Wireless Survillence system

download Wireless Survillence system

of 45

Transcript of Wireless Survillence system

  • 8/9/2019 Wireless Survillence system

    1/45

    WIRELESS SURVILLENCE

    SYSTEM

  • 8/9/2019 Wireless Survillence system

    2/45

    1. INTRODUCTION

    This Project is all about to provide easily affordable security system for an

    office or house or bank or any important room where you want to have security byconnecting IR Transmitter and Receiver at the entrance of the room. If there is any

    interruption, application (PC connected with USB modem) will send SMS to concern

    person, keyboard, and also server will be started for transmitting the video to the mobile.

    After receiving the SMS, concern person can view the live video from the GPRS enabled

    Mobiles. And also, we can take the snapshots of the video recorded through web cam in

    the GPRS enabled Mobiles.

    This application designed for capturing images and displaying them on GPRS-

    capable device. It consists of servlets that runs on a computer with a webcam. The main

    intention behind developing this project is to capture images recorded through webcam

    and displaying them on GPRS enabled Mobile. By using this project we can monitor

    offices, super markets, school, and traffic from our mobile device.

    2.

    AIM OF THE PROJECTThis Project is all about providing easy affordable security system for a office or

    house or bank or any important place where you want to have security by connecting IR

    Transmitter and Receiver at the entrance of the room. If anytime, the IR Rays are cut,

    The PC is intimated about the same. Immediately, an SMS is sent to the owner of the

    setup regarding the instruction such that the owner can open the application in his cell

    and view the snapshots of the happenings. Also, an alarm is activated at the PCs end to

    alert the people around regarding happenings.

  • 8/9/2019 Wireless Survillence system

    3/45

    This project is intended to:

    o Take the snapshots of the happening through webcam.o Store these snapshots as images in the PC. Images can be stored in formats

    subjected to the particular format.o Upload these captured images to specific IP address through the internet for later

    view through mobile devices.

    o View snapshots through a mobile. This application allows the mobile user totrack the activities happening at a particular location.

    o Now, one can take further actions on the happenings simultaneously in the GPRSenabled Mobiles.

    3. TECHNICAL DETAILS

    GPRS Streaming is an Internet browser application developed with the main

    intention to view the live events taking place at a site wherever the webcam will be

    focusing, through a GPRS enabled Mobile. It gives user the high quality images with

    much less (General Packet Radio Service)GPRS or Universal Mobile Telecommunication

    System(UMTS) traffic, so the communication with the web will not be a cost problem at

    todays GPRS or UMTS rates. As security is a critical factor for the business and at many

    places, so everyone who utilizes this application can get to know that the events

    happening at a particular location with just a mobile from a remote location. This

    package uses a user friendly GUI so that the people can use it with utmost ease.

    In this project, Ir Tx passes rays continuously to receiver, will in turn is

    connected at the top of the entrance of the door and will be connected to the PC which

    has webcam and internet connection. If there is no interruption between the transmitter

    and receiver, the receiver will receive rays continuously, and this will be monitor by the

    PC continuously. If any obstruction occurs there, the passage of rays will be

    disconnecting, and that will be detected by the hardware connected to the PC. If there is

  • 8/9/2019 Wireless Survillence system

    4/45

    any obstruction, the webcam will start capturing the snapshots and simultaneously the

    sms will be sent to corresponding person.

    To view the live events happening at a site we need to connect to the PCwith which the webcam is connected and the server part of this application should be

    running there in. Next we can start the client part loaded in the mobile and we need to

    specify the PC to be connected by passing its IP address where in the server part should

    be running.. We can choose view webcam option to see the live. So we can connect to

    any location or the PC through this application which must fulfill the requirements

    specified above.

    4. LITERATURE SURVEY

    4.1..NET Framework

    The .NET Framework is an integral Windows component that supports building

    and running the next generation of applications and XML Web services. The key

    components of the .NET Framework are the common language runtime and the .NET

    Framework class library, which includes ADO.NET, ASP.NET, and Windows Forms.

    The .NET Framework provides a managed execution environment, simplified

    development and deployment, and integration with a wide variety of programming

    languages.

    4.1.1. Overview of the .NET Framework

    The .NET Framework is a new computing platform that simplifies applicationdevelopment in the highly distributed environment of the Internet. The .NET Framework

    is designed to fulfill the following objectives:

  • 8/9/2019 Wireless Survillence system

    5/45

    y To provide a consistent object-oriented programming environment whether objectcode is stored and executed locally, executed locally but Internet-distributed, or

    executed remotely.

    y To provide a code-execution environment that minimizes software deploymentand versioning conflicts.

    y To provide a code-execution environment that guarantees safe execution of code,including code created by an unknown or semi-trusted third party.

    y To provide a code-execution environment that eliminates the performanceproblems of scripted or interpreted environments.

    y To make the developer experience consistent across widely varying types ofapplications, such as Windows-based applications and Web-based applications.

    y To build all communication on industry standards to ensure that code based on the.NET Framework can integrate with any other code.

    The .NET Framework has two main components: the common language runtime

    and the .NET Framework class library. The common language runtime is the foundation

    of the .NET Framework. You can think of the runtime as an agent that manages code at

    execution time, providing core services such as memory management, thread

    management, and remoting, while also enforcing strict type safety and other forms of

    code accuracy that ensure security and robustness. In fact, the concept of code

    management is a fundamental principle of the runtime. Code that targets the runtime is

    known as managed code, while code that does not target the runtime is known as

    unmanaged code. The class library, the other main component of the .NET Framework, is

    a comprehensive, object-oriented collection of reusable types that you can use to develop

    applications ranging from traditional command-line or graphical user interface (GUI)

    applications to applications based on the latest innovations provided by ASP.NET, such

    as Web Forms and XML Web services.

    The .NET Framework can be hosted by unmanaged components that load the

    common language runtime into their processes and initiate the execution of managed

    code, thereby creating a software environment that can exploit both managed and

  • 8/9/2019 Wireless Survillence system

    6/45

    unmanaged features. The .NET Framework not only provides several runtime hosts, but

    also supports the development of third-party runtime hosts.

    Internet Explorer is an example of an unmanaged application that hosts the

    runtime (in the form of a MIME type extension). Using Internet Explorer to host the

    runtime enables you to embed managed components or Windows Forms controls in

    HTML documents. Hosting the runtime in this way makes managed mobile code (similar

    to Microsoft ActiveX controls) possible, but with significant improvements that only

    managed code can offer, such as semi-trusted execution and secure isolated file storage.

    The following illustration shows the relationship of the common language runtime

    and the class library to your applications and to the overall system. The illustration also

    shows how managed code operates within a larger architecture.

    4.1.2..NET Framework in context

    The following sections describe the main components and features of the .NET

    Framework in greater detail.

  • 8/9/2019 Wireless Survillence system

    7/45

    4.2. Features of the Common Language Runtime

    The common language runtime manages memory, thread execution, code

    execution, code safety verification, compilation, and other system services. These

    features are intrinsic to the managed code that runs on the common language runtime.

    With regards to security, managed components are awarded varying degrees of

    trust, depending on a number of factors that include their origin (such as the Internet,

    enterprise network, or local computer). This means that a managed component might or

    might not be able to perform file-access operations, registry-access operations, or other

    sensitive functions, even if it is being used in the same active application.

    The runtime enforces code access security. For example, users can trust that an

    executable embedded in a Web page can play an animation on screen or sing a song, but

    cannot access their personal data, file system, or network. The security features of the

    runtime thus enable legitimate Internet-deployed software to be exceptionally featuring

    rich.

    The runtime also enforces code robustness by implementing a strict type-and-

    code-verification infrastructure called the common type system (CTS). The CTS ensures

    that all managed code is self-describing. The various Microsoft and third-party language

    compilers generate managed code that conforms to the CTS. This means that managed

    code can consume other managed types and instances, while strictly enforcing type

    fidelity and type safety.

    In addition, the managed environment of the runtime eliminates many common

    software issues. For example, the runtime automatically handles object layout and

    manages references to objects, releasing them when they are no longer being used. Thisautomatic memory management resolves the two most common application errors,

    memory leaks and invalid memory references.

    The runtime also accelerates developer productivity. For example, programmers

    can write applications in their development language of choice, yet take full advantage of

  • 8/9/2019 Wireless Survillence system

    8/45

    the runtime, the class library, and components written in other languages by other

    developers. Any compiler vendor who chooses to target the runtime can do so. Language

    compilers that target the .NET Framework make the features of the .NET Framework

    available to existing code written in that language, greatly easing the migration process

    for existing applications.

    While the runtime is designed for the software of the future, it also supports

    software of today and yesterday. Interoperability between managed and unmanaged code

    enables developers to continue to use necessary COM components and DLLs.

    The runtime is designed to enhance performance. Although the common language

    runtime provides many standard runtime services, managed code is never interpreted. A

    feature called just-in-time (JIT) compiling enables all managed code to run in the native

    machine language of the system on which it is executing. Meanwhile, the memory

    manager removes the possibilities of fragmented memory and increases memory locality-

    of-reference to further increase performance.

    Finally, the runtime can be hosted by high-performance, server-side applications,

    such as Microsoft SQL Server and Internet Information Services (IIS). This

    infrastructure enables you to use managed code to write your business logic, while stillenjoying the superior performance of the industry's best enterprise servers that support

    runtime hosting.

    4.3. NET Framework Class Library

    The .NET Framework class library is a collection of reusable types that tightly

    integrate with the common language runtime. The class library is object-oriented,

    providing types from which your own managed code can derive functionality. This notonly makes the .NET Framework types easy to use, but also reduces the time associated

    with learning new features of the .NET Framework. In addition, third-party components

    can integrate seamlessly with classes in the .NET Framework.

  • 8/9/2019 Wireless Survillence system

    9/45

    For example, the .NET Framework collection classes implement a set of

    interfaces that you can use to develop your own collection classes. Your collection

    classes will blend seamlessly with the classes in the .NET Framework.

    As you would expect from an object-oriented class library, the .NET

    Framework types enable you to accomplish a range of common programming tasks,

    including tasks such as string management, data collection, database connectivity,

    and file access. In addition to these common tasks, the class library includes types

    that support a variety of specialized development scenarios. For example, you can

    use the .NET Framework to develop the following types of applications and services:

    Console applications.

    y Windows GUI applications (Windows Forms).y ASP.NET applications.y XML Web services.y Windows services.

    For example, the Windows Forms classes are a comprehensive set of reusable types

    that vastly simplify Windows GUI development. If you write an ASP.NET Web Form

    application, you can use the Web Forms classes.

    4.4. Client Application Development

    Client applications are the closest to a traditional style of application in Windows-

    based programming. These are the types of applications that display windows or forms on

    the desktop, enabling a user to perform a task. Client applications include applications

    such as word processors and spreadsheets, as well as custom business applications such

    as data-entry tools, reporting tools, and so on. Client applications usually employ

    windows, menus, buttons, and other GUI elements, and they likely access local resources

    such as the file system and peripherals such as printers.

    Another kind of client application is the traditional ActiveX control (now replaced

    by the managed Windows Forms control) deployed over the Internet as a Web page. This

  • 8/9/2019 Wireless Survillence system

    10/45

    application is much like other client applications: it is executed natively, has access to

    local resources, and includes graphical elements.

    In the past, developers created such applications using C/C++ in conjunction with

    the Microsoft Foundation Classes (MFC) or with a rapid application development (RAD)

    environment such as Microsoft Visual Basic. The .NET Framework incorporates

    aspects of these existing products into a single, consistent development environment that

    drastically simplifies the development of client applications.

    The Windows Forms classes contained in the .NET Framework are designed to be

    used for GUI development. You can easily create command windows, buttons, menus,

    toolbars, and other screen elements with the flexibility necessary to accommodate

    shifting business needs.

    For example, the .NET Framework provides simple properties to adjust visual

    attributes associated with forms. In some cases the underlying operating system does not

    support changing these attributes directly, and in these cases the .NET Framework

    automatically recreates the forms. This is one of many ways in which the .NET

    Framework integrates the developer interface, making coding simpler and more

    consistent.

    Unlike ActiveX controls, Windows Forms controls have semi-trusted access to a

    user's computer. This means that binary or natively executing code can access some of

    the resources on the user's system (such as GUI elements and limited file access) without

    being able to access or compromise other resources. Because of code access security,

    many applications that once needed to be installed on a user's system can now be safely

    deployed through the Web. Your applications can implement the features of a local

    application while being deployed like a Web page.

    4.5. Server Application Development

    Server-side applications in the managed world are implemented through runtime

    hosts. Unmanaged applications host the common language runtime, which allows your

  • 8/9/2019 Wireless Survillence system

    11/45

    custom managed code to control the behavior of the server. This model provides you with

    all the features of the common language runtime and class library while gaining the

    performance and scalability of the host server.

    The following illustration shows a basic network schema with managed code

    running in different server environments. Servers such as IIS and SQL Server can

    perform standard operations while your application logic executes through the managed

    code.

    ASP.NET is the hosting environment that enables developers to use the .NET

    Framework to target Web-based applications. However, ASP.NET is more than just a

    runtime host; it is a complete architecture for developing Web sites and Internet-

    distributed objects using managed code. Both Web Forms and XML Web services use IIS

    and ASP.NET as the publishing mechanism for applications, and both have a collection

    of supporting classes in the .NET Framework.

    XML Web services, an important evolution in Web-based technology, are

    distributed, server-side application components similar to common Web sites. However,

    unlike Web-based applications, XML Web services components have no UI and are not

    targeted for browsers such as Internet Explorer and Netscape Navigator. Instead, XML

    Web services consist of reusable software components designed to be consumed by other

    applications, such as traditional client applications, Web-based applications, or even

    other XML Web services. As a result, XML Web services technology is rapidly moving

    application development and deployment into the highly distributed environment of the

    Internet.

  • 8/9/2019 Wireless Survillence system

    12/45

    If you have used earlier versions of ASP technology, you will immediately notice

    the improvements that ASP.NET and Web Forms offer. For example, you can develop

    Web Forms pages in any language that supports the .NET Framework. In addition, your

    code no longer needs to share the same file with your HTTP text (although it can

    continue to do so if you prefer). Web Forms pages execute in native machine language

    because, like any other managed application, they take full advantage of the runtime. In

    contrast, unmanaged ASP pages are always scripted and interpreted. ASP.NET pages are

    faster, more functional, and easier to develop than unmanaged ASP pages because they

    interact with the runtime like any managed application.

    The .NET Framework also provides a collection of classes and tools to aid in

    development and consumption of XML Web services applications. XML Web servicesare built on standards such as SOAP (a remote procedure-call protocol), XML (an

    extensible data format), and WSDL (the Web Services Description Language). The .NET

    Framework is built on these standards to promote interoperability with non-Microsoft

    solutions.

    For example, the Web Services Description Language tool included with the

    .NET Framework SDK can query an XML Web service published on the Web, parse its

    WSDL description, and produce C# or Visual Basic source code that your application can

    use to become a client of the XML Web service. The source code can create classes

    derived from classes in the class library that handle all the underlying communication

    using SOAP and XML parsing. Although you can use the class library to consume XML

    Web services directly, the Web Services Description Language tool and the other tools

    contained in the SDK facilitate your development efforts with the .NET Framework.

    If you develop and publish your own XML Web service, the .NET Framework

    provides a set of classes that conform to all the underlying communication standards,

    such as SOAP, WSDL, and XML. Using those classes enables you to focus on the logic

    of your service, without concerning yourself with the communications infrastructure

    required by distributed software development.

  • 8/9/2019 Wireless Survillence system

    13/45

  • 8/9/2019 Wireless Survillence system

    14/45

    Developers can use Web Forms or XML Web services when creating an

    ASP.NET application, or combine these in any way they see fit. Each is supported by the

    same infrastructure that allows you to use authentication schemes; cache frequently used

    data, or customizes your application's configuration, to name only a few possibilities.

    y Web Forms allow you to build powerful forms-based Web pages. When buildingthese pages, you can use ASP.NET server controls to create common UI

    elements, and program them for common tasks. These controls allow you to

    rapidly build a Web Form out of reusable built-in or custom components,

    simplifying the code of a page.

    y An XML Web service provides the means to access server functionality remotely.Using XML Web services, businesses can expose programmatic interfaces to theirdata or business logic, which in turn can be obtained and manipulated by client

    and server applications. XML Web services enable the exchange of data in client-

    server or server-server scenarios, using standards like HTTP and XML messaging

    to move data across firewalls. XML Web services are not tied to a particular

    component technology or object-calling convention. As a result, programs written

    in any language, using any component model, and running on any operating

    system can access XML Web services.

    4.7. C-SHARP (C#) LanguageThis project has been implemented using C# language which is entirely new language. It

    resembles Java and C++ in syntax, but there is no migration path from Java or C++. C#

    is an elegant, modern language that is ideal for creating the next generation of business

    applications.

    C# is actually far more similar than Java. Though the syntax is different, C# uses the .Netclass library and are supported by the CLR (Common Language Runtime). And it

    supports a language feature called operator overloading.

  • 8/9/2019 Wireless Survillence system

    15/45

    4.7.1. Main Features of C#

    Simple

    1. Pointers are missing in C#.2. Unsafe operations such as direct memory manipulation are not allowed.

    3. In C# there is no usage of "::" or "->" operators.

    4. Since its on .NET, it inherits the features of automatic memory management and

    garbage collection.

    5. Varying ranges of the primitive types like Integer, Floats etc.

    6. Integer values of 0 and 1 are no longer accepted as Boolean values. Boolean values are

    pure true or false values in C# so no more errors of "="operator and "=="operator.

    "==" is used for comparison operation and "=" is used for assignment operation.

    Modern

    1. C# has been based according to the current trend and is very powerful and simple for

    building interoperable, scalable, robust applications.

    2. C# includes built in support to turn any component into a web service that can be

    invoked over the Internet from any application running on any platform.

    Object Oriented

    1. C# supports Data Encapsulation, inheritance, polymorphism, interfaces.

    2. (int, float, double) are not objects in java but C# has introduces structures (structs)

    which enable the primitive types to become objects

  • 8/9/2019 Wireless Survillence system

    16/45

    Type safe

    1. In C# we cannot perform unsafe casts like convert double to a Boolean.

    2. Value types (primitive types) are initialized to zeros and reference types (Objects andClasses are initialized to null by the compiler automatically.

    3. Arrays are zero base indexed and are bound checked.

    4. Overflow of types can be checked.

    Interoperability

    1. C# includes native support for the COM and windows based applications.2. Allowing restricted use of native pointers.

    3. Users no longer have to explicitly implement the unknown and other COM interfaces,

    those features are built in.

    4. C# allows the users to use pointers as unsafe code blocks to manipulate your old code.

    5. Components from VB NET and other managed code languages and directly be used in

    C#.

    Scalable and Updatable

    1. .NET has introduced assemblies, which are self-describing by means of their manifest.

    Manifest establishes the assembly identity, version, culture and digital signature etc.

    Assemblies need not to be register anywhere.

    2. To scale our application we delete the old files and updating them with new ones. No

    registering of dynamic linking library.

    3. Updating software components is an error prone task. Revisions made to the code can

    effect the existing program C# support versioning in the language. Native support for

    interfaces and method overriding enable complex frame works to be developed and

    evolved over time.

  • 8/9/2019 Wireless Survillence system

    17/45

  • 8/9/2019 Wireless Survillence system

    18/45

    Object: Supports all classes in the .NET Framework class hierarchy and provides low-

    level services to derived classes. This is the ultimate base class of all classes in the .NET

    Framework; it is the root of the type hierarchy.

    Array: Provides methods for creating, manipulating, searching, and sorting arrays,

    thereby serving as the base class for all arrays in the common language runtime

    Buffer: Manipulates arrays of primitive types.

    Console: Represents the standard input, output, and error streams for console

    application. This class cannot be inherited

    Delegate: Represents a delegate, which is a data structure that refers to a static methodor to a class instance and an instance method of that class.

    Event Args: Event Args is the base class for classes containing event data.

    Exception: Represents errors that occur during application execution.

    Execution Engine Exception: The exception that is thrown when there is an internal

    error in the execution engine of the common language runtime. This class cannot be

    inherited.

    4.8.3. System.Net namespace

    The System.Net namespace provides a simple programming interface for many of

    the protocols used on networks today. The WebRequest and WebResponse classes form

    the basis of what are called pluggable protocols, an implementation of network services

    that enables you to develop applications that use Internet resources without worrying

    about the specific details of the individual protocols. Some of the Classes provided by

    this Namespace hierarchy are;

    Authentication Manager: Manages the authentication modules called during the client

    authentication process.

  • 8/9/2019 Wireless Survillence system

    19/45

    Authorization: Contains an authentication message for an Internet server

    Cookie: Provides a set of properties and methods used to manage cookies. This class

    cannot be inherited.

    Global Proxy Selection: Contains a global default proxy instance for all HTTP request

    Http Version: : Defines the HTTP version numbers supported by the HttpWebRequest

    and HttpWebResponse classes

    HttpWeb Request: Provides an HTTP-specific implementation of the WebRequest class

    HttpWeb Response: Provides an HTTP-specific implementation of the WebResponse

    class.

    Ipaddress: Provides an Internet Protocol (IP) address

    NetworkCredential: Provides credentials for password-based authentication schemes

    such as basic, digest, NTLM, and Kerberos authentication.

    ServicePoint: Provides connection management for HTTP connections.

    Socket Permission: Controls rights to make or accept connections on a transport address

    (i) System.IO NamespaceThe System.IO namespace contains types that allow reading and writing to files and data

    streams, and types that provide basic file and directory support. Some of the Classes

    provided by this Namespace hierarchy are:

    IOException: The exception that is thrown when an I/O error occurs.

    BinaryReader: Reads primitive data types as binary values in a specific encoding.

  • 8/9/2019 Wireless Survillence system

    20/45

    BinaryWriter: Writes primitive types in binary to a stream and supports writing strings

    in a specific encoding

    Stream: Provides a generic view of a sequence of bytes

    BufferedStream: Adds a buffering layer to read and write operations on another stream.

    This class cannot be inherited

    File: Provides static methods for the creation, copying, deletion, moving, and opening of

    files, and aids in the creation of FileStream objects.

    FileInfo: Provides instance methods for the creation, copying, deletion, moving, and

    opening of files, and aids in the creation of FileStream objects

    FileStream: Exposes a Stream around a file, supporting both synchronous and

    asynchronous read and write operations.

    Path: Performs operations on String instances that contain file or directory path

    information. These operations are performed in a cross-platform manner

    5. EXISTING SYSTEM

    The upgrade process updates the existing system software with new versions, but

    does not remove any data from users' home directories. The existing partition structure on

    your hard drives does not change. Your system configuration changes only if a package

    upgrade demands it. Most package upgrades do not change system configuration, but

    rather install an additional configuration file for you to examine later.

    File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to

    exchange files between computers on the Internet. Like the Hypertext Transfer Protocol

    (HTTP), which transfers displayable Web pages and related files, and the Simple Mail

  • 8/9/2019 Wireless Survillence system

    21/45

    Transfer Protocol (SMTP), which transfers e-mail, FTP is an application protocol that

    uses the Internet's TCP/IP protocols.

    FTP is commonly used to transfer Web page files from their creator to the

    computer that acts as their server for everyone on the Internet. It's also commonly used to

    download programs and other files to your computer from other servers.

    6. PROPOSED SYSTEM

    The light we see with our eyes is really a very small portion of what is

    called the "Electromagnetic Spectrum." The Electromagnetic Spectrum includes all types

    of radiation - from the X-rays used at hospitals, to radio waves used for communication,

    and even the microwaves you cook food with.

    Although infrared radiation is not visible, humans can sense it - as heat.

    Put your hand next to a hot oven if you want to experience infrared radiation "first-hand!

    If you have an infrared transceiver, but Infrared Devices does not appear

    in Device Manager, you do not have an infrared device installed. Radiation in the

    Electromagnetic Spectrum is often categorized by wavelength. Short wavelength

    radiation is of the highest energy and can be very dangerous - Gamma, X-rays

    and ultraviolet are examples of short wavelength radiation. Longer wavelength

    radiation is of lower energy and is usually less harmful - examples include

    radio, microwaves and infrared. A rainbow shows the optical (visible) part of

    the Electromagnetic Spectrum and infrared (if you could see it) would be

    located just beyond the red side of the rainbow.

    In the past several years, the use of Webcams and network based camera

    systems has permeated, and even inspired, businesses, corporations, government

    agencies, educational institutes, and news agencies worldwide. There has also been an

    exponential surge in home-based private and public Internet cameras. Using the

    powerful search engine on EarthCam.com, you can discover the many ways we

  • 8/9/2019 Wireless Survillence system

    22/45

    communicate, collaborate and observe locations all over the world using Webcam

    technology. An extension of EarthCam, the WebCamStore provides a showcase of

    Internet camera technology and demonstrates the extent that Webcams can be used to

    provide views of construction, landmarks, traffic, weather, and people. Learn how

    Internet camera technology can work for you while exploring multitudes of specialized

    IP camera systems. It may seem overwhelming at first, so please take some time to

    review this introduction to Webcam applications and technology and learn exactly how

    the "World Watches the World".

    7. SYSTEM ANALYSIS

    Analysis involves the requirement determination and specification.

    Basically it involves establishing requirements for all system elements and then mapping

    these requirements to software forms. It should address such issues as:

    Profile of people who are operating on the system. Database on which the software is going to function. Hardware on which the software is going to function. Existing system problems.

    Analysis encompasses requirements getting at system level with small,

    amount of top-level design. The data obtained from the requirement determination phase

    are documented in Software requirement Specifications (SRS) document. During

    analysis, a great deal of relatively unstructured data is collected through procedural

    manuals and through websites.

    The traditional approach is to organize and convert the data through

    system flowcharts, which support future developments of the system and simplify

    communications with the users. But the system flowcharts represent a physical system

  • 8/9/2019 Wireless Survillence system

    23/45

    and simplify communication with users. But the system flowcharts represent the physical

    system rather than logical system.

    It makes it difficult to distinguish between what happens and how it

    happens in the system. Because of this drawback it is necessary to have something, which

    is analogous to the architects blueprint as a starting point for the design. It is the way to

    focus on the functions rather than physical implementation.

    7.1. IR Based Video Transmission

    7.1.1. Description

    IR Based Video Transmission is an application-designed for security of

    any places like office, home, etc. By using web cam, capturing the images of specified

    places where IRTransmitter connected, and transferring that videos to GPRS enabled

    mobile. By using this project we can monitor Offices, school, from any of the internet

    connected PC.

    IR Transmitter, which will pass rays continuously to receiver, will be

    connected top the entrance of the door and will be connected to the PC which has web

    cam and internet connection. If there is no interruption between the transmitter and

    receiver, the receiver will receive rays continuously, and this will be monitoring

    continuously by the application running in PC. If there is any obstruction occurs, the

    passages of rays will be disconnecting, and that will be detected by the application. If

    there is any obstruction, simultaneously, web cam will start recording, and sms will be

    sent to corresponding person.

    If the concern person receives the sms once, he can view the live captured

    images from the GPRS enabled Mobile, he can take snapshot.

    This application designed for capturing images and displaying them on

    GPRS capable device. It consists of servlets that runs on a computer with a web cam. The

  • 8/9/2019 Wireless Survillence system

    24/45

    main intention behind developing this project is to capture images of video recorded

    through web cam and displaying them on GPRS enabled Mobile. By using this project

    we can monitor Offices, super markets, school, and traffic from our mobile device. We

    can take snapshot while monitoring and we can save that to our mobile device.

    On the server side, we should run the application, which will continuously

    monitor the IR. Once if it finds any obstruction it will send sms to the concern person.

    After getting the sms, he should launch to the application to view the live

    video. First we have to select the View web cam, we can see the live status of any place.

    It will display the grabbed video from web cam to the display window. From that video

    we can take snapshots and save than images in mobile device by selecting save option.

    Secondly, we want to view the snapshots by selecting the option view

    image. It will display the images we taken from the video and saved.

    7.1.2. Client

    yTake the snapshot of video recorded through web cam by connecting through webcam by connecting to the server.

    y Save the images taken by the clienty The images are delivered according to each client capabilities (image size) on the

    Client.

    y The server modules retrieve the images from the webcam and sends to the clientfor display.

    y View images: You can see a list of saved images; you can visualize them.

  • 8/9/2019 Wireless Survillence system

    25/45

    7.1.3. Server

    The Server module connects the IR hardware at the entrance of the room and also

    to pc where the server application is running. Web cam also connected to the server pc

    through the JMF (java media framework) which in turn connects the web cam for getting

    the images the images will be displayed for each and every specified delay seconds.

    First Monitoring IR.java program will be executed in the server side. It will

    continuously monitor the IR, if it finds any obstruction it will send sms, start the tomcat

    server for transmission of the video to the mobile. While running the tomcat server, the

    settings window will appear. User can choose the delay in milliseconds (the amount of

    time between grabbing two consecutive images from the web camera). Press OK, and a

    new window will show up. For the moment, the window is blank; it will display the

    grabbed images when at least one client is active.

    7.2. Viewing images cell phone with security

    7.2.1. Description

    The main intention is to view the live images taking place at a sitewherever the web cam will be focusing, through a GPRS enabled Mobile. It gives user

    the high quality images with much less (General Packet Radio Service) GPRS or

    Universal Mobile Telecommunication System (UMTS) traffic, so the communication

    with the web will not be a cost problem at todays GPRS or UMTS rates. As security is a

    critical factor for the business and at many places, everyone who utilizes this application

    can get to know the events happening at a particular location with just a mobile from a

    remote location.

    In this project, Ir Tx passes rays continuously to receiver, will in turn is

    connected at the top of the entrance of the door and will be connected to the PC which

    has web cam and internet connection. If there is no interruption between the transmitter

    and receiver, the receiver will receive rays continuously, and this will be monitor by the

  • 8/9/2019 Wireless Survillence system

    26/45

    PC continuously. If any obstruction occurs there, the passage of rays will be

    disconnecting, and that will be detected by the hardware connected to the PC. If there is

    any obstruction, the web cam will start recording the video and simultaneously the sms

    will be send to corresponding person.

    8. FUNCTIONAL REQUIREMENTS

    This project has been developed using ASP.Net as the front-end tool and

    MS access as back-end tool. C# is used for interfacing ASP.Net and MS access. It also

    involves the use of IIS (Internet Information Server) for running the application and

    ADO.Net Technology is used for managing application with the server and the database.

    The functional requirements are given below:

    8.1. Software Requirements

    Server Side

    p Microsoft Visual Studio .NET 2005p Internet Information Server (IIS)p Microsoft Office Access 2003p Internet Explorer 6.0p Microsoft Windows XP Professional

    Client Side

    p Microsoft Windows Familyp Internet Explorer or Mozilla Firefox or Any other browser

  • 8/9/2019 Wireless Survillence system

    27/45

    8.2. Hardware Requirements

    Server Side

    p 1.8 GHz or better CPUp 256 MB or better RAMp 2 GB of free disk space

    Client Side

    p A good compatible PCp GPRS enabled image.

    8.3. Architectural design

    IR BASED VIDEO TRANSMISSION

    PC with dial-up

    Connection and

    USB Modem.

    +5v

    GPRS Enabled

    Mobile Phone.

    PPI

    MicroController

    PIC16F87

    7404

    NOTIR Rx

    IR TX

    555

  • 8/9/2019 Wireless Survillence system

    28/45

    A Parallel /LPT1 port is basically used for the operation of a printer. Other

    than a printer, a parallel port can be also be used for simple interfacing applications.

    A parallel port has 12 output lines and 5 input lines, some of which are

    inverted, hence parallel port, cannot be used as it is for other demanding application other

    than a printer. Hence the need for an interface card connected to parallel port which can

    handle ample number of inputs and outputs.

    The present design of interface card connected to parallel port can handle

    24 bit input or output, which is sufficient for most interfacing applications. The heart of

    this interface card is programmable peripheral interface PPI chip8255. Intel developed

    8255 PPI. This interface card has three 8-bit ports, which can be individually

    programmed as input or output. Hence we can program the ports to provide 24 bit input

    or 24 bit output or combination of both.

    Device driver software is used as a translator between parallel ports 8255

    PPI. The device driver P8255. The device driver bridges the incompatibilities of the

    signals between the parallel port and 8255 PPI.

    The signal levels of interface card is TTL compatible, hence it can be used

    both for TTL as well as CMOS interfacing. The outputs of interface card are capable of

    sinking 2mA of current. Hence suitable buffering should be provided for high current

    sinking applications.

  • 8/9/2019 Wireless Survillence system

    29/45

  • 8/9/2019 Wireless Survillence system

    30/45

    9. IMPLEMENTATION

    BLOCK DIAGRAM:

    Server

    MOBILE(GPRS

    Enabled)

    WEBCAM

    MF

    IR

    TX

    IR

    RX

    Interface

  • 8/9/2019 Wireless Survillence system

    31/45

    9.1. IR BASED VIDEO TRANSMISSION

    __ GPRS enabled

    Cell phone Article

    PC withDial-up

    connection

    USB Modem

    PPI

    Micro

    Controller(PIC16F873)

    7404NOT IR Rx

    IR Tx

    555

  • 8/9/2019 Wireless Survillence system

    32/45

    10. SYSTEM DESIGN

    Design is a multi-step process that focuses on, software architecture, data

    structure, procedural details and interfaces between the modules. The design process also

    translates the requirement into the representation of the software that can be assessed for

    quality before coding begins.

    Software design methodology changes continually as new methods; better

    analysis and broader understanding evolve. Software design is at relatively early stage in

    its evolution. Therefore, software design methodology lacks the depth, flexibility, and

    quantitative nature that is normally associated with more classical engineering

    disciplines. However, techniques for software design leads the three technical activities

    Design, Code, Testing that are required to build and verify software. Each activity

    transforms information in a manner that results in validation of the computer software.

    Design is the only way that we can accurately translate a customers

    requirements into a finished software product or system. Without design, risk of building

    an unstable system exists one that will fail when small changes are made, one that may

    be difficult to test.

    In this project mainly three modules has been provided. They are as follows

    y Admin module:y Ftp module:y Webcam module:y Infrared module.

  • 8/9/2019 Wireless Survillence system

    33/45

    10.1. Administrator Module

    The admin have the following option were he can view the details as below

    y The admin can see were the rays broken due to some physical interrupt.y The admin can view the images captured by the cameras.y The admin has the access to view the details of the date of images capture.

    10.2. Ftp module:File Transfer Protocol (FTP), a standard Internet protocol, is the simplest

    way to exchange files between computers on the Internet. Like the Hypertext Transfer

    Protocol (HTTP), which transfers displayable Web pages and related files, and the

    Simple Mail Transfer Protocol (SMTP), which transfers e-mail, FTP is an application

    protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web

    page files from their creator to the computer that acts as their server for everyone on the

    Internet. It's also commonly used to download programs and other files to your computer

    from other servers.

    As a user, you can use FTP with a simple command line interface (forexample, from the Windows MS-DOS Prompt window) or with a commercial program

    that offers a graphical user interface. Your Web browser can also make FTP requests to

    download programs you select from a Web page. Using FTP, you can also update (delete,

    rename, move, and copy) files at a server. You need to logon to an FTP server. However,

    publicly available files are easily accessed using anonymous FTP.

    Basic FTP support is usually provided as part of a suite of programs that

    come with TCP/IP. However, any FTP client program with a graphical user interface

    usually must be downloaded from the company that makes it

  • 8/9/2019 Wireless Survillence system

    34/45

    Client-server describes the relationship between two computer programs

    in which one program, the client program, makes a service request to another, the server

    program. Standard networked functions such as email exchange, web access and database

    access, are based on the client-server model. For example, a web browser is a client

    program at the user computer that may access information at any web server in the world.

    To check your bank account from your computer, a web browser client program in your

    computer forwards your request to a web server program at the bank. That program may

    in turn forward the request to its own database client program that sends a request to a

    database server at another bank computer to retrieve your account balance. The balance is

    returned to the bank database client, which in turn serves it back to the web browser

    client in your personal computer, which displays the information for you.

    FTP (File Transfer Protocol) is the simplest and most secure way to

    exchange files over the Internet. Whether you know it or not, you most likely use FTP all

    the time.

  • 8/9/2019 Wireless Survillence system

    35/45

    The most common use for FTP is to download files from the Internet.

    Because of this, FTP is the backbone of the MP3 music craze, and vital to most online

    auction and game enthusiasts. In addition, the ability to transfer files back-and-forth

    makes FTP essential for anyone creating a Web page, amateurs and professionals alike.

    When downloading a file from the Internet you're actually transferring the

    file to your computer from another computer over the Internet. This is why the T

    (transfer) is in FTP. You may not know where the computer is that the file is coming

    from but you most likely know its URL or Internet address.

    An FTP Client is software that is designed to transfer files back-and-forth

    between two computers over the Internet. It needs to be installed on your computer and

    can only be used with a live connection to the Internet.

    File transfers are as easy as dragging-and-dropping files from one panel to

    the other or by highlighting a file and clicking one of the direction arrows located

    between the panels.

    Additional features of the FTP Client include: multiple file transfer; the

    auto re-get or resuming feature; a queuing utility; the scheduling feature; an FTP find

    utility; a synchronize utility; and for the advanced user, a scripting utility.

    10.3. FTP

    FTP runs over TCP. It defaults to listen on port 21 for incoming

    connections from FTP clients. A connection to this port from the FTP Client forms the

    control stream on which commands are passed from the FTP client to the FTP server andon occasion from the FTP server to the FTP client. FTP uses out-of-band control, which

    means it uses a separate connection for control and data. Thus, for the actual file transfer

    to take place, a different connection is required which is called the data stream.

    Depending on the transfer mode, the process of setting up the data stream is different.

    Port 21 for control (or program), port 20 for data.

  • 8/9/2019 Wireless Survillence system

    36/45

    In active mode, the FTP client opens a dynamic port, sends the FTP server the

    dynamic port number on which it is listening over the control stream and waits for a

    connection from the FTP server. When the FTP server initiates the data connection to the

    FTP client it binds the source port to port 20 on the FTP server.

    In order to use active mode, the client sends a PORT command, with the IP and

    port as argument. The format for the IP and port is "h1,h2,h3,h4,p1,p2". Each field is a

    decimal representation of 8 bits of the host IP, followed by the chosen data port. For

    example, a client with an IP of 192.168.0.1, listening on port 49154 for the data

    connection will send the command "PORT 192,168,0,1,192,2". The port fields should be

    interpreted as p1256 + p2 = port, or, in this example, 192256 + 2 = 49154.

    In passive mode, the FTP server opens a dynamic port, sends the FTP client the

    server's IP address to connect to and the port on which it is listening (a 16-bit value

    broken into a high and low byte, as explained above) over the control stream and waits

    for a connection from the FTP client. In this case, the FTP client binds the source port of

    the connection to a dynamic port.

    To use passive mode, the client sends the PASV command to which the server

    would reply with something similar to "227 Entering Passive Mode (127,0,0,1,192,52)".

    The syntax of the IP address and port are the same as for the argument to the PORT

    command.

    In extended passive mode, the FTP server operates exactly the same as passive

    mode, however it only transmits the port number (not broken into high and low bytes)

    and the client is to assume that it connects to the same IP address that was originally

    connected to. Extended passive mode was added by RFC 2428 in September 1998.

    While data is being transferred via the data stream, the control stream sits idle.

    This can cause problems with large data transfers through firewalls which time out

  • 8/9/2019 Wireless Survillence system

    37/45

    sessions after lengthy periods of idleness. While the file may well be successfully

    transferred, the control session can be disconnected by the firewall, causing an error to be

    generated.

    The FTP protocol supports resuming of interrupted downloads using the REST

    command. The client passes the number of bytes it has already received as argument to

    the REST command and restarts the transfer. In some command line clients for example,

    there is an often-ignored but valuable command, "re-get" (meaning "get again") that will

    cause an interrupted "get" command to be continued, hopefully to completion, after a

    communications interruption.

    Resuming uploads is not as easy. Although the FTP protocol supports the APPE

    command to append data to a file on the server, the client does not know the exact

    position at which a transfer got interrupted. It has to obtain the size of the file some other

    way, for example over a directory listing or using the SIZE command.

    10.4. Webcam module

    In the past several years, the use of Webcams and network based camera systems

    has permeated, and even inspired, businesses, corporations, government agencies,

    educational institutes, and news agencies worldwide. There has also been an

    exponential surge in home-based private and public Internet cameras. Using the

    powerful search engine on EarthCam.com, you can discover the many ways we

    communicate, collaborate and observe locations all over the world using Webcam

    technology. An extension ofEarth-Cam,

    The WebCamStore provides a showcase of Internet camera technology and

    demonstrates the extent that Webcams can be used to provide views of construction,

    landmarks, traffic, weather, and people. Learn how Internet camera technology can

    work for you while exploring multitudes of specialized IP camera systems. It may seem

  • 8/9/2019 Wireless Survillence system

    38/45

    overwhelming at first, so please take some time to review this introduction to Webcam

    applications and technology and learn exactly how the "World Watches the World".

    10.4.1. Features

    From anywhere in the world using EarthCams network construction cameras,

    companies can remotely view their job sites over the Internet. We provide specific

    construction webcam solutions for some of the largest construction companies and

    developers in the world. Combined with EarthCams Control Center Software, create the

    ultimate interactive live construction cam solution to monitor, control and archive your

    job sites.

    The WebCamStore offers cost-effective personal webcam solutions to get you

    webcasting in minutes.

    Wireless solutions make it easy to wirelessly webcast high quality color images

    over the web.

    Monitor and protect your property from anywhere in the world.

    Rely on EarthCam's years of experience creating hundreds of custom solutions to

    meet the needs of our clients around the world. Our experts will listen and work closely

    with you to identify the optimum custom camera solution with services for your project

    saving you unnecessary expenses.

    10.4.2. Security Policy

    EarthCam offers the latest technology to protect the loss, misuse and alteration of

    your financial information that we obtain and will not release it to any outside

    organization. To ensure that there is no unauthorized access of your purchasing

    information, EarthCam uses the Secure Socket Layer (SSL) line in conjunction with the

    industry standards in Internet browsing: Netscape Navigator and Microsoft Internet

    Explorer. By encrypting all private information upon its submission to our site, all vital

    data collected therein is protected against unauthorized viewing and/or access.

  • 8/9/2019 Wireless Survillence system

    39/45

    A conventional 0.1 lux sensitivity tv camera with a 25mm focal length, f 2.5, 13.3

    degree telephoto lens is mounted in a weatherproof enclosure on a pole about 30 metres

    from the gate. The analogue tv signal is transmitted about 400 metres over standard

    multicore telecom cable (not coax) using video adaptors at each end to a video-to-USB

    adaptor.

    The camera enclosure is not heated so sometimes condensation on the enclosure

    window can result in the image being rather blurred.

    Also, the camera cant cope with the high contrast in illumination that results

    from bright sunlight at low angles (early morning and late evening). Similarly, in bright

    sunlight specular reflections from the river and the metal gate can play havoc with

    whatever automatic brightness control there is in the camera.

    10.5. Infrared module

    As next-generation electronic information systems evolve, it is critical that all

    people have access to the information available via these systems. Examples of

    developing and future information systems include interactive television, touch screen-

    based information, and advanced Internet programs. Infrared technology, increasingly

    present in mainstream applications, holds great potential for enabling people with a

    variety of disabilities to access a growing list of information resources. Already

    commonly used in remote control of TVs, VCRs and CD players, infrared technology is

    also being used and developed for remote control of environmental control systems,

    personal computers, and talking signs.

    For individuals with mobility impairments, the use of infrared or other wireless

    technology can facilitate the operation of information kiosks, environmental control

    systems, personal computers and associated peripheral devices. For individuals with

    visual impairments, infrared or other wireless communication technology can enable

    users to locate and access talking building directories, street signs, or other assistive

    navigation devices. For individuals using augmentative and alternative communication

    (AAC) devices, infrared or other wireless technology can provide an alternate, more

  • 8/9/2019 Wireless Survillence system

    40/45

  • 8/9/2019 Wireless Survillence system

    41/45

    wave is higher frequency and therefore shorter wavelength than the radio wave.

    Conversely, the radio wave is lower frequency and therefore longer wavelength than the

    infrared wave. Anyone who has listened to the radio while driving long distances can

    appreciate that longer wavelength AM radio waves carry further than the shorter

    wavelength FM radio waves.

    11. TESTING

    11.1. Importance of testing

    Testing is the measurement of software quality hence, one of the most important

    stages in software development. It involves executing an implementation of the software

    and its operational behavior to check that it is performing as required. One of the main

    goals of testing is to have a minimum number of test cases that will find a majority of the

    implementation errors.

  • 8/9/2019 Wireless Survillence system

    42/45

  • 8/9/2019 Wireless Survillence system

    43/45

    11.4. Black box testing

    Black box testing attempts to derive sets of inputs that will fully exercise

    all the functional requirements of a system. Here the system is a black-box whosebehavior can only be determined by studying its inputs and related outputs.

    This type of testing attempts to find errors in the following category:

    Incorrect or missing functions.

    Errors in data structures or external database access.

    Interface and performance errors.

    11.5. Test Cases

    A Test case (TC) is a set of test inputs, executions, and expected results developed for a

    particular objective.

    Fig: Black-box testing

    e

    System

    Inputs causinganomalous behavior

    utputs whichreveal the presence

    of defects

    Input Test data

    Ie

    utput test results

  • 8/9/2019 Wireless Survillence system

    44/45

    An excellent test case satisfies the following criteria

    Reasonable probability of catching an error. Does interesting things Doesnt do unnecessary things Neither too simple nor too complex Not redundant with other tests Allows isolation and identification of errors

    Test case document

    Purpose: Tests whether the administrator is able to perform various operations and

    if the operations occur correctly.

    Pre-requisite: Administrator login from his secured webpage.

    Steps:

    1) Administrator is able to see all the images that are captured from the webcamera; from his home page.

    2) Then he may intimate the concerned one to take necessary actions by viewingthe image.

    .

  • 8/9/2019 Wireless Survillence system

    45/45

    12. CONCLUSION

    From the above report it clearly shows the transfer of the data with out the wire by

    the infrared and the details of capturing the brake up of the infrared d to some physical

    interrupt in between the raise which will be capture by the camera and the transfer of the

    data. This application designed for capturing images and displaying them on J2ME-

    capable device. It consists of servlets that runs on a computer with a webcam and a J2ME

    client.