Grid Network

ABSTRACT


Grid is as an emerging technology for enabling resource sharing and coordinated problem solving in dynamic multi-institutional virtual organizations. In the grid environment, resources may belong to different institutions, have different usage policies and pose different requirements on acceptable requests.

one of the fundamental operations needed to support location independent computing is resource discovery .It is the process of locating relevant resources based on application requirements of a user.

The description of a resource is essential for automated resource discovery and search, selection, matching, composition and interoperation, invocation and execution monitoring; different middle-ware specifies different rules for describing a resource. Hence, the information gathered from these diverse sources tends to be semantically heterogeneous and needs to be correlated.

Efficient resource discovery needs uniform unambiguous resource description. To date there is no universal resource description language common to all state of art grid middleware. Different grid middleware systems have different methods of resource description and it is not yet known how well these can interoperate. Hence, there is a need to utilize semantic matching of these resource descriptions.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.



Mail ID: - contact4seminars@gmail.com



* conditions apply


– OR –


Click here for Quick Contact (Request for Topics)



Smart Cards

ABSTRACT


In this seminar, is giving some basic concepts about smart cards. The physical and logical structure of the smart card and the corresponding security access control has been discussed in this seminar. It is believed that smart cards offer more security and confidentiality than the other kinds of information or transaction storage. Moreover, applications applied with smart card technologies are illustrated which demonstrate smart card is one of the best solutions to provide and enhance their system with security and integrity. The seminar also covers the contactless type smart card briefly. Different kinds of scheme to organise and access of multiple application smart card are discussed. The first and second schemes are practical and workable on these days, and there is real applications developed using those models. For the third one, multiple independent applications in a single card, there is still a long way to go to make it becomes feasible because of several reasons.

At the end of the paper, an overview of the attack techniques on the smart card is discussed as well. Having those attacks does not mean that smart card is unsecure. It is important to realise that attacks against any secure systems are nothing new or unique. Any systems or technologies claiming 100% secure are irresponsible. The main consideration of determining whether a system is secure or not depends on whether the level of security can meet the requirement of the system.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com 
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



Shallow Water Acoustic Networks

ABSTRACT


In the last two decades, underwater acoustic communications has experienced significant progress. The traditional approach for ocean-bottom or ocean-column monitoring is to deploy oceanographic sensors, record the data, and recover the instruments. But this approach failed in real-time monitoring. The ideal solution for real-time monitoring of selected ocean areas for long periods of time is to connect various instruments through wireless links within a network structure. Basic underwater acoustic networks are formed by establishing bidirectional acoustic communication between nodes such as autonomous underwater vehicles (AUVs) and fixed sensors. The network is then connected to a surface station, which can further be connected to terrestrial networks such as the Internet.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com 
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



10 GB ETHERNET

ABSTRACT


Since its inception at Xerox Corporation in the early 1970s, Ethernet has been the dominant networking protocol. Of all current networking protocols, Ethernet has, by far, the highest number of installed ports and provides the greatest cost performance relative to Token Ring, Fiber Distributed Data Interface (FDDI), and ATM for desktop connectivity. Fast Ethernet, which increased Ethernet speed from 10 to 100 megabits per second (Mbps), provided a simple, cost-effective option for backbone and server connectivity.

10 Gigabit Ethernet builds on top of the Ethernet protocol, but increases speed tenfold over Fast Ethernet to 10000 Mbps, or 10 gigabit per second (Gbps). This protocol, which was standardized in august 2002, promises to be a dominant player in high-speed local area network backbones and server connectivity. Since10 Gigabit Ethernet significantly leverages on Ethernet, customers will be able to leverage their existing knowledge base to manage and maintain gigabit networks.

The purpose of this technology brief is to provide a technical overview of 10 Gigabit Ethernet. This paper discusses:

• The architecture of the Gigabit Ethernet protocol, including physical interfaces, 802.3x flow control, and media connectivity options
• The 10 Gigabit Ethernet standards effort and the timing for Gigabit Ethernet
• 10 Gigabit Ethernet topologies
• Migration strategies to 10 Gigabit Ethernet



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



Windows DNA

ABSTRACT


Microsoft Windows Distributed interNet Applications Architecture (Windows DNA) is the application development model for the Windows platform. Windows DNA specifies how to: develop robust, scalable, distributed applications using the Windows platform; extend existing data and external applications to support the Internet; and support a wide range of client devices maximizing the reach of an application. Developers are free from the burden of building or assembling the required infrastructure for distributed applications and can focus on delivering business solutions.

Windows DNA addresses requirements at all tiers of modern distributed applications: presentation, business logic, and data. Like the familiar PC environment, Windows DNA enables developers to build tightly integrated applications by accessing a rich set of application services in the Windows platform using a wide range of familiar tools. These services are exposed in a unified way through the Component Object Model (COM). Windows DNA provides customers with a roadmap for creating successful solutions that build on their existing computing investments and will take them into the future. Using Windows DNA, any developer will be able to build or extend existing applications to combine the power and richness of the PC, the robustness of client/server computing, and the universal reach and global communications capabilities of the Internet.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



Inferno OS

ABSTRACT


Inferno is an operating system for creating and supporting distributed services .The name of the operating system and of its associated programs, as well as of the company Vita Nuova Holding that produces it, were inspired by the litrary works of Dante Alighieri, particularly the Divine Comedy
Inferno runs in hosted mode under several different operating systems or natively on a range of hardware architectures. In each configuration the operating system presents the same standard interfaces to its applications. A communications protocol called Styx is applied uniformly to access both local and remote resources.
Applications are written in the type-safe Limbo programming language, whose binary representation is identical over all platforms.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



TRACKING AND POSITIONING OF MOBILE PHONES

ABSTRACT


Mobile positioning technology has become an important area of research, for emergency as well as for commercial services. Mobile positioning in cellular networks will provide several services such as, locating stolen mobiles, emergency calls, different billing tariffs depending on where the call is originated, and methods to predict the user movement inside a region. The evolution to location-dependent services and applications in wireless systems continues to require the development of more accurate and reliable mobile positioning technologies.
The major challenge to accurate location estimation is in creating techniques that yield acceptable performance when the direct path from the transmitter to the receiver is intermittently blocked. This is the Non-Line-Of-Sight (NLOS) problem, and it is known to be a major source of error since it systematically causes mobile to appear farther away from the base station (BS) than it actually is, thereby increasing the positioning error. In this seminar, I present a simple method for mobile telephone tracking and positioning with high accuracy.
This presents the location of a mobile telephone by drawing a plurality of circles with the radii being the distances between a mobile telephone and a several base stations (it will be found using Time Of Arrival (TOA)) and the base stations at their centers, and using location tracking curves connecting the intersection points between each circle pair instead of the common chords defined by the circles. We use location tracking curves connecting the intersection points of the two circles which will be drawn by ordinary TOA method, instead of the common chord as in TDOA.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



  • © 2008 – 2013 seminars4you,

  • All rights reserved.