Computer networking using wireless network - Project Ideas | Grossarchive.com

Explore Project Topics on: Computer networking using wireless network

Related Works

      CHAPTER ONE                                        INTRODUCTION 1.1   BACKGROUND TO THE STUDY         A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing... Continue Reading
ABSTRACT As mobile phone handsets attain increasing capabilities, we see many more opportunities for novel applications development. These handsets are typically characterized as constrained computing platforms, due to limitations in computing, storage and interface capabilities. Specialized development environments, such as J2ME, allow for cross-... Continue Reading
ABSTRACT As mobile phone handsets attain increasing capabilities, we see many more opportunities for novel applications development.  These handsets are typically characterized  as constrained computing platforms, due to limitations in computing, storage and interface capabilities. Specialized development  environments, such as J2ME, allow for... Continue Reading
ABSTRACT Ad hoc networking is emerging as today and future requirement for dynamic and mobile wireless communication. For fast connections the refugee node needs a path where it can avail the best throughput by means of connections created on the fly, for single time usage or on short-term basis. In this paper we have focused on the scenario of... Continue Reading
ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
ABSTRACT Ad hoc networking is emerging as today and future requirement for dynamic and mobile wireless communication. For fast connections the refugee node needs a path where it can avail the best throughput by means of connections created on the fly, for single time usage or on short-term basis. In this paper we have focused on the scenario of... Continue Reading
ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
ABSTRACT This project topic “Secured Wireless Network” was carried out with a view to deploying effective security for wireless networks. The project developed a system that lets typical users easily build a highly secured wireless network. My aim is to show how user interface can be applied to provide a complete solution for securing wireless... Continue Reading
ABSTRACT The document outlines an investigation done in order to study Fifth Generation (5G) systems and to identify a role that satellite systems will play in contribution to the many advanced and diverse demands on existing telecommunication networks. This next generation network is a build-up and phenomenal improvement in wireless communication... Continue Reading
ABSTRACT The document outlines an investigation done in order to study Fifth Generation (5G) systems and to identify a role that satellite systems will play in contribution to the many advanced and diverse demands on existing telecommunication networks. This next generation network is a build-up and phenomenal improvement in wireless communication... Continue Reading
ABSTRACT The research provides a conceptual and theoretical study of wireless internet network as a means of enhancing Nigerian economy. It analyzes the nature, types and significance of wireless internet network towards enhancing the Nigerian economy. INTRODUCTION The past 15 years have... Continue Reading
ABSTRACT This project topic “Secured Wireless Network” was carried out with a view to deploying effective security for wireless networks. The project developed a system that lets typical users easily build a highly secured wireless network. My aim is to show how user interface can be applied to provide a complete solution for securing wireless... Continue Reading
The aim of this project is to shows the possibility of wireless power transfer through the design of a wireless charging pad.  In this project write-up, the methodology and principle of operation is wireless power transfer through inductive couple, a feasible design is modelled accordingly. The inductive couple technique is used because it is the... Continue Reading
The aim of this project is to shows the possibility of wireless power transfer through the design of a wireless charging pad.  In this project write-up, the methodology and principle of operation is wireless power transfer through inductive couple, a feasible design is modelled accordingly. The inductive couple technique is used because it is the... Continue Reading
ABSTRACT The report summarizes that in this Information Technology age, the needs of law enforcement are changing. Some traditional crimes, especially those concerning finance and commerce, continue to be upgraded technologically. Paper trails have become electronic trails. Crimes associated with the theft and manipulations of data are detected... Continue Reading
(A Case Study Of Diamond Bank Nig Plc Owerri) ABSTRACT The degree of accidence of an organisation that services to customer such as banks security depends on speed and accuracy with the service performed in the banks which include information processing e.g. data entry. Data using... Continue Reading
ABSTRACT The load balancing is the most important issues to reduce congestion in Autonomous computer networks. The inter-domain traffic control methods have been addressed by researchers. In this paper, we are proposed HTS; a BGP-based hierarchical network traffic reconfiguration method to redistribute traffic on overloaded link for IP-based... Continue Reading
ABSTRACT The load balancing is the most important issues to reduce congestion in Autonomous computer networks. The inter-domain traffic control methods have been addressed by researchers. In this paper, we are proposed HTS; a BGP-based hierarchical network traffic reconfiguration method to redistribute traffic on overloaded link for IP-based... Continue Reading
CHAPTER ONE 1.0                                     INTRODUCTION 1.1              BACKGROUND OF THE STUDY The world is fast becoming a global village and a necessary tool for this process is communication of which telecommunication is a key player. The quantum development in the telecommunications... Continue Reading
Abstract This work investigates an improved protection solution based on the use of artificial neural network on the 330kV Nigerian Network modelled using Matlab R2014a. Measured fault voltages and currents signals decomposed using the discrete Fourier transform implemented via fast Fourier transform are fed as inputs to the neural network. The... Continue Reading
A huge number of studies have been done supporting seamless mobility networks and mobile technologies over the years.  The recent innovations in mobile technologies have unveiled another revolution from the static architectural approach for client-server network relationships to more dynamic, and even mobile approaches. Due to the special... Continue Reading
CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
ABSTRACT           This project is organized in five chapters. Chapter one explains the introduction of the proposed project. It described the problem statement of the project, aim and objectives and expected contribution to knowledge.           Chapter two presents a vivid literature review of the concept of network analyzer... Continue Reading
ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
ABSTRACT The study examined sales promotion as a persuasive activity hence is the direct and indirect communication used by firms to influence present and... Continue Reading
whatsappWhatsApp Us