mobile computing full report
#11

mobile computing

[attachment=16999]
Introduction
Mobile computing has been given special attention as the next personal computing and communication environment, because of the enormous improvement in performance of the portable computer, personal digital assistant (PDA), and wireless networking infrastructure. However, mobile communication infrastructures, especially wireless data networks, lack communication speed, reliability and security. Mobile users are worried about information leakage by wireless tapping. Therefore, research and development is needed for communication security of mobile computing environments. Encryption tools and new applications that use exclusive API for security control have been proposed. This paper describes a communication method with data compression and encryption for mobile computing environments. This method offers communication, data compression and encryption from end to end by adding a process via WinSock API without changing the existing TCP/IP-based application.
<!--[if !vml]--> <!--[endif]-->
Problems of communication, data compression and encryption processing
There are two methods of compressing and encrypting communication data:

<!--[if !supportLists]-->1. <!--[endif]-->Encryption done by the application and compression done by the modem.
<!--[if !supportLists]-->2. <!--[endif]-->Embedding the functions of encryption and compression into the communication control software.
Both methods have problems. High-performance compression is not anticipated using method 1, because data randomizing by the first encryption process removes regularity, thereby preventing efficient compression in the compression sequence after the encryption sequence. Applications should have the encrypting function in the case of method 1. There is another problem: In method 2, changing the TCP/IP software is necessary, which is against our goal. The method of data compression and encryption processing in PPP (Point to Point Protocol) is popular, but it only takes effect between client and access server.
Data compression and encryption by intercepting WinSock command from WinSock API
WinSock API is a standard application programming interface for TCP/IP-based PC communication programs. We achieved embedded data compression and encryption without changing the TCP/IP and application software by intercepting WinSock commands from WinSock API temporarily and adding individual processing. Figure 2 shows intercepting WinSock commands.
<!--[if !vml]--> <!--[endif]-->
First, our application execution support program changes the linkage between the target application program and WinSock DLL program when the target application program is loaded into memory by the loader before its execution. The secure communication add-in program that we developed intercepts the send command of the application program from WinSock API, compresses its data in the send command, encrypts the data, and then returns this command to WinSock DLL, which is properly transferred. On the other hand, the receive command is intercepted from WinSock API, as with the send command. Also, the secure communication add-in program decrypts the data received from WinSock DLL, decompresses it, and then returns it to the application program, which is properly transferred. Other commands of WinSock are processed in the same way as above. By using this method, we have achieved these features without changing any program or any interfaces.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: manufacturers suppliers manufacturers secretaries managers ceo of customed floor standing metal wire display rack europe mail,
Popular Searches: mobile computing seminar project full report, edmus scary, bput xam sitting arrengment, mobile computing full, seminar report on mobile computing, mobile computing seminar report, 4g boston sprint,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
mobile computing full report - by seminar topics - 17-03-2010, 10:24 AM
RE: mobile computing full report - by ravi_2030 - 15-05-2011, 09:53 PM
RE: mobile computing full report - by johntikolo - 01-06-2011, 04:36 PM
RE: mobile computing full report - by seminar addict - 01-02-2012, 03:34 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,872 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,789 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,950 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,665 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,035 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,125 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,469 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,604 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,344 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,427 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: