wireless survillence system
TRANSCRIPT
-
8/9/2019 Wireless Survillence system
1/45
WIRELESS SURVILLENCE
SYSTEM
-
8/9/2019 Wireless Survillence system
2/45
1. INTRODUCTION
This Project is all about to provide easily affordable security system for an
office or house or bank or any important room where you want to have security byconnecting IR Transmitter and Receiver at the entrance of the room. If there is any
interruption, application (PC connected with USB modem) will send SMS to concern
person, keyboard, and also server will be started for transmitting the video to the mobile.
After receiving the SMS, concern person can view the live video from the GPRS enabled
Mobiles. And also, we can take the snapshots of the video recorded through web cam in
the GPRS enabled Mobiles.
This application designed for capturing images and displaying them on GPRS-
capable device. It consists of servlets that runs on a computer with a webcam. The main
intention behind developing this project is to capture images recorded through webcam
and displaying them on GPRS enabled Mobile. By using this project we can monitor
offices, super markets, school, and traffic from our mobile device.
2.
AIM OF THE PROJECTThis Project is all about providing easy affordable security system for a office or
house or bank or any important place where you want to have security by connecting IR
Transmitter and Receiver at the entrance of the room. If anytime, the IR Rays are cut,
The PC is intimated about the same. Immediately, an SMS is sent to the owner of the
setup regarding the instruction such that the owner can open the application in his cell
and view the snapshots of the happenings. Also, an alarm is activated at the PCs end to
alert the people around regarding happenings.
-
8/9/2019 Wireless Survillence system
3/45
This project is intended to:
o Take the snapshots of the happening through webcam.o Store these snapshots as images in the PC. Images can be stored in formats
subjected to the particular format.o Upload these captured images to specific IP address through the internet for later
view through mobile devices.
o View snapshots through a mobile. This application allows the mobile user totrack the activities happening at a particular location.
o Now, one can take further actions on the happenings simultaneously in the GPRSenabled Mobiles.
3. TECHNICAL DETAILS
GPRS Streaming is an Internet browser application developed with the main
intention to view the live events taking place at a site wherever the webcam will be
focusing, through a GPRS enabled Mobile. It gives user the high quality images with
much less (General Packet Radio Service)GPRS or Universal Mobile Telecommunication
System(UMTS) traffic, so the communication with the web will not be a cost problem at
todays GPRS or UMTS rates. As security is a critical factor for the business and at many
places, so everyone who utilizes this application can get to know that the events
happening at a particular location with just a mobile from a remote location. This
package uses a user friendly GUI so that the people can use it with utmost ease.
In this project, Ir Tx passes rays continuously to receiver, will in turn is
connected at the top of the entrance of the door and will be connected to the PC which
has webcam and internet connection. If there is no interruption between the transmitter
and receiver, the receiver will receive rays continuously, and this will be monitor by the
PC continuously. If any obstruction occurs there, the passage of rays will be
disconnecting, and that will be detected by the hardware connected to the PC. If there is
-
8/9/2019 Wireless Survillence system
4/45
any obstruction, the webcam will start capturing the snapshots and simultaneously the
sms will be sent to corresponding person.
To view the live events happening at a site we need to connect to the PCwith which the webcam is connected and the server part of this application should be
running there in. Next we can start the client part loaded in the mobile and we need to
specify the PC to be connected by passing its IP address where in the server part should
be running.. We can choose view webcam option to see the live. So we can connect to
any location or the PC through this application which must fulfill the requirements
specified above.
4. LITERATURE SURVEY
4.1..NET Framework
The .NET Framework is an integral Windows component that supports building
and running the next generation of applications and XML Web services. The key
components of the .NET Framework are the common language runtime and the .NET
Framework class library, which includes ADO.NET, ASP.NET, and Windows Forms.
The .NET Framework provides a managed execution environment, simplified
development and deployment, and integration with a wide variety of programming
languages.
4.1.1. Overview of the .NET Framework
The .NET Framework is a new computing platform that simplifies applicationdevelopment in the highly distributed environment of the Internet. The .NET Framework
is designed to fulfill the following objectives:
-
8/9/2019 Wireless Survillence system
5/45
y To provide a consistent object-oriented programming environment whether objectcode is stored and executed locally, executed locally but Internet-distributed, or
executed remotely.
y To provide a code-execution environment that minimizes software deploymentand versioning conflicts.
y To provide a code-execution environment that guarantees safe execution of code,including code created by an unknown or semi-trusted third party.
y To provide a code-execution environment that eliminates the performanceproblems of scripted or interpreted environments.
y To make the developer experience consistent across widely varying types ofapplications, such as Windows-based applications and Web-based applications.
y To build all communication on industry standards to ensure that code based on the.NET Framework can integrate with any other code.
The .NET Framework has two main components: the common language runtime
and the .NET Framework class library. The common language runtime is the foundation
of the .NET Framework. You can think of the runtime as an agent that manages code at
execution time, providing core services such as memory management, thread
management, and remoting, while also enforcing strict type safety and other forms of
code accuracy that ensure security and robustness. In fact, the concept of code
management is a fundamental principle of the runtime. Code that targets the runtime is
known as managed code, while code that does not target the runtime is known as
unmanaged code. The class library, the other main component of the .NET Framework, is
a comprehensive, object-oriented collection of reusable types that you can use to develop
applications ranging from traditional command-line or graphical user interface (GUI)
applications to applications based on the latest innovations provided by ASP.NET, such
as Web Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that load the
common language runtime into their processes and initiate the execution of managed
code, thereby creating a software environment that can exploit both managed and
-
8/9/2019 Wireless Survillence system
6/45
unmanaged features. The .NET Framework not only provides several runtime hosts, but
also supports the development of third-party runtime hosts.
Internet Explorer is an example of an unmanaged application that hosts the
runtime (in the form of a MIME type extension). Using Internet Explorer to host the
runtime enables you to embed managed components or Windows Forms controls in
HTML documents. Hosting the runtime in this way makes managed mobile code (similar
to Microsoft ActiveX controls) possible, but with significant improvements that only
managed code can offer, such as semi-trusted execution and secure isolated file storage.
The following illustration shows the relationship of the common language runtime
and the class library to your applications and to the overall system. The illustration also
shows how managed code operates within a larger architecture.
4.1.2..NET Framework in context
The following sections describe the main components and features of the .NET
Framework in greater detail.
-
8/9/2019 Wireless Survillence system
7/45
4.2. Features of the Common Language Runtime
The common language runtime manages memory, thread execution, code
execution, code safety verification, compilation, and other system services. These
features are intrinsic to the managed code that runs on the common language runtime.
With regards to security, managed components are awarded varying degrees of
trust, depending on a number of factors that include their origin (such as the Internet,
enterprise network, or local computer). This means that a managed component might or
might not be able to perform file-access operations, registry-access operations, or other
sensitive functions, even if it is being used in the same active application.
The runtime enforces code access security. For example, users can trust that an
executable embedded in a Web page can play an animation on screen or sing a song, but
cannot access their personal data, file system, or network. The security features of the
runtime thus enable legitimate Internet-deployed software to be exceptionally featuring
rich.
The runtime also enforces code robustness by implementing a strict type-and-
code-verification infrastructure called the common type system (CTS). The CTS ensures
that all managed code is self-describing. The various Microsoft and third-party language
compilers generate managed code that conforms to the CTS. This means that managed
code can consume other managed types and instances, while strictly enforcing type
fidelity and type safety.
In addition, the managed environment of the runtime eliminates many common
software issues. For example, the runtime automatically handles object layout and
manages references to objects, releasing them when they are no longer being used. Thisautomatic memory management resolves the two most common application errors,
memory leaks and invalid memory references.
The runtime also accelerates developer productivity. For example, programmers
can write applications in their development language of choice, yet take full advantage of
-
8/9/2019 Wireless Survillence system
8/45
the runtime, the class library, and components written in other languages by other
developers. Any compiler vendor who chooses to target the runtime can do so. Language
compilers that target the .NET Framework make the features of the .NET Framework
available to existing code written in that language, greatly easing the migration process
for existing applications.
While the runtime is designed for the software of the future, it also supports
software of today and yesterday. Interoperability between managed and unmanaged code
enables developers to continue to use necessary COM components and DLLs.
The runtime is designed to enhance performance. Although the common language
runtime provides many standard runtime services, managed code is never interpreted. A
feature called just-in-time (JIT) compiling enables all managed code to run in the native
machine language of the system on which it is executing. Meanwhile, the memory
manager removes the possibilities of fragmented memory and increases memory locality-
of-reference to further increase performance.
Finally, the runtime can be hosted by high-performance, server-side applications,
such as Microsoft SQL Server and Internet Information Services (IIS). This
infrastructure enables you to use managed code to write your business logic, while stillenjoying the superior performance of the industry's best enterprise servers that support
runtime hosting.
4.3. NET Framework Class Library
The .NET Framework class library is a collection of reusable types that tightly
integrate with the common language runtime. The class library is object-oriented,
providing types from which your own managed code can derive functionality. This notonly makes the .NET Framework types easy to use, but also reduces the time associated
with learning new features of the .NET Framework. In addition, third-party components
can integrate seamlessly with classes in the .NET Framework.
-
8/9/2019 Wireless Survillence system
9/45
For example, the .NET Framework collection classes implement a set of
interfaces that you can use to develop your own collection classes. Your collection
classes will blend seamlessly with the classes in the .NET Framework.
As you would expect from an object-oriented class library, the .NET
Framework types enable you to accomplish a range of common programming tasks,
including tasks such as string management, data collection, database connectivity,
and file access. In addition to these common tasks, the class library includes types
that support a variety of specialized development scenarios. For example, you can
use the .NET Framework to develop the following types of applications and services:
Console applications.
y Windows GUI applications (Windows Forms).y ASP.NET applications.y XML Web services.y Windows services.
For example, the Windows Forms classes are a comprehensive set of reusable types
that vastly simplify Windows GUI development. If you write an ASP.NET Web Form
application, you can use the Web Forms classes.
4.4. Client Application Development
Client applications are the closest to a traditional style of application in Windows-
based programming. These are the types of applications that display windows or forms on
the desktop, enabling a user to perform a task. Client applications include applications
such as word processors and spreadsheets, as well as custom business applications such
as data-entry tools, reporting tools, and so on. Client applications usually employ
windows, menus, buttons, and other GUI elements, and they likely access local resources
such as the file system and peripherals such as printers.
Another kind of client application is the traditional ActiveX control (now replaced
by the managed Windows Forms control) deployed over the Internet as a Web page. This
-
8/9/2019 Wireless Survillence system
10/45
application is much like other client applications: it is executed natively, has access to
local resources, and includes graphical elements.
In the past, developers created such applications using C/C++ in conjunction with
the Microsoft Foundation Classes (MFC) or with a rapid application development (RAD)
environment such as Microsoft Visual Basic. The .NET Framework incorporates
aspects of these existing products into a single, consistent development environment that
drastically simplifies the development of client applications.
The Windows Forms classes contained in the .NET Framework are designed to be
used for GUI development. You can easily create command windows, buttons, menus,
toolbars, and other screen elements with the flexibility necessary to accommodate
shifting business needs.
For example, the .NET Framework provides simple properties to adjust visual
attributes associated with forms. In some cases the underlying operating system does not
support changing these attributes directly, and in these cases the .NET Framework
automatically recreates the forms. This is one of many ways in which the .NET
Framework integrates the developer interface, making coding simpler and more
consistent.
Unlike ActiveX controls, Windows Forms controls have semi-trusted access to a
user's computer. This means that binary or natively executing code can access some of
the resources on the user's system (such as GUI elements and limited file access) without
being able to access or compromise other resources. Because of code access security,
many applications that once needed to be installed on a user's system can now be safely
deployed through the Web. Your applications can implement the features of a local
application while being deployed like a Web page.
4.5. Server Application Development
Server-side applications in the managed world are implemented through runtime
hosts. Unmanaged applications host the common language runtime, which allows your
-
8/9/2019 Wireless Survillence system
11/45
custom managed code to control the behavior of the server. This model provides you with
all the features of the common language runtime and class library while gaining the
performance and scalability of the host server.
The following illustration shows a basic network schema with managed code
running in different server environments. Servers such as IIS and SQL Server can
perform standard operations while your application logic executes through the managed
code.
ASP.NET is the hosting environment that enables developers to use the .NET
Framework to target Web-based applications. However, ASP.NET is more than just a
runtime host; it is a complete architecture for developing Web sites and Internet-
distributed objects using managed code. Both Web Forms and XML Web services use IIS
and ASP.NET as the publishing mechanism for applications, and both have a collection
of supporting classes in the .NET Framework.
XML Web services, an important evolution in Web-based technology, are
distributed, server-side application components similar to common Web sites. However,
unlike Web-based applications, XML Web services components have no UI and are not
targeted for browsers such as Internet Explorer and Netscape Navigator. Instead, XML
Web services consist of reusable software components designed to be consumed by other
applications, such as traditional client applications, Web-based applications, or even
other XML Web services. As a result, XML Web services technology is rapidly moving
application development and deployment into the highly distributed environment of the
Internet.
-
8/9/2019 Wireless Survillence system
12/45
If you have used earlier versions of ASP technology, you will immediately notice
the improvements that ASP.NET and Web Forms offer. For example, you can develop
Web Forms pages in any language that supports the .NET Framework. In addition, your
code no longer needs to share the same file with your HTTP text (although it can
continue to do so if you prefer). Web Forms pages execute in native machine language
because, like any other managed application, they take full advantage of the runtime. In
contrast, unmanaged ASP pages are always scripted and interpreted. ASP.NET pages are
faster, more functional, and easier to develop than unmanaged ASP pages because they
interact with the runtime like any managed application.
The .NET Framework also provides a collection of classes and tools to aid in
development and consumption of XML Web services applications. XML Web servicesare built on standards such as SOAP (a remote procedure-call protocol), XML (an
extensible data format), and WSDL (the Web Services Description Language). The .NET
Framework is built on these standards to promote interoperability with non-Microsoft
solutions.
For example, the Web Services Description Language tool included with the
.NET Framework SDK can query an XML Web service published on the Web, parse its
WSDL description, and produce C# or Visual Basic source code that your application can
use to become a client of the XML Web service. The source code can create classes
derived from classes in the class library that handle all the underlying communication
using SOAP and XML parsing. Although you can use the class library to consume XML
Web services directly, the Web Services Description Language tool and the other tools
contained in the SDK facilitate your development efforts with the .NET Framework.
If you develop and publish your own XML Web service, the .NET Framework
provides a set of classes that conform to all the underlying communication standards,
such as SOAP, WSDL, and XML. Using those classes enables you to focus on the logic
of your service, without concerning yourself with the communications infrastructure
required by distributed software development.
-
8/9/2019 Wireless Survillence system
13/45
-
8/9/2019 Wireless Survillence system
14/45
Developers can use Web Forms or XML Web services when creating an
ASP.NET application, or combine these in any way they see fit. Each is supported by the
same infrastructure that allows you to use authentication schemes; cache frequently used
data, or customizes your application's configuration, to name only a few possibilities.
y Web Forms allow you to build powerful forms-based Web pages. When buildingthese pages, you can use ASP.NET server controls to create common UI
elements, and program them for common tasks. These controls allow you to
rapidly build a Web Form out of reusable built-in or custom components,
simplifying the code of a page.
y An XML Web service provides the means to access server functionality remotely.Using XML Web services, businesses can expose programmatic interfaces to theirdata or business logic, which in turn can be obtained and manipulated by client
and server applications. XML Web services enable the exchange of data in client-
server or server-server scenarios, using standards like HTTP and XML messaging
to move data across firewalls. XML Web services are not tied to a particular
component technology or object-calling convention. As a result, programs written
in any language, using any component model, and running on any operating
system can access XML Web services.
4.7. C-SHARP (C#) LanguageThis project has been implemented using C# language which is entirely new language. It
resembles Java and C++ in syntax, but there is no migration path from Java or C++. C#
is an elegant, modern language that is ideal for creating the next generation of business
applications.
C# is actually far more similar than Java. Though the syntax is different, C# uses the .Netclass library and are supported by the CLR (Common Language Runtime). And it
supports a language feature called operator overloading.
-
8/9/2019 Wireless Survillence system
15/45
4.7.1. Main Features of C#
Simple
1. Pointers are missing in C#.2. Unsafe operations such as direct memory manipulation are not allowed.
3. In C# there is no usage of "::" or "->" operators.
4. Since its on .NET, it inherits the features of automatic memory management and
garbage collection.
5. Varying ranges of the primitive types like Integer, Floats etc.
6. Integer values of 0 and 1 are no longer accepted as Boolean values. Boolean values are
pure true or false values in C# so no more errors of "="operator and "=="operator.
"==" is used for comparison operation and "=" is used for assignment operation.
Modern
1. C# has been based according to the current trend and is very powerful and simple for
building interoperable, scalable, robust applications.
2. C# includes built in support to turn any component into a web service that can be
invoked over the Internet from any application running on any platform.
Object Oriented
1. C# supports Data Encapsulation, inheritance, polymorphism, interfaces.
2. (int, float, double) are not objects in java but C# has introduces structures (structs)
which enable the primitive types to become objects
-
8/9/2019 Wireless Survillence system
16/45
Type safe
1. In C# we cannot perform unsafe casts like convert double to a Boolean.
2. Value types (primitive types) are initialized to zeros and reference types (Objects andClasses are initialized to null by the compiler automatically.
3. Arrays are zero base indexed and are bound checked.
4. Overflow of types can be checked.
Interoperability
1. C# includes native support for the COM and windows based applications.2. Allowing restricted use of native pointers.
3. Users no longer have to explicitly implement the unknown and other COM interfaces,
those features are built in.
4. C# allows the users to use pointers as unsafe code blocks to manipulate your old code.
5. Components from VB NET and other managed code languages and directly be used in
C#.
Scalable and Updatable
1. .NET has introduced assemblies, which are self-describing by means of their manifest.
Manifest establishes the assembly identity, version, culture and digital signature etc.
Assemblies need not to be register anywhere.
2. To scale our application we delete the old files and updating them with new ones. No
registering of dynamic linking library.
3. Updating software components is an error prone task. Revisions made to the code can
effect the existing program C# support versioning in the language. Native support for
interfaces and method overriding enable complex frame works to be developed and
evolved over time.
-
8/9/2019 Wireless Survillence system
17/45
-
8/9/2019 Wireless Survillence system
18/45
Object: Supports all classes in the .NET Framework class hierarchy and provides low-
level services to derived classes. This is the ultimate base class of all classes in the .NET
Framework; it is the root of the type hierarchy.
Array: Provides methods for creating, manipulating, searching, and sorting arrays,
thereby serving as the base class for all arrays in the common language runtime
Buffer: Manipulates arrays of primitive types.
Console: Represents the standard input, output, and error streams for console
application. This class cannot be inherited
Delegate: Represents a delegate, which is a data structure that refers to a static methodor to a class instance and an instance method of that class.
Event Args: Event Args is the base class for classes containing event data.
Exception: Represents errors that occur during application execution.
Execution Engine Exception: The exception that is thrown when there is an internal
error in the execution engine of the common language runtime. This class cannot be
inherited.
4.8.3. System.Net namespace
The System.Net namespace provides a simple programming interface for many of
the protocols used on networks today. The WebRequest and WebResponse classes form
the basis of what are called pluggable protocols, an implementation of network services
that enables you to develop applications that use Internet resources without worrying
about the specific details of the individual protocols. Some of the Classes provided by
this Namespace hierarchy are;
Authentication Manager: Manages the authentication modules called during the client
authentication process.
-
8/9/2019 Wireless Survillence system
19/45
Authorization: Contains an authentication message for an Internet server
Cookie: Provides a set of properties and methods used to manage cookies. This class
cannot be inherited.
Global Proxy Selection: Contains a global default proxy instance for all HTTP request
Http Version: : Defines the HTTP version numbers supported by the HttpWebRequest
and HttpWebResponse classes
HttpWeb Request: Provides an HTTP-specific implementation of the WebRequest class
HttpWeb Response: Provides an HTTP-specific implementation of the WebResponse
class.
Ipaddress: Provides an Internet Protocol (IP) address
NetworkCredential: Provides credentials for password-based authentication schemes
such as basic, digest, NTLM, and Kerberos authentication.
ServicePoint: Provides connection management for HTTP connections.
Socket Permission: Controls rights to make or accept connections on a transport address
(i) System.IO NamespaceThe System.IO namespace contains types that allow reading and writing to files and data
streams, and types that provide basic file and directory support. Some of the Classes
provided by this Namespace hierarchy are:
IOException: The exception that is thrown when an I/O error occurs.
BinaryReader: Reads primitive data types as binary values in a specific encoding.
-
8/9/2019 Wireless Survillence system
20/45
BinaryWriter: Writes primitive types in binary to a stream and supports writing strings
in a specific encoding
Stream: Provides a generic view of a sequence of bytes
BufferedStream: Adds a buffering layer to read and write operations on another stream.
This class cannot be inherited
File: Provides static methods for the creation, copying, deletion, moving, and opening of
files, and aids in the creation of FileStream objects.
FileInfo: Provides instance methods for the creation, copying, deletion, moving, and
opening of files, and aids in the creation of FileStream objects
FileStream: Exposes a Stream around a file, supporting both synchronous and
asynchronous read and write operations.
Path: Performs operations on String instances that contain file or directory path
information. These operations are performed in a cross-platform manner
5. EXISTING SYSTEM
The upgrade process updates the existing system software with new versions, but
does not remove any data from users' home directories. The existing partition structure on
your hard drives does not change. Your system configuration changes only if a package
upgrade demands it. Most package upgrades do not change system configuration, but
rather install an additional configuration file for you to examine later.
File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to
exchange files between computers on the Internet. Like the Hypertext Transfer Protocol
(HTTP), which transfers displayable Web pages and related files, and the Simple Mail
-
8/9/2019 Wireless Survillence system
21/45
Transfer Protocol (SMTP), which transfers e-mail, FTP is an application protocol that
uses the Internet's TCP/IP protocols.
FTP is commonly used to transfer Web page files from their creator to the
computer that acts as their server for everyone on the Internet. It's also commonly used to
download programs and other files to your computer from other servers.
6. PROPOSED SYSTEM
The light we see with our eyes is really a very small portion of what is
called the "Electromagnetic Spectrum." The Electromagnetic Spectrum includes all types
of radiation - from the X-rays used at hospitals, to radio waves used for communication,
and even the microwaves you cook food with.
Although infrared radiation is not visible, humans can sense it - as heat.
Put your hand next to a hot oven if you want to experience infrared radiation "first-hand!
If you have an infrared transceiver, but Infrared Devices does not appear
in Device Manager, you do not have an infrared device installed. Radiation in the
Electromagnetic Spectrum is often categorized by wavelength. Short wavelength
radiation is of the highest energy and can be very dangerous - Gamma, X-rays
and ultraviolet are examples of short wavelength radiation. Longer wavelength
radiation is of lower energy and is usually less harmful - examples include
radio, microwaves and infrared. A rainbow shows the optical (visible) part of
the Electromagnetic Spectrum and infrared (if you could see it) would be
located just beyond the red side of the rainbow.
In the past several years, the use of Webcams and network based camera
systems has permeated, and even inspired, businesses, corporations, government
agencies, educational institutes, and news agencies worldwide. There has also been an
exponential surge in home-based private and public Internet cameras. Using the
powerful search engine on EarthCam.com, you can discover the many ways we
-
8/9/2019 Wireless Survillence system
22/45
communicate, collaborate and observe locations all over the world using Webcam
technology. An extension of EarthCam, the WebCamStore provides a showcase of
Internet camera technology and demonstrates the extent that Webcams can be used to
provide views of construction, landmarks, traffic, weather, and people. Learn how
Internet camera technology can work for you while exploring multitudes of specialized
IP camera systems. It may seem overwhelming at first, so please take some time to
review this introduction to Webcam applications and technology and learn exactly how
the "World Watches the World".
7. SYSTEM ANALYSIS
Analysis involves the requirement determination and specification.
Basically it involves establishing requirements for all system elements and then mapping
these requirements to software forms. It should address such issues as:
Profile of people who are operating on the system. Database on which the software is going to function. Hardware on which the software is going to function. Existing system problems.
Analysis encompasses requirements getting at system level with small,
amount of top-level design. The data obtained from the requirement determination phase
are documented in Software requirement Specifications (SRS) document. During
analysis, a great deal of relatively unstructured data is collected through procedural
manuals and through websites.
The traditional approach is to organize and convert the data through
system flowcharts, which support future developments of the system and simplify
communications with the users. But the system flowcharts represent a physical system
-
8/9/2019 Wireless Survillence system
23/45
and simplify communication with users. But the system flowcharts represent the physical
system rather than logical system.
It makes it difficult to distinguish between what happens and how it
happens in the system. Because of this drawback it is necessary to have something, which
is analogous to the architects blueprint as a starting point for the design. It is the way to
focus on the functions rather than physical implementation.
7.1. IR Based Video Transmission
7.1.1. Description
IR Based Video Transmission is an application-designed for security of
any places like office, home, etc. By using web cam, capturing the images of specified
places where IRTransmitter connected, and transferring that videos to GPRS enabled
mobile. By using this project we can monitor Offices, school, from any of the internet
connected PC.
IR Transmitter, which will pass rays continuously to receiver, will be
connected top the entrance of the door and will be connected to the PC which has web
cam and internet connection. If there is no interruption between the transmitter and
receiver, the receiver will receive rays continuously, and this will be monitoring
continuously by the application running in PC. If there is any obstruction occurs, the
passages of rays will be disconnecting, and that will be detected by the application. If
there is any obstruction, simultaneously, web cam will start recording, and sms will be
sent to corresponding person.
If the concern person receives the sms once, he can view the live captured
images from the GPRS enabled Mobile, he can take snapshot.
This application designed for capturing images and displaying them on
GPRS capable device. It consists of servlets that runs on a computer with a web cam. The
-
8/9/2019 Wireless Survillence system
24/45
main intention behind developing this project is to capture images of video recorded
through web cam and displaying them on GPRS enabled Mobile. By using this project
we can monitor Offices, super markets, school, and traffic from our mobile device. We
can take snapshot while monitoring and we can save that to our mobile device.
On the server side, we should run the application, which will continuously
monitor the IR. Once if it finds any obstruction it will send sms to the concern person.
After getting the sms, he should launch to the application to view the live
video. First we have to select the View web cam, we can see the live status of any place.
It will display the grabbed video from web cam to the display window. From that video
we can take snapshots and save than images in mobile device by selecting save option.
Secondly, we want to view the snapshots by selecting the option view
image. It will display the images we taken from the video and saved.
7.1.2. Client
yTake the snapshot of video recorded through web cam by connecting through webcam by connecting to the server.
y Save the images taken by the clienty The images are delivered according to each client capabilities (image size) on the
Client.
y The server modules retrieve the images from the webcam and sends to the clientfor display.
y View images: You can see a list of saved images; you can visualize them.
-
8/9/2019 Wireless Survillence system
25/45
7.1.3. Server
The Server module connects the IR hardware at the entrance of the room and also
to pc where the server application is running. Web cam also connected to the server pc
through the JMF (java media framework) which in turn connects the web cam for getting
the images the images will be displayed for each and every specified delay seconds.
First Monitoring IR.java program will be executed in the server side. It will
continuously monitor the IR, if it finds any obstruction it will send sms, start the tomcat
server for transmission of the video to the mobile. While running the tomcat server, the
settings window will appear. User can choose the delay in milliseconds (the amount of
time between grabbing two consecutive images from the web camera). Press OK, and a
new window will show up. For the moment, the window is blank; it will display the
grabbed images when at least one client is active.
7.2. Viewing images cell phone with security
7.2.1. Description
The main intention is to view the live images taking place at a sitewherever the web cam will be focusing, through a GPRS enabled Mobile. It gives user
the high quality images with much less (General Packet Radio Service) GPRS or
Universal Mobile Telecommunication System (UMTS) traffic, so the communication
with the web will not be a cost problem at todays GPRS or UMTS rates. As security is a
critical factor for the business and at many places, everyone who utilizes this application
can get to know the events happening at a particular location with just a mobile from a
remote location.
In this project, Ir Tx passes rays continuously to receiver, will in turn is
connected at the top of the entrance of the door and will be connected to the PC which
has web cam and internet connection. If there is no interruption between the transmitter
and receiver, the receiver will receive rays continuously, and this will be monitor by the
-
8/9/2019 Wireless Survillence system
26/45
PC continuously. If any obstruction occurs there, the passage of rays will be
disconnecting, and that will be detected by the hardware connected to the PC. If there is
any obstruction, the web cam will start recording the video and simultaneously the sms
will be send to corresponding person.
8. FUNCTIONAL REQUIREMENTS
This project has been developed using ASP.Net as the front-end tool and
MS access as back-end tool. C# is used for interfacing ASP.Net and MS access. It also
involves the use of IIS (Internet Information Server) for running the application and
ADO.Net Technology is used for managing application with the server and the database.
The functional requirements are given below:
8.1. Software Requirements
Server Side
p Microsoft Visual Studio .NET 2005p Internet Information Server (IIS)p Microsoft Office Access 2003p Internet Explorer 6.0p Microsoft Windows XP Professional
Client Side
p Microsoft Windows Familyp Internet Explorer or Mozilla Firefox or Any other browser
-
8/9/2019 Wireless Survillence system
27/45
8.2. Hardware Requirements
Server Side
p 1.8 GHz or better CPUp 256 MB or better RAMp 2 GB of free disk space
Client Side
p A good compatible PCp GPRS enabled image.
8.3. Architectural design
IR BASED VIDEO TRANSMISSION
PC with dial-up
Connection and
USB Modem.
+5v
GPRS Enabled
Mobile Phone.
PPI
MicroController
PIC16F87
7404
NOTIR Rx
IR TX
555
-
8/9/2019 Wireless Survillence system
28/45
A Parallel /LPT1 port is basically used for the operation of a printer. Other
than a printer, a parallel port can be also be used for simple interfacing applications.
A parallel port has 12 output lines and 5 input lines, some of which are
inverted, hence parallel port, cannot be used as it is for other demanding application other
than a printer. Hence the need for an interface card connected to parallel port which can
handle ample number of inputs and outputs.
The present design of interface card connected to parallel port can handle
24 bit input or output, which is sufficient for most interfacing applications. The heart of
this interface card is programmable peripheral interface PPI chip8255. Intel developed
8255 PPI. This interface card has three 8-bit ports, which can be individually
programmed as input or output. Hence we can program the ports to provide 24 bit input
or 24 bit output or combination of both.
Device driver software is used as a translator between parallel ports 8255
PPI. The device driver P8255. The device driver bridges the incompatibilities of the
signals between the parallel port and 8255 PPI.
The signal levels of interface card is TTL compatible, hence it can be used
both for TTL as well as CMOS interfacing. The outputs of interface card are capable of
sinking 2mA of current. Hence suitable buffering should be provided for high current
sinking applications.
-
8/9/2019 Wireless Survillence system
29/45
-
8/9/2019 Wireless Survillence system
30/45
9. IMPLEMENTATION
BLOCK DIAGRAM:
Server
MOBILE(GPRS
Enabled)
WEBCAM
MF
IR
TX
IR
RX
Interface
-
8/9/2019 Wireless Survillence system
31/45
9.1. IR BASED VIDEO TRANSMISSION
__ GPRS enabled
Cell phone Article
PC withDial-up
connection
USB Modem
PPI
Micro
Controller(PIC16F873)
7404NOT IR Rx
IR Tx
555
-
8/9/2019 Wireless Survillence system
32/45
10. SYSTEM DESIGN
Design is a multi-step process that focuses on, software architecture, data
structure, procedural details and interfaces between the modules. The design process also
translates the requirement into the representation of the software that can be assessed for
quality before coding begins.
Software design methodology changes continually as new methods; better
analysis and broader understanding evolve. Software design is at relatively early stage in
its evolution. Therefore, software design methodology lacks the depth, flexibility, and
quantitative nature that is normally associated with more classical engineering
disciplines. However, techniques for software design leads the three technical activities
Design, Code, Testing that are required to build and verify software. Each activity
transforms information in a manner that results in validation of the computer software.
Design is the only way that we can accurately translate a customers
requirements into a finished software product or system. Without design, risk of building
an unstable system exists one that will fail when small changes are made, one that may
be difficult to test.
In this project mainly three modules has been provided. They are as follows
y Admin module:y Ftp module:y Webcam module:y Infrared module.
-
8/9/2019 Wireless Survillence system
33/45
10.1. Administrator Module
The admin have the following option were he can view the details as below
y The admin can see were the rays broken due to some physical interrupt.y The admin can view the images captured by the cameras.y The admin has the access to view the details of the date of images capture.
10.2. Ftp module:File Transfer Protocol (FTP), a standard Internet protocol, is the simplest
way to exchange files between computers on the Internet. Like the Hypertext Transfer
Protocol (HTTP), which transfers displayable Web pages and related files, and the
Simple Mail Transfer Protocol (SMTP), which transfers e-mail, FTP is an application
protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web
page files from their creator to the computer that acts as their server for everyone on the
Internet. It's also commonly used to download programs and other files to your computer
from other servers.
As a user, you can use FTP with a simple command line interface (forexample, from the Windows MS-DOS Prompt window) or with a commercial program
that offers a graphical user interface. Your Web browser can also make FTP requests to
download programs you select from a Web page. Using FTP, you can also update (delete,
rename, move, and copy) files at a server. You need to logon to an FTP server. However,
publicly available files are easily accessed using anonymous FTP.
Basic FTP support is usually provided as part of a suite of programs that
come with TCP/IP. However, any FTP client program with a graphical user interface
usually must be downloaded from the company that makes it
-
8/9/2019 Wireless Survillence system
34/45
Client-server describes the relationship between two computer programs
in which one program, the client program, makes a service request to another, the server
program. Standard networked functions such as email exchange, web access and database
access, are based on the client-server model. For example, a web browser is a client
program at the user computer that may access information at any web server in the world.
To check your bank account from your computer, a web browser client program in your
computer forwards your request to a web server program at the bank. That program may
in turn forward the request to its own database client program that sends a request to a
database server at another bank computer to retrieve your account balance. The balance is
returned to the bank database client, which in turn serves it back to the web browser
client in your personal computer, which displays the information for you.
FTP (File Transfer Protocol) is the simplest and most secure way to
exchange files over the Internet. Whether you know it or not, you most likely use FTP all
the time.
-
8/9/2019 Wireless Survillence system
35/45
The most common use for FTP is to download files from the Internet.
Because of this, FTP is the backbone of the MP3 music craze, and vital to most online
auction and game enthusiasts. In addition, the ability to transfer files back-and-forth
makes FTP essential for anyone creating a Web page, amateurs and professionals alike.
When downloading a file from the Internet you're actually transferring the
file to your computer from another computer over the Internet. This is why the T
(transfer) is in FTP. You may not know where the computer is that the file is coming
from but you most likely know its URL or Internet address.
An FTP Client is software that is designed to transfer files back-and-forth
between two computers over the Internet. It needs to be installed on your computer and
can only be used with a live connection to the Internet.
File transfers are as easy as dragging-and-dropping files from one panel to
the other or by highlighting a file and clicking one of the direction arrows located
between the panels.
Additional features of the FTP Client include: multiple file transfer; the
auto re-get or resuming feature; a queuing utility; the scheduling feature; an FTP find
utility; a synchronize utility; and for the advanced user, a scripting utility.
10.3. FTP
FTP runs over TCP. It defaults to listen on port 21 for incoming
connections from FTP clients. A connection to this port from the FTP Client forms the
control stream on which commands are passed from the FTP client to the FTP server andon occasion from the FTP server to the FTP client. FTP uses out-of-band control, which
means it uses a separate connection for control and data. Thus, for the actual file transfer
to take place, a different connection is required which is called the data stream.
Depending on the transfer mode, the process of setting up the data stream is different.
Port 21 for control (or program), port 20 for data.
-
8/9/2019 Wireless Survillence system
36/45
In active mode, the FTP client opens a dynamic port, sends the FTP server the
dynamic port number on which it is listening over the control stream and waits for a
connection from the FTP server. When the FTP server initiates the data connection to the
FTP client it binds the source port to port 20 on the FTP server.
In order to use active mode, the client sends a PORT command, with the IP and
port as argument. The format for the IP and port is "h1,h2,h3,h4,p1,p2". Each field is a
decimal representation of 8 bits of the host IP, followed by the chosen data port. For
example, a client with an IP of 192.168.0.1, listening on port 49154 for the data
connection will send the command "PORT 192,168,0,1,192,2". The port fields should be
interpreted as p1256 + p2 = port, or, in this example, 192256 + 2 = 49154.
In passive mode, the FTP server opens a dynamic port, sends the FTP client the
server's IP address to connect to and the port on which it is listening (a 16-bit value
broken into a high and low byte, as explained above) over the control stream and waits
for a connection from the FTP client. In this case, the FTP client binds the source port of
the connection to a dynamic port.
To use passive mode, the client sends the PASV command to which the server
would reply with something similar to "227 Entering Passive Mode (127,0,0,1,192,52)".
The syntax of the IP address and port are the same as for the argument to the PORT
command.
In extended passive mode, the FTP server operates exactly the same as passive
mode, however it only transmits the port number (not broken into high and low bytes)
and the client is to assume that it connects to the same IP address that was originally
connected to. Extended passive mode was added by RFC 2428 in September 1998.
While data is being transferred via the data stream, the control stream sits idle.
This can cause problems with large data transfers through firewalls which time out
-
8/9/2019 Wireless Survillence system
37/45
sessions after lengthy periods of idleness. While the file may well be successfully
transferred, the control session can be disconnected by the firewall, causing an error to be
generated.
The FTP protocol supports resuming of interrupted downloads using the REST
command. The client passes the number of bytes it has already received as argument to
the REST command and restarts the transfer. In some command line clients for example,
there is an often-ignored but valuable command, "re-get" (meaning "get again") that will
cause an interrupted "get" command to be continued, hopefully to completion, after a
communications interruption.
Resuming uploads is not as easy. Although the FTP protocol supports the APPE
command to append data to a file on the server, the client does not know the exact
position at which a transfer got interrupted. It has to obtain the size of the file some other
way, for example over a directory listing or using the SIZE command.
10.4. Webcam module
In the past several years, the use of Webcams and network based camera systems
has permeated, and even inspired, businesses, corporations, government agencies,
educational institutes, and news agencies worldwide. There has also been an
exponential surge in home-based private and public Internet cameras. Using the
powerful search engine on EarthCam.com, you can discover the many ways we
communicate, collaborate and observe locations all over the world using Webcam
technology. An extension ofEarth-Cam,
The WebCamStore provides a showcase of Internet camera technology and
demonstrates the extent that Webcams can be used to provide views of construction,
landmarks, traffic, weather, and people. Learn how Internet camera technology can
work for you while exploring multitudes of specialized IP camera systems. It may seem
-
8/9/2019 Wireless Survillence system
38/45
overwhelming at first, so please take some time to review this introduction to Webcam
applications and technology and learn exactly how the "World Watches the World".
10.4.1. Features
From anywhere in the world using EarthCams network construction cameras,
companies can remotely view their job sites over the Internet. We provide specific
construction webcam solutions for some of the largest construction companies and
developers in the world. Combined with EarthCams Control Center Software, create the
ultimate interactive live construction cam solution to monitor, control and archive your
job sites.
The WebCamStore offers cost-effective personal webcam solutions to get you
webcasting in minutes.
Wireless solutions make it easy to wirelessly webcast high quality color images
over the web.
Monitor and protect your property from anywhere in the world.
Rely on EarthCam's years of experience creating hundreds of custom solutions to
meet the needs of our clients around the world. Our experts will listen and work closely
with you to identify the optimum custom camera solution with services for your project
saving you unnecessary expenses.
10.4.2. Security Policy
EarthCam offers the latest technology to protect the loss, misuse and alteration of
your financial information that we obtain and will not release it to any outside
organization. To ensure that there is no unauthorized access of your purchasing
information, EarthCam uses the Secure Socket Layer (SSL) line in conjunction with the
industry standards in Internet browsing: Netscape Navigator and Microsoft Internet
Explorer. By encrypting all private information upon its submission to our site, all vital
data collected therein is protected against unauthorized viewing and/or access.
-
8/9/2019 Wireless Survillence system
39/45
A conventional 0.1 lux sensitivity tv camera with a 25mm focal length, f 2.5, 13.3
degree telephoto lens is mounted in a weatherproof enclosure on a pole about 30 metres
from the gate. The analogue tv signal is transmitted about 400 metres over standard
multicore telecom cable (not coax) using video adaptors at each end to a video-to-USB
adaptor.
The camera enclosure is not heated so sometimes condensation on the enclosure
window can result in the image being rather blurred.
Also, the camera cant cope with the high contrast in illumination that results
from bright sunlight at low angles (early morning and late evening). Similarly, in bright
sunlight specular reflections from the river and the metal gate can play havoc with
whatever automatic brightness control there is in the camera.
10.5. Infrared module
As next-generation electronic information systems evolve, it is critical that all
people have access to the information available via these systems. Examples of
developing and future information systems include interactive television, touch screen-
based information, and advanced Internet programs. Infrared technology, increasingly
present in mainstream applications, holds great potential for enabling people with a
variety of disabilities to access a growing list of information resources. Already
commonly used in remote control of TVs, VCRs and CD players, infrared technology is
also being used and developed for remote control of environmental control systems,
personal computers, and talking signs.
For individuals with mobility impairments, the use of infrared or other wireless
technology can facilitate the operation of information kiosks, environmental control
systems, personal computers and associated peripheral devices. For individuals with
visual impairments, infrared or other wireless communication technology can enable
users to locate and access talking building directories, street signs, or other assistive
navigation devices. For individuals using augmentative and alternative communication
(AAC) devices, infrared or other wireless technology can provide an alternate, more
-
8/9/2019 Wireless Survillence system
40/45
-
8/9/2019 Wireless Survillence system
41/45
wave is higher frequency and therefore shorter wavelength than the radio wave.
Conversely, the radio wave is lower frequency and therefore longer wavelength than the
infrared wave. Anyone who has listened to the radio while driving long distances can
appreciate that longer wavelength AM radio waves carry further than the shorter
wavelength FM radio waves.
11. TESTING
11.1. Importance of testing
Testing is the measurement of software quality hence, one of the most important
stages in software development. It involves executing an implementation of the software
and its operational behavior to check that it is performing as required. One of the main
goals of testing is to have a minimum number of test cases that will find a majority of the
implementation errors.
-
8/9/2019 Wireless Survillence system
42/45
-
8/9/2019 Wireless Survillence system
43/45
11.4. Black box testing
Black box testing attempts to derive sets of inputs that will fully exercise
all the functional requirements of a system. Here the system is a black-box whosebehavior can only be determined by studying its inputs and related outputs.
This type of testing attempts to find errors in the following category:
Incorrect or missing functions.
Errors in data structures or external database access.
Interface and performance errors.
11.5. Test Cases
A Test case (TC) is a set of test inputs, executions, and expected results developed for a
particular objective.
Fig: Black-box testing
e
System
Inputs causinganomalous behavior
utputs whichreveal the presence
of defects
Input Test data
Ie
utput test results
-
8/9/2019 Wireless Survillence system
44/45
An excellent test case satisfies the following criteria
Reasonable probability of catching an error. Does interesting things Doesnt do unnecessary things Neither too simple nor too complex Not redundant with other tests Allows isolation and identification of errors
Test case document
Purpose: Tests whether the administrator is able to perform various operations and
if the operations occur correctly.
Pre-requisite: Administrator login from his secured webpage.
Steps:
1) Administrator is able to see all the images that are captured from the webcamera; from his home page.
2) Then he may intimate the concerned one to take necessary actions by viewingthe image.
.
-
8/9/2019 Wireless Survillence system
45/45
12. CONCLUSION
From the above report it clearly shows the transfer of the data with out the wire by
the infrared and the details of capturing the brake up of the infrared d to some physical
interrupt in between the raise which will be capture by the camera and the transfer of the
data. This application designed for capturing images and displaying them on J2ME-
capable device. It consists of servlets that runs on a computer with a webcam and a J2ME
client.