+ All Categories
Home > Documents > securit gprs

securit gprs

Date post: 08-Apr-2018
Category:
Upload: meena088
View: 219 times
Download: 0 times
Share this document with a friend
31
SSG Main Project Report 2011 1. INTRODUCTION 1.1 PREAMBLE System surveillance using GPRS is a motion detection application that monitors your home, office or any premise. This application records action triggered by motion as it happens. It’s simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is  break. At that time the mobile which is connected to the PC automatically call the owners mobile  phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a message will be sent from the mobile connected to the PC and the owner can view the live videos from home, office or any premise by following the link in the message. 1.2 TECHNOLOGY OVERVIEW AND APPLICATIONS ‘Security surveillance using gprs’ is a security system which detects any intrusion in our house or office and alerts the user wherever he is. The user can also view the live videos of the happenings in his house or office by following the link provided by the message sent from the mobile connected to the PC. 1.3 MOTIVATION  The chief motivation behind developing this model is that usually in our daily activities we come across many instances in which thieves have plundered our houses when we are not in the house. The thieves cannot be caught because we have no evidence about the theft. But using this system, we can find the thieves because the video of the intrusion is recorded. Thus we can  produce evidence for the police and for the court. 1.4 SCOPE AND OBJECTIVE This project envisages a relief to the human beings by helping them to substitute the manual work by the SSG. This is not only replacing the manual intervention but it will bring in  Department of IT University College Of Engineering, Kariavattom 1
Transcript
Page 1: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 1/31

SSG Main Project Report 2011

1. INTRODUCTION

1.1 PREAMBLE

System surveillance using GPRS is a motion detection application that monitors your home,

office or any premise. This application records action triggered by motion as it happens. It’s

simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is

 break. At that time the mobile which is connected to the PC automatically call the owners mobile

 phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a

message will be sent from the mobile connected to the PC and the owner can view the live

videos from home, office or any premise by following the link in the message.

1.2 TECHNOLOGY OVERVIEW AND APPLICATIONS

‘Security surveillance using gprs’ is a security system which detects any intrusion in our 

house or office and alerts the user wherever he is. The user can also view the live videos

of the happenings in his house or office by following the link provided by the message sent

from the mobile connected to the PC.

1.3 MOTIVATION

  The chief motivation behind developing this model is that usually in our daily activities

we come across many instances in which thieves have plundered our houses when we are not in

the house. The thieves cannot be caught because we have no evidence about the theft. But using

this system, we can find the thieves because the video of the intrusion is recorded. Thus we can

 produce evidence for the police and for the court.

1.4 SCOPE AND OBJECTIVE

This project envisages a relief to the human beings by helping them to substitute the

manual work by the SSG. This is not only replacing the manual intervention but it will bring in

  Department of IT University College Of Engineering, Kariavattom

1

Page 2: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 2/31

SSG Main Project Report 2011

saving of time, energy as well as money. There is no need of any humans in this security system.

Once the system is started all is done by itself and thus human resource is saved. This project is

to relieve the human intervention whereby we get a uninterrupted services without any loss of 

resources which is becoming a great threat to our mankind. Also we can relieve the tension of 

any thieves attacking our house once we are outside. Any intrusion will be reported by the

system and we can have a live look at our home or office.

1.4 PROBLEM STATEMENT

Our endeavor here is to design and develop a small-scale SSG. The installations include

IR emitter, IR sensor and a webcam to record the videos . This prototype is an optimal device

for understanding the techniques used in the security surveillance system. The chief functionalities that must be implemented as part of this can be enumerated as follows:-

Intrusion Detection: Any intrusion after the server is started must be detected.

User Alert: The mobile connected to the PC should send a message and also make

a call to the alert number provided

Live Streaming:The Live videos of the place under surveillance should be

available by following the link provided in the message.

The above requirements must be satisfied by the software. Our problem here is to

implement a software that incorporates the foresaid requirements.

 

1.5 CONTRIBUTIONS

We have implemented a system that is operational now. Users need to be given a user 

name and password by the administrator before they can log into the system. This is done to have

authenticated information about each user. A registered user can login every time he/she wishes

to use the system. The functioning of the software is easy to understand and is user-friendly.

The administrator is responsible for blocking or updating existing users and adding new

users.

 

  Department of IT University College Of Engineering, Kariavattom

2

Page 3: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 3/31

SSG Main Project Report 2011

 2. SYSTEM STUDY

2.1. EXISTING TECHNIQUES

The existing system is a physical system in which humans should guard an intended

 place. There is also another system in which an alarm go of when any intrusion is detected. But

this is of no use if there is nobody near the house or if it is a false alarm it might alert the

neighbors without any reason. There is also no evidence about the person who intruded into the

house.

2.2. PROPOSED SYSTEM

Security surveillance using GPRS is an application records action triggered by motion as

it happens. Whenever an intrusion occurs the system sends a signal by connecting IR to the PC.

System can detect the intrusion when the IR signal is break. At that time the mobile which is

connected to the pc automatically call the owners mobile phone. That indicates the intrusion

detection. Then the owner can disconnected the call and view live videos of intrusion

2.3. FEASIBILITY STUDY

This involves questions such as whether the firm can afford to build the system, whether 

its benefits should substantially exceed its costs, and whether the project has higher priority and

 profits than other projects that might use the same resources. Since the system is developed as

 part of project work, there is no manual cost to spend for the proposed system. Also all the

resources are already available, it give an indication of the system is economically possible for 

development.

2.3.1 ECONOMIC FEASIBILITY

  Department of IT University College Of Engineering, Kariavattom

3

Page 4: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 4/31

SSG Main Project Report 2011

This involves questions such as whether the firm can afford to build the system, whether 

its benefits should substantially exceed its costs, and whether the project has higher priority and

 profits than other projects that might use the same resources. Since the system is developed as

 part of project work, there is no manual cost to spend for the proposed system. Also all the

resources are already available, it give an indication of the system is economically possible for 

development.

2.3.2 TECHNICAL FEASIBILITY

The system is evaluated from the technical point view first. This involves questions such

as whether the technology needed for the system exists, how difficult it will be to build, and

whether the firm has enough experience using that technology. The assessment is based on an

outline design of system requirements in terms of Input, Output, Fields, Programs, andProcedures. This can be qualified in terms of volumes of data, trends, frequency of updating, etc.

in order to give an introduction to the technical system. Security Surveillance Using GPRS is

developed using java technologies.

2.3.3 OPERATIONAL FEASIBILITY

Proposed system would be beneficial if they can be turned into information system that

will meet the organization operating requirements. One of the main problems faced during

development of a new system is getting acceptance from user. The test of operational feasibility

asks if the system will work when developed and installed. The tools selected for developing the

software are J2SE which are readily / freely available in the market. It is coded in such a way

that not much change occurs while operations are done.

2.3.4 LEGAL FEASIBILITY

Determines whether the proposed system conflicts with legal requirements, e.g. a data

 processing system must comply with the local Data Protection Acts.

  Department of IT University College Of Engineering, Kariavattom

4

Page 5: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 5/31

SSG Main Project Report 2011

2. REQUIREMENT ANALYSIS & SPECIFICATION

3.1. INTRODUCTION System surveillance using GPRS is a motion detection application that monitors your 

home, office or any premise. This application records action triggered by motion as it happens.

It’s simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is

 break. At that time the mobile which is connected to the PC automatically call the owners mobile

 phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a

message will be sent from the mobile connected to the PC and the owner can view the live

videos from home, office or any premise by following the link in the message.

3.1.1. PURPOSE

   The purpose is to give an overview of our project. It provides a complete

overview of our project and also the specific requirements, functional requirements,

non functional requirements etc. which are needed to adequately design and

implement this software product. System surveillance using GPRS is a motion

detection application that monitors your home, office or any premise

3.1.2. SCOPE

(1)The scope of our project SSG is to create a flexible system for users and it is also easy to use

and modify.

(2)Features that come under the scope of our project: Intrusion Detection, Alerting User, Live

Video Streaming

  Department of IT University College Of Engineering, Kariavattom

5

Page 6: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 6/31

SSG Main Project Report 2011

3.2 GENERAL DESCRIPTION

3.2.1 PRODUCT PERSPECTIVE

In order to work this application, a computer is needed. Also a java implementing

software is needed. It also includes the possibility of expanding the system developed and the

technical guarantees of accuracy, reliability ease of access and also the data security.

3.2.2 PRODUCT FUNCTIONS

In our project SSG, we have the following modules:

• Intrusion Detection

• User Alert

• Live Video Streaming

The intrusion system detects any intrusion into the place under surveillance. The User 

Alert part alerts the intended user whenever an intrusion occurs. The Live Video

Streaming part ensures that the user can the stream the live videos of the place byfollowing the link in the message.

3.3 .SPECIFIC REQUIREMENTS

3.3.1 HARDWARE REQUIREMENTS

Hardware requirement denotes the minimum hardware required for the successful

development and implementation of the project.

The following list specifies the hardware requirements for the successful development

and implementation of the project named ‘Security Surveillance Using GPRS’.

Processor: Pentium 4 and above

RAM: 512MB

Hard Disc: 40GBMICROCONTROLLER: AT89C51

MICROCONTROLLER 

A microcontroller (sometimes abbreviated µC, uC or MCU) is a small computer on a

single integrated circuit containing a processor core, memory, and programmable input/output 

  Department of IT University College Of Engineering, Kariavattom

6

Page 7: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 7/31

SSG Main Project Report 2011

 peripherals. Program memory in the form of  NOR flash or OTP ROM is also often included on

chip, as well as a typically small amount of RAM. Microcontrollers are designed for embedded

applications, in contrast to the microprocessors used in   personal computers or other general

 purpose applications.

Microcontrollers are used in automatically controlled products and devices, such as

automobile engine control systems, implantable medical devices, remote controls, office

machines, appliances, power tools, and toys. By reducing the size and cost compared to a design

that uses a separate microprocessor, memory, and input/output devices, microcontrollers make it

economical to digitally control even more devices and processes. Mixed signal microcontrollers

are common, integrating analog components needed to control non-digital electronic systems.

Some microcontrollers may use four-bit words and operate at clock rate frequencies as

low as 4 kHz, for low power consumption (milliwatts or microwatts). They will generally have

the ability to retain functionality while waiting for an event such as a button press or other 

interrupt; power consumption while sleeping (CPU clock and most peripherals off) may be just

nanowatts, making many of them well suited for long lasting battery applications. Other 

microcontrollers may serve performance-critical roles, where they may need to act more like a

digital signal processor (DSP), with higher clock speeds and power consumption.

ATMEL AT89 SERIES

The Atmel AT89 series is an Intel 8051-compatible family of 8 bit microcontrollers 

(µCs) manufactured by the Atmel Corporation.

Based on the Intel 8051 core, the AT89 series remains very popular as general purpose

microcontrollers, due to their industry standard instruction set, and low unit cost. This allows a

great amount of legacy code to be reused without modification in new applications. While

considerably less powerful than the newer AT90 series of  AVR   RISC microcontrollers, new

 product development has continued with the AT89 series for the aforementioned advantages.

Of more recent times, the AT89 series has been augmented with 8051-cored special

function microcontrollers, specifically in the areas of  USB, I²C (two wire interface), SPI and

CAN bus controllers, MP3 decoders and hardware PWM.

AT89C51

FEATURES 

4K Bytes of In-System Reprogrammable Flash Memory

Fully Static Operation: 0 Hz to 24 MHz

Three-level Program Memory Lock 

  Department of IT University College Of Engineering, Kariavattom

7

Page 8: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 8/31

SSG Main Project Report 2011

128 x 8-bit Internal RAM

32 Programmable I/O Lines

Two 16-bit Timer/Counters

Six Interrupt Sources

Programmable Serial Channel

Low-power Idle and Power-down Modes

40-pin DIP

PIN DESCRIPTION

Pin Number Description

1 - 8 P1.0 - P1.7 - Port 1

9 RST - Reset

10 - 17 P3.0 - P3.7 - Port 3

18 XTAL2 - Crystal

19 XTAL1 - Crystal

20 GND - Ground

21 - 28 P2.0 - P2.7 - Port 2

29 PSEN - Program Store Enable30 ALE - Address Latch Enable

31 EA - External Access Enable

32 - 39 P0.7 - P0.1 - Port 0

40 Vcc - Positive Power Supply

  Department of IT University College Of Engineering, Kariavattom

8

Page 9: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 9/31

SSG Main Project Report 2011

PIN LAYOUT

SENSORS

IR SENSOR 

  Department of IT University College Of Engineering, Kariavattom

9

Page 10: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 10/31

SSG Main Project Report 2011

WEBCAM

A webcam is a video camera which feeds its images in real time to a computer or computer 

network, often via USB, Ethernet or Wi-Fi.

Their most popular use is the establishment of video links, permitting computers to act asvideophones or videoconference stations. This common use as a video camera for the WorldWide Web gave the webcam its name. Other popular uses include security surveillance and

computer vision.

Webcams are known for their low manufacturing cost and flexibility, making them the lowest

cost form of video telephony. They have also become a source of security and privacy issues, assome built-in webcams can be remotely activated via spyware.

NOKIA N86

The Nokia N86 8MP is a Symbian Series 60 mobile phone. One of its main selling points is its

 photography features

  Department of IT University College Of Engineering, Kariavattom

10

Page 11: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 11/31

SSG Main Project Report 2011

It was Nokia's first camera phone to have an 8 megapixel sensor, and features both multiple

aperture settings and a mechanical shutter (uncommon features by the standards of camera

 phones), and a Carl Zeiss lens with a wide angle of view (28 mm equivalent). It also has autofocus and a dual LED flash (3rd generation dual-LEDs), and an AF assist light. Video capture

resolution is 640 × 480 pixels (VGA) at 30 frames per second.

The N86 8MP has a toughened glass front cover and metal detailing. It is similar in specification

to the Nokia N85, with a 2.6-inch OLED display and the "dual-slider" form factor.It also has thesame kickback stand so it's possible to use as a small standalone screen, and it's possible to

configure the opening of the stand to launch applications such as the video player.

3.3.2 SOFTWARE REQUIREMENTS

Software Specification denotes the minimum support software required for the successful

development and implementation of the project.

  Department of IT University College Of Engineering, Kariavattom

11

Page 12: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 12/31

SSG Main Project Report 2011

The following list specifies the software support required for the successful development

and implementation of the project named ‘SSG’.

Technologies Used

Java 2 Standard Edition (JDK 1.6)

Windows XP

MySQL

MySQL Query Analyser 

JAVA

Java is a   programming language originally developed by James Gosling at Sun Microsystems (which is now a subsidiary of Oracle Corporation) and released in 1995 as a core

component of Sun Microsystems' Java platform. The language derives much of its syntax from C 

and C++ but has a simpler  object model and fewer  low-level facilities. Java applications are

typically compiled to bytecode (class file) that can run on any Java Virtual Machine (JVM)

regardless of computer architecture. Java is a general-purpose, concurrent, class-based, object-

oriented language that is specifically designed to have as few implementation dependencies as

 possible. It is intended to let application developers "write once, run anywhere". Java is currently

one of the most popular programming languages in use, and is widely used from application

software to web applications.

Principles

There were five primary goals in the creation of the Java language.

1. It should be "simple, object oriented, and familiar".

2. It should be "robust and secure".

3. It should have "an architecture-neutral and portable environment".

4. It should execute with "high performance".

5. It should be "interpreted, threaded, and dynamic".

Java Platform

Characteristic of Java is portability, which means that computer programs written in the

Java language must run similarly on any supported hardware/operating-system platform. This is

achieved by compiling the Java language code to an intermediate representation called Java 

 bytecode, instead of directly to platform-specific machine code. Java bytecode instructions are

  Department of IT University College Of Engineering, Kariavattom

12

Page 13: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 13/31

SSG Main Project Report 2011

analogous to machine code, but are intended to be interpreted by a virtual machine (VM) written

specifically for the host hardware. End-users commonly use a Java Runtime Environment (JRE)

installed on their own machine for standalone Java applications, or in a Web browser for Java

applets.

Standardized libraries provide a generic way to access host-specific features such as

graphics, threading, and networking.

A major benefit of using bytecode is porting. However, the overhead of interpretation

means that interpreted programs almost always run more slowly than programs compiled to

native executables would. Just-in-Time compilers were introduced from an early stage that

compile bytecodes to machine code during runtime.

MySQL

MySQL is a relational database management system (RDBMS) that runs as a server  providing multi-user access to a number of databases. It is named after developer  Michael 

Widenius' daughter, My. The SQL phrase stands for Structured Query Language.

The MySQL development project has made its source code available under the terms of 

the GNU General Public License, as well as under a variety of  proprietary agreements. MySQL

was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now

owned by Oracle Corporation.

Free-software-open source projects that require a full-featured database management

system often use MySQL. For commercial use, several paid editions are available, and offer 

additional functionality. Some open source software project examples: Joomla, WordPress,

MyBB,  phpBB, Drupal and other software built on the LAMP software stack. MySQL is also

used in many high-profile, large-scale World Wide Web products, including Wikipedia, Google 

and Facebook 

MySQL QUERY ANALYZER 

The MySQL Query Analyzer helps you improve application performance by monitoring

query performance and accurately pinpointing SQL code that is causing a slow down. With the

new MySQL Connector Plug-ins, you can optimize performance for your Java and .Net

applications more efficiently by communicating directly with the Query Analyzer.

Queries are presented in an aggregated view across all MySQL servers so you can filter 

for specific query problems and analyze your most expensive code. With the MySQL Query

  Department of IT University College Of Engineering, Kariavattom

13

Page 14: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 14/31

SSG Main Project Report 2011

Analyzer, you can improve the SQL code during active development, and continuously monitor 

and tune the queries in production.

ASSEMBLY LANGUAGE

An assembly language is a low-level programming language for  computers,microprocessors, microcontrollers, and other programmable devices. It implements a symbolic

representation of the machine codes and other constants needed to program a given CPU 

architecture. This representation is usually defined by the hardware manufacturer, and is based

on mnemonics that symbolize processing steps (instructions),  processor registers, memory

locations, and other language features. An assembly language is thus specific to a certain

 physical (or virtual) computer architecture. This is in contrast to most high-level programming 

languages, which, ideally, are portable.

A utility program called an assembler is used to translate assembly language statements

into the target computer's machine code. The assembler performs a more or less isomorphic 

translation (a one-to-one mapping) from mnemonic statements into machine instructions and

data. This is in contrast with high-level languages, in which a single statement generally results

in many machine instructions.

Many sophisticated assemblers offer additional mechanisms to facilitate program

development, control the assembly process, and aid debugging. In particular, most modern

assemblers include a macro facility and are called macro assemblers.

There are two types of assemblers based on how many passes through the source are

needed to produce the executable program.

• One-pass assemblers go through the source code once and assume that all symbols will

 be defined before any instruction that references them.

• Two-pass assemblers create a table with all symbols and their values in the first pass,

then use the table in a second pass to generate code. The assembler must at least be able

to determine the length of each instruction on the first pass so that the addresses of 

symbols can be calculated.

The advantage of a one-pass assembler is speed, which is not as important as it once was

with advances in computer speed and abilities. The advantage of the two-pass assembler is that

symbols can be defined anywhere in program source code. This lets programs be defined in more

logical and meaningful ways, making two-pass assembler programs easier to read and maintain.

3.3.3 EXTERNAL INTERFACE REQUIREMENTS

  Department of IT University College Of Engineering, Kariavattom

14

Page 15: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 15/31

SSG Main Project Report 2011

3.3.3.1.User Interfaces

-Describes how this product interfaces with the user.

-Sensors and PC.

3.3.3.2. Hardware Interface

This software can access different storage devices to access the files and to save them

after processing.

Processor: Intel Pentium Pro or Processor  

Processor speed: 2.67 GHz

RAM: 512 MB

Hard Disk Capacity: 80 GB

3.3.3.3. Software Interfaces

This software does not have any interface with other software.

Package Used: J2SE

Software Used: JDK 1.6, My SQL

Operating System: Windows XP

3.3.3.4. Communications Interfaces

Serial port

3.3.4. FUNCTIONAL REQUIREMENTS

3.3.4.1. INTRUSION DETECTION

Any intrusion after the server is started should be detected. This is done by using a IR 

emitter and IR sensor. The sensor is connected to the 8051 microcontroller which sends aninterrupt to the computer to which it is connected.

3.3.4.2. USER ALERT

  Department of IT University College Of Engineering, Kariavattom

15

Page 16: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 16/31

SSG Main Project Report 2011

Whenever there is an intrusion, the microcontroller sends an interrupt to the computer 

system. There is an alert number that the user sets. A message showing the link of the video to be

streamed and also a call is made to the alert number.

3.3.4.3. LIVE VIDEO STREAMING

The user can view the live video of the place under surveillance by following the link 

 provided in the message.

3.3.5. NON-FUNCTIONAL REQUIREMENTS

3.3.5.1. Performance

The Java programming language is an object oriented programming language. Java is a platform independent programming language developed by Sun Microsystems. In java, the code

is compiled to byte codes that are interpreted by Java virtual machines (JVM). This provides

 portability to any machine for which a virtual machine has been written. The two steps of 

compilation and interpretation allow for extensive code checking and improved security. Apart

from these, built-in exception handling strong type checking etc. make Java a truly robust

 programming language. There are mainly three variations of it - J2SE, J2ME and J2EE. J2SE is

the standard edition of Java.

3.3.5.2. Reliability

The SSG system is reliable because it creates a flexible system for Users and it is easy to

use and modify.

3.3.5.3. Availability

Our system is available all times, meaning the system controls the devices around the

clock.

 

3.3.4.5. Maintainability

Maintainability is defined as the ease with which changes can be made to a software

system. These changes may be necessary for the correction of faults, adaptation of the system to

  Department of IT University College Of Engineering, Kariavattom

16

Page 17: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 17/31

SSG Main Project Report 2011

a meet a new requirement, addition of new functionality, removal of existing functionality or 

corrected when errors or deficiencies occur and can be perfected, adapted or action taken to

reduce further maintenance costs.

3.3.4.6. PortabilityThe system is developed using the java programming language, java is a platform

independent language, so the server portion of the system can be operate in any OS.

4.SYSTEM DESIGN

  Department of IT University College Of Engineering, Kariavattom

17

Page 18: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 18/31

SSG Main Project Report 2011

  Department of IT University College Of Engineering, Kariavattom

18

Page 19: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 19/31

SSG Main Project Report 2011

4.1 DATA FLOW DIAGRAM

  Department of IT University College Of Engineering, Kariavattom

19

Page 20: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 20/31

SSG Main Project Report 2011

4.2 STATE TRANSITION DIAGRAM

5.SYSTEM IMPLEMENTATION

  Department of IT University College Of Engineering, Kariavattom

20

Page 21: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 21/31

SSG Main Project Report 2011

5.1. IMPLEMENTATION PLAN

Implementation is the stage of the project where the theoretical design is turned into a

working system. It can be considered to be the most crucial stage in achieving a successful new

system gaining the users confidence that the new system will work and will be effective and

accurate. It is primarily concerned with user training and documentation. Conversion usually

takes place about the same time the user is being trained or later. Implementation simply means

convening a new system design into operation, which is the process of converting a new revised

system design into an operational one.

5.2. TASK OF IMPLEMENTATION

 

It begins with preparing the implementation of the system. In this plan, discussion has

 been made regarding the equipment, resources and how to test the activities.

The system was implemented by a different user to verify that the system works

effectively. And is giving confidence on the new system for the use that it will work efficiently

and effectively. It involves careful planning, investigation of the current system and its

constraints on implementation, design of methods to achieve the changeover, an evaluation, of 

change over methods.

One of the most important development activities is the coding of programs. The systemflow charts are converted into modular programs. They have to be complied, tested and

debugged. The user requirements are achieved through building software be keeping in mind of 

their requirements.

6. SYSTEM TESTING

  Department of IT University College Of Engineering, Kariavattom

21

Page 22: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 22/31

SSG Main Project Report 2011

6.1. BLACK BOXTESTING

It takes an external perspective of the test object to derive test cases. These test can be

functional or non-functional, though usually functional. The test designer selects valid and

invalid inputs and determines the correct output. There is no knowledge of the test object’s

internal structure.

6.2. WHITEBOX TESTING

 

Whitebox testing uses an internal perspective of the system to design test cases based on

the internal structure. It requires programming skills to identify all path through the software.

While whitebox testing is applicable at the unit, integration and system levels of the software

testing process, it is typically applied to the unit. While it normally tests paths with in a unit, it

can also test paths between units during integration and between subsystems during a system

level test. Though this method of test design can uncover an overwhelming number of test cases,it might not detect unimplemented parts of the specification or missing requirements, but one can

 be sure that all parts through the test objects are executed.

6.3. INTEGRATION TESTING

Data can be lost across the interfaces; one module can have an adverse effect on the

other; sub functions when combined, may not produce the desired major functions. The

integration testing is a systematic testing for constructing the programs structure, while at the

same time conducting tests to uncover errors associated within the interface. The objective is to

take unit tested module and build a program structure. All the modules are combined and testedas a whole. Here correction is difficult because the vast expenses of the entire program

complicate the isolation of causes. Thus in the integration testing step, all the errors uncovered

are corrected for the next testing steps.

6.4. TESTING METHODOLOGY USED

The testing methodology used is the unit testing and validation testing. This ensures

that all the modules are worked as per we are specified. As each program is coded, test data are

 prepared and documented to ensure that all aspects of the program are properly tested. The path

of operation from origin to destination is carefully be tested, whether they are taken the right

 path. Finally, we checked whether the project is user-oriented vehicle. Finally, all error handling

 paths are tested. Validation is the final step in testing.

  Department of IT University College Of Engineering, Kariavattom

22

Page 23: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 23/31

SSG Main Project Report 2011

7. MAINTENANCE

Maintenance follows conversion to extend that changes are necessary to maintain

satisfactory operations relative to changes in the user’s environment. Maintenance often includes

minor enhancements or corrections to problems that surface in the system’s operation. Anysystem developed should be secured and protected against possible hazards It is performed most

often to improve the existing software rather than to a crisis or risk failure as user requirements

change, software and documentation should be changed as part of the maintenance work. It is

during system maintenance that the analyst.

• Resolves necessary changes

• Correct errors

• Enhances or modifies the system

Assigns staff to perform maintenance activities• Provides for scheduled maintenance

Writing systems that requires as little maintenance as possible is one of the primary goals

as well as one of the benefits of today’s modern methodology of software development.

  Department of IT University College Of Engineering, Kariavattom

23

Page 24: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 24/31

SSG Main Project Report 2011

8. SCREENSHOTS

8.1 LOGIN PAGE

  Department of IT University College Of Engineering, Kariavattom

24

Page 25: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 25/31

SSG Main Project Report 2011

8.2 HOMEPAGE

  Department of IT University College Of Engineering, Kariavattom

25

Page 26: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 26/31

SSG Main Project Report 2011

8.3 NEW USER

  Department of IT University College Of Engineering, Kariavattom

26

Page 27: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 27/31

SSG Main Project Report 2011

8.4 EXISTING USER

  Department of IT University College Of Engineering, Kariavattom

27

Page 28: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 28/31

SSG Main Project Report 2011

8.5 RECORDED VIDEO

  Department of IT University College Of Engineering, Kariavattom

28

Page 29: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 29/31

SSG Main Project Report 2011

8.6 ALERT SETTINGS

  Department of IT University College Of Engineering, Kariavattom

29

Page 30: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 30/31

SSG Main Project Report 2011

9. CONCLUSION

Security surveillance using GPRS is a motion detection application that monitors your 

home, office or any premise. This application records action triggered by motion as it happens.

It’s simple as connecting IR to the PC .The System can detect the intrusion when the IR signal is

 break. At that time the mobile which is connected to the PC automatically call the owners mobile

 phone. That indicates the intrusion detection. Then the owner can cut the call ,at that time a

message will be sent from the mobile connected to the PC and the owner can view the live

videos from home, office or any premise by following the link in the message.

We are able to provide a user friendly system for the surveillance of any place which can be

used by anyone who posess basic knowledge of computers. We are able to install this system

anywhere irrespective of house or office and provide a serious security system.

  Department of IT University College Of Engineering, Kariavattom

30

Page 31: securit gprs

8/6/2019 securit gprs

http://slidepdf.com/reader/full/securit-gprs 31/31

SSG Main Project Report 2011

10.REFERENCE

• Bunnell, D. & Brate, A. (2001). Die Cisco Story (in German). ModerneIndustrie. ISBN 3-478-35995-3.

• Bunnell, D. (2000). Making the Cisco Connection: The Story Behind the RealInternet Superpower . Wiley. ISBN 0-471-35711-1.

• Paulson, E. (2001). Inside Cisco: The Real Story of Sustained M&A Growth.Wiley. ISBN 0-471-41425-5.

• Slater, R. (2003). The Eye of the Storm: How John Chambers Steered CiscoThrough the Technology Collapse. HarperCollins. ISBN 0-06-018887-1.

• Stauffer, D. (2001). Nothing but Net Business the Cisco Way . Wiley. ISBN 1-84112-087-1.

• Waters, J. K. (2002). John Chambers and the Cisco Way: Navigating ThroughVolatility . Wiley. ISBN 0-471-00833-8.

•  Young, J. S. (2001). Cisco Unauthorized: Inside the High-Stakes Race to Ownthe Future. Prima Lifestyles. ISBN 0-7615-2775-3.


Recommended