Posts

Showing posts from December, 2022

Mobile Computing Seminar

Image
Need for  Ad-hoc Networks :   Ad Hoc Network :           ■ An ad hoc network is a type of peer to peer wireless network mode where wireless devices communicate with each other directly, without the aid of a Wireless Access Point (WAP) device.           ■ Wireless networks typically depend on a base station or WAP device to manage and direct the stream of data between wireless devices.          ■  In an ad hoc setup, the network is built spontaneously as and when devices communicate with each other.            ■ These devices should ideally be within close range of each other; however quality of connection and speed of the network will suffer as more devices are added to the network.           ■ The security of an ad hoc network is non-existent, as wireless security norms such as WAP2, WAP, and WEP are not permitted in such dire...

OS Seminar

Protection in Directory Structure:                  ■In computer systems, alot of user’s information is stored, the objective of the operating system is to keep safe the data of the user from the improper access to the system.             ■Protection can be provided in number of ways.              ■For a single laptop system, we might provide protection by locking the computer in a desk drawer or file cabinet.               ■For multi-user systems, different mechanisms are used for the protection.  Types of Access :                ■The files which have direct access of the any user have the need of protection.                ■The files which are not accessible to other users doesn’t require any kind of protection.             ...

Java Seminar

Image
   JAVA BEANS :           ■A JavaBean is a specially constructed Java class written in the Java and coded according to the JavaBeans API specifications.   Following are the unique characteristics that distinguish a JavaBean from other Java classes −                   ■It provides a default, no-argument constructor.                   ■It should be serializable and that which can implement the Serializable interface.                   ■ It may have a number of properties which can be read or written.                   ■It may have a number of "getter" and "setter" methods for the properties. JavaBeans Properties :                  ■A JavaBean property is a named attribute that can be accessed by the user of the object....

CN SEMINAR

Image
 What is Mobile IP?          ■Mobile IP is able to track a mobile host without needing to change the mobile host's long-term IP address.         ■Its goal is to provide the ability of an host to stay connected to the internet regardless of their location.         ■Mobile IP is an internet protocol designed to support host mobility. Mobile IP Features : Transparency :           ■ Mobile end-systems keep their IP address.           ■ Continuation of communication after interruption of link possible.            ■Point of connection to the fixed network can be changed. Compatibility :         ■No changes to current end-systems and routers required.        ■ Mobile end-systems can communicate with fixed systems. Security :         ■ Authentication of all registration messages.   ...

RDBMS SEMINAR

Image
       Specialized Locking Techniques :                 The concurrency control technique in which the value of the lock variable is manipulated is called locking.         The technique of locking is one way to   Ensure Serializability in DBMS.       In DBMS, locking is the responsibility of a subsystem called lock manager.        Binary Locks :               A binary lock has two states or values associated with each data item. These values are:                                        Locked – 1                                  Unlocked – 0 Locked (A):      To access a data item in the database.   Unlocked (B):     ...