Final Year Projects for B.E, B.Tech, M.Sc, M.C.A
Location: www.donexttechnologies.com , chennai – 17.
Dear Students,
We are glad to inform you that we are handling the academic project for Final year students for Fourth successful year on areas of Networking, Security, Protocol Development, Device drivers, AdHoc Network, mobile technology, Wireless Network, Optical Communication, Neural Network, Grid Computing, GPRS, Biometrics, artificial intelligence, Telecom Technology of very Latest technology. We are handling projects on various domains here in our premises.
Plenty of Innovative Projects for Splendid Students
Partial List of our Projects:
1) Aynchronous Transfer Mode (ATM): - JAVA
Aynchronous Transfer Mode (ATM) has been accepted universally as the transfer mode of choice for Broadband Integrated Services Digital Networks(BISDN). ATM can handle any kind of information i.e. voice, data, image, text and video in an integrated manner. ATM provides a good bandwidth flexibility and can be used efficiently from desktop computers to local area and wide area networks.
2) Load Balancing using Proxy : - JAVA
Load balancing is a technique (usually performed by load balancers) to spread work between many computers, processes, hard disks or other resources in order to get optimal resource utilization and decrease computing time. Load balancing is dividing the amount of work that a computer has to do between two or more computers so that more work gets done in the same amount of time and, in general, all users get served faster. Load balancing can be implemented with hardware, software, or a combination of both. Typically, load balancing is the main reason for computer server clustering.
3) Denial-of-service attack (DoS attack) or Distributed Denial-of-service attack (DDoS attack): – JAVA (IEEE 2006)
Denial-of-service attack (DoS attack) or Distributed Denial-of-service attack (DDoS attack) poses an immense threat to the Internet, and many defense mechanisms have been proposed to combat the problem. Existing defense systems deploy various strategies to counter the problem; the one, which is used, is Throttle Algorithm.
.
4) SECURE