Wlan Monitoring Using Android Phone



Similar documents
How To Monitor A Network With Remote Method Invocation (Rmi)

A B S T R A C T. Index Terms - Android, GPRS, GSM modem, Desktop, LAN. I. INTRODUCTION

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser

Fast remote data access for control of TCP/IP network using android Mobile device

LAN Monitoring Using Android Phone

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

Plc Based Monitoring and Controlling System Using Wi-Fi Device

Remote Desktop Access Through Android Mobile Phones and Reverse

Remote Monitoring, Controlling and Lost Hardware Detecting through GSM

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

Are apps available for Virtual Water Assistant? No. We use a mobile website.

SSL VPN Technology White Paper

What is Bitdefender BOX?

Implementation of Botcatch for Identifying Bot Infected Hosts

Fig. 1 BAN Architecture III. ATMEL BOARD

Web Service Provisioning on Android Mobile Host

Help Desk Management System for PC Troubleshooting

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Messaging and Voice Conferencing through Wi-Fi Network

Net Protector Admin Console

Smart Queue Management System Using GSM Technology

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

The All-in-One, Intelligent NXC Controller

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Lucent VPN Firewall Security in x Wireless Networks

Compulink Advantage Online TM

Using the Internet Outcome1

Offline Data Synchronization in Order Management System

Intelligent Home Automation and Security System

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

AC1200 Multi-Function Concurrent Dual-Band Gigabit Wi-Fi Router

Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations

Mobile Device Manual for 3G DVRs

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA USA. August v1.0

This document is intended to make you familiar with the ServersCheck Monitoring Appliance

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Quick Installation Guide

NEW! CLOUD APPS ReadyCLOUD & genie remote access

Nagpur, Maharashtra, India

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Design and Implementation of Video Conference System Over the Hybrid Peer-to- Peer Networks

Java Secure Application Manager

Chapter 2 Configuring Your Wireless Network and Security Settings

Developing Network Security Strategies

Introduction: Why do we need computer networks?

Original Research Articles

Single Sign-On Secure Authentication Password Mechanism

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Quick Start. Nighthawk X8 AC5300 Tri-Band WiFi Router Model R8500. Package Contents. NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA USA

Remote PC Guide for Standalone PC Implementation

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

Aeroqual Connect and Cloud

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Discovering Computers Chapter 9 Communications and Networks

Wireless power meter monitoring with power theft detection and intimation system using GSM and Zigbee networks

Sensors and actuators are ubiquitous. They are used

Cisco Virtual Office Express

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Remote Android Assistant with Global Positioning System Tracking

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc.

D-Link DAP-1360 Repeater Mode Configuration

What you don t know about industrial GSM/GPRS modem communications

Implementation of Wi-Ap; An IEEE b/g Based Electrical Switch Module With Web Enabled Interface for Electrical Appliances Control

Student Halls Network. Connection Guide

Remote Desktop on Mobile

Chapter 15: Advanced Networks

Towards the Web of Things

Here s your guide to easy installation. Get the most out of Verizon High Speed Internet.

Quick Installation Guide

7 6.2 Windows Vista / Windows IP Address Syntax Mobile Port Windows Vista / Windows Apply Rules To Your Device

Quick Installation Guide

Fall 2011 SYSTEM ARCHITECTURE DESIGN TEAM MEMBERS: PROJECT OWNERS: AMIR 15 ECTS) EKAMBAR

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9 Simple steps to secure your Wi-Fi Network.

Advanced Higher Computing. Computer Networks. Homework Sheets

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

24im Server. Enterprise Instant Messaging & Collaboration

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

ANDROID BASED HOME AUTOMATION AND VISION SURVEILLANCE USING RASPBERRY PI

SVN5800 Secure Access Gateway

International Journal of Advanced Research in Computer Science and Software Engineering

AC750 Multi-Function Concurrent Dual-Band Wi-Fi Router

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets

Introduction Chapter 1. Uses of Computer Networks

PocketDroid - A PC Remote Control

User Manual. Page 2 of 38

LOCATIONS AROUND ME (ANDROID)

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

A Novel Distributed Wireless VoIP Server Based on SIP

DATA PROJECTOR XJ-A147/XJ-A247/XJ-A257 XJ-M146/XJ-M156 XJ-M246/XJ-M256. XJ-A Series. XJ-M Series. Network Function Guide

Transcription:

International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 7 (July 2014), PP.23-27 Wlan Monitoring Using Android Phone Pooja Chaudhary 1, Atul Bavoria 2 1 (Department of Computer Engineering, Maharashtra Institute of Technology, Pune, India 2 (Department of Electronics and Telecommmunication, Maharashtra Institute of Technology, Pune, India Abstract :- In this paper we explain how a wireless LAN network can be monitored using an android phone when the administrator is not present at the place of network but he/she is away from it. The features installed in the application which can be installed in an android phone are explained as well as the advantages and future scope. This paper demonstrates how the application is used and details about the architecture of the LAN with android phone are given. The problem of security and authorization is also addressed in the paper stating how the application created is accessible only to an authorized person. The current market scenario makes it necessary to handle the workload in the company/workplace located at different locations from one single location. This is possible by using the application developed and a detailed framework is given in this paper. We describe what features are in the scope of the software and what are not in the scope of the software developed. The software will control and monitor the LAN network from our wireless handheld device i.e. cell phone from anywhere irrespective of distance. Keywords:- LAN, framework, android,handheld device, scope I. INTRODUCTION At our workplaces many computers are connected together and form a network. Normally this network is monitored through a central monitoring server. This is similar to the client-server architecture. In this application the central server is further connected to an android phone. The machines connected in the network are clients and the android phone becomes our administrator as the monitoring is going to be done through this android phone only. The whole system is WIFI enabled. Mobile phone needs to have its WIFI and internet enabled and perfectly working to be able to establish connection with the central server. There are various features given in the application developed. This project is loaded in the android phone and whenever the administrator wants to carry out any monitoring activity he needs to open the application in phone and use the features as per need. So whenever administrator wants to know what is happening at the workplace and wants to know the activities being carried on the machines, this application is ready to help him. II. PREVIOUS SYSTEMS IN USE There has been a lot of technical research in monitoring of wireless networks. The changes in the market of information technology with the gradual enlargement of IT firms have made it even more competitive to develop solid user friendly softwares for network monitoring. 2.1 Network Monitoring In Schools/Colleges In the college and school laboratories the monitoring is done through a central server. The machines are connected either wireless or wired way with the server. The administrator sits at the server and controls the activities. The basic information about the machines in the network like the machine names is displayed. We have normally observed that the administrators in colleges disable the USB ports on all machines. Whenever there is a new machine in the network the server gets informed and similarly when there is a USB device being connected. It does not notify when a new machine is entered or the personal gazettes like smart phones and laptops. A continuous monitoring has to be carried out making this a loophole from security and efficiency point of view. 2.2 GSM Based Monitoring For Lan In this system it control and monitor the LAN network from our email i.e. internet, from anywhere irrespective of distance. Say, you have a LAN setup at your office. Sitting at home you want to learn the LAN status. You can do so by your cell phone and executing the same. In this system Administrator sends his request through SMS using his phone via GSM modem to the server. Server then recognizes the client machine which administrator is supposed to monitor and extract data from locally cached data buffer where latest 15 sec data of every machine is updated or stored and sends this info to the administrator as response. Server sends command to the clients like start process, shutdown process, kill Process, create, delete, send task list, and compile code. 23

Through the GSM service provider the communication is done with the GSM modem which communicates with the server and the server communicates with the client. All clients are controlled and monitored by administrator via a series of SMS. 2.3 Email Based LAN Monitoring This email based LAN monitoring project aims to develop various network utilities which are required to effectively monitor a LAN network. It aims to develop an integrated software solution that allows a network administrator to remotely monitor his LAN network by his email account. In a concern, computers are grouped together to form a network. To manage and control the activities of the network while in office is an easy task. But, while you are outstation / away from office, how do you go about with monitoring and controlling of network? Instead of depending on third party information, you can always have your cell phones with internet i.e. email serve the purpose. Login anytime to the application and see who is busy with what in the office 2.4 Monitoring Using Sniffers The wireless monitoring system consists of a set of devices which we call sniffers, to observe traffic characteristics on the wireless medium. A wireless monitoring system can be set up and put into operation without any interference to existing infrastructure, e.g. end hosts and network routers. In fact wireless monitoring can be performed without any interaction with the existing network, and hence is completely independent of the operational network. More importantly, wireless monitoring exposes the characteristics on the wireless medium itself so that we can infer the PHY/MAC characteristics. Thus wireless monitoring allows us to examine physical layer header information including signal strength, noise level and traffic characteristics of the flowing data in the network. III. BASIC ARCHITECTURE The client side has a central client, one central server and one android phone. The clients are connected in WIFI creating a WLAN. Server is connected to the central client side. The connection establishment between android phone and server is done through basic socket programming. Operating environment of the software is Android. But client machine and server machine involved in the operation may have any windows based operating system (windows XP onwards).the application developed using java as java provides wide options for creating articulate GUIs. Network Buddy- WLAN Monitoring Local Title Network Sends Command-> <- Client Responds Client 1 Server Machine With Static IP Server running Client 2 Client 3 Administrator is provided with various GUI Screens in android to monitor Local Network Machine through Server Machine From Remote Place Client 4 Fig 1. Architecture diagram of application system 24 Features 1. View Client List 2. View Process List 3. Kill/Activate/Launch New Process 4. Shutdown Remote machine 5. Send Remote messages 6. View/Compile/Create New Files

3.1 User Classes and Characteristics 1. General users: These types of users can be client. They can communicate among themselves. They cannot modify or delete content of another computer. 2. Admin: Admin is the user who can monitor complete LAN system using cell phone. 3. Server program: this is the communication medium between the server and clients. 3.2 Processing of request from phone to network The feature which is selected by the admin on phone, a HTTP request is sent from the phone in URL form and received by the server. This same HTTP request is read and encoded and sent further to the client. The client reads this URL message and extracts the command name and other required parameters. The command is executed on the particular machine to which the server sent the URL to. The URL from phone contains the IP address of central server and its port number. In client-server connection we normally use 9977 for server port and 9988 as client port. The ports for clients are kept common i.e. 9988. URL from phone to server is written in the java code which is at the server side. The client side will only have the client-server connection code. url 1 : url from phone to server : http:// <ip address of server><port no> url 2 : from server to client : http://<ip address of client>/<port no of client/?method=method_name&parameter value=val; android phone option selcted.http request sent server request accepted. http encoded client command extracted command executed Fig 4. Flow of http request Fig 4. Diagram showing sequence of activities after user launches the application 25

3.2 Features controlled from cell phone: 1. Net View: Get in your cell phone, the list of entire client s in LAN. Keep pinging every time to check the latest status of the PC s. Anytime, the PC goes offline, its name is removed from the list. 2. Activate Process: Activate different processes in either the server machine or any of the client s. 3. Kill Process: Kill the desired processes in either the server or clients. 4. Read: You can read the drives, folders, files of any of the client machines/ the server machine from cell. 5. Open File: A small text file residing in any of the client or the server machine can be opened in your cell phone. 6. Compile & Execute: Compile and execute java programs. Get the acknowledgement in cell phone. 7. Chatting: You can establish half-duplex chat between clients, server and cell phone. 8. Broadcast messages: Broadcast messages to clients, Server from cell. 9. New File: Create a new document in the cell phone and save the same in either the server or client machine. 10. Shut Down the client machines from mobile Fig 3. Behavioral diagram of system. IV. SECURITY AND PROTECTION OF NETWORK While WLANs were once used to offer network access to guests or employees in common areas, they are now often extended to reach every laptop and desktop in the enterprise. What's more, they also support both corporate and personal smart phones and tablets, as well as embedded Wi-Fi devices, such as copy machines and surveillance cameras. With all these users and clients, network managers must implement granular WLAN access control and network authorization. The application in the android phone protects and secures the network. Only the phone whose no matches the database record already provided in the server side will be connected to the server. Thus a random phone cannot access the network. The use of no provides a high level security as the no for every phone is unique. No one can forge or fake this no. Also the database has only selected no provided by the authorized member of the company or workplace. Other requirements that have been fulfilled such as: 1. Extensibility: Allows new component to the system, replaces the existing once. This is done without affecting that component those are in their original place. 2. Compatibility: Compatibility is the measure with which user can extend the one type of application with another. The presentation tool is compatible with any type of Operating system. Because of this its usability is highly flexible. 26

V. CONCLUSION 1. The Network Monitoring: WLAN monitoring Software will be able to identify different clients connected in a network and will be able to monitor them through a mobile phone irrespective of distance. This will reduce the workload on network administrator to great extent. This project makes it possible to support even the personal smart phones, laptops in the vicinity of LAN in use. 2. Concurrent working on the same process, but one on the machine and the other through the android cell phone we are using. REFERENCES [1]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless Sensor Networks: A Survey, Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. [2]. T. Gao, D. Greenspan, M. Welesh, R.R. Juang, and A. Alm, Vital Signs Monitoring and Patient Tracking over a Wireless Network, Proc. IEEE 27th Ann. Int l Conf. Eng. Medicine and Biology Soc. (EMBS), Sept. 2005. [3]. http://archive.itmanagementnews.com/itmanagementnews5420060301thetopfivelansecurityissues Fac ing ITManagersToday.html. [4]. Covkun and Ardam, A Remote Controller for Home and Office Appliances By Telephone, IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, NOVEMBER 1998. [5]. W.-T. Leung, D. L. Lee, and W.-C. Lee, Personalized web search with location preferences, in Proc. of IEEE ICDE Conference, 2010. [6]. Dinesh C. Verma, Simplifying Network Administration Using Policy-Based Management, IEEE Network, March/April 2002. [7]. Allen Householder, Kevin Houle, and Chad Dougherty, Computer Attack Trends Challenges Internet security, IEEE Security and Privacy 2002 [8]. Evangelos P. Markatos, Dionisios N. Pnevmatikatos, Web-Conscious Storage Management for Web Proxies, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, NO. 6, DECEMBER 2002. [9]. Ninghui Li and John C. Mitchell, Securing Java RMI-based Distributed Applications, Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 04). [10]. L. Deri, ncap: Wire-speed Packet Capture and Transmission, IEEE 2005. [11]. Mamata Bhamare, Tejashree Malshikare, Renuka Salunke, Priyanka Waghmare, GSM Based LAN Monitoring and Controlling, International Journal of Modern Engineering Research (IJMER), Vol.2, Issue.2, Mar-Apr 2012 pp-387-389 ISSN: 2249-6645. 27