UNIVERSITI PUTRA MALAYSIA INTERNET - BASED SECURITY AND MONITORING SYSTEM ISAMELDIN MOHAMMED SULIMAN FK 1998 10



Similar documents
A STUDY OF SECURITY LIMITATIONS IN VIRTUAL LOCAL AREA NETWORK IMPLEMENTATION

HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA FAKULTI TEKNOLOGI MAKLUMAT DAN KOMUNIKASI

RFID BASED SYSTEMATIC STUDENT S ATTENDANCE MANAGEMENT SYSTEM HANISAH BINTI HAMID. Faculty of Electrical and Electronic Engineering

BISKUT RAYA INVENTORY MANAGEMENT SYSTEM (BRIMS) NURUL AMIRAH BINTI ROSLAN THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE

CLIENT SERVER APPLICATION FOR SERVER FARM PERFORMANCE MONITORING ABDIRASHID HASSAN ABDI

DEVELOP AND DESIGN SHEMATIC DIAGRAM AND MECHANISM ON ONE SEATER DRAG BUGGY MUHAMMAD IBRAHIM B MD NUJID

Car Rental Management System (CRMS) Lee Chen Yong

EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH

DEVELOPMENT OF DATA ACQUISITION SOFTWARE FOR CENTRALIZED RADIATION MONITORING SYSTEM

GSM BASED HOME SECURITY SYSTEM CHENG KAR LOCK

IMPROVING SERVICE REUSABILITY USING ENTERPRISE SERVICE BUS AND BUSINESS PROCESS EXECUTION LANGUAGE AKO ABUBAKR JAAFAR

PRODUCTIVITY IMPROVEMENT VIA SIMULATION METHOD (MANUFACTURING INDUSTRY) HASBULLAH BIN MAT ISA

JOB AGENT MANAGEMENT SYSTEM LU CHUN LING. A thesis submitted in partial fulfillment of. the requirements for the award of the degree of

MASTER S PROJECT REPORT SUMMARY

MODELING AND SIMULATION OF SINGLE PHASE INVERTER WITH PWM USING MATLAB/SIMULINK AZUAN BIN ALIAS

SPAM FILTERING USING BAYESIAN TECHNIQUE BASED ON INDEPENDENT FEATURE SELECTION MASURAH BINTI MOHAMAD

LIGHTNING AS A NEW RENEWABLE ENERGY SOURCE SARAVANA KUMAR A/L ARPUTHASAMY UNIVERSITI TEKNOLOGI MALAYSIA

WEB-BASED PROPERTY MANAGEMENT SYSTEM SAFURA ADEELA BINTI SUKIMAN

THE FINGERPRINT IDENTIFICATION OF ATTENDANCE ANALYSIS & MANAGEMENT. LEE GUAN HENG (Software Engineering)

HOME SECURITY SENSOR SYSTEM USING ATMEL AVR MICROCONTROLLER LIM BOON HOI

THE RELATIONSHIP BETWEEN HUMAN RESOURCE INFORMATION SYSTEM (HRIS) AND HUMAN RESOURCE MANAGEMENT (HRM) ALFRED PUN KHEE SEONG

UMP-AUTOMATIC SPORT FACILITIES MANAGEMENT SYSTEM (UMPASFMS) TAN HOOI FONG UNIVERSITI MALAYSIA PAHANG

DEVELOPING AN ISP FOR HOTEL INDUSTRY: A CASE STUDY ON PUTRA PALACE HOTEL

UNIVERSITI PUTRA MALAYSIA

VEHICLE TRACKING AND SPEED ESTIMATION SYSTEM CHAN CHIA YIK. Report submitted in partial fulfillment of the requirements

SWAY REDUCTION ON GANTRY CRANE SYSTEM USING DELAYED FEEDBACK SIGNAL (DFS) NORASHID BIN IDRUS

TABLE OF CONTENTS. SUPERVISOR S DECLARATION ii STUDENT S DECLARATION iii DEDICATION ACKNOWLEDGEMENTS v ABSTRACT LIST OF TABLES

STRESS EFFECT STUDY ON 6 DIFFERENT PATTERN OF TYRES FOR SIZE 175/70 R13 SYAHRIL AZEEM ONG BIN HAJI MALIKI ONG. for the award of the degree of

Intelligent Home Automation and Security System

CONTROL HOME APPLIANCES VIA INTERNET (CoHAVI) SOFTWARE DEVELOPMENT SHIRRENE A/P NAI SOWAT

UNIVERSITI PUTRA MALAYSIA KNOWLEDGE MANAGEMENT SYSTEM FRAMEWORK FOR COLLABORATIVE OPEN SOURCE SOFTWARE DEVELOPMENT

A STUDY ON MOTIVATION TO START UP A BUSINESS AMONG CHINESE ENTREPRENEURS

HOME AUTOMATION SYSTEM USING POWER LINE COMMUNICATION DARLENE BINTI MOHAMAD DOUGLAS

FTMK LECTURER'S APPOINTMENT SYSTEM (FLAS) NORAHAYU BTNTI MOHD RAMLY

SPA BEAUTY MANAGEMENT SYSTEM NAJIHAH BINTI RUSSLI

CLINICAL MANAGEMENT SYSTEM (CMS)

Other 555 based and 8051 based projects...

Application Note 83 Fundamentals of RS 232 Serial Communications

REAL TIME SERVER ALERT SYSTEM USING PORT SCANNING AND REACHABILITY TEST FUNCTIONS MUHAMMAD HAFIZ BIN MUHAMAD HENDRI

FRONT DESK CUSTOMER SERVICE FOR QUEUE MANAGEMENT SYSTEM MOHAMAD FAZLI BIN ALIAS

SMART SHOES CHARGER TAN CHEE CHIAN

It iiumiuimmnuu. Pusat Khidrpp; Maklumat Akadendk UNIVERSITI MALAYSIA SARAWAK Kote ßarnprjn HOST-BASED INTRUSION DETECTION SYSTEM (HIDS)

REMOTE ELECTROCARDIOGRAM MONITORING BASED ON THE INTERNET

K-BASED HELPDESK SYSTEM SISTEM MEJA BANTUAN BERASASKAN PENGETAHUAN

Feasibility of Teaching Public Relations Courses Through E-Learning: A Case Study in Malaysia

FRAMEWORK FOR EVALUATING PROGRAMMING LANGUAGES FOR COMPUTER GRAPHICS

ONLINE DATA VISUALIZATION FOR UMP STRATEGIC PLAN DASHBOARD ANDY PUE ZENFOONG TECHNICAL SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM) KIT FOR VEHICLE S ALARM SYSTEM NIK MOHD KHAIRULFAHMI BIN NIK MAT

INTEGRATING CONSUMER TRUST IN BUILDING AN E-COMMERCE WEBSITE NUR ZAILAN BIN OTHMAN

TN. MOHD FAKHRUZZAMAN B. TN ISMAIL

MODELING OF TRANSPORT PROCESSES FOR AIR POLLUTANTS ENHANCED WITH GEOGRAPHIC INFORMATION SYSTEM

FACE RECOGNITION SECURITY SYSTEM FOR ACCESS CONTROL NUR ADILA BINTI MOHD RAZALI UNIVERSITI TEKNOLOGI MALAYSIA

CELL PHONE SALES MANAGEMENT SYSTEM (CPSMS)

MBO TICKET M-BOOKING SYSTEM RIDZWAN BIN ABDOL RAHMAN UNNERSITI TEKNIKAL MALAYSIA MELAKA

HOME ALARM MONITORING NETWORK GOH SWEE TIAN

UNIVERSITI PUTRA MALAYSIA FRAUD DETECTION SYSTEM FOR ROTOR PAY PHONE NURWARDIAH BINTI SPIAN FK

DIRECT CURRENT MOTOR CONTROL LED BY MICROCONTROLLER CREATED PWM THINESH A/L KUNASEGERAN. Thesis submitted in fulfillment of the requirements

HOME AUTOMATION USING X-10 TECHNOLOGY MOHAMAD RIDHWAN BIN MOHAMED RODZI UNIVERSITY MALAYSIA PAHANG

REGISTRATION AND BILLING SYSTEM TAN CHIN YONG

DIALER SPECIFICATION VERBATIM MODULAR SERIES VSS

UNIVERSITI PUTRA MALAYSIA DEVELOPMENT OF PROTOTYPE SCHEDULING AND SEQUENCING SOFTWARE FOR JOB SHOP MANUFACTURING IN SHEET METAL FABRICATION

PIPELINE ENGINEERING - Pipeline System Automation and Control - C. Bruce Warren and Mike S. Yoon PIPELINE SYSTEM AUTOMATION AND CONTROL

BUS MANAGEMENT SYSTEM HASDILAZIRA BT ABD LATIIF

MY HOME - CONTROL 130

INVENTORY MANAGEMENT SYSTEM USING DISTRIBUTED SYSTEM APPROACH GOH LIRONG

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

AUTOMATED SHOPPING LIST GENERATOR NOR IZATIE BINTI MOHAMAD NADRY

Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System)

DEVELOPMENT OF STATISTICAL PROCESS CONTROL (SPC) MATLAB- BASED SOFTWARE FOR AUTOMOTIVE INDUSTRIES APPLICATION SITI HAZLINA BINTI MOKHTAR

UNIVERSITI PUTRA MALAYSIA REAL TIME TRACKING AND FACE RECOGNITION USING WEB CAMERA

Building Technologies

UNIVERSITI PUTRA MALAYSIA DEVELOPMENT OF AN ELECTRIC VEHICLE DASHBOARD MONITORING SYSTEM USING MICROCONTROLLER MOHAMMED E. SALEM ABOZAED FK

PREVENTIVE MAINTENANCE MANAGEMENT DECISION SUPPORT SYSTEM FOR PALM OIL MILL (PMMDS) LEE HWANG CHIN

REAL TIME FACE DETECTION SYSTEM AMY SAFRINA BINTI MOHD ALI

UNIVERSITI PUTRA MALAYSIA AN EXPERT SYSTEM FOR FIRE PREVENTION IN HIGH RISE BUILDINGS SENGDAO WAYAKONE FK

HOME ALARM SYSTEM USING DETECTOR SENSOR MD KHAIRUL AMRI B MD ZAIN

TRANSFORMATIONAL PROJECT MANAGER: AN ENABLER OF AN ENTERPRISE RESOURCE PLANNING (ERP) IMPLEMENTATION SUCCESS JOHN ONYEKACHI OKUGO

Installation Manual for D1110 DigiCom2

RC:

Advanced Higher Computing. Computer Networks. Homework Sheets

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK

MOTION DETECTION FOR PC BASED SECURITY SYSTEM BY USING OPTICAL FLOW NUR NABILAH BT MOHAMAD HAMID

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

NOR BAHYAH BINTI ABDUL RASHID

Monitoring & Control of Small-scale Renewable Energy Sources

A Smart Telephone Answering Machine with Voice Message Forwarding Capability

Faculty of Computer Science & Information Technology

Web-based remote monitoring of infant incubators in the ICU

Traditional Telephony

EMPLOYEE ATTENDANCE SYSTEM KOIK SEOW LIN

Tarkh BOOK INVENTORY SYSTEM USING RFID NURUL NADIA BINTI MAT JALALUDDIN

BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE

Real-time Video Monitoring Increases the Efficiency of SCADA Process Management

SNC-VL10P Video Network Camera

GSM ATT Modules Simply effective remote control

ONLINE HELPDESK FOR MAYBANK ACCOUNT PAYABLE SYSTEM (MAPS) SHOBINI D/ RAMAN NAIR UNIVERSITI TEKNOLOGI MALAYSIA

HELP DESK MANAGEMENT SYSTEM. LOW SlEW PEI

A STUDY ON INVENTORY CONTROL SYSTEM PRACTICE IN KUANTAN FOOD PROCESSING SMALL MEDIUM ENTERPRISE (SME) NURUL AJILAH BINTI MOHAMAD ROSALAN

Integration of Alarm Systems

Transcription:

UNIVERSITI PUTRA MALAYSIA INTERNET - BASED SECURITY AND MONITORING SYSTEM ISAMELDIN MOHAMMED SULIMAN FK 1998 10

INTERNET -BASED SECURITY AND MONITORING SYSTEM By ISAMELDIN MOHAMMED SULIMAN Thesis Submitted in Fulfillment of the Requirements for the Degree of Master of Science in the Faculty of Engineering Universiti Putra Malaysia November 1998

To my parents and sisters

ACKNOWLEDGEMENTS I wo uld like to express my sincere thanks to my supervisor Dr. Abd Ra hman Ra mli. This thesis wo uld not have been done without his support, encouragement, comments. Thanks and appreciation is extended to the members of the supervisory committee Dr. Mahmud Hassan and Mrs. Ro slizah Ali. I would also like to express my thanks to the staff at the Graduate Sc hool Office for their help and cooperation. My appreciation and gratitude to all of the individuals at the Department of Computer and Communication Sy stem Engineering, cooperative. I gratefully ackno wledge the support of Ir. Dr. No nnan Bin Mariun the general manager of Control and Automation Sy stem Center (C ASC). My thanks and appreciation to my colleagues at the CA SC for their help and suggestions during the research work. iii

TABLE OF CONTENTS Page AC KNOWL EDG EM ENT S............................... III LI ST OF TABLES......................................................................... vu LI ST O F FI GURES......... LI ST OF ABB REVIATION S... AB ST RA CT...... Vlll x xu AB ST RAK.............................. XIV CHAPTER I INT ROD UCTION.............................................. 1 Benefits ofa Web-Based En vironment... 3 Objectives.............................................................. 3 Thesis Organisation.............................................. 4 II REVI EW ON SEC URIT Y SYST EM S A ND ALARM SI GNA LL ING......... 5 Introduction........................................... 5 Security and Monitoring Technology..................... 5 Intrusion Detection and Monitoring Systems.............. 8 The Internet.................................... 11 Internet Telephony.......... 12 Conclusion.......................................................... 13 III BAC KG ROUND TH EO RY... 15 Introduction... 15 Java Language... 15 Telephone Networks.... 16 The Phone Line....................................... 17 IV

On-hook and Off-hook Operation... 17 DTMF Dialing... 19 TP5088 DTMF Generator... 20 Telephone Line Interface... 22 Modems.................................................................. 22 PC Serial Interfacing... 23 PIC16C8 4 Microcntroller... 24 IV SYSTEM ARCHITECTURE... 25 Introduction... 25 General Layout of the Security System... 25 Software Description... 27 Interface to the Host Machine... 27 Interrupts... 27 Data Exchange between C Program and Java Applet... 28 The Web Server Installation... 29 The Communication Program... 30 Implementing the Interrupt Service Routine (ISR) 31 Creating the Monitor Server... 34 Implementing the Monitor Client Applet... 37 The infotist Applet... 39 HTTP Links to Monitored Locations Applet.. 42 The Password Apple....................... 44 The Chat System... 46 Creating Multithread Chat Server...... 47 Building Chat Client Applet... 50 Conclusion... 54 V RESULTS AND DISCUSSION................. 55 System Performance............ 55 Conclusion... 62 v

VI CON CLUSION S AND RECOMMENDA non S... 63 Conclusions... 63 Recommendations and Directions for Future Work s... 66 Sensors Unit... 67 Control Unit... 67 Auto-Dialler Unit...... 68 Data Access Arrangement (D AA) 68 REFERENCES............................................................. 71 APPENDICES................................................................... 75 A The Communication Program......... 76 8-1 The Monitor Server...... 79 8-2 The Monitor Client Applet...... 83 C The Infolist Applet.... 90 D HTTP Link s Applet... 97 E The Password Applet... 99 F -1 The Chat Server... 102 F-2 The Chat Client Applet......... 107 VITA............................................................................... 113 vi

LIST OF TABLES Table Page 1 DTMF Digits..................................................... 19 2 Functional Truth Table of TP5088 DTMF Generator...... 21 vii

LIST OF FIGURES Figure Page 1 On-hook State.............................................................. 18 2 Off-hook State................... 18 3 General Layout of the Security System...... 26 4 Mechanism for Data Exchange between Java Applet and C Program..................................................... 29 5 Algorithm for Implementing the Interrupt Service Routine......... 32 6 The Communication Program F lowchart 33 7 Algorithm for Creating the Monitor Server........................... 35 8 The Monitor Server F lowchart 9 Algorithm for Creating the Monitor Client... 38 10 The Monitor Client F lowchart........................................... 39 11 Algorithm for Infolist Applet............................................ 40 12 The Infolist Applet Flowchart.......................... 41 13 The HTTP Link s Applet F lowchart 43 14 The Password Applet F lowchart........................................ 45 15 The Chat Client/Server Pair............................................. 47 16 Algorithm for Creation of the Chat Server............................. 48 17 The Chat Server F lowchart............................................... 49 18 Algorithm for Building the Chat Client Applet........................ 52 19 The Chat Client F lowchart................................. 53 Vlll

20 The Password Applet 21 Applet 58 22 Applet 58 23 Applet 59 24 Chat 60 25 The Chat 26 Block Diagram of th 67 ix

LIST OF ABBREVIATIONS AC AW T CCTV CG I CPU DAA DC DCE DLAB DTMF DTE DTR EOI FIFO GUI HTML HTTP IER IRQ ISR Alternating Current Abstract Windowing Toolk it Closed-circuit TV Common Gateway Interface Central Processing Unit Data Access Arrangement Direct Current Data Communication Equipment Divisor Latch Access Bit Dual Tone Multi-frequency Data Terminal Equipment Data Terminal Ready End of Interrupt First In First Out Graphical User Interface Hypertext Mark up Language Hypertext Transfer Protocol Interrupt Enable Register Interrupt Request Interrupt Service Routine x

JV M LA N LED MSR OOP PC PIC PSTN PWS RI RISC ROM RT S RT U SCADA TCPIIP UART UR L WWW Java Virtual Machine Local Area Network Light Emitted Diode Modem Status Register Object Oriented Programming Personal Computer Programmable Interrupt Controller Public Switched Telephone Network Personal Web Server Ring Indicator Reduced Instruction Set Computing Read Only Memory Request To Send Remote Terminal Unit Supervisory Control And Data Acquisition Transmission Control ProtocollIntemet Protocol Universal Asynchronous Receiver/Transmitter Uniform Resource Locator World Wide Web Xl

Abstract of thesis submitted to the Senate of Universiti Putra Malaysia in fulfilment of the requirements for the degree of Master of Science. INTERNET-BASED SECURITY AND MONITORING SYSTEM By ISAMELDIN MOHAMMED SULIMAN NOVEMBER, 1998 Chairman: Abd Rahman Ramli, Ph.D. Faculty: Engineering This study describes a remote monitoring and security system based on the Internet. It is intended to investigate the possibilities of using the integration of the Internet and telephone lines in providing solution to security problems by conveying alarm signals from remote monitored locations. developed to allow selected users to get monitoring and security information. A special purpose web server was designed to handle the system. This web server which is acting as a central monitoring station will supply the system's users with information reporting any intrusion at remote monitored locations The system utilised the existing telephone network, and user friendly in alarm transmission from remote monitored location. modem was used to maintain interface between the telephone line and the web server. xii

data capturing from the modem through the serial port web server. Java language was used for developing a server program that is running in the back ground to enable data provided by the communication program to be put on the Internet for access. A graphical user interface (J ava applets) implemented to allow users to access the system. The results of applying this approach showed the possibilities of using the integration of the Internet and telephone lines in conveying alarm signals and control command. It also emphasised the import developing software programs for Internet-based systems. Furthermore, is still required to fill the low-level interface gap that was not supported by Java language. Finally, Internet can be used not only for information exchange and retrieval, as a communication medium for monitoring and controlling of remote physical environments. xiii

Abstrak tesis yang dikemukan kepada Senat Universiti Putra Malaysia untuk ijazah Master Sains SISTEM KESELAMATAN DAN PEMANTAUAN BERASASKAN INTERNET Oleh: ISAMELDIN MOHAMED SULIMAN NOVEMBER, 1998 Pengerusi: Abd Rahman Ramli, P.hD. Fakulti: Kejuruteraan Kajian ini menerangkan satu sistem pemantauan dan keselamatan jarak jauh menggunakan internet. Tujuan kajian adalah untuk menyiasat kemungkinan menggunakan integrasi talian telefon dan Internet untuk menyelesaikan masalah keselamatan dengan menghantar isyarat penggera dari lokasi jauh. Halaman web dibangunkan untuk membenarkan pengguna mendapatkan maklumat bagi pemantauan dan keselamatan. Komputer perumah (pelayan WWW) bertindak sebagai stesen pemantauan pusat yang menyediakan kawalan keselamatan dan laporan maklumat keadaan sistem pengguna di lokasi pemantauan pada jarak jauh. Satu pelayan web dibina khusus untuk mengawal sistem ini. Sistem ini menggunakan rangkaian telefon yang sedia ada, yang mana ia lebih kos efektif dan senang dipakai dalam penghantaran isyarat penggera dari lokasi jauh. Satu modem dalaman digunakan untuk mengantaramukakan tali an telefon dengan pelayan web. Program komunikasi yang dibangunkan dalam bahasa C bertanggungjawab untuk xiv

mendapatkan data dari modem melalui pangkalan bersiri dan menghantar data itu kepada pelayan web. Bahasa Java digunakan untuk membangunkan satu program pelayan yang lari pada latar belakang supaya data yang diberi oleh program komunikasi boleh dipaparkan pada internet untuk dicapai. Satu pengantara bergrafik (Java Applet) dibangunkan supaya pengguna boleh mencapai sistem tersebut. Keputusan daripada perlaksanaan kaedah ini menunjukkan kemungkinan untuk mengguna integrasi internet dan talian telefon dalam menghantar isyarat penggera dan arahan kawalan. Ia juga menitikberatkan kepentingan bahasa Java dalam pembangunan peri sian untuk sistem berasaskan internet. Selanjutnya, bahasa C masih diperlukan untuk memenuhi ruang aras rendah yang tidak dapat dilakukan oleh bahasa Java. Secara kesimpulan, kajian yang diterangkan ini telah membuktikan bahawa internet boleh digunakan bukan hanya kepada pertukaran maklumat dan capaian, tetapi ianya boleh digunakan sebagai perantara komunikasi untuk pemantauan dan kawalan persekitaran fizikal pada j arak yang j auh. xv

CHAPTER I INTRODUCTION Computer network s and data communications are of great importance in today's information society. Data communications is used to extend the power of computers and allow computer facilities to be accessed at remote sites. The emergence of advanced network ing capabilities and the availability of software and information components mak es it easier to implement network ed data acquisition systems that is used to support a wide range of applications lik e telemedicine (Koblas and Stienbak k, teleconferencing (Kirstein, applications. Within the Internet, integrative platform to access Internet services. distributing and sharing information. WWW offers a suitable infrastructure that integrate computer-based services from multiple platforms and provides flexible and effective tools for examining and monitoring remote physical environments. The adoption of new Web-based systems will allow for higher level of interaction between users at remote clients and servers.

2 The design and installation of security systems employs a wide variety of techniques, specific applications (Traister, systems to become highly efficient and flexible. Alarm signal transmission is the most import communication systems have been used for alarm signalling. Telephone lines over the years have proved extremely reliable which provides a practical solution consistent with both security and costing. Moreover, the security considerably. The work described in this study is an attempt that has been made to use the integration of the Internet and telephone lines in security systems. The intense interest in propert Monitoring services are needed for several reasons; location, away The thesis outlines an approach used to build reasonably interactive security system, presents the benefits brought and limitations imposed by using the WWW and Java language in developing real-time applications. of how modem technology can be used to provide security services.

3 Benefits of a Web-Based Environment Within the past few years, network connecting modest number of research institutions to a back bone connecting individuals, infrastructure (Larnm and Reed, convenient way to access information in the Internet. Moreover, language as an effective tool for extending functionality and improving performance of the Web will facilitate utilising the Internet in building real-time applications. The protection of property against attack s is the aim of any security procedure. Many types of security systems are used to support protection of human property, range from private protection (homes) continuously scanning the area under monitoring, whenever intrusion is detected. the ability to provide many services (communication, enhance security system in several ways. Internet could be used to supply visual and audio information to a security guard at a central monitoring station as well as security system users around the world. Objectives follows: The objectives of the Internet-based security and monitoring system are as

4 1. To investigate the possibilities of using the integration of the Internet and telephone lines in providing solution to security problems by conveying alarm signals from remote monitored locations. 2. To establish a web server that acts as a central monitoring station to receive alarm signals and to enable information to be put on the Internet for access. 3. To implement a graphical user interface (J ava applets) web server. Thesis Organisation The thesis consists of six chapters. objectives of the project. In Chapter II a literature review on security systems and alarm signalling is provided. Chapter III gives theoretical back ground of the tools that are used in building the system. Chapter IV gives a general description of the system. provides methods used for the software development. The system's performance and results are discussed in chapter V. summ arises the conclusions and directions of future efforts.

CHAPTER II REVIEW ON SECURITY SYSTEMS AND ALARM SIGNALLING Introduction The need for security systems in all types of buildings becomes a necessity with the increase in crime rate. Alarm and monitoring systems can be used to prevent crime. By protecting places such as homes, guards and patrol officers can spend more time in areas with high crime rates and with fewer premises protected by alarm systems. This chapter will review the components of security and monitoring systems, have been used in designing and building of security systems. Security and Monitoring Technology Security and monitoring systems were originally introduced as a means to protect people and property by drawing attention to a problem in its beginning stages so that the problem can be controlled through quick action. The use the fight against crime is not new. When electricity was put to practical use around the 5

6 later part of the last century, methods were devised to use door bells, entrance detectors, and manually operated fire alarms for signalling devices (Traister, 1990). In 1858, Edwin began the first central office burglar alarm system (Cunningham, 1988). The two basic signal circuits that were used for security and fire alarm systems are open and closed circuit. The advantage of the open circuit technique was the reduced cost in providing alarm protection. However it has certain drawback as a wire to one of the sensors could be cut and there would no means of detecting it. To avoid difficulties of the open circuit (Capel, 1989), the closed circuit technique came into general use. In the early 1960s, closed circuit TV (CCTV) was introduced (Fennelly, 1997) to provide a useful supplement to an intruder alarm system, particularly in large building complexes. In an effort to improve security systems, multiplexing circuits were used to transmit multiple alarm signals using a common carrier. Another major improvement in security systems was the change from analogue to digital data transmission which made it possible to apply the capabilities of digital computers for security systems (Hopf, 1979). Security alarms consists of several functional parts. Sensors to detect the action or penetration of an intruder, control unit that is used to receive, process and transmit alarm signal to a central station, communication medium, and a central monitoring station that operates for 24 hours a day to supervise, record, and maintain alarms (Fennelly, 1997). When an alarm or monitoring information is to be transmitted, the medium of communication can be in the form of:

7 1. Power line. The power mains are used to transfer alarm signal from the monitored locations to the central station. The use of power lines as the transmission medium in a facility could significantly reduce cabling costs (Halbig, et at., 1994). 2. Cabling. A dedicated cabling system is run from the protected location to the central monitoring station. The disadvantage of the direct cabling system is the high cost of the dedicated line. 3. Telephone. The most common cost-effective form of alarm monitoring has been via telephone lines. If an alarm device wishes to communicate with the central station, it will instruct the dialler to dial the monitoring station reporting the alarm information. 4. Radio signal transmission. This method takes the alarm signal from the protected locations and sends it via radio frequency to a central monitoring station. Supervisory Control And Data Acquisition (SCADA) is an industrial measurement and control system consisting of a central host usually called a master station, one or more remote terminal units (RTU), communication medium and a collection of software used to monitor and control remote located data field elements. SCADA applications includes monitoring and control services for fire, security, building management as well as meter reading and control for utilities such as gas, water and electricity. The overall performance of SCADA system depends on satisfactory performance of the integral data communication links (Bruce and Lee, 1994). SCADA covers large geographic areas and rely on variety of communication interfaces between RTU's and the master station. Transmission of data could take place over the power

8 line, radio frequency link, twisted pair network in addition to a normal telephone line. The data acquisition is accomplished by RTV's scanning the field input connected to the R TV to detect alarm conditions, and if an alarm is detected it will be sent to the master station. SCADA carry out all necessary analysis and control, and then display this data on a number of operator screens. Intrusion Detection and Monitoring Systems In the past, security systems that implemented CCTV were forced to use expensive television equipment. However, Christoffersen (1990) showed that the PCbased CCTV system is a highly functional alternative to conventional video system equipment as it could offer reduced cost and reduced amount of software and hardware maintenance besides the equipment is of compact size. According to Barry (1993), improved capacity links have enabled the development of high data sensors such as remotely controlled camera and imaging units. Laura (1994) showed that a storage area can be monitored by collecting a basis image representing the monitored area and then continuously monitoring the area to detect changes in the monitored area. In many video surveillance applications used for intrusion detection, a variety of factors lead to some errors like varying illumination conditions, small camera motion, rain, etc. Michael, et al. (1996) solved these problems by applying compression techniques to transmit video images to a surveillance centre using digital network. Although sending video images to the central monitoring station eliminates false alarms

9 by allowing central station operators to see what is happening inside the protected area, the video images and detection results have to be transmitted to the surveillance centre. Therefore an individual transmission channel is required for each sensor connected to the monitoring centre. In addition, as the video signal is transmitted, the connection needs high bandwidth, as a result the costs increase with the distance and number of connections. Centralised monitoring and security systems have been in use for many years but increasing demands for expansion, flexibility and system integrity along with the cost have exceeded the capabilities of the traditional systems. Key to the establishment of security systems is a robust and well designed communications network. However. a separate communication networks for security only is expensive and not necessary (William, 1989). A new concept has been developed which allows for sharing resources to provide security measures in a cost-effective manner. The most important resource which may be shared is the data network. Johnson, et al. (1994) developed a remote monitoring system by utilising network cable to collect data from sensors and store them in storage medium. These data are remotely monitored via telephone. They concluded that number of technologies could be combined to introduce new approaches to provide unattended remote monitoring of facilities. Another technique of alarm signalling is the utilisation of optical fibres which are used to communicate restricted data, transmit CCTV pictures and detect intruders moving across restricted areas. Hawkes (1995) described a study on a fibre optic