry-post of what an element may see in a room.

Being advised to wash our mouth out, don’t talk soiled, or, even on event being asked to please talk tarnished may be our comprehending of the special ways we utilize clean or dingy dialect with others. Dialect is utilized to impart our musings, emotions, and plans to others. As an audience, we all react and respond to the things stated to us, but not constantly in the way that the speaker planned.

Samba Search Engine B.Tech NIT Mini Projects In Computer Science

Introduction to Samba Search Engine Mini Projects:

This software is used for searching the files in the network of a local area especially where the server of the samba is installed. The files can be shared in a machine that enable samba network and in a windows machine. Smbclient program is used by the program and it gives the results in a formatted manner. The output result of the query is relevant to the matter and is also presented in a proper manner. Using the Tcl and TK script the graphical interface is developed for the users.

Samba is simply an SMB server that is developed by Andrew Tridgell for UNIX. It is maintained by a group of people located all from all over the world. Lunix, HP-UX, DEC OSF/1, Digital UNIX, SunOS, etc are some of the variants of UNIX. The problem of searching the network samba for files can easily be cope us with the software.

As the output is printed to get relevant information therefore the time taken for searching is quite long. An index document organizes files in such a predetermined way that a search engine starts searching for the files that matches the criteria entered by the users on the system. Installation of samba network is done in systems in order to facilitate inter operating system communication.

SMB protocol is the base of samba servers. Here the client has mounted  the share directory of a particular file. Therefore searching becomes a tedious job with samba and this problem can be tackled with the use of samba tools known As Smbclient.

A Device Mapper based Encryption Layer for TransCrypt NIT Final Year Project Report

At the present time data security is given the utmost importance. Files by encrypting have been designed that will enable to solve the problem. Data security is an important fact and it is necessary to showcase it in a transparent and secure manner. Similarly, TransCrypt is also a type of encrypting file that is implemented in kernel space. Moreover it has an advanced management system that is specially formulated for a scenario in the enterprise.

It uses the keys of cryptography that enable flexible sharing and also the supervisor is not included in the trust model. The Linux kernel of version 2.6 implemented for the transcript system and during this implementation various changes were made to the existing system of the kernel. It helps in embedding the functionality of the transcript system.

The modifications also make several changes especially in the I/O behavior of the files. This adds a layer of cryptography that enables to perform decryption and encryption of the data files. The modified kernel has various drawbacks from the aspect of maintenance, performance and functionality. Moreover, in this paper a new cryptographic layer is proposed that will help the transcript file system. As a kernel module this layer is implemented and it also does not me, and any kind of modification to the present code of the kernel. The omnipresent use of data storage in computers has increased the need of data security in various scenarios.

The system of transcript provides efficient storage facility and also a safe and secure way to address the importance of the security of data. The dependence of transcript implementation earlier was based on the page cache and this led to the introduction of a new cryptographic layer that is based on the mapped infrastructure device of the kernel. This further improves the performance of the transcript file.

Rich Site Summary Perl MYSQL NIT CSE Final Year Project

Introduction to Rich Site Summary Perl Project:

The rich site summary project focus on producing softwares that make sure to keep the website for checking the updates as well as the RSS feed automatically. The RSS reader will surely parse the RSS feed and provides the user with the latest news and updates.

The most extensive used XML formats on the web is RSS. THE rss XTML describes a new style of searching web information’s and it also acts as a news fee. Usually this link consists of links and summaries of the new content of a web site.

As per the RSS feed back the generator can now easily generate the RSS files. It’s almost become difficult to manage the sites that are provided with more than thousand links and it is limited only up to a specific domain.  Almost more than half of the sites have useless links or links of other channels. It can also produce RSS generator that can help in generating the RSS feed for almost all the links. For the gcc gnu compilers site there is a selected domain and so for the morzilla web browser.

Open source is the restricted limit for the RSS reader and it includes newforge.net, morzilla.org, linux.com etc. the above mentioned sites is parsing the RSS feeds to the readers of RSS providing the latest up to date informations. According to the research it is said that the domain can be further extended  and it can also be used for generating RSS feedbacks in case the source can be found from where the update is made or at least a small description of the text. .9 is the standard feed generated value for this project that is allowed by the RSS. This can be a useful expansion for the users and it will also enhance the level of security.

Resource Allocation Problem Using Adaptive Mobile NIT Final Year Topics for CSE Students

Introduction to Resource Allocation Problem Using Adaptive Mobile Project Topics:

A program naming mobile agent is based on autonomous movement and it migrates from machine to machine through a heterogeneous network. It interacts with services on each machine to perform the task desired by the user on his behalf. The environment in which the mobile agent operates keeps on changing because it keeps on moving from in a heterogenous network from one machine to the other. Adjusting in a dynamic environment and compatible with sudden changes are some of the main issues of this system.

There are different models designed for this system and adaptive mobile agent is one of them. This mobile agent creates a platform that helps in the migration features, tracking, adaptation and collaboration among the agents. Using the resource allocation problem this model has been tested thoroughly and as a part of the continuation of this work several other features like the courts of various mitigation, load condition that affects the system’s behavior etc. there is an existing phase in this continuation and that is instead of using a stimulator in order to simulate the condition of the environment for the system agent we can use a real network environment.

Different distributions can be used in order to simulate the tasks arrive in the simulator and this is one of the proposals for any continuation experiment. A study can be conducted to find out the distribution that competes easily with the conditions of the real network closely. Another work that can be done in the future is to change the simulator designs.

The current simulator is based on static design that means no changes can be made in the parameters of the simulation once the agent start the simulation process. A proposal is made to make this static based simulator to a dynamic one so that the parameter value can be changed as per required.

NIT Final Year Project Topic For CSE on Resident Database System with Project Report

Introduction to Resident Database System with Project:

This project focuses the NITC quarters and implements a database system along with the required querying facility.

Input

The system of the database will set up through the GUI system and it will include the starting point, a number of the quarter and the name of the resident.

Output

In case if the input is a name then the quarter numbers will be the corresponding output.

In case the quarter numbers are provided then the contact information and the name of the residents will be the result.

The quarters will be highlighted on NITC, a scaled map of the residential areas.

The shortest path distance from an exact location of a particular quarter.

This new proposed system is being developed in accordance to the design specifications and this can also be used in identifying to get the shortest distance of a location from where you are standing. At the same time it also enable to locate a house even in the dense forest areas. Thus it is a blessing for the new visitors as it will help them to get the house exactly they want without having to wander from here to there. Moreover the implementation of the algorithms devised by Dijkstra’s that includes a minimum amount of complexity is quite a difficult job and is also time consuming at the same time.

This requires a lot of time during the state of implementation and programming language of Java is quite suitable for the purpose of coding. Straightening of the curves between the points of junction especially during the implementation period is one of the most difficult job in this entire theory. Usually the junction paths could be of any shape and in order to make it straight one has to introduce more junctions which will lead to increase the running time of the algorithm. 

NIT Computer Science Project Report on Resident Database of NITC Quaters Project

Introduction to Resident Database of NITC Quaters Project:

The value of a straight mailing catalogue can represent the deciding moment a battle. You can have an important accord, and critical utility, a significant send piece but assuming that every last trace of these things are not getting to the right individuals, they are useless. You lack the capacity to essentially take an immersion mailing record (all locations in a specified zone) and look for it to act and also a targeted post will.

In the event that you claim a hair and nail salon and your deal runs to a family unit with no females, I’d contend that it’s useless! Similarly provided that you possessed a hairstyling salon and you sent it to a house with no guys. Plainly, the proposed are primary samples but you can apply it to any business or utility. In the first place, you should ponder who could quite purchase your item or utility, and target them with offers. When you have your catalogue and you start mailing to its essential to redesign it and keep it natural. Individuals move and pass afar every single day, so if you’re mailing to somebody who doesn’t inhabit the present location anymore, it’s wasted post.

It’ll either move toward getting come back to you or get tossed out. Our records are just $35 for each 1,000 names and locations, so you’ll recovery cash by acquiring a new record versus wasting postage on turned around post. Have you chosen to buy a database answer for your business but don’t know the sorts that are good to go? This piece will assist you in perceiving contrasting database keys and the profits of utilizing them.

Desktop Databases: As the name recommends, these are situated towards single-user provisions and live on standard private machines. The proposed features are economical and are of vital esteem for non-intuitive net requisitions. “PrimaSoft Organizer Deluxe” is one such bundle. Telemarketing utilities have extended been around. Likely, it happened when the first telephone was imagined and the first businessperson dialed a client’s telephone number to give his brand new wares. It has eternity updated the way folks work together. It makes plausible bargains and different transactions without all the more going out of your home.