SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238
www.ijera.com 234 | P a g e
Remote Nodes Management Using RMI
Saurabh Malgaonkar*, Swarnalata Bollavarapu*, Tejas Hirave**
*(Computer Engineering Department, Mukesh Patel School of Technology Management & Engineering,
NMIMS University, Mumbai, India)
** (Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai University,
Mumbai, India)
ABSTRACT
We have focused upon the design and development of a remote desktop management system using Remote
Method Invocation, since it has many advantages in terms of remote computation, software optimization, data
access and storage services that do not require end-user knowledge of the physical location and configuration of
the system. In this type of a system we have two types of users - clients and the server. The server can control all
the activities of the clients and also impose certain restrictions on the clients. The clients can use the data or
shared resources, software and information that are provided by the server to computers and other devices as a
utility over a network. The major elements of desktop management are assets management, software
deployment, patch management, remote desktop sharing, active directory reports and user logon reports. Remote
desktop sharing enables users to access and use their own desktop from other machines or locations. This
system is focused upon the real time events.
Keywords- cloud hosting services, distributed computing, remote control, remote monitoring, networking, real-
time applications
I. INTRODUCTION
Computer networks is a collection of
computers and other devices that can send and
receive data from one another communication
system, since networking deals with data, hence it
becomes necessary to focus on the security.
Managing the other remote computers is equally
important in the congested network environment [1].
Management consists of monitoring, by monitoring
the other computers on the network we know what
others are doing on their system.
This real time application does not involve
any end user (client) activity. Only user of the
application is administrator sitting at server. This
application can be applied to monitor activities of
employee in a particular department or the work
running on client’s terminal specific lab work
session.
In today’s fast and growing world, every
system is connected to network via internet or by a
combinations of LAN (local area network) or by a
WAN (wide area network) or by a MAN
(metropolitan area network). In an environment
where there is an administrator, a user present,
management and monitoring becomes the important
aspect of the network system. Administrator should
have control over the remote computers.
This system provides many features and
advantages and may have its applications in corporate
firms and many other organizations. The need for
time-effective and cost-effective solutions has been
the basic motive behind the development of this
project.
We have studied about the cloud services and have
analyzed its advantages over the normal networks
and hosting services. For this system we have
preferred cloud based hosting because of the
following advantages: flexibility, availability, fault
tolerance, massive processing power and economic
feasibility.
II. DESIGN
A. Product Function Overview
This real time application mainly deals with
the administrator access from the server. It includes
security and monitoring aspect of the network. It
involves grabbing the screen of multiple client
terminals and showing multiple client screens at
server side. The main search and retrieve operation
involves the discovery [2] [3] of the nodes of a
system along with the grabbing of their information
for their inclusion in the server list.
B. User Characteristics
There will be only one type of user in
application –administrator. He/She is the only person
to keep watch of networked client terminals from the
server side only. He can do function like:
1. Add client.
2. Remove client.
3. Administrator message to the client.
4. Watching screen of single client terminals.
RESEARCH ARTICLE OPEN ACCESS
Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238
www.ijera.com 235 | P a g e
5. Simultaneously keeping watch of multiple
clients.
6. Time flexibility for screen updates.
7. Performing remote operations.
C. General Characteristics
The client terminal to be watched should
have client program installed over there.
1. Inputs and Outputs:
Input: Administrator does not have to enter
any data. Just by clicking over options he can
perform desired operations.
Output: Single terminal screen or multiple clients’
screens mapped.
2. External Interface Requirements:
A user-friendly GUI has been developed
which provides effective screens that an
administrator can easily use.
D. Performance Constraints
In this application, the client screen changes
are updated at specified interval of time but if
multiple clients are sending their screens
simultaneously, then there can be chances of
increased network traffic. To overcome this problem,
message can be passed from server to client about
sending its screen after specified interval. It may be
possible that on a networked terminal, there is no
work going on & still if clients send its screen at each
interval, traffic will be increased but this is also
properly addressed. The deployment of the server is
on Google cloud hosting service [6] that enables to
handle and perform many operations simultaneously
without any delays perfectly on a real time basis.
Fig 1: Functional Workflow of the system
III. IMPLEMENTATION
A. RMI
The Java Remote Method Invocation
Application Programming Interface (API), or Java
RMI [5], is a Java [4] API that performs the object-
oriented equivalent of remote procedure calls (RPC),
with support for direct transfer of serialized Java
objects and distributed garbage collection.
1. The original implementation depends on Java
Virtual Machine (JVM) class representation
mechanisms and it thus only supports making calls
from one JVM to another. The protocol underlying
this Java-only implementation is known as Java
Remote Method Protocol (JRMP).
2. In order to support code running in a non-JVM
context, a CORBA version was later developed.
B. ROBOT CLASS
This class is used to generate native system
input events for the purposes of test automation, self-
running demos and other applications where control
of the mouse and keyboard is needed. The primary
purpose of Robot is to facilitate automated testing of
Java platform implementation.
C. SAMPLE CODES
1. Server Code for sending message to client
Public void message method ()
{
String s;
s = "MESSAGE" + "n";
System.out.println("hi");
int selected[] = list.getSelectedIndices();
System.out.println("hi " + selected.length);
String hostnames[] = new
String[selected.length];
System.out.println("hi " + hostnames.length);
for (int i = 0; i <selected.length; i++)
{
hostnames[i] = (String)
model.getElementAt(selected[i]);
String ipaddress = hostnames[i];
System.out.println("hi " + ipaddress);
try
{
Socket s1 = new Socket(ipaddress, 2030);
System.out.println("hi");
DataOutputStream dos = new
DataOutputStream(s1.getOutputStream());
System.out.println("hi");
dos.writeBytes(s);
dos.flush();
System.out.println("hi");
}
catch (Exception e)
{
System.out.println(e);
}
}
System.out.println("hi");
msgsendms= new msgsend(this);
System.out.println("hi");
}
Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238
www.ijera.com 236 | P a g e
2. Server code tologoff client
public void logoffmethod(){
String s;
s = "LOGOFF"+"n";
System.out.println("hi");
int selected[] = list.getSelectedIndices();
System.out.println("hi "+selected.length);
String hostnames[]= new
String[selected.length];
System.out.println("hi "+hostnames.length);
for(int i = 0 ; i<selected.length ; i++)
{
hostnames[i]=(String)model.getElementAt(s
elected[i]);
String ipaddress = hostnames[i];
System.out.println("hi
"+ipaddress);
model.removeElement(hostnames[i]);
try {
Socket s3 = new
Socket(ipaddress,2030);
System.out.println("hi");
DataOutputStream dos = new
DataOutputStream(s3.getOutputStream());
System.out.println("hi");
dos.writeBytes(s);
dos.flush();
System.out.println("hi");
rmodel.addElement(hostnames[i]);
}
catch(Exception
e){System.out.println(e);}
}
}
3. Server code to restart client
public void restartmethod(){
String s;
s = "RESTART"+"n";
System.out.println("hi");
int selected[] = list.getSelectedIndices();
System.out.println("hi "+selected.length);
String hostnames[]= new String[selected.length];
System.out.println("hi "+hostnames.length);
for(int i = 0 ; i<selected.length ; i++)
{
hostnames[i]=(String)model.getElementAt(s
elected[i]);
String ipaddress = hostnames[i];
System.out.println("hi
"+ipaddress);
model.removeElement(hostnames[i]);
try {
Socket s2 = new
Socket(ipaddress,2030);
System.out.println("hi");
DataOutputStream dos = new
DataOutputStream(s2.getOutputStream());
System.out.println("hi");
dos.writeBytes(s);
dos.flush();
System.out.println("hi");
rmodel.addElement(hostnames[i]);
}
catch(Exception e){System.out.println(e);}
}
}
4. Client code for sending its live screen to server
public class ClientFirst
{
Socket socket = null;
public static void main(String[] args)
{
newClientFirst().initialize("192.168.1.4", 1122);
}
public void initialize(String ip, int port )
{
Robot robot = null; //Used to capture the screen
Rectangle rectangle = null; //Used to represent
screen dimensions
try
{
System.out.println("Connecting to server ..........");
socket = new Socket(ip, port);
System.out.println("Connection Established.");
//Get default screen device
GraphicsEnvironmentgEnv=GraphicsEnvironment.ge
tLocalGraphicsEnvironment();
GraphicsDevicegDev=gEnv.getDefaultScreenDevice
();
//Get screen dimensions
Dimension dim =
Toolkit.getDefaultToolkit().getScreenSize();
rectangle = new Rectangle(dim);
//Prepare Robot object
robot = new Robot(gDev);
//ScreenSpyer sends screenshots of the client screen
newScreenSpyer(socket,robot,rectangle);
//ServerDelegaterecievesserver commands and
execute them
newServerDelegate(socket,robot);
}
catch (UnknownHostException ex)
{
ex.printStackTrace();
}
catch (IOException ex)
{
ex.printStackTrace();
Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238
www.ijera.com 237 | P a g e
}
catch (AWTException ex)
{
ex.printStackTrace();
}
}
}
IV. SCREENS
The server side was successfully deployed
on the cloud from where it was used to monitor and
manage clients of a particular network.
Fig 2: Server side interface
Fig 3: Successful file transfer operation
Successful operations were carried out using
the server interface with very minute or almost no
delays and the remote clients functioned properly.
V. CONCLUSION
This application mainly deals with the
administrator access from the server. It includes
security and monitoring aspect of the network
remotely. It involves grabbing the screen of multiple
client terminals and showing multiple client screens
at server side. This system also provides facility of
file transfer from server computer to client computer.
These files are stored at the address specified by the
client in its corresponding code. The server also has
the ability to remotely control the entire available
clients. The server can perform actions such as client
restart, client logoff & client shutdown.
The both client and server applications are
very lightweight (size <1MB combined), hence very
flexible and easy to use.
VI. Future Work
“Remote cloud based monitoring” has many
features but there may be many facilities that can be
added to enhance the working of our system. System
Design is creative, it is almost impossible to create a
finished system with the first plan. Hence there is
always a scope for improvements.
1) Creation of log file: To retrieve the information
store at client side and have information
regarding all the operations done in the past.
2) Lock: To disable the inputs from mouse and
keyboard of remote client.
3) Benchmarking: We are currently hosting this at
cloud, but we need to work upon the time based
each operation result for the various type of
hosting platforms (cloud, dedicated, Linux-
based…) available.
ACKNOWLEDGEMENTS
Our sincere thanks to Sakshi “Geeta” Surve,
who is an assistant professor at the Thadomal
Shahani Engineering College, Computer Engineering
department, Mumbai University, Mumbai, India; for
her constant support, guidance and feedback for
implementing this system. Her expert knowledge of
distributed computing and cloud computing has
always been a source of motivation and inspiration to
us.
REFERENCES
[1] Kenneth P. Birman (2005), "Reliable
distributed systems".
[2] Zupeng Li, Daoyin Huang, Jianhua Huang,
“Research of Peer Discovery Method in
Peer-to-Peer Network” ,12th IEEE
Conference on distributed computing and
networking, pp. 37-42, 2008.
[3] L. Alima, A. Ghodsi, and S. Haridi. A
framework for structured peer- to-peer
overlay networks in Global Computing,
223–249, 2011.
[4] "Java ", http://www.java.com/en/, December
18, 2013.
[5] "Remote Method Invocation", http://www.
oracle.com/technetwork/java/javase/tech/ind
ex-jsp-136424.html, January 19, 2013.
[6] "Google Cloud Platform", https://cloud.
google.com/, March 23, 2013.
Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238
www.ijera.com 238 | P a g e
Saurabh Malgaonkar is a post
graduate (Masters in Computer Engineering) pass out
student of the Thadomal Shahani Engineering
College, Computer Engineering Department.
His research interests are networking, distributed
systems and computing, artificial intelligence, data
mining and in particular the intersection of these
fields.
Tejas Hirave is a post graduate (Masters
in Computer Engineering) pass out student of the
Thadomal Shahani Engineering College, Computer
Engineering Department.
His research interests are P2P systems, database
systems, data mining, data structures and networking.
Ms.Swarnalata Bollavarapu has
received M.E. (Computer Engg.) from Thadomal
Shahani Engineering College in 2011. She has more
than 8 years of teaching experience. She is currently
working as Assistant professor in Department of
Computer Engineering at MPSTME, NMIMS
University, Mumbai. Her areas of interest includes
Information Security, Distributed Computing and
Cloud Computing.
.

Contenu connexe

Tendances

A generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemA generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemConference Papers
 
Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middlewareSajan Sahu
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardConference Papers
 
Srs template ieee
Srs template ieeeSrs template ieee
Srs template ieeehoinongdan
 
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET Journal
 
Design of Intrusion Tolerance System based on Service Redundancy Level
Design of Intrusion Tolerance System based on Service Redundancy LevelDesign of Intrusion Tolerance System based on Service Redundancy Level
Design of Intrusion Tolerance System based on Service Redundancy LevelIOSRJEEE
 
11.location based spatial query processing in wireless system
11.location based spatial query processing in wireless system11.location based spatial query processing in wireless system
11.location based spatial query processing in wireless systemAlexander Decker
 
3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless systemAlexander Decker
 
Lighting Automation- A Web-Based Approach
Lighting Automation- A Web-Based ApproachLighting Automation- A Web-Based Approach
Lighting Automation- A Web-Based ApproachApoorva Chandra
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
Highly Available XenApp Cloud
Highly Available XenApp CloudHighly Available XenApp Cloud
Highly Available XenApp Cloudijitcs
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingeSAT Journals
 

Tendances (18)

One m2m 3- managment_capability
One m2m 3- managment_capabilityOne m2m 3- managment_capability
One m2m 3- managment_capability
 
A generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemA generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration system
 
Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Srs template ieee
Srs template ieeeSrs template ieee
Srs template ieee
 
Rfc3415
Rfc3415Rfc3415
Rfc3415
 
Flows in mule
Flows in muleFlows in mule
Flows in mule
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
 
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with Dealership
 
Design of Intrusion Tolerance System based on Service Redundancy Level
Design of Intrusion Tolerance System based on Service Redundancy LevelDesign of Intrusion Tolerance System based on Service Redundancy Level
Design of Intrusion Tolerance System based on Service Redundancy Level
 
11.location based spatial query processing in wireless system
11.location based spatial query processing in wireless system11.location based spatial query processing in wireless system
11.location based spatial query processing in wireless system
 
3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system
 
Lighting Automation- A Web-Based Approach
Lighting Automation- A Web-Based ApproachLighting Automation- A Web-Based Approach
Lighting Automation- A Web-Based Approach
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
Middleware
MiddlewareMiddleware
Middleware
 
Highly Available XenApp Cloud
Highly Available XenApp CloudHighly Available XenApp Cloud
Highly Available XenApp Cloud
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computing
 

En vedette (20)

Ao4301216220
Ao4301216220Ao4301216220
Ao4301216220
 
Az4301280282
Az4301280282Az4301280282
Az4301280282
 
Ag4301181184
Ag4301181184Ag4301181184
Ag4301181184
 
Ab4301153156
Ab4301153156Ab4301153156
Ab4301153156
 
A43060105
A43060105A43060105
A43060105
 
Bb4301290299
Bb4301290299Bb4301290299
Bb4301290299
 
Jj3516091620
Jj3516091620Jj3516091620
Jj3516091620
 
Jk3516211625
Jk3516211625Jk3516211625
Jk3516211625
 
Jn3516471651
Jn3516471651Jn3516471651
Jn3516471651
 
Kw3618561867
Kw3618561867Kw3618561867
Kw3618561867
 
Ks3618311836
Ks3618311836Ks3618311836
Ks3618311836
 
H41045255
H41045255H41045255
H41045255
 
´Presentacion de adverbios (1)
´Presentacion de adverbios (1)´Presentacion de adverbios (1)
´Presentacion de adverbios (1)
 
internet
internetinternet
internet
 
Inquisicion
InquisicionInquisicion
Inquisicion
 
Evolución de la energía en la informática
Evolución de la energía en la informáticaEvolución de la energía en la informática
Evolución de la energía en la informática
 
True Message Of Jesus
True Message Of JesusTrue Message Of Jesus
True Message Of Jesus
 
Trabajo de 2.0
Trabajo de 2.0Trabajo de 2.0
Trabajo de 2.0
 
¿PROPUESTAS, RETOS O TENDENCIAS?
¿PROPUESTAS, RETOS O TENDENCIAS?¿PROPUESTAS, RETOS O TENDENCIAS?
¿PROPUESTAS, RETOS O TENDENCIAS?
 
Seminário TIC e Educação
Seminário TIC e EducaçãoSeminário TIC e Educação
Seminário TIC e Educação
 

Similaire à As4301234238

Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoringIAEME Publication
 
IRJET- Remote Desktop Monitoring and Controlling
IRJET- Remote Desktop Monitoring and ControllingIRJET- Remote Desktop Monitoring and Controlling
IRJET- Remote Desktop Monitoring and ControllingIRJET Journal
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...IRJET Journal
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...IRJET Journal
 
RMC: Real-Time Monitoring and Controlling Approach on Networks
RMC: Real-Time Monitoring and Controlling Approach on  NetworksRMC: Real-Time Monitoring and Controlling Approach on  Networks
RMC: Real-Time Monitoring and Controlling Approach on NetworksIOSR Journals
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud allan sam
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud ComputingIRJET Journal
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Similaire à As4301234238 (20)

Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
 
IRJET- Remote Desktop Monitoring and Controlling
IRJET- Remote Desktop Monitoring and ControllingIRJET- Remote Desktop Monitoring and Controlling
IRJET- Remote Desktop Monitoring and Controlling
 
publishable paper
publishable paperpublishable paper
publishable paper
 
I44084954
I44084954I44084954
I44084954
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
 
RMC: Real-Time Monitoring and Controlling Approach on Networks
RMC: Real-Time Monitoring and Controlling Approach on  NetworksRMC: Real-Time Monitoring and Controlling Approach on  Networks
RMC: Real-Time Monitoring and Controlling Approach on Networks
 
B0320611
B0320611B0320611
B0320611
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
VEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEMVEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEM
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
395 401
395 401395 401
395 401
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
D1072327
D1072327D1072327
D1072327
 

Dernier

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

As4301234238

  • 1. Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238 www.ijera.com 234 | P a g e Remote Nodes Management Using RMI Saurabh Malgaonkar*, Swarnalata Bollavarapu*, Tejas Hirave** *(Computer Engineering Department, Mukesh Patel School of Technology Management & Engineering, NMIMS University, Mumbai, India) ** (Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai University, Mumbai, India) ABSTRACT We have focused upon the design and development of a remote desktop management system using Remote Method Invocation, since it has many advantages in terms of remote computation, software optimization, data access and storage services that do not require end-user knowledge of the physical location and configuration of the system. In this type of a system we have two types of users - clients and the server. The server can control all the activities of the clients and also impose certain restrictions on the clients. The clients can use the data or shared resources, software and information that are provided by the server to computers and other devices as a utility over a network. The major elements of desktop management are assets management, software deployment, patch management, remote desktop sharing, active directory reports and user logon reports. Remote desktop sharing enables users to access and use their own desktop from other machines or locations. This system is focused upon the real time events. Keywords- cloud hosting services, distributed computing, remote control, remote monitoring, networking, real- time applications I. INTRODUCTION Computer networks is a collection of computers and other devices that can send and receive data from one another communication system, since networking deals with data, hence it becomes necessary to focus on the security. Managing the other remote computers is equally important in the congested network environment [1]. Management consists of monitoring, by monitoring the other computers on the network we know what others are doing on their system. This real time application does not involve any end user (client) activity. Only user of the application is administrator sitting at server. This application can be applied to monitor activities of employee in a particular department or the work running on client’s terminal specific lab work session. In today’s fast and growing world, every system is connected to network via internet or by a combinations of LAN (local area network) or by a WAN (wide area network) or by a MAN (metropolitan area network). In an environment where there is an administrator, a user present, management and monitoring becomes the important aspect of the network system. Administrator should have control over the remote computers. This system provides many features and advantages and may have its applications in corporate firms and many other organizations. The need for time-effective and cost-effective solutions has been the basic motive behind the development of this project. We have studied about the cloud services and have analyzed its advantages over the normal networks and hosting services. For this system we have preferred cloud based hosting because of the following advantages: flexibility, availability, fault tolerance, massive processing power and economic feasibility. II. DESIGN A. Product Function Overview This real time application mainly deals with the administrator access from the server. It includes security and monitoring aspect of the network. It involves grabbing the screen of multiple client terminals and showing multiple client screens at server side. The main search and retrieve operation involves the discovery [2] [3] of the nodes of a system along with the grabbing of their information for their inclusion in the server list. B. User Characteristics There will be only one type of user in application –administrator. He/She is the only person to keep watch of networked client terminals from the server side only. He can do function like: 1. Add client. 2. Remove client. 3. Administrator message to the client. 4. Watching screen of single client terminals. RESEARCH ARTICLE OPEN ACCESS
  • 2. Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238 www.ijera.com 235 | P a g e 5. Simultaneously keeping watch of multiple clients. 6. Time flexibility for screen updates. 7. Performing remote operations. C. General Characteristics The client terminal to be watched should have client program installed over there. 1. Inputs and Outputs: Input: Administrator does not have to enter any data. Just by clicking over options he can perform desired operations. Output: Single terminal screen or multiple clients’ screens mapped. 2. External Interface Requirements: A user-friendly GUI has been developed which provides effective screens that an administrator can easily use. D. Performance Constraints In this application, the client screen changes are updated at specified interval of time but if multiple clients are sending their screens simultaneously, then there can be chances of increased network traffic. To overcome this problem, message can be passed from server to client about sending its screen after specified interval. It may be possible that on a networked terminal, there is no work going on & still if clients send its screen at each interval, traffic will be increased but this is also properly addressed. The deployment of the server is on Google cloud hosting service [6] that enables to handle and perform many operations simultaneously without any delays perfectly on a real time basis. Fig 1: Functional Workflow of the system III. IMPLEMENTATION A. RMI The Java Remote Method Invocation Application Programming Interface (API), or Java RMI [5], is a Java [4] API that performs the object- oriented equivalent of remote procedure calls (RPC), with support for direct transfer of serialized Java objects and distributed garbage collection. 1. The original implementation depends on Java Virtual Machine (JVM) class representation mechanisms and it thus only supports making calls from one JVM to another. The protocol underlying this Java-only implementation is known as Java Remote Method Protocol (JRMP). 2. In order to support code running in a non-JVM context, a CORBA version was later developed. B. ROBOT CLASS This class is used to generate native system input events for the purposes of test automation, self- running demos and other applications where control of the mouse and keyboard is needed. The primary purpose of Robot is to facilitate automated testing of Java platform implementation. C. SAMPLE CODES 1. Server Code for sending message to client Public void message method () { String s; s = "MESSAGE" + "n"; System.out.println("hi"); int selected[] = list.getSelectedIndices(); System.out.println("hi " + selected.length); String hostnames[] = new String[selected.length]; System.out.println("hi " + hostnames.length); for (int i = 0; i <selected.length; i++) { hostnames[i] = (String) model.getElementAt(selected[i]); String ipaddress = hostnames[i]; System.out.println("hi " + ipaddress); try { Socket s1 = new Socket(ipaddress, 2030); System.out.println("hi"); DataOutputStream dos = new DataOutputStream(s1.getOutputStream()); System.out.println("hi"); dos.writeBytes(s); dos.flush(); System.out.println("hi"); } catch (Exception e) { System.out.println(e); } } System.out.println("hi"); msgsendms= new msgsend(this); System.out.println("hi"); }
  • 3. Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238 www.ijera.com 236 | P a g e 2. Server code tologoff client public void logoffmethod(){ String s; s = "LOGOFF"+"n"; System.out.println("hi"); int selected[] = list.getSelectedIndices(); System.out.println("hi "+selected.length); String hostnames[]= new String[selected.length]; System.out.println("hi "+hostnames.length); for(int i = 0 ; i<selected.length ; i++) { hostnames[i]=(String)model.getElementAt(s elected[i]); String ipaddress = hostnames[i]; System.out.println("hi "+ipaddress); model.removeElement(hostnames[i]); try { Socket s3 = new Socket(ipaddress,2030); System.out.println("hi"); DataOutputStream dos = new DataOutputStream(s3.getOutputStream()); System.out.println("hi"); dos.writeBytes(s); dos.flush(); System.out.println("hi"); rmodel.addElement(hostnames[i]); } catch(Exception e){System.out.println(e);} } } 3. Server code to restart client public void restartmethod(){ String s; s = "RESTART"+"n"; System.out.println("hi"); int selected[] = list.getSelectedIndices(); System.out.println("hi "+selected.length); String hostnames[]= new String[selected.length]; System.out.println("hi "+hostnames.length); for(int i = 0 ; i<selected.length ; i++) { hostnames[i]=(String)model.getElementAt(s elected[i]); String ipaddress = hostnames[i]; System.out.println("hi "+ipaddress); model.removeElement(hostnames[i]); try { Socket s2 = new Socket(ipaddress,2030); System.out.println("hi"); DataOutputStream dos = new DataOutputStream(s2.getOutputStream()); System.out.println("hi"); dos.writeBytes(s); dos.flush(); System.out.println("hi"); rmodel.addElement(hostnames[i]); } catch(Exception e){System.out.println(e);} } } 4. Client code for sending its live screen to server public class ClientFirst { Socket socket = null; public static void main(String[] args) { newClientFirst().initialize("192.168.1.4", 1122); } public void initialize(String ip, int port ) { Robot robot = null; //Used to capture the screen Rectangle rectangle = null; //Used to represent screen dimensions try { System.out.println("Connecting to server .........."); socket = new Socket(ip, port); System.out.println("Connection Established."); //Get default screen device GraphicsEnvironmentgEnv=GraphicsEnvironment.ge tLocalGraphicsEnvironment(); GraphicsDevicegDev=gEnv.getDefaultScreenDevice (); //Get screen dimensions Dimension dim = Toolkit.getDefaultToolkit().getScreenSize(); rectangle = new Rectangle(dim); //Prepare Robot object robot = new Robot(gDev); //ScreenSpyer sends screenshots of the client screen newScreenSpyer(socket,robot,rectangle); //ServerDelegaterecievesserver commands and execute them newServerDelegate(socket,robot); } catch (UnknownHostException ex) { ex.printStackTrace(); } catch (IOException ex) { ex.printStackTrace();
  • 4. Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238 www.ijera.com 237 | P a g e } catch (AWTException ex) { ex.printStackTrace(); } } } IV. SCREENS The server side was successfully deployed on the cloud from where it was used to monitor and manage clients of a particular network. Fig 2: Server side interface Fig 3: Successful file transfer operation Successful operations were carried out using the server interface with very minute or almost no delays and the remote clients functioned properly. V. CONCLUSION This application mainly deals with the administrator access from the server. It includes security and monitoring aspect of the network remotely. It involves grabbing the screen of multiple client terminals and showing multiple client screens at server side. This system also provides facility of file transfer from server computer to client computer. These files are stored at the address specified by the client in its corresponding code. The server also has the ability to remotely control the entire available clients. The server can perform actions such as client restart, client logoff & client shutdown. The both client and server applications are very lightweight (size <1MB combined), hence very flexible and easy to use. VI. Future Work “Remote cloud based monitoring” has many features but there may be many facilities that can be added to enhance the working of our system. System Design is creative, it is almost impossible to create a finished system with the first plan. Hence there is always a scope for improvements. 1) Creation of log file: To retrieve the information store at client side and have information regarding all the operations done in the past. 2) Lock: To disable the inputs from mouse and keyboard of remote client. 3) Benchmarking: We are currently hosting this at cloud, but we need to work upon the time based each operation result for the various type of hosting platforms (cloud, dedicated, Linux- based…) available. ACKNOWLEDGEMENTS Our sincere thanks to Sakshi “Geeta” Surve, who is an assistant professor at the Thadomal Shahani Engineering College, Computer Engineering department, Mumbai University, Mumbai, India; for her constant support, guidance and feedback for implementing this system. Her expert knowledge of distributed computing and cloud computing has always been a source of motivation and inspiration to us. REFERENCES [1] Kenneth P. Birman (2005), "Reliable distributed systems". [2] Zupeng Li, Daoyin Huang, Jianhua Huang, “Research of Peer Discovery Method in Peer-to-Peer Network” ,12th IEEE Conference on distributed computing and networking, pp. 37-42, 2008. [3] L. Alima, A. Ghodsi, and S. Haridi. A framework for structured peer- to-peer overlay networks in Global Computing, 223–249, 2011. [4] "Java ", http://www.java.com/en/, December 18, 2013. [5] "Remote Method Invocation", http://www. oracle.com/technetwork/java/javase/tech/ind ex-jsp-136424.html, January 19, 2013. [6] "Google Cloud Platform", https://cloud. google.com/, March 23, 2013.
  • 5. Saurabh Malgaonkar et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.234-238 www.ijera.com 238 | P a g e Saurabh Malgaonkar is a post graduate (Masters in Computer Engineering) pass out student of the Thadomal Shahani Engineering College, Computer Engineering Department. His research interests are networking, distributed systems and computing, artificial intelligence, data mining and in particular the intersection of these fields. Tejas Hirave is a post graduate (Masters in Computer Engineering) pass out student of the Thadomal Shahani Engineering College, Computer Engineering Department. His research interests are P2P systems, database systems, data mining, data structures and networking. Ms.Swarnalata Bollavarapu has received M.E. (Computer Engg.) from Thadomal Shahani Engineering College in 2011. She has more than 8 years of teaching experience. She is currently working as Assistant professor in Department of Computer Engineering at MPSTME, NMIMS University, Mumbai. Her areas of interest includes Information Security, Distributed Computing and Cloud Computing. .