Seminar Report Rakesh

26
COLLEGE OF ENGINEERING, ATTINGAL THIRUVANANTHAPURAM-695101 KERALA DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SEMINAR REPORT On “Enhancing LAN Using Cryptography And Other Modules” Submitted by Rakesh T(12093822) vII SEMESTER COMPUTER SCIENCE AND ENGINEERING 2010-2011 1

Transcript of Seminar Report Rakesh

Page 1: Seminar Report Rakesh

COLLEGE OF ENGINEERING, ATTINGAL

THIRUVANANTHAPURAM-695101KERALA

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

SEMINAR REPORTOn

“Enhancing LAN Using Cryptography And Other Modules”

Submitted by

Rakesh T(12093822)

vII SEMESTER COMPUTER SCIENCE AND ENGINEERING2010-2011

1

Page 2: Seminar Report Rakesh

COLLEGE OF ENGINEERING, ATTINGAL

THIRUVANANTHAPURAM-695101KERALA

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

2010-2011

Certificate

Certified that this is the bonafide report of the

seminar work

entitled ” Enhancing LAN Using Cryptography And

Other Modules “ submitted by its successful completion during

the Seventh semester of academic year 2010-2011 in partial

fulfillment of the requirements for the award of the degree of

Bachelor of Technology in Computer science and Engineering by

Cochin University of Science and Technology, in year 2011.

Head of Department: Seminar Guide:

Mrs.Suma L.S Mrs.Leena Silvester

Senior Lecturer Lecture in Computer

Dept of Computer Science and Engineering Science and Engineering

2

Page 3: Seminar Report Rakesh

ACKNOWLEDGEMENT

First and foremost we thank God Almighty for giving us

Strength ,blessings and determination for the completion of the

seminar named ‘Enhancing LAN Using Cryptography And Other

Modules’. The satisfaction that accompanies that the successful

completion of any task would be incomplete without the mention of people

whose ceaseless cooperation made it possible, whose constant guidance

and encouragement crown all efforts with success.

It gives me immense pleasure to thank the

Principal Prof. Bhadran V, college OF Engineering Attingal for all his

support and encouragement. I also express my heartfelt gratitude to

Mrs.Suma L.S, Head of Department of Computer Science for her immense

inspiration and encouragement, I also extend my gratitude and thanks to

Mrs.Leena Silvester ,my seminar guide for her advice and support

rendered to me.

Last but not the least, I thank my parents, friends and all others for their

moral support and help they have given me.

RAKESH T

3

Page 4: Seminar Report Rakesh

CONTENTS

1 INTRODUCTION

2 MODULES

i. Process Management

ii. Monitoring

iii. Desktop capturing

iv. Remote processing

v. File Transfer

vi. Wakeon lan

vii. GPS in system management

3 ARCHITECTURE

4 HARDWARE REQUIREMENTS

5 MAGIC PACKET

6 GLOBAL POSITIONING SYSTEM

7 FUTURE ENHANCEMENTS

8 CONCLUSION

4

Page 5: Seminar Report Rakesh

9 REFERENCES

INTRODUCTION

The ‘Enhancing LAN Using Cryptography And

Other Modules’ suggests important ways to remove the

shortcomings of the present network management systems. It

allows the administrator to gain more control over remote machine

on the network. The network is used to its full potential. The

proposed system is implemented in .net. It has the following

modules. Each of the modules addresses some key feature of the

network. Modules includes process management ,

monitoring ,desktop capturing ,remote processing ,file

transfer ,chatting, wakeon lan and a GPS receive r for user system

management. Our project have the following advantages over

existing systems.

Security of data : Protection of data during their transmission

over a collection of interconnected network by using

cryptography.

Faster and Better Communication–When our requirement is

to communicate with any of the colleagues sitting in the same

organization and not with any of the personal friends then why

to communicate over the congested network of thousands of

computers called Internet instead of exploiting the features of

high speed Local Area Network which already exists in almost

5

Page 6: Seminar Report Rakesh

all enterprises and institutions.

Timely and Assured Transfers–For tasks such as general

notifications the broadcasting feature is hundred times faster

than a peon circulating the notices to all employees. Networks

are not just for data transfers anymore. Data transfer can be

used in the following, not only interesting but also productive

ways.

System management-Here we use the GPS receiver for time

synchronization through which the administrator can shut down

the user system.

6

Page 7: Seminar Report Rakesh

MODULES

Different modules include:

1. Process Management

2. Monitoring

3. Desktop capturing

4. Remote processing

5. File Transfer

6. Wakeon lan

7. GPS in system management

1. Process Management

This section consists of Scan all computers in the Network,

View the list of processing, View the list of software installed in the

client machines, Performance data of networked machines (free

disk space, processor utilization etc.), View the list of System

events, Firing of a trigger on the occurrence of any event on any

machine. To find out the user connected to any machine.

2. Monitoring

This section is used to verify the connected clients with the

server and also view al the processes running on them.

7

Page 8: Seminar Report Rakesh

3. Desktop Capturing

Desktop sharing software works by sending packets of

information from a host computer to a remote computer describing what's

on the host computer's screen at any given time. The encrypted data

travels over the Internet. Some data arrives as image files (JPEGs and

GIFs), while others arrive as individual pixels assigned to a particular X

and Y coordinate. Desktop sharing software is smart enough to only send

information updates on the sections of the screen that have changed and to

compress the data significantly, minimizing the amount of necessary

bandwidth.This section is used to capture the screen of a connected client

and save that screen in the server.

4.Remote Processing

This is used to view all the process running on a client machine and

the server can kill the process from the list. It can log off and shut down

the remote clients.

5. File Transfer

This is used to upload the files from a client to server and download

shared files from the server. The files will be encrypted using

cryptographic method by DES algorithm. This ensures that during a file

8

Page 9: Seminar Report Rakesh

transfer a hacker cannot take the data, even if he manages to get it, it will

be in encrypted form. File Transferring can only happen with the

knowledge of the administrator in case of a confidential file , if anyone

else try to take a copy of the file it will be notified to the administrator and

this function enhances the security of the firm.

6.Wakeon LAN

Wake on LAN is implemented using a special network message called a

magic packet.The magic packet contains the MAC address of the

destination computer.The listening computer waits for a magic packet

9

Page 10: Seminar Report Rakesh

addressed to it and then initiates system wake up.The magic packet is sent

on the data link layer or layer 2 in the OSI model and broadcast to all NICs

using the network broadcast address; the IP address is not used. This is

why Wake on LAN is platform independent. Any application, on any

platform, can wake up computers running on any other platform.

It is a common misconception that because Wake on LAN is built

upon broadcast technology it can only be used within the current network

subnet.While this is generally the case there are some exceptions inorder

for wake on LAN to work,parts of the network interface need to stay

on.This consumes standby power,much less than normal operating

power.If wake on Lan is not needed,disabling it may reduce power

consumption slightly while the computer is switched off but still plugged

in. By using this module, administrator can wakeup the system that is

shutdowned by the user.WakeOnLan discovers all other computers in

LAN,and enables the admin to wake them.

7.GPS in system management

In the proposed system, The GPS receiver outputs UTC

(Coordinated Universal Time) date and time of day in the transmitted

data. After the initial position fix,the

date and time of day are calculated using GPS satellite

information and are synchronized with the one-pulse-per-second

output, the client computers in the network can receive the information at

a correct time that the server had sent, GPS time sychronisation also

prevents misuse of client machines after the office time, by providing a

10

Page 11: Seminar Report Rakesh

warning to the client who uses it without permission from administrator

and notifying the administrator about the user.

Architecture

11

Page 12: Seminar Report Rakesh

DES ALGORITHM

Hardware Requirements

I. A GPS RECEIVER

II. Must have an ATX 2.01(or above) – compliant power supply and an ATX motherboard with a WOL connector.

12

Page 13: Seminar Report Rakesh

III. PCI 2.2 compliant network adapter card.

IV. BIOS support for Wake on LAN power up

Magic Packet

The magic packet is a broadcast frame containing anywhere within

its payload 6 bytes of all 255 (FF FF FF FF FF FF in hexadecimal),followed

by sixteen repetitions of the target computer’s 48-bit MAC address.Since

the magic packet is only scanned for the string above and not actually

parsed by a full protocol stack,it may be sent as any network and transport

layer protocol,although it is typically sent as a UDP datagram to port 7 or

9,or directly over Ethernet.

A standard magic packet has the following basic limitations:

a. Requires destination computer MAC address(also may require a

SecureOn password)

b. Does not provide a delivery confirmation

c. May not work outside of the local network

d. Requires hardware support of wake on LAN on destination computer

The wake on LAN implementation is designed to be very simple and to be

quickly processed by the circuitry present on the Network Interface

Card(NIC) with minimal power requirement.Because wake on LAN

operates below the protocol layer the MAC address is required and makes

IP addresses and DNS names meaningless[7].

13

Page 14: Seminar Report Rakesh

Fig 1. Magic Packet Architecture [ref 4]

GLOBAL POSITIONING SYSTEM

GPS (Global Positioning System) is a satellite navigation system

to determine accurate location and time. It was developed by the

U.S. Department of Defense, and is widely used today for both navigation

and time synchronization. The satellites are owned by the Department of

Defense, paid for by U.S. tax dollars, and reception of satellite signals is

available for public use

ClockWatch Star Sync GPS time synchronization works by using a GPS

receiver that is connected to your computer.

How does Star Sync get the time from the GPS?

The GPS receiver outputs UTC (Coordinated Universal Time) date

and time of day in the transmitted data. After the initial position fix,

the date and time of day are calculated using GPS satellite

information and are synchronized with the one-pulse-per-second

output. The highly accurate one-pulse-per second output is provided to

Star Sync from the Garmin GPS35. The signal is generated after the

initial position fix has been calculated and continues until power

14

Page 15: Seminar Report Rakesh

down. This rising edge of the signal is synchronized to the the start

of each GPS second. The information transmitted to Star Sync is

referenced to the pulse immediately preceding the NMEA 0183 RMC

sentence. Beagle Software specially configures the Garmin GPS35

so that this pulse is usable by the Star Sync software.

GPS receivers integrate a radio and a navigation computer and can receive

the faint, twenty-watt signals coming from the satellites. The computer

uses these signals to calculate the distance between the satellites and the

receiver. With this information, the computer can further calculate the

position and velocity of the receiver. The number of satellites visible to a

receiver constantly varies between four and eleven according to time and

location. Each satellite broadcasts a number of unique spread-spectrum

codes, but only one, the Coarse Acquisition (C/A) code, is easily accessible

for civilian use. The C/A in orbit 11,000 miles above earth, GPS satellites

transmit at twenty watts a number of unique spread-spectrum code. The

number of satellites visible to a GPS receiver constantly varies between

four and eleven according to time and location. Code is effectively a timing

signal synchronized to an international time standard-Universal

Coordinated Time (UCT). UCT is kept by a world-wide ensemble of cesium

and hydrogen maser frequency standard atomic docks. The highest-quality

GPS receivers measure the C/A code to better-than- nanosecond

precision.

15

Page 16: Seminar Report Rakesh

Fig 2 : GPS receiver receiving signal from GPS satellite [ref 2]

16

Page 17: Seminar Report Rakesh

FUTURE ENHANCEMENTS

Video conferencing

Video conferencing will be included to provide a lot of more add-ons to the enhancement system. This will enable the administrator to video conference with multiple users at the same time, which is useful in case of organizing a conference. The users will be able to video conference with each other which reduces the time required for them to get from their cabin to another in case of a doubt occurring during a team project.

Extending to WAN

Currently the enhancement is done only in a LAN system but in future it can be implemented to WAN. This help a organization or firm having more than one office to coordinate their work easily. For example a meeting comprising of the officials from all branches of the firm can be done using video conferencing which lessens the time. Also data can be send/ received between the offices more securely.

Use advanced cryptographic algorithms[3DES]

The present system uses the DES algorithm but in future will be using the 3DES algorithm for cryptography which will further improve the security.

17

Page 18: Seminar Report Rakesh

CONCLUSION

The administrator can have complete control over all activity

done by his subordinates. By encryption of data/ files security can be

enhanced. User system can be managed by admin even if it is shutdown.

We can use satellite timing system and to develop an network application

(both client and server) that can be used to synchronize the system time of

client computers connected to the network with the GPS time.

18

Page 19: Seminar Report Rakesh

REFERENCES

1. www.ntp-time-server.com

2. www.edu-observatory.org/gps

3. http://en.wikipedia.org/wiki/Wake-on-LAN

4. http://www.codeproject.com/KB/IP/WOL.aspx

5. http://en.wikipedia.org/wiki/Data_Encryption_Standard

19