In this laboratory experiment we need to understand the basic concepts of Interior Gateway Protocols (IGP). We have used Cisco Packet Tracer software which is used to build a network, configure a network and analyse the flow of different routing protocols. Each router needs to be configured using command line interface (CLI). We need to understand the working of routing protocols. The network diagram on which we need to test different routing protocols is as shown below: The detail of the...
Ad hoc is originally a Latin word that literally means for this purpose only. It refers usually to temporary networks that are constructed for some special applications. The nodes in an ad hoc network are simply deployed in an area without any a priori planning. The nodes are capable of organizing themselves, by discovering their neighbours and communicating over the wireless medium. Recently, ad hoc networks have been getting greater attention as more applications are depending on them....
Bluetooth is an open wireless and short range technology that was introduced for exchanging electronic data over short distances from fixed and mobile devices. Bluetooth is used to pair two devices such as mobile phones and personal computers with high levels of security. [1] 1.2 Connecting or 'Pairing' devices. In order for pairing or linking to take place between the two devices, both devices must be Bluetooth-compatible. If both devices support Bluetooth, the process of pairing or linking is...
THE SUCCESS MISUSES of computer systems security breaches increased slightly in 2005, according to the FBI and the Computer Security Institute (CSI). Many security issues that apply to large enterprises definitely apply to SMBs, especially as SMBs become more technologically sophisticated, according to Andrew Kellett, senior research analyst with U.K.-based Butler Group. You dont have to be a particular large organization to have some pretty complex supporting systems in place, he says. (Fred...
What is a database. The database is responsible for managing the data; it can be fast storage and retrieval of data application. Database information can be collected, organization, management, update and can be easily accessed. According to the database content types: a bibliography, text, data and images. The database can be divided into different types of databases are most relational database because it can store the data in tabular form table each row in the table can be kept the same...
The word Mechatronics was introduced in 1969 by Tetsuro Mori, senior engineer in Yaskawa Electric Company. It was composition of two words: mecha from mechanism and tronics from electronics. At the beginning Mechatronics was defined as integration of electrical systems into mechanical machines. The definition changed over time and consecutively it is note described only as connection of subsystems (mechanical, electrical, computer control) but rather as methodology used for optimal design of...
Location dependent queries of the mobile users increases as the mobile applications which support location dependent services comes into existences. Wireless data broadcast is the promising technique and various localization mechanisms for the mobile nodes are proposed. In this project the proposed mechanism uses fixed number of beacon transceiver which will be equipped with the GPS functionality and able to transmit a gradient of power levels.The several power levels serve to identify the...
Logical data security is the guarding of information against unauthorized access while at the same time making sure that their integrity is guaranteed. If logical security is laid down in a shoddy way, then it would cause risks and its vulnerability may lead to the compromise of the data. System intrusion is one of the vulnerabilities for logical IT security. Software bugs may not all be eliminated by system administrators or programmers (Perry, 2006). The intruders therefore use the bugs to...
Here we have the classic case of a double-edged sword. Many people hold the view that Bill Gates is so rich because his successfully established business, Microsoft, is the biggest monopoly in today's world. On the other hand, there are those who believe that Bill Gates has been fairly rewarded for the technology created and maintained by Microsoft. In the first part of this report, I will analyze and address the view that Microsoft is the biggest monopoly. Thereafter, I will present an...
Thinning plays a vital role in image processing and computer vision. It is an important preprocessing step in many applications such as document analysis, image compression, data compression, fingerprint classification, and pattern recognition. The main objective of thinning is to minimize the amount of information to be processed by preserving the important information such as shape, size and topological properties thereby enhancing the later processing steps (extracting features from...