A projector is to display images from computer or laptop. The term wireless is used to describe how the projector receive the signal. Presentation projector always having wire mess up here and there, this is where wireless projector comes in. It solve the problem of wiring by transmitting without wire using wireless technology such as Bluetooth, radio frequency and Wi-Fi. Currently there are many types of projectors such as image projector, movie projector and etc. This project is about...
Wireless Local Area Networks (WLANs) are increasingly at hand in corporate and residential indoor environments. WLAN is not a single radio technology, several different technologies fall into the category called WLAN. This study endeavors to spotlight particularly on the existing industry standard for IEEE 802.11b as the representative example of the WLAN family of technologies.3.1.1 Radio frequency technologyGeneralRF has turn out to be the effective technology for largest division of today's...
Overtime the internet has evolved and the capabilities have been enhanced and extended from basic HTML for static content to include other programming languages which give the user a more dynamic and interactive experience. When writing web applications there are two types of programming languages that enable the interactive experience. These are client-side scripting languages and server-side programming languages. The client side script enables code to run on the client without posting back...
Bluetooth is an open standard wireless communication protocol developed to transfer data over short range of distances. This technology is becoming increasingly popular and has proved to be one of the means of sending information between personal communication objects and devices. Named after a relatively obscure Scandinavian king, Bluetooth was developed in the mid-90s at a time when Ericsson was looking for a way to connect a keyboard to a computer without using the PS2 cable and connector....
Born in Basel, Switzerland on 15th April 1707, Leonhard Euler was arguably the brightest mathematician of all time. The Swiss mathematician and physicist is considered a pioneer in many fields of mathematics. He introduced a lot of the mathematical terminology and notation used today and he is considered the father of mathematical analysis where, for instance, he introduced the notation of a mathematical function, f(x). His contributions to the field of mathematics are in analytic and...
The date and time for all computers running on a Windows Server 2008 network is synchronized by the Window Server 2008 Window Time service (W32time). In making it reliable and scalable time service for enterprise administrators, Network Time Protocol (NTP) and time providers is integrated in the service. The purpose of the Window Time service is to make sure that all computers running the Windows Operating System in an organization use a common time. The Window Time service uses a hierarchical...
In general the ad hoc networks are represented through undirected graph. In our work we considered the graph G as. Here, E and V denote the set of undirected links and set of nodes in the network respectively. The nodes in the ad hoc network are detected using its unique identity and represents a host having a communication range of R, and has huge storage space. The speed and direction of each node in the network changes randomly. The link (i, j) represents that there exists a wireless...
Many people believe that cloud computing has a very huge scope in future. With the introduction of cloud computing the conventional way of using the hardware has changed and many of them prefer to use the servers online, but they involve data security issues. For instance consider a popular photo-sharing site Instagram they use Amazon EC2 computing service to provide services to their users, it provides privacy to the users data by using Secure Socket Layer and Secure Shell. Most of the cloud...
Introduction: - As the Internet is growing day by day, most of the people are not aware of security and privacy. Internet is a widespread information infrastructure; it is basically an insecure channel for exchanging information. Web security is the set of rules and measures taken against web security threats. Web privacy is the ability of hiding end user's information. Nowadays most of the applications have the vulnerability (weakness) that makes a threat possible. An attack may be possible...
This report is to provide the effect of smart phone operation system and also analyze which operation system will be lead in such a competitive market. Among of many operation systems in market, this report makes a comparison between Apple's iPhone OS and Google's Android OS. The findings of this report are based on factors such as performance characteristics, market share growth, demands and future technology. First of all, we analyze the performance characteristics which are the most...