Session initiation protocol (SIP) is defined by Internet Engineering Task Force (IETF), it is protocol used to carry signaling information of IP based multimedia sessions in an IP network. It is an application layer protocol responsible for creating, terminating and modifying sessions with multiple participants. SIP provides negotiation of media type to be used at session creation time, SIP messages are used for this purpose. Proxy server is one of the elements of SIP protocol, it is used to...
PHP stands for Hypertext Preprocessor, it is a famous and widely used server-side scripting language to produce dynamic web pages and web development. PHP code will integrate into HTML source document and it will compile by PHP processor module in a web server in order to generate web page document send back to client side. All the script and source document for PHP will only process in server-side and the client will never know the underlying code and source document content, it can prevent...
ABSTRACT Wireless Local Area Networks (WLAN) provide multiple advantages to the world of networking, this include cost effectiveness, ease of integration with an existing 802.3 network, mobility of clients in the sense that clients can be mobile while data is stored centrally and no geographical limitations are experienced. However no system is perfect therefore the art of deploying, managing and understanding the ups and downs of a WLAN needs to be critically analysed. This technical report...
Good range resolution and accuracy are important criteria for radar which corresponds to a high detection capability. But increasing the range resolution of radar decreases the average transmitted power which hinders the radar's normal modes of operation. Pulse compression exploits the technique of maintaining good range resolution and accuracy compatible with average transmitted power. Thus pulse compression processing is one of the important factors in determining the performance of...
Wireless adhoc networks recently attracted considerable interest in the field of mobile computing. These adhoc networks have been deployed without any infrastructure support and most used medium access control protocol provide somewhat dependable unicast frames. When group traffic is delivered to a set of neighbour nodes, a packet can be unicast to each neighbour, but because of the mediums broadcast nature, such retransmissions are redundant. Repeated redundant retransmissions consume channel...
Introduction For the pass few years the wireless communication market been enjoying a steady growth. Currently, wireless technology can reach or capable of reaching all around the world. Not bound by wire networks, people are able to access and share information anywhere they go. The motivation and benefit from wireless technology is increased mobility. 802.11n is the next generation of wireless LAN technology which provides a dramatic increase in range and throughput over legacy...
Today, the development of information technologies and modern telecommunication systems contributes to the fast business development and introduction of innovations in the field of IT and telecommunication systems which allow users to get larger opportunities for using their PCs, laptops, and mobile phones. In recent years, the emergence of information technologies and telecommunication system contributed consistently to the rise of the mobile phone market and, today, mobile phones tend to...
Server Security: This is one of the most basic and most important components of database security. If an organizations database server is supplying information to a web server, then it should be configured to allow connections only from that server. Protect sensitive data that is being transmitted via some type of communications[ DataEncryption] Access Control: Access control is the process of meditating every request to resource and data maintained by system and determined weather request...
A computer virus is a segment of code or a program that is written with the intent of doing harm to another users machine. Viruses are capable of self-replicating and inserting themselves into other files. Word-processed documents and e-mail attachments are two areas where viruses thrive. Once inserted into a file, the virus cannot run until the file is opened. Then, the virus will follow its programmed instructions, ranging from displaying annoying messages on the screen to destroying...
This chapter includes a detailed introduction regarding my thesis work. My thesis work is basically on stream cipher that is geffe generator. Stream ciphers are an important class of keystream generation algorithms. They usually encrypt individual characters (binary digits) of a plain text message one time at a time, using an encryption transformation which varies with time. Feedback shift registers particularly linear feedback shift registers are the basic components of many key stream...