Natural & Applied Sciences

Natural & Applied Sciences Research Papers/Topics

PERFORMANCE EVALUATION DISTANCE ROUTING ALGORITHM IN MANET

ABSTRACT A mobile ad-hoc network (MANET) consists of wireless mobile hosts (nodes) that communicate with each other over wireless link, in the absence of a fixed infrastructure. Routes between two hosts in MANET may consists of hops through other hosts in the network, due to the limitation of broadcasting range of each host Movement of hosts results in a change of routes. Therefore various algorithms, to find  & maintain routes in MANET is difficult and important task for efficient routing, ...

PEER TO PEER MESSAGING SYSTEM USING JXTA

ABSTRACT Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. Pe...

PEER TO PEER MESSAGING

ABSTRACT Peer to peer messaging is a simple information dissemination platform that is supported by a protocol which is based on pairs of request/response PDUs (protocol data units, or packets) exchanged over OSI layer 4 (TCP session or X.25 SVC3) connections. PDUs are binary encoded for efficiency. Data exchange may be synchronous, where each peer waits for a response for each PDU being sent, and asynchronous, where multiple requests can be issued without waiting and acknowledged in a skew o...

OPTIMAL MULTICAST ROUTING IN MOBILE AD HOC NETWORK

ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack of redundancy, multiple paths and multicast tree structure. Tree graph optimization problems (GOP) are usually difficult and time consuming NP-hard ...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED PROPERTY MANAGEMENT SYSTEM (A CASE STUDY OF ENUGU NORTH LOCAL GOVERNMENT AREA)

ABSTRACT This project lays emphasis on the contribution a computerized property management system in Enugu North Local Government Area and how the computer can be programmed to record property management system and computations so as to eliminate the abuse and fraudulent activities associated with manual methods of property management system. The study of this project is to design a new system that will be more efficient and will provide timely information and a special data input or enquiry....

PROTOCOL SCRUBBING NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION (CASE STUDY OF PRESSURE WORLD CAFE)

ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream end-points. The fingerprint scrubber restricts an attacker's ...

PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSIONS

ABSTRACT The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of trust simple, but it allows no flexibility for individual zones and makes incremental deployment impossible. A pure web of trust based approach impos...

DESIGN AND IMPLEMENTATION OF A PROTOCOL SEQUENCER AND SUBSYSTEM INTERFACE: ADMINISTRATOR TOOL WHICH WILL MONITOR APPLICATION ON A LAN PROVIDE FUNCTIONS (CASE STUDY OF NETWORKING TRAINING)

ABSTRACT A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually, the server has applications and data storage that are shared in common by multiple computer users. A local area network may serve as few as two or three users (for example, in a home network) o...

QUIEVE: CONSISTENT OBJECT SHARING FOR EDGE SERVICE

ABSTRACT We present Quiver, a system that coordinates service proxies placed at the edge of the Internet to serve distributed clients accessing a service involving mutable objects. Quiver enables these proxies to perform consistent accesses to shared objects by migrating the objects to proxies performing operations on those objects. These migrations dramatically improve performance when operations involving an object exhibit geographic locality, since migrating this object into the vicinity o...

READING AND WRITING AVI FILE USING STEGANOGRAPHY

ABSTRACT The video stream in an AVI file is nothing more than a sequence of bitmaps. This article is about extracting these bitmaps and re-building the stream, in order to hide a message in the video. Before reading this article, you should have read at least part one, Steganography - Hiding messages in the Noise of a Picture. This one uses the application described in parts 1-3, but you don’t need the extended features to understand it.  TABLE OF CONTENTS Title page Certification Approva...

REDUCING DELAY AND ENHANCING DOS RESISTANCE IN MULTICAST AUTHENTICATION THROUGH MULTIGRADE SECURITY (CASE STUDY OF PRESSURE WORLD CAFEE )

ABSTRACTMany techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of partial trust. This paper introduces staggered timed efficient stream loss-tolerant authentication (TESLA), a method for achieving multigrade authenticat...

REMOTE ELECTRICITY BILLING SYSTEM AUTOMATION AND IMPLEMENTATION -EJB (A CASE STUDY OF NEPA)

ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of water billing system. Almost all the big organization are developing their billing system because of the extraordinary benefit resulting from information technology. Information technology has enabled water billing system to work successfully.  To ease the o...

REMOTE PC ACCESS IN CYBER CAFE (CASE STUDY OF PRESSURE WORLD CAFE )

ABSTRACTRemote pc access are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing network conditions. Our communication protocol, Castor, occupies a unique point in the design space: It does not use any control messages except simple ...

RETRIEVING FILES USING CONTENT BASED SEARCH

ABSTRACT Content Based File Search is a Java application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost the ability to search files for arbitrary bytes of text. Windows 98/ME/2000 could find words buried in files with unknown formats; Windows XP and Vis...

DESIGN AND IMPLEMENTATION OF SELECTIVE ENCRYPTION OF STILL IMAGE (CASE STUDY OF WOMAN OF FAITH)

ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the in-order delivery abstraction provided by a TCP-based approach prevents the receiver application from processing and rendering portions of an image when ...


8731 - 8745 Of 8848 Results