Anda di halaman 1dari 3

Java network based project

2010

1. REMOTE APPROACH FOR EFFECTIVE TASK EXECUTION AND DATA ACCESSING TOOL 2. ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE NETWORKS 3. EXCESSIVE DATA ACCUMULATION FREE ROUTING IN ENLARGE NETWORK 4. REALISTIC BROADCAST PROTOCOL HANDLER FOR GROUP COMMUNICATION 5. MULTICAST LIVE VIDEO BROADCASTING USING REAL TIME TRANSMISSION PROTOCOL 6. ADAPTIVE SECURITY AND AUTHENTICATION FOR DNS SYSTEM 7. EVALUATING THE PERFORMANCE OF VERSATILE RMI APPROACH IN JAVA 8. DYNAMIC CONTROL FOR ACTIVE NETWORK SYSTEM 9. EFFECTIVE PACKET ANALYZING AND FILTERING SYSTEM FOR ATM NETWORK 10. MULTI SERVER COMMUNICATION IN DISTRIBUTED DATABASE MANAGEMENT 11. MESSAGING SERVICE OVER TCP/IP IN LOCAL AREA NETWORK 12. EXPLICIT ALLOCATION OF BEST-EFFORT PACKET DELIVERY SERVICE 13. LOGICAL GROUP NETWORK MAINTENANCE AND CONTROL SYSTEM 14. REDUCTION OF NETWORK DENSITY FOR WIRELESS AD-HOC NETWORK USING XTC ALGORITHM 15. DISTRIBUTED NODE MIGRATION BY EFFECTIVE FAULT TOLERANCE

http://www.cedt.iisc.ernet.in/osp/wmn/ http://research.microsoft.com/en-us/projects/mesh/ http://www.projectsparadise.com/ambulance-management-system-gis/#

http://e-construction.pm.umd.edu/publications/Jang%20-%20Wireless%20Networkbased%20Tracking%20and%20Monitoring%20on%20Project%20Sites%20of%20Construction%20Materi als.pdf http://projectsinnetworking.com/ http://www.logicindia.net/Software_IEEE%20Projects_ieee_2010_2011_Btech_Mtech_Mca_C_Java_JEE _Dotnet_44.aspx https://sites.google.com/site/ashutoshdhekne/mtechprojects http://ieeeprojects2010.com/EthicalHacking.htm

literature servey 1. fingerprinting a web server 2. smurf attack

3. PING FEATURE TEST PLAN 4. TLS PROTOCOL-PACKET DECODE AND ANALYSIS 5. PACKET DELAY MODELING OF TRUNCATED MULTI-PROCESS ARQ PROTOCOLS FOR PARALLEL
COMMUNICATIONS

6. 7. 8.

HOW TO EFFECTIVELY USE MULTIPLE CHANNELS IN WIRELESS MESH NETWORKS DISTRIBUTED CACHE UPDATING ALGORITHM FOR THE DYNAMIC SOURCE ROUTING PROTOCOL
DESIGN AND IMPLEMENTATION OF DENIAL OF SERVICE ATTACKS USING THE DOMAIN NAME SYSTEM AND FIREWALL SECURITY

In the distributed denial of service (DDos) attack, attacker requests the target IP Address to the DNS server. Then he takes over many computers that have vulnerabilities in advance. Hosts that are taken over called zombie hosts (a machine which cant protect itself from unauthorized access, like the remote system may not have firewall). By employing many zombie hosts, attacker can send vast amount of data packet to the target host. It makes huge traffic in the host network. If the network traffic increased, the speed of the data transmission will be very less. There is a technique to reduce the influence of the DoS attack without disturbing the demand of the regular users by allocating the information, when DoS attack occurs, to the filtering rules. To overcome this DoS attack in network, we are implementing Filtering technique based on DNS query response and creating a Hashed value table using the IP address of source and destination machines. Firewall is employed for DoS countermeasure. By limiting packet rate at which it passes to inner network, it can protect inner network from flooding.

System Requirement Specification:DOMAIN : TRANSACTION ON NETWORKING SOFTWARE : Operating System: windows xP Platform: JAVA,DB: SQL Server HARDWARE : Processor: Pentium-IV Speed: 1.8 GHZ RAM: 512 MB HDD: 80 GB

APPLICATION DRIVEN OPTIMIZATION FOR VIDEO STREAMING OVER LAN NETWORKS (IEEE) This project based on IEEE Papers Application - Driven Cross-Layer Optimization for Video Streaming over Wireless Networks involves that a Video file in a format is to be transferred over networks. In the Existing system, the transformation of video file over networks cause a more traffic and it affects the other resources using the same network.

In the proposed system, this network traffic can be overcome by, that we are taking a video file and splitting into a frames (images) and these frames are stored in a jpeg format, those jpeg images are compressed by a method, so that it is easy to transfer over networks, then the compressed images are stored in server. If any client in the network request for a video file, then server response to a particular client by sending those compressed images of video file by receiving it, Clients have a provision to decompress it and again convert it to a video file. In this transformation, the original size of a video file is somewhat reduced, but we overcomed to get the file as good quality System DOMAIN Tool: Requirement : VIDEO Specification:STREAMING JMF

SOFTWARE : Operating System: Windows xp, Platform: JAVA, Back end: Ms-access, HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ , RAM: 512 MB, HDD: 80 GB

DISCOVERING E-MAIL SPAM AND ANTICIPATION VIA COLLABORATION AND AI TECHNIQUES (IEEE) View Abstract Spam has become a very necessary topic of discussion these days. It is especially assuming alarming proportions due to the fact that genuine emails get buried in the horde of Spam. More so that in recent days free email service providers like yahoo are considering ways to charge the senders of emails to preferred accounts. System DOMAIN Requirement : ARTIFICIAL Specification:INTELLIGENCE

SOFTWARE : Operating System: Windows xp , Platform: JAVA, Back end: Ms Access HARDWARE : Processor: Pentium-IV, Speed:1.8 GHZ , RAM: 512 MB, HDD: 80 GB

Anda mungkin juga menyukai