Seminar Report Rakesh
-
Upload
ajin-chathannoor -
Category
Documents
-
view
118 -
download
8
Transcript of Seminar Report Rakesh
COLLEGE OF ENGINEERING, ATTINGAL
THIRUVANANTHAPURAM-695101KERALA
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
SEMINAR REPORTOn
“Enhancing LAN Using Cryptography And Other Modules”
Submitted by
Rakesh T(12093822)
vII SEMESTER COMPUTER SCIENCE AND ENGINEERING2010-2011
1
COLLEGE OF ENGINEERING, ATTINGAL
THIRUVANANTHAPURAM-695101KERALA
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
2010-2011
Certificate
Certified that this is the bonafide report of the
seminar work
entitled ” Enhancing LAN Using Cryptography And
Other Modules “ submitted by its successful completion during
the Seventh semester of academic year 2010-2011 in partial
fulfillment of the requirements for the award of the degree of
Bachelor of Technology in Computer science and Engineering by
Cochin University of Science and Technology, in year 2011.
Head of Department: Seminar Guide:
Mrs.Suma L.S Mrs.Leena Silvester
Senior Lecturer Lecture in Computer
Dept of Computer Science and Engineering Science and Engineering
2
ACKNOWLEDGEMENT
First and foremost we thank God Almighty for giving us
Strength ,blessings and determination for the completion of the
seminar named ‘Enhancing LAN Using Cryptography And Other
Modules’. The satisfaction that accompanies that the successful
completion of any task would be incomplete without the mention of people
whose ceaseless cooperation made it possible, whose constant guidance
and encouragement crown all efforts with success.
It gives me immense pleasure to thank the
Principal Prof. Bhadran V, college OF Engineering Attingal for all his
support and encouragement. I also express my heartfelt gratitude to
Mrs.Suma L.S, Head of Department of Computer Science for her immense
inspiration and encouragement, I also extend my gratitude and thanks to
Mrs.Leena Silvester ,my seminar guide for her advice and support
rendered to me.
Last but not the least, I thank my parents, friends and all others for their
moral support and help they have given me.
RAKESH T
3
CONTENTS
1 INTRODUCTION
2 MODULES
i. Process Management
ii. Monitoring
iii. Desktop capturing
iv. Remote processing
v. File Transfer
vi. Wakeon lan
vii. GPS in system management
3 ARCHITECTURE
4 HARDWARE REQUIREMENTS
5 MAGIC PACKET
6 GLOBAL POSITIONING SYSTEM
7 FUTURE ENHANCEMENTS
8 CONCLUSION
4
9 REFERENCES
INTRODUCTION
The ‘Enhancing LAN Using Cryptography And
Other Modules’ suggests important ways to remove the
shortcomings of the present network management systems. It
allows the administrator to gain more control over remote machine
on the network. The network is used to its full potential. The
proposed system is implemented in .net. It has the following
modules. Each of the modules addresses some key feature of the
network. Modules includes process management ,
monitoring ,desktop capturing ,remote processing ,file
transfer ,chatting, wakeon lan and a GPS receive r for user system
management. Our project have the following advantages over
existing systems.
Security of data : Protection of data during their transmission
over a collection of interconnected network by using
cryptography.
Faster and Better Communication–When our requirement is
to communicate with any of the colleagues sitting in the same
organization and not with any of the personal friends then why
to communicate over the congested network of thousands of
computers called Internet instead of exploiting the features of
high speed Local Area Network which already exists in almost
5
all enterprises and institutions.
Timely and Assured Transfers–For tasks such as general
notifications the broadcasting feature is hundred times faster
than a peon circulating the notices to all employees. Networks
are not just for data transfers anymore. Data transfer can be
used in the following, not only interesting but also productive
ways.
System management-Here we use the GPS receiver for time
synchronization through which the administrator can shut down
the user system.
6
MODULES
Different modules include:
1. Process Management
2. Monitoring
3. Desktop capturing
4. Remote processing
5. File Transfer
6. Wakeon lan
7. GPS in system management
1. Process Management
This section consists of Scan all computers in the Network,
View the list of processing, View the list of software installed in the
client machines, Performance data of networked machines (free
disk space, processor utilization etc.), View the list of System
events, Firing of a trigger on the occurrence of any event on any
machine. To find out the user connected to any machine.
2. Monitoring
This section is used to verify the connected clients with the
server and also view al the processes running on them.
7
3. Desktop Capturing
Desktop sharing software works by sending packets of
information from a host computer to a remote computer describing what's
on the host computer's screen at any given time. The encrypted data
travels over the Internet. Some data arrives as image files (JPEGs and
GIFs), while others arrive as individual pixels assigned to a particular X
and Y coordinate. Desktop sharing software is smart enough to only send
information updates on the sections of the screen that have changed and to
compress the data significantly, minimizing the amount of necessary
bandwidth.This section is used to capture the screen of a connected client
and save that screen in the server.
4.Remote Processing
This is used to view all the process running on a client machine and
the server can kill the process from the list. It can log off and shut down
the remote clients.
5. File Transfer
This is used to upload the files from a client to server and download
shared files from the server. The files will be encrypted using
cryptographic method by DES algorithm. This ensures that during a file
8
transfer a hacker cannot take the data, even if he manages to get it, it will
be in encrypted form. File Transferring can only happen with the
knowledge of the administrator in case of a confidential file , if anyone
else try to take a copy of the file it will be notified to the administrator and
this function enhances the security of the firm.
6.Wakeon LAN
Wake on LAN is implemented using a special network message called a
magic packet.The magic packet contains the MAC address of the
destination computer.The listening computer waits for a magic packet
9
addressed to it and then initiates system wake up.The magic packet is sent
on the data link layer or layer 2 in the OSI model and broadcast to all NICs
using the network broadcast address; the IP address is not used. This is
why Wake on LAN is platform independent. Any application, on any
platform, can wake up computers running on any other platform.
It is a common misconception that because Wake on LAN is built
upon broadcast technology it can only be used within the current network
subnet.While this is generally the case there are some exceptions inorder
for wake on LAN to work,parts of the network interface need to stay
on.This consumes standby power,much less than normal operating
power.If wake on Lan is not needed,disabling it may reduce power
consumption slightly while the computer is switched off but still plugged
in. By using this module, administrator can wakeup the system that is
shutdowned by the user.WakeOnLan discovers all other computers in
LAN,and enables the admin to wake them.
7.GPS in system management
In the proposed system, The GPS receiver outputs UTC
(Coordinated Universal Time) date and time of day in the transmitted
data. After the initial position fix,the
date and time of day are calculated using GPS satellite
information and are synchronized with the one-pulse-per-second
output, the client computers in the network can receive the information at
a correct time that the server had sent, GPS time sychronisation also
prevents misuse of client machines after the office time, by providing a
10
warning to the client who uses it without permission from administrator
and notifying the administrator about the user.
Architecture
11
DES ALGORITHM
Hardware Requirements
I. A GPS RECEIVER
II. Must have an ATX 2.01(or above) – compliant power supply and an ATX motherboard with a WOL connector.
12
III. PCI 2.2 compliant network adapter card.
IV. BIOS support for Wake on LAN power up
Magic Packet
The magic packet is a broadcast frame containing anywhere within
its payload 6 bytes of all 255 (FF FF FF FF FF FF in hexadecimal),followed
by sixteen repetitions of the target computer’s 48-bit MAC address.Since
the magic packet is only scanned for the string above and not actually
parsed by a full protocol stack,it may be sent as any network and transport
layer protocol,although it is typically sent as a UDP datagram to port 7 or
9,or directly over Ethernet.
A standard magic packet has the following basic limitations:
a. Requires destination computer MAC address(also may require a
SecureOn password)
b. Does not provide a delivery confirmation
c. May not work outside of the local network
d. Requires hardware support of wake on LAN on destination computer
The wake on LAN implementation is designed to be very simple and to be
quickly processed by the circuitry present on the Network Interface
Card(NIC) with minimal power requirement.Because wake on LAN
operates below the protocol layer the MAC address is required and makes
IP addresses and DNS names meaningless[7].
13
Fig 1. Magic Packet Architecture [ref 4]
GLOBAL POSITIONING SYSTEM
GPS (Global Positioning System) is a satellite navigation system
to determine accurate location and time. It was developed by the
U.S. Department of Defense, and is widely used today for both navigation
and time synchronization. The satellites are owned by the Department of
Defense, paid for by U.S. tax dollars, and reception of satellite signals is
available for public use
ClockWatch Star Sync GPS time synchronization works by using a GPS
receiver that is connected to your computer.
How does Star Sync get the time from the GPS?
The GPS receiver outputs UTC (Coordinated Universal Time) date
and time of day in the transmitted data. After the initial position fix,
the date and time of day are calculated using GPS satellite
information and are synchronized with the one-pulse-per-second
output. The highly accurate one-pulse-per second output is provided to
Star Sync from the Garmin GPS35. The signal is generated after the
initial position fix has been calculated and continues until power
14
down. This rising edge of the signal is synchronized to the the start
of each GPS second. The information transmitted to Star Sync is
referenced to the pulse immediately preceding the NMEA 0183 RMC
sentence. Beagle Software specially configures the Garmin GPS35
so that this pulse is usable by the Star Sync software.
GPS receivers integrate a radio and a navigation computer and can receive
the faint, twenty-watt signals coming from the satellites. The computer
uses these signals to calculate the distance between the satellites and the
receiver. With this information, the computer can further calculate the
position and velocity of the receiver. The number of satellites visible to a
receiver constantly varies between four and eleven according to time and
location. Each satellite broadcasts a number of unique spread-spectrum
codes, but only one, the Coarse Acquisition (C/A) code, is easily accessible
for civilian use. The C/A in orbit 11,000 miles above earth, GPS satellites
transmit at twenty watts a number of unique spread-spectrum code. The
number of satellites visible to a GPS receiver constantly varies between
four and eleven according to time and location. Code is effectively a timing
signal synchronized to an international time standard-Universal
Coordinated Time (UCT). UCT is kept by a world-wide ensemble of cesium
and hydrogen maser frequency standard atomic docks. The highest-quality
GPS receivers measure the C/A code to better-than- nanosecond
precision.
15
Fig 2 : GPS receiver receiving signal from GPS satellite [ref 2]
16
FUTURE ENHANCEMENTS
Video conferencing
Video conferencing will be included to provide a lot of more add-ons to the enhancement system. This will enable the administrator to video conference with multiple users at the same time, which is useful in case of organizing a conference. The users will be able to video conference with each other which reduces the time required for them to get from their cabin to another in case of a doubt occurring during a team project.
Extending to WAN
Currently the enhancement is done only in a LAN system but in future it can be implemented to WAN. This help a organization or firm having more than one office to coordinate their work easily. For example a meeting comprising of the officials from all branches of the firm can be done using video conferencing which lessens the time. Also data can be send/ received between the offices more securely.
Use advanced cryptographic algorithms[3DES]
The present system uses the DES algorithm but in future will be using the 3DES algorithm for cryptography which will further improve the security.
17
CONCLUSION
The administrator can have complete control over all activity
done by his subordinates. By encryption of data/ files security can be
enhanced. User system can be managed by admin even if it is shutdown.
We can use satellite timing system and to develop an network application
(both client and server) that can be used to synchronize the system time of
client computers connected to the network with the GPS time.
18
REFERENCES
1. www.ntp-time-server.com
2. www.edu-observatory.org/gps
3. http://en.wikipedia.org/wiki/Wake-on-LAN
4. http://www.codeproject.com/KB/IP/WOL.aspx
5. http://en.wikipedia.org/wiki/Data_Encryption_Standard
19