LAN Monitoring Using Android Phone
|
|
|
- Virginia Lester
- 10 years ago
- Views:
Transcription
1 LAN Monitoring Using Android Phone Prof. Rakhi Bhardwaj 1, Sandesh S. Jangam 2, Prashant N. Shinde 3, Abhijit B. Raut 4, Rajesh S. Trigune 5 Professor, Dept. of Computer Engg., KJEI s Trinity College of Engineering & Research, Pune University, India 1 Student, Dept. of Computer Engg., KJEI s Trinity College of Engineering & Research, Pune University, India 2 Student, Dept. of Computer Engg., KJEI s Trinity College of Engineering & Research, Pune University, India 3 Student, Dept. of Computer Engg., KJEI s Trinity College of Engineering & Research, Pune University, India 4 Student, Dept. of Computer Engg., KJEI s Trinity College of Engineering & Research, Pune University, India 5 ABSTRACT: Now a day s android phones are used for the various applications. We can use android phone for monitor and control the network. It is to control the network when network admin is in admin office but it is difficult to control the network from outside the office. It is integrated software solution that allows a network admin to remotely monitor his LAN network by his Android phone with GUI. The main purpose of this application is to provide all the important details of the network to the admin on their android phone with the help of GPRS or Wi-Fi. We are using data connectivity or Wi-Fi to connect the mobile phone to LAN server. And we also are using password encryption for authentication in phone. KEYWORDS: Android, Control LAN, GPRS, LAN Monitoring, Server, Wi-Fi. I. INTRODUCTION In general, networks are form by connecting multiple computers through the LAN. To control and monitor the activities of network form the admin office is very easy job but what? If the admin is not in the admin office. In that case how do you going to control and monitor the network? Instead of depend on any third person for the information about the network we developing the new android application through which we can easily monitor the network. The communication between particular client and the admin is achieved through a central monitoring server, our goal is to develop an integrated software application that will help network admin to remotely monitor network through android phone. The communication between the client and the android phones is done through the server. Till now there are many techniques for monitoring network from remote place. LAN monitoring using SMS based system is one of them. But there are many disadvantages of monitoring network using SMS based system so to overcome these disadvantages we are implementing new system on android platform with GPRS or Wi-Fi. These may be cost of SMS is high. So we are going to implement new idea in our system is we are developing it on android platform. In this application the android phone is connected to the server using Wi-Fi or GPRS server will take action on respective client. So it is convenient to monitor the network using android phone. This application is more reliable and easy to communicate [1]. II. RELATED WORK In [1] monitor the network from our device i.e. phone from anywhere. You have LAN setup at your office. Sitting in the admin office you want to monitor the LAN status. You can do by using your android phone. In [3] the authors present the process to access the computer with the help of android phone. This process is related to VNC architecture. So we can extend this in our system. In this we must install VNC server on our computer connected with Wi-Fi network. In [5] authors present that we can connect android phone to the PC via IP address and port. So we can use functions of PC in android phone. In [4] authors presents they can enlist the process to access the desktop using android phone. This is based on VNC so user can access and manipulate the remote computer through a VNC viewer. Android phone can connect with PC through Wi-Fi. Copyright to IJIRCCE
2 III. EXISTING SYSTEM A. GSM Based System In [1] this system it control and monitor network by sending messages from anywhere from outside the server room. In this system Admin sends his request through SMS using his cell phone via GSM modem to the control monitoring server. Server then identifies the client machine and do the work according to the request and sends response back to the admin. Server sends command to the client. In this system the communication between server and admin is done through the GSM service provider.clients are controlled by admin through the SMS. Fig. 1 GSM Based System. From above block diagram admin sends SMS to the server through GSM modem. In SMS there is mobile number of users, client name and operation to be performed is mentioned. The client identified by server after receiving the SMS by the server. The incoming message is parsed and specified operation is performed on the identified client and the server response is given back in same manner. But there are many drawbacks of GSM based system. Cost of SMS is high, and in some situation failure of the GSM modem may happen in GSM based system. So this system is not convenient and useful for user. Another we can monitor the network via . It provides more information about the network to the admin on their account, when admin is out of office. In the internet, services are mostly used by internet users but remote monitoring of networks through is also not useful. There are many disadvantages of this system also. So we are implementing solution for this. We are developing android based LAN monitoring system.ype your text into it. IV. PROBLEM DEFINITION In previous system Admin sends his request via SMS with the help of phone through GSM modem to the LAN server. Then server find the client machine which admin is to be monitor. Via the GSM service provider the communication is done with the GSM modem which communicates with the server and the server communicates with the client. But such system fails when there is no any SMS service available or low balance. Copyright to IJIRCCE
3 Nowadays the administrator is performing more than one task at a time, so he should control the server from his remote place and hence we are proposing a system to monitor and control the network using android phone. So we can implement an application in Android system to monitor the network provided that GPRS or Wi-Fi is enabled. V. PROPOSED SYSTEM A. Android Based System Objectives:- We are going to proposed a system in which the idea of network monitoring through the Android Phone is presented. Fig. 2 Block Diagram for Android Based System. The main purpose of the system is to obtain maximum information about the network to admin on the Android Phone, whenever the admin is not present in the server room. In this system we are going to use number of protocols to control the network. These are as follows: 1) Simple Network Management Protocol (SNMP): It is standard protocol for managing devices on IP networks. The following devices support the SNMP protocol these are as follows. Routers, Switches, servers, workstations, printer and more. SNMP protocol operates in the 7 layer of OSI model that is Application layer. It receives request at UDP port 161 and the response is sent back to the port ) Session Initiation Protocol (SIP): It is used in the application to easily set we the incoming and outgoing voice calls without having transport level communication. All the features controlled by the GSM based system and based system are also controlled by the android phone system very conveniently because the android phone system provide the very good user interface to carry out operations. It improves the speed of the operation and save many times which is required for login in to used system. Command typing time also saved in this system. Where use in this system we can perform operation just by starting the application. There are many reason of developing new android phone based system these are. In SMS based we cannot ensure the delivery of SMS. Also cost of SMS is high. Copyright to IJIRCCE
4 Fig. 3 Proposed System Architecture. Features of Android Based System and Advantages of system: We can use system to monitor large networks like university, colleges, offices etc. we can develop same application for I phone and blackberry also. Features: Client list- we can get list of client logged in at any time. Can keep track of status of every client at anytime. Process list- we can obtain the list of processes running in machine. Activate process- we can start different processes on server or client machine. Kill processes- we can kill the unwanted processes. Scheduling-by using scheduling we can stop the processes according to the priorities. Data recovery- we can recover the lost data during the processes. B. System Connectivity All clients of the network (LAN) will update its status (which processes are going on) time to time and it will be stored on the LAN server part of the server. Copyright to IJIRCCE
5 Fig. 4 Android and Clients Connectivity. Whenever the administrator ask for a any kind of the android server for the result if the it contains the solution then the result will be sent back to the administrator if it does not contains solution then it will check in LAN server for solution if present then it will be transferred to the server and then return back to the android connection and if in case LAN server also does not contain solution the it will find answer on client machine and it will be return back to the LAN server. VI. PSEUDO ALGORITHM A. ENCRYPTION ALGORITHM We are using SHA1 algorithm for password encryption/decryption. SHA stands for "Secure Hash Algorithm". SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols. SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols.[9] Note 1: All variables are unsigned 32 bits and wrap modulo 2 32 when calculating. Note 2: All constants in this pseudo code are in big endian. Within each word, the most significant byte is stored in the leftmost byte position Initialize variables: h0 = 0x h1 = 0xEFCDAB89 h2 = 0x98BADCFE h3 = 0x h4 = 0xC3D2E1F0 Pre-processing: append the bit '1' to the message i.e. by adding 0x80 if characters are 8 bits. append 0 k < 512 bits '0', thus the resulting message length (in bits) is congruent to 448 (mod 512) Copyright to IJIRCCE
6 append length of message (before pre-processing), in bits, as 64-bit big-endian integer. Process the message in successive 512-bit chunks: break message into 512-bit chunks for each chunk break chunk into sixteen 32-bit big-endian words w[i], 0 i 15 Extend the sixteen 32-bit words into eighty 32-bit words: for i from 16 to 79 w[i] = (w[i-3] xor w[i-8] xor w[i-14] xor w[i-16] leftrotate 1 Initialize hash value for this chunk: a = h0 b = h1 c = h2 d = h3 e = h4 Main loop: [34] for i from 0 to 79 if 0 i 19 then f = (b and c) or ((not b) and d) k = 0x5A else if 20 i 39 f = b xor c xor d k = 0x6ED9EBA1 else if 40 i 59 f = (b and c) or (b and d) or (c and d) k = 0x8F1BBCDC else if 60 i 79 f = b xor c xor d k = 0xCA62C1D6 temp = (a leftrotate 5) + f + e + k + w[i] e = d d = c c = b leftrotate 30 b = a a = temp Add this chunk's hash to result so far: h0 = h0 + a h1 = h1 + b h2 = h2 + c h3 = h3 + d h4 = h4 + e Produce the final hash value (big-endian) as a 160 bit number: hh = (h0 leftshift 128) or (h1 leftshift 96) or (h2 leftshift 64) or (h3 leftshift 32) or h4 Copyright to IJIRCCE
7 Let s be the set S={C, S, A, Ap, P, F, M} VII. MATHEMATICAL MODEL Where, C is a set of clients viz C1, C2, C3... Cn belongs to C. S is the server machine which is responsible for getting clients process information via Apache Tomcat server. A is the administrator of the system who have control of server machine S. Ap is the third party client device managed by the administrator for functions like as follows- P is the set of processes P1, P2, P3...Pn belongs to P. F is a set of files F1, F2, F3...Fn belongs to F. Operations- Process list Process pl= Demon tool(client machine, all processes ) Db=add pl(pl,cid) f=create file on client(cid,fname,path,contents) [Y/N]=Kill process(cid,process name,pid) M=Create message(cid,m) Authentication on Android [Y/N] =Login(Password,uid) pass =SHA1(pass) VIII. CONCLUSION AND FUTURE WORK From this paper we have concluded that the GSM based system is not convenient for user. We have done the detailed survey of the SMS based system and from that information we developing Android based system for LAN monitoring. The Android based LAN monitoring system is very convenient and secure. The android system gives detail information of the network whenever administrator is away from the server room just by stating application using WI- FI or GPRS. REFERENCES. 1. Prof. C. S. Nimodia, Prof. S. S. Asole, A Survey on Network Monitoring and Administration Using and Android Phone, International Journal of Emerging Technology and Advanced Engineering (ISSN , ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013) 2. Ha-Young Ko, Jae-Hyeok Lee, Jong-Ok Kim, Implementation and Evaluation of Fast Mobile VNC Systems, IEEE Transactions on Consumer Electronics, Vol. 58, No. 4, Jaya Bharathi chintalapati, Srinivasa Rao T.Y.S, Remote computer access through Android mobiles, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 3, September Archana Jadhav, Vipul Oswal, Sagar Madane, Harshal Zope, Vishal Hatmode VNC ARCHITECTURE BASED REMOTE DESKTOP ACCESS THROUGH ANDROID MOBILE PHONES, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 2, April Dr. Khanna SamratVivekanand Omprakash, Concept of Remote controlling PC with Smartphone Inputs from remote place with internet, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January Zhang Juan, "The design of intertranslation dictionary software of online access and desktop access",electric Information and Control Engineering (ICEICE), 2011,International Conference, April Jinwook C., Sooyoung Y., Heekyong P., and Jonghoon C, MobileMed: A PDA-based mobile clinical information system, IEEE Trans. on Information Technology in Biomedicine, vol. 10, no.3, July B. Woodward, R. S. H. Istepanian, and C. I. Richards, Design of a telemedicine system using a mobile telephone, IEEE Trans. on Information Technology in Biomedicine, vol.5, no. 1, pp , March Copyright to IJIRCCE
8 BIOGRAPHY Sandesh Shashikant Jangam is a Research scholar in the Computer Department, Trinity college of Engineering and Research, Pune University. He is pursuing Bachelors Degree in Computer Engineering 2014 from TCOER, Pune, MH, and India. Prashant Narayan Shinde is a Research scholar in the Computer Department, Trinity college of Engineering and Research, Pune University.He is pursuing Bachelors Degree in Computer Engineering 2014 from TCOER, Pune, MH, and India. Abhijit Bhimrao Raut is a Research scholar in the Computer Department, Trinity college of Engineering and Research, Pune University. He is pursuing Bachelors Degree in Computer Engineering 2014 from TCOER, Pune, MH, and India. Rajesh Shankar Trigune is a Research scholar in the Computer Department, Trinity college of Engineering and Research, Pune University. He is pursuing Bachelors Degree in Computer Engineering 2014 from TCOER, Pune, MH, and India. Copyright to IJIRCCE
A B S T R A C T. Index Terms - Android, GPRS, GSM modem, Desktop, LAN. I. INTRODUCTION
Accessing Remote Desktop and LAN through Android Smart Phone. Pranjal Badgujar, Sujit Korade, Lata Nagalapur, Rakesh Shinde D. Y. Patil College of Engineering Akurdi, Pune [email protected], [email protected],
Remote Monitoring, Controlling and Lost Hardware Detecting through GSM
Remote Monitoring, Controlling and Lost Hardware Detecting through GSM Amir Sheikh, Rahul Hendawe, Rajnish Singh, Jayashree Shiral, Anmol Rohan Abstract The project aims to develop various network utilities
Fast remote data access for control of TCP/IP network using android Mobile device
RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi
Wlan Monitoring Using Android Phone
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 7 (July 2014), PP.23-27 Wlan Monitoring Using Android Phone Pooja Chaudhary
VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
Mobile Virtual Network Computing System
Mobile Virtual Network Computing System Vidhi S. Patel, Darshi R. Somaiya Student, Dept. of I.T., K.J. Somaiya College of Engineering and Information Technology, Mumbai, India ABSTRACT: we are planning
A B S T R A C T. Keywords: Mobile computing, Compiler, Android Development tool kit; I. INTRODUCTION
Remote Access Android Phones Through Simple Mobile. 1M.S.Badgujar, 2N.D.Tribhuvan, 3S.U.Rahane,4Prof.C.S.Aryan Department of Computer Engg, Jaihind College Of Engg, Kuran Savitribai Phule Pune University,
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
VNC ARCHITECTURE BASED REMOTE DESKTOP ACCESS THROUGH ANDROID MOBILE PHONES
VNC ARCHITECTURE BASED REMOTE DESKTOP ACCESS THROUGH ANDROID MOBILE PHONES Archana Jadhav 1,Vipul Oswal 2,Sagar Madane 3,Harshal Zope 4,Vishal Hatmode 5 ABSTRACT In this paper, we will enlist the process
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Preamble: Remote Storage in Android Using SCTP
Preamble: Remote Storage in Android Using SCTP Mr. Nikhil Vijay Patil 1, Prof.Sandeep Khanna 2 1 M.E.Second Year Student, Padm.Dr.V.B.Kolte College of Engineering, Malkapur Dist.Buldhana (M.S.) India.
Research Article Volume 6 Issue No. 4
DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) BUS TRACKING AND TICKETING SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN ISSN 0976-6480 (Print) ISSN 0976-6499
PC Applications on Android Mobile for Remote Desktop Control
PC Applications on Android Mobile for Remote Desktop Control Abhijit.P.Shisode 1, M.R.Dhotre 2 Department of Electronics and Communication, Govt. College of Engineering, Jalgaon, India 1 Assistant Professor,
Fig. 1 BAN Architecture III. ATMEL BOARD
Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
SMS banking using Cell phone
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 2 June 2013, pp. 463-469 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ SMS
Lightweight DNS for Multipurpose and Multifunctional Devices
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.12, December 2013 71 Lightweight DNS for Multipurpose and Multifunctional Devices Yogesh A. Wagh 1, Prashant A. Dhangar
Help Desk Management System for PC Troubleshooting
Volume 7 No.7, August 2014 www.ijais.org Help Desk Management System for PC Troubleshooting Safiya Al-Sharji Student, Computer Engineering Caledonian College of Engineering Muscat, Oman Ali Al-Mahruqi
DESKTOP BASED RECOMMENDATION SYSTEM FOR CAMPUS RECRUITMENT USING MAHOUT
Journal homepage: www.mjret.in ISSN:2348-6953 DESKTOP BASED RECOMMENDATION SYSTEM FOR CAMPUS RECRUITMENT USING MAHOUT 1 Ronak V Patil, 2 Sneha R Gadekar, 3 Prashant P Chavan, 4 Vikas G Aher Department
Smart Telephone System
IG7600 Smart Telephone System Quick Installation Guide Copyright 2013, All Rights Reserved. Ver11140311 IG7600 Smart Telephone System Quick Installation Guide Powering up 1. Plug the IG7600 in and allow
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Plc Based Monitoring and Controlling System Using Wi-Fi Device
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 4, Ver. II (Jul - Aug. 2014), PP 29-34 Plc Based Monitoring and Controlling System
A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets
A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets Pradipta Biswas University of Kalyani, India 1 Introduction Remote control of electrical and electronic gadgets in domestic and
An Implementation of Secure Online Voting System
An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., [email protected]
Remote Desktop Access Through Android Mobile Phones and Reverse
Reviewed Paper Volume 2 Issue 8 April 2015 Paper International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Remote Desktop Access Through Android Mobile Phones and Reverse Paper
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack
A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack Mr. Vishal Andodariya PG Student C. U. Shah College Of Engg. And Tech., Wadhwan city, India [email protected]
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,
Remote Android Assistant with Global Positioning System Tracking
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking
Setting Up Your Wireless Network
Setting Up Your Wireless Network 1 TABLE OF CONTENTS Wireless Tips... 3 Terminology... 4 Motorola 2247... 5 Logging In:... 5 Changing the SSID/network name... 6 Westell Model 7500... 12 Configuration of
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE
RIVIER ACADEMIC JOURNAL, VOLUME 3, NUMBER 1, SPRING 2007 NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE Arti Sood * Graduate Student, M.S. in Computer Science Program, Rivier College Abstract
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
Fall 2011 SYSTEM ARCHITECTURE DESIGN TEAM MEMBERS: PROJECT OWNERS: AMIR ROOZBEH([email protected], 15 ECTS) EKAMBAR SELVAKUMAR(ekambar@kth.
Fall 2011 SYSTEM ARCHITECTURE DESIGN TEAM MEMBERS: AMIR ROOZBEH([email protected], 15 ECTS) EKAMBAR SELVAKUMAR([email protected], 30 ECTS) ERICSON FERDINAND PASARIBU([email protected], 24 ECTS) JUNG CHANGSU([email protected],
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
The All-in-One Support Solution. Easy & Secure. Secure Advisor
The All-in-One Support Solution. Easy & Secure. Secure Advisor Secure Advisor - A Perfect Solution for Online Support Fast and easy remote support from anywhere Problems that often sound complicated on
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Feature and Technical
BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
RealTime Implementation of RTOS based Vehicle Tracking System
BIOSCIENCES BIOTECHNOLOGY RESEARCH ASIA, April 2015. Vol. 12(1), 237-241 RealTime Implementation of RTOS based Vehicle Tracking System A. Venkataraman 1 and P. Chitra 2 1 Master of Engineering, Embedded
CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016
VEHICLE TRACKING SYSTEM WITH ANDROID APP SUPPORT ABSTRACT M. Sudhakar Professor Dept of ECE CMR College of Engineering & Technology Kandlakoya, Medchal Rd, Hyderabad e-mail: [email protected] K.Kalyani PG
Mobile Device Manual for 3G DVRs
Mobile Device Manual for 3G DVRs The 3G DVR can be monitored with APPS for supported mobile device operating systems. Please refer to the table below for your specific mobile device application. Please
Small Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP [email protected] Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
An Android Enabled Mobile Cloud Framework for Development of Electronic Healthcare Monitoring System using VPN Connection
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com An Android
Computer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
Nagpur, Maharashtra, India
Volume 6, Issue 2, February 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated Door
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control.
Secure Control of Remote Electrical Devices Using Mobile SMS Services Kishor T. Mane 1, G.A. Patil 2 1. Asst. Professor, 2. Head and Asst. Professor D. Y. Patil college of Engg. & Tech. Kolhapur, Maharashtra,
Integrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
Keywords Mobile Cloud Operating System (MCOS), Distributed Cloud Operating System, Garbage mobile phone, Cloud Operating System
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Futuristic Approach:
Mobile Learning and Attendance Management System on Android Platform
Mobile Learning and Attendance Management System on Android Platform Rakhi Joshi 1, Virendra Shete 2, Sunil Somani 3 ME Student, Dept. of E&TC, MITCOE, SavitribaiPhule Pune University, Pune, India 1 Professor,
Security Configuration Guide P/N 300-010-493 Rev A05
EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed
Online Mobile Cloud Based Compiler
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 2 February 2015, Page No. 10400-10403 Online Mobile Cloud Based Compiler Miss. Pooja D. Pawar, Miss.
Vine Server. v3.1. Manual
Vine Server v3.1 Manual Copyright 2009 TestPlant Inc. Vine Server Manual Trademarks Vine, Vine Viewer, Vine Server, the Vine logo, TestPlant, and the TestPlant logo are trademarks or registered trademarks
Implementation of the Remote Control and Management System. in the Windows O.S
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012 11 Implementation of the Remote Control and Management System in the Windows O.S Seung-Ju Jang Dong-Eui University,
Configure A VoIP Network
Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: [email protected] Ms. Zarna M. Gohil Electronics & Communication
Bidirectional Communication With EPABX for Hotel Management Software (HMS) using Handshaking Protocol
Bidirectional Communication With EPABX for Hotel Management Software (HMS) using Handshaking Protocol Srilakshmi Nair, Kalyani Gaikwad, Gauri Nidan, Amit Shetty Dept. Of Information Technology JSPM S (JSCOE)
Internet Telephony PBX System. IPX-300 Series. Quick Installation Guide
Internet Telephony PBX System IPX-300 Series Quick Installation Guide Overview PLANET IPX-300/IPX-300W IP PBX telephony systems ( IP PBX in the following term) are designed and optimized for the small
Smart Queue Management System Using GSM Technology
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 941-950 Research India Publications http://www.ripublication.com/aeee.htm Smart Queue Management System Using
How To Build A Gps Vehicle Tracking System On Android App.Com
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 71-75 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) GPS Vehicle Tracking System Shital Mohol
The English translation Of MBA Standard 0301
MBA 文 書 0603 号 MBA Document 0603 The English translation Of MBA Standard 0301 MISAUTH Protocol Specification The authoritive specification is Japansese one, MBA Standard 0203 (June 2004). The Protocol
Implementation of College Network Scenario Module by Using CCNA
Implementation of College Network Scenario Module by Using CCNA Jitender Singh 1, Anshu Rani 2 1 Scholar, Computer Science & Engineering, RPSGOI Mohindergarh, India 2 Scholar, Computer Science & Engineering,
Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)
Network Setup Guide 1 Glossary 1.1 Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service Provider) means
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute
An Intelligent Parking Guidance and Information System by using image processing technique
An Intelligent Parking Guidance and Information System by using image processing technique P.DharmaReddy 1, A. RajeshwarRao 2, Dr. Syed Musthak Ahmed 3 M. Tech Student, Embedded Systems, SR Engineering
Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements
, pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner
Secure Authentication with 3D Password Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner Abstract Providing
A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
, pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication
EMBEDDED GSM MONITOR AND CONTROL USING ANDROID APPLICATION
http:// EMBEDDED GSM MONITOR AND CONTROL USING ANDROID APPLICATION J Ramya Ritika 1, K.V. Yateendranath 2 1 M.Tech Student [DSCE], Dept. of ECE, VITS, Kavali, Andhra Pradesh, (India) Associate Professor,
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.
Note: DIR-130 FW: 1.21 How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. This setup example uses the following network settings: D-Link Technical Support PPTP VPN Between Windows PPTP
Interactive Voice Response System by Using Asterisk
Interactive Voice Response System by Using Asterisk Ankita Bhondge, Aditi Bhatkar, Sapna Fender, Sonali Thakre, Megha Goel Student, Dept. of C.S.E., SRMCEW, RTM University, Nagpur, India. Professor, Dept.
Wifi Ticketing. Atul Jain Ankita Gurbaxani Sagar Oza Purvi Sankhe
Wifi Ticketing Atul Jain Ankita Gurbaxani Sagar Oza Purvi Sankhe Information Technology Information Technology Information Technology Assistant Professor TCET TCET TCET TCET Mumbai, India Mumbai, India
Question How do I access the router s web-based setup page? Answer
http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup
TRACING VNC AND RDP PROTOCOL ARTEFACTS ON WINDOWS MOBILE AND WINDOWS SMARTPHONE FOR FORENSIC PURPOSE
TRACING VNC AND RDP PROTOCOL ARTEFACTS ON WINDOWS MOBILE AND WINDOWS SMARTPHONE FOR FORENSIC PURPOSE Abstract Paresh Kerai School of Computer and Security Science Edith Cowan University Perth, Western
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone
ISSN (e): 2250 3005 Vol, 04 Issue, 7 July 2014 International Journal of Computational Engineering Research (IJCER) Enhanced Wireless Security System With Digital code lock using RF &GSM Technology 1 E.Supraja,
Introduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, [email protected] - Add-on material included of Peterson, Davie: Computer Networks February
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated Food
Protect Integrity of Data in Cloud Assisted Privacy Preserving Mobile Health Monitoring
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1329-1334 International Research Publications House http://www. irphouse.com Protect Integrity
APC Enterprise KVM Switches
APC Enterprise KVM Switches Introduction You need more than point access products. You need a system that provides more control, flexibility and scalability than ever before. Systems that reduce your Mean
7. Mobile Phone Support
7. Mobile Phone Support A state-of-the-art feature of this DVR device is transmitting live feed from the CCTV cameras to your mobile phone, so that you can have on the go access to your surveillance system
ISL AlwaysOn 1.0 Manual
Contents 2 Table of Contents Foreword 0 Part I Introduction 3 Part II Security Statement 4 Part III System requirements 6 Part IV Setting up ISL AlwaysOn on a computer 7... 1 Register ISL Online account
Technical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
Configuring and Monitoring Hitachi SAN Servers
Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in Cloud Prof. Pranalini S. Ketkar Ankita Bhimrao Patkure IT Department, DCOER, PG Scholar, Computer Department DCOER, Pune University Pune university
Remote Desktop on Mobile
Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to
