Trans ocean inter-continental optical links
#1

full report
Reply
#2
where can i get ppt and pdf files on trans ocean inter continental optical links
Reply
#3

ABSTRACT


The main scope of this paper is to detect the lost mobiles. Each and every day thousands of mobiles get misplaced or lost, though effective way for the blocking of the lost mobile to prevent unauthorized person from making and receiving the calls has been done by the manufacturers of the mobile with the help of International Mobile Equipment Identifier (IMEI) has been done but however there has been no development or very little progress for the detection of the misplaced mobile phone.

For the detection of lost mobile SNIFFER plays a vital role .The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection .The device can be called as a mobile Base station that includes Sniffer Base station, Unidirectional antenna , Tracking software. The sniffer is a small base station that includes transceiver section.It should operate at a frequency which is much different from the frequency of the current cell in which the operation of detection is being carried out. The directional antenna is an important device that is to be designed and used as it plays a major role.

There are certain boundary conditions that have to be qualified for the identification of lost mobile like the power of the mobile should be good enough, the mobile phone should not be in the shadow region but however this method using modern technologies and devices.
Our paper seems to be a bit costlier for initial setup but the cost is gradually reduced when effectively and efficiently utilized for the purpose of detection.

















INTRODUCTION



One of the most interesting things about cell phone is that it is really a radio an extremely sophisticated radio, which uses some band of frequency that has the basic working similar to the ordinary cordless phone. The mobile cellular communication has been appreciated since its birth in the early 70’s and the advancement in the field of VLSI has helped in designing less power, smaller size but efficient transceiver for the purpose of communication.


But however the technology has not yet answered the loss or misplacement of the lost mobile phone which is significantly increasing. In this paper we discuss the problem and the probable solution that could be done. The IMEI number is a unique number that is embedded in the mobile phone the main purpose of which is the blocking of calls that is made by unauthorized person once the mobile is reported as stolen but here we use it effectively for the purpose of detection.



2. ABOUT IMEI :

The GSM MoU’s IMEI (International Mobile Equipment Identity) numbering system is a 15 digit unique code that is used to identify the GSM/DCS/PCS phone. When a phone is switched on, this unique IMEI number is transmitted and checked against a data base of black listed or grey listed phones in the network’s EIR (Equipment ID Register). This EIR determines whether the phone can log on to the network to make and receive calls. To know the IMEI number the *#06# has to be pressed, the number will be displayed in the LCD screen; it is unique to a mobile phone. If the EIR and IMEI number match, the networks can do a number of things.


For example grey list or blacklist a phone:
1. Grey listing will allow the phone to be used, but it can be tracked to see who has it (via the SIM information).
2. Black listing the phone from being used on any network where there is an EIR match.


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminer topic on fm trans meter, links magazine top, free space optical links, uts my, backhaul links, ocean city maryland par, links to get on youtube,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates deepu1331 3 2,361 31-01-2013, 03:33 PM
Last Post: itnagraja
  Route Reservation in Inter networks angelniru23 1 1,601 02-03-2012, 12:57 PM
Last Post: seminar paper
  controlling ip spoofing through inter domain packet filters haree143 4 3,709 29-02-2012, 12:51 PM
Last Post: seminar paper
  CONTROLLING IP SPOOFING THROUGH INTER DOMAIN PACKET FILTER 1 1,403 29-02-2012, 12:51 PM
Last Post: seminar paper
  constructing inter domain packet filtering using bgp updates rashinarrasheed 1 1,543 20-02-2012, 02:57 PM
Last Post: seminar paper
  inter intrcation a vehicle wireless communication anilk 0 660 20-02-2012, 12:56 PM
Last Post: anilk
  bridge monitoring using optical fibres vani kulkarni 1 727 03-02-2012, 10:59 AM
Last Post: seminar addict
Lightbulb Internet Access via TV cable Network Possibly Related Links kunwar89 1 1,290 17-01-2012, 10:31 AM
Last Post: seminar addict
  e secure transaction secure electronic data interchange over inter dhanalakshmii.ch 0 1,398 01-07-2011, 11:22 AM
Last Post: dhanalakshmii.ch
  optical computing teertha 1 1,019 08-05-2011, 12:00 AM
Last Post: seminar project

Forum Jump: