Project_Paper

advertisement
International Journal of Research In Science & Engineering
Volume: 1 Issue: 1
e-ISSN: 2394-8299
p-ISSN: 2394-8280
TITLE: “Advance LAN Monitoring And Remote Access Through
Android Phone.”
Megha Kandharkar, Mahesh Pharande, Priya Gupta
1
Bachelor of Engineering, Computer Engg, Pad.DYPIEMR, kandharkar.megha@gmail.com
2
Bachelor of Engineering, Computer Engg, Pad.DYPIEMR, mpharande100@gmail.com
3
Bachelor of Engineering, Computer Engg, Pad.DYPIEMR, priyagupta@gmail.com
ABSTRACT
This paper proposes a system that can control and access the remotely located LAN network from an Android cell
phone no matter whatever the distance may be and we can access it from anywhere. Android is a smart device and
using that smart device we are achieving our goals and actually smart phones becomes a human need now days.
Computer access in the personal presence is an easy task, but while you are away from it, then to monitor and
controlling of it instead of depending on third party information you can always have your cell phone to serve the
purpose. Just login to the application and do your task what you intend to do. This project provides maximum
control to the admin, when he/she is away from its workstation/goes out of station at that time he/she can work from
there. In this project we access a LAN using smart phones as like PC shut-down, software installation, process
killing, file access and pend-drive detection and many more things as well. Admin has top most priority in our
model and he is the main user as well. Android mobile is connected to server using application. Using smart phone
we are reducing lots of work load and tasks becomes much easy and relevant for operating the LAN. Computer has a
unique application as well for connecting a mobile device to the system as and it contains a database as well. As we
said Android phones are becoming a necessity of human so we can make something that can useful to the peoples
who use their brains along with smart device.
Keywords: Android ,Wireless, Remote Access ,WLAN, Internet .
1.INTRODUCTION
At our organizations many computers are connected together and form a network. Normally this networks is
monitored through a central monitoring server. This is nearly similar to the client-server architecture. In this
application the central server is connected to an android cell phone. The machines connected in the network are
clients and the android cell phone becomes our administrator as the handling LAN PC's . Mobile phone needs to
have its internet enabled and perfectly working to be able to establish connection an with the central server. There
are various features proposed in the developing of this application. This application is loaded in the android phone
and whenever the administrator wants to monitor any activity he needs to just open the application in phone and
use the features as per needs. So whenever an administrator wants to know what is happening at the workplace and
wants to know the activities being carried out on the machines, this application is ready to help him. This project is
database oriented. So whenever administrator wants to know what all activities is carried out he comes to know by
the machine registry information and the process information is also stored.
2. SOFTWARE RESOURCES REQUIRED
2.1 Java Platform
A platform is the combination of hardware or software in which a program runs. We have already defined some of
the most popular platforms like Windows 2000, Linux, Solaris, and Mac-OS. Most of these platforms can be
described as a combination of the operating system with hardware. The Java platform differs from most other
platforms in that its a only a software platform that use on top of other type of hardware-based platforms. The Java
platform has mainly two components as:
1. The Java Virtual Machine (Java VM).
2. The Java Application Programming Interface (Java API)
IJRISE| www.ijrise.org|editor@ijrise.org
International Journal of Research In Science & Engineering
Volume: 1 Issue: 1
e-ISSN: 2394-8299
p-ISSN: 2394-8280
2.2 Virtual Machine
Java is multi operational language as compiled and an interpreted language. Java source file is turned into normal
binary instructions, much like simple microprocessor machine code. However, where as C or C++ source is
available to native instructions for a exact model of processor, Java source is compiled into a global format
instructions .Compiled Java byte-code, also called J-code, is executed by a Java run time interpreter. The run time
application performs all the normal activities of a normal processor, but it does so
in a exact and virtual environment. It performs the stack based instruction set and manages a storage. It creates and
manipulates primitive data types, and loads and invokes newly referenced blocks of code. Most importantly, it does
all this in acordance with a strictly denied open specification that can be implemented by a person who wants to
produce a virtual machine. Together, the virtual machine and language dentition provide a complete structure. There
are no features of Java left implementation-dependent. For example, Java species the sizes of all its primitive data
types, rather than leave it up to each implementation. The Java interpreter is combination of lightweight and small
activity it can be implemented in whatever form is desirable for a particular platform. On many systems, the
interpreter is written in a faster, actively compiled language like C and C++. The interpreter can be run as a separate
application, or it can be embedded in another piece of software, such as a web browser. All of this means that Java
code is implicitly portable. The same Java application varies byte code according to platforms that provides a Java
run time environment. You don’t have to produce alternative versions of your application for different platforms,
and you don’t have to distribute source code to end users.
2.3 Application programming interface (API):
An application programming interface (API) is a software program that gives interaction with other software
programs. An API allows a programmer to interact with an application using a collection of callable functions. The
goal of an API is to allow programmers to write programs that will not cease to function if the underlying system is
upgraded. Think of an API as the set the interface that sets out the rules dealing with a software component. When
properly designed, the underlying software can be continually upgraded without breaking other software that
depends on it. An API can be general or specific. The full set of a general API is bundled in the libraries of a
programming language. With a specific API a specific term is meant to deal with a specific problem.
An API is language dependent or independent:
Language Dependent: This means it is only available by using the syntax and elements of a particular language,
making it more convenient to use.
Language Independent: This means the API is written to be called from several programming languages.
3. ARCHITECTURE
In a LAN monitoring using android phone we are connecting a mobile to the server using Internet/Wi-Fi system to
achieve the goals. Android device will send the request to the server machine and server response has been
made.Android phone when connected to server functionality of model are in a working mode and we can able to
operate a LAN using Android mobile phone. As a smart phones are portable so we can access the LAN from
anywhere in anytime.LAN has a multiple pcs and we are accessing those using mobile connected to serever.Using
mobile we can ready to use the data as like a process,active windows and software installations as well.Server sends
the commands for working a activity connected to mobile phone. Admin can operate the LAN from Remote
locations as well and performs the tasks.On mobile phone using application we connect to system and does the
operations according to our need. We can perform or implement various operations like view, kill process, file
transferring, Process view and message broadcasting.
IJRISE| www.ijrise.org|editor@ijrise.org
International Journal of Research In Science & Engineering
Volume: 1 Issue: 1
e-ISSN: 2394-8299
p-ISSN: 2394-8280
Fig1:Architecture Diagram
4. ENCRYPTION ALGORITHMS
Used for performing encryption on data by certain mathematical procedures. Through the use of these algorithms an
meaningful information is converted to meaningless cipher text and requires the use of a key to revert back to its
original form. AES RC4, RC5, and RC6,Blowfish are some of the example.
4.1 RC6 (Rivest cipher 6)
RC6 is a fully parameterized family of encryption algorithms. A version of RC6 is more accurately specified as
RC6-w/r/b where the word size is w bits, encryption consists of a positive number of rounds r, and b denotes the
length of the encryption key in bytes.
4.2 SPEKE
SPEKE (Simple Password Exponential Key Exchange) is a cryptographic method for password-authenticated key
agreement. It is one of the well-known protocols in the relatively new field of password-authenticated key
exchange. The SPEKE protocol consists of a little more than a Diffie-Hellman key exchange where the DiffieHellman generator g is created from a hash of the password. So by this we can say that this paper can provide user
(administrator) a maximum usability for handling and controlling the network in robust and secure manner.
5. APPLICATION MODULES
1. Net View: Get in your email, the list of entire client's in LAN. Keep pinging every time to get the latest status of
your PC's. Anytime, the PC goes off line, its name is removed from the list.
2. Process List: To get the list of all the processes running in the remote machine.
3. Activate Process: Activate different processes in either the server machine or in the client's machine.
IJRISE| www.ijrise.org|editor@ijrise.org
International Journal of Research In Science & Engineering
Volume: 1 Issue: 1
e-ISSN: 2394-8299
p-ISSN: 2394-8280
4. Kill Process: Kill the desired processes in either the server or clients.
6. Open Application: We can open any application installed on remote system.
7. Broadcast messages: Broadcast messages to clients.
8. Shut Down: the client machines through Mobile
9. Restart: the client machines through Mobile.
10. Logoff: the client machines through Mobile.
11. Screen Shots: Gives screen shots of the desktop of the selected client machine on Server Machine.
12. Remote Silent software Installation.
13. Video Interfacing: After some interval of time student can view videos of staff lecture using Web Portal &
Mobile.
14. Security using Eaack : for secure data communication we have introduced secured data communication using
Eaack Method.
6. CONCLUSION
The LAN Monitoring Software would help to identify the different clients connected in a network and will be able
to monitor them through a mobile phone. By this the workload of network administrator will get reduce to a greater
extent. The earlier systems consists of technologies like SMTP protocols or GSM module which has dependencies.
In this paper we are proposing a approach to which it will maximize control over the connected network. Use of a
mobile device is unique functionality provided and algorithms used for the security of the data over the network.
This project makes it possible to support even the laptops, personal smart phones in the vicinity of LAN in use.
Concurrent working on the same process, but one on the machine and the other through the android cell phone we
are using. This paper contributes for IT Administrators to control any computer that are remotely present in the
network, allowing them to solve the problems faster. Network monitoring can be useful in applications such as
university, college, offices and malls. The application also helps one to monitor his own Personal Computer when
he/she is away from the workstation. We can conclude that android based is reliable and efficient from previously
developed systems.
ACKNOWLEDGEMENT
Every project big or small is successful largely due to the effort of a number of wonderful people who have always
given their valuable advice or lent a helping hand. We sincerely appreciate the inspiration; support and guidance of
all those people who have been instrumental in making this project a success.
We would also like to thank all the faculty members of DYPIEMR for their critical advice and guidance without
which this project would not have been possible.
Last but not the least we place a deep sense of gratitude to my family members and my friends who have
been constant source of inspiration during the preparation of this project work.
IJRISE| www.ijrise.org|editor@ijrise.org
International Journal of Research In Science & Engineering
Volume: 1 Issue: 1
e-ISSN: 2394-8299
p-ISSN: 2394-8280
REFERENCES
[1] G.V. Kondraske, R. A. Volz, D. H. Johnson, D. Tesar, J. C. Trinkle, and C. R. Price, "Network-based
infrastructure for distributed remote operations and robotics research," Robotics and Automation, IEEE
Transactions on, vol. 9, pp. 702-70.
[2] V. J. Harward, J. A. del Alamo, S. R. Lerman, P. H. Bailey, J. Carpenter, K. DeLong, C. Felknor, J. Hardison, B.
Harrison, I. Jabbour, P. D. Long, M. Tingting, L. Naamani, J. Northridge, M. Schulz, D. Talavera, C.
Varadharajan, W. Shaomin, K. Yehia, R. Zbib, and D. Zych, "The iLab Shared Architecture: A Web Services
Infrastructure to Build Communities of Internet Accessible Laboratories," Proceedings of the IEEE, vol. 96, pp.
[3] Chen, "A Constructivist Approach to Teaching: Implication in Teaching computer Networking," Information
Technology, Learning, and Performance Journal, vol. 21, pp. 17-27, 931-950, 2008.
Dr. Khanna SamratVivekanand Omprakash, “Concept of Remote controlling PC with Smartphone Inputs from
Remote place with internet”, International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 2, Issue 1, January 2012.
[4] R.Manikandasamy , "REMOTE DESKTOP CONNECTION USING MOBILE PHONE", International Journal
of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 8, August 2013
[5] Archana Jadhav, "VNC ARCHITECTURE BASED REMOTE DESKTOP ACCESS THROUGH ANDROID
MOBILE PHONES", International Journal of Advanced Research in Computer and Communication Engineering
Vol. 1, Issue 2, April 2012
[5] International Journal of Innovative Research in Computer and Communication Engineering (An ISO
3297: 2007 Certified Organization) Vol. 2, Issue 2, February 2014
IJRISE| www.ijrise.org|editor@ijrise.org
Download