a web based client and server model for controlling electronic warfare monitoring receivers

5
A Web Based Client and Server Model for Controlling Electronic Warfare Monitoring Receivers Abstract: The basic concept of electronic warfare monitoring receivers is to exploit the enemy’s signals. It is to provide intelligence on enemy’s order of battle, intentions and capabilities where to use some countermeasures to deny effective use of communications. The signals can be detected by using frequency, bandwidth and demodulation. Here, we are going to control the electronic warfare receiver by using web based client and server. The monitoring receiver can detect the different modulation signals such as Amplitude modulation, frequency modulation, and pulse signal etc. our project includes controlling of monitoring receivers to intercept and demodulate mainly AM,FM modulated communicated intelligence by controlling and configuring the receiver with the relevant command structure. The receiver is remotely controlled via LAN using TCP/IP protocol. Modules: Client Router Server Ip address Longitude and Latitude

Upload: yeswanth-reddy

Post on 23-Jan-2017

122 views

Category:

Education


1 download

TRANSCRIPT

Page 1: A web based client and server model for controlling electronic warfare monitoring receivers

A Web Based Client and Server Model for Controlling Electronic Warfare Monitoring Receivers

Abstract:

The basic concept of electronic warfare monitoring receivers is to exploit the enemy’s signals. It is to provide intelligence on enemy’s order of battle, intentions and capabilities where to use some countermeasures to deny effective use of communications. The signals can be detected by using frequency, bandwidth and demodulation. Here, we are going to control the electronic warfare receiver by using web based client and server.

The monitoring receiver can detect the different modulation signals such as Amplitude modulation, frequency modulation, and pulse signal etc. our project includes controlling of monitoring receivers to intercept and demodulate mainly AM,FM modulated communicated intelligence by controlling and configuring the receiver with the relevant command structure. The receiver is remotely controlled via LAN using TCP/IP protocol.

Modules:

Client Router Server Ip address Longitude and Latitude

Client:

The client is the end user of the network and needs to be secured the most. The client end usually exposes data through the screen of the computer. Client connections to server should be secured through passwords and upon leaving their workstations clients should make sure that their connection to the server is securely cut off in order to make sure that no hackers or intruders are able to reach the server data. Not only securing the workstations connection to the server is important but also securing the files on the workstation (client) is important as it ensures that no hackers are able to reach the system. Another possibility is that of introducing a virus or running unauthorized software on the client workstation thus threatening the entire information bank at the server.

Page 2: A web based client and server model for controlling electronic warfare monitoring receivers

Server:

The server can be secured by placing all the data in a secure, centralized location that is protected through permitting access to authorized personnel only. Virus protection should also be available on server computers as vast amounts of data can be infected. Regular upgrades should be provided to the servers as the software and the applications need to be updated. Even the entire body of data on a server could be encrypted in order to make sure that reaching the data would require excessive time and effort

Router:

A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node.

IP Address:

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there

Longitude and Latitude:

Longitude:

It is a geographic coordinate that specifies the east-west position of a point on the Earth's surface. It is an angular measurement, usually expressed in degrees and denoted by the Greek letter lambda (λ). Points with the same longitude lie in lines running from the North Pole to the South Pole. By convention, one of these, the Prime Meridian, which passes through the Royal Observatory, Greenwich, England, was intended to establish the position of zero degrees longitude.

Latitude:

Page 3: A web based client and server model for controlling electronic warfare monitoring receivers

It is a geographic coordinate that specifies the north-south position of a point on the Earth's surface. Latitude is an angle (defined below) which ranges from 0° at the Equator to 90° (North or South) at the poles. Lines of constant latitude, or parallels, run east–west as circles parallel to the equator. Latitude is used together with longitude to specify the precise location of features on the surface of the Earth.

System Requirement specification:

Hardware Requirements:

Processor - Pentium –III

Speed - 1.1 GHz

RAM - 256 MB (min)

Hard Disk - 20 GB

Floppy Drive - 1.44 MB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA

Software Requirements:

Operating System :Windows95/98/2000/XP

Application Server : Tomcat5.0/6.X

Front End : HTML, Java, Jsp

Scripts : JavaScript.

Server side Script : Java Server Pages.

Database : My sql

Database Connectivity : JDBC.