SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com         Vol.2, Issue.6, Nov-Dec. 2012 pp-4019-4021       ISSN: 2249-6645

                          Smart Connect Using Cellular Technology
                             Ms. Priyanka V. Kampasi, Prof. Y.C. Kulkarni,
                               1,2
                                 Bharati Vidyapeeth’s College of Engineering/IT, Pune, India

ABSTRACT: Technical developments in computer                    system, it shall respond back by sending an
hardware and software make it possible to introduce             acknowledgment message asking password so as to confirm
automation into virtually all aspects of human-machine          that an authentic user has made the request.
systems. Automation has made Software applications much                  As soon as the correct password is received as a
more efficient to use. This paper proposes that automation      response to the request, the system shall generate 4-digit
can be applied to desktop sharing in which a system can         conformation code for establishing the connectivity. As soon
operate automatically anywhere in the world using GSM           as the system is connected, the data transfer can take place.
technology & VIRTUAL LAN concept.                               For providing security to the data transmission, SHA-1
          The proposed system will be used to make the          algorithm is used.
purpose of data access simpler, keeping in mind the needs                The system is basically focused for those people
of the IT industries. Through this system, automated desktop    who travel around the globe and need to be consistently
sharing can be implemented with effective cause. Today's        connected to their workplace or home at the same time.
desktop conferencing and groupware software often assume        The proposed system has a great potential and it will benefit
a serial work model in which information (pictures,             the masses for a long time.
documents, and presentations) are prepared by one person                 Everybody these days possesses a Mobile Phone.
and then disseminated to others for comments, revision, or      As it is small in size and portable, it become a smarter
review. However, many types of collaborative work are           choice for accessing the remote desktop than a PC or a
much more parallel, with many people viewing, updating,         laptop. This paper proposes the use of Mobile Phones
and adding information concurrently across cross-               (equipped with Internet features) by the IT professionals to
platform display sharing between Mac OS, Windows, and           access their office computers after proper authentication
UNIX operating systems. The current EMSL Televiewer             check.
prototype supports display sharing of application windows,               The overall system will require hardware
screen regions, and desktops. This system proposes              components like a Modem, Microcontroller, Microprocessor
enhancements to the EMSL Televiewer that will provide           and a USB Port to accomplish this task. For secure
collaborative annotations over the display, shared mouse        transmission of data between the cellular device and the PC,
cursors, pointer, high performance data compression, and        encryption algorithm (SHA 1) will be used.
session recording capabilities. When completed, the EMSL                 Apart from this if ROBOT APIs are used then we
Televiewer will provide researchers and the scientific          can use our Mobile phone as a remote control for switching
community a powerful tool that can by itself open up many       on or off the lights, adjusting the thermostat of our AC. It
new avenues for collaboration and will fit well with other      could also be used for indicating the temperature in high
tools to provide a comprehensive collaborative                  temperature zones like Nuclear Reactors.
environment.                                                             The whole application is divided into modules
                                                                according to their functionalities. The output of one module
Keywords: Cell Phone, Desktop Sharing, Encryption,              is input for the next module. Intended Audience and
GSM, Microcontroller.                                           Reading Suggestions This document is intended for the
                                                                persons in the following categories Students doing
               I.    INTRODUCTION                               Graduation in Computers. Internal and External guide.
         The concept of Desktop Sharing has revolutionized      Most of the industries need it for their project development.
the work of IT professionals immensely. While sitting at
home or while roaming, an IT professional can work on his                 II.    The SHA-1 hash function
office computer anytime. The Computer system in the office             SHA-1 produces a 160-bit message digest based on
can be accessed by the employee anywhere. Yes, of Course      principles similar to those used by Ronald L. Rivest of MIT
there are security considerations that must be met. That is,  in the design of the MD4 and MD5 message digest
the authenticity of the person requesting access to the       algorithms, but has a more conservative design. The original
workplace computer. Earlier even though a person could        specification of the algorithm was published in 1993 as the
remotely access his/her office computer but still he/she      Secure Hash Standard, FIPS PUB 180, by US government
required a desktop computer or a laptop. The Goal of          standards agency NIST (National Institute of Standards and
designing this application is for the benefit of industry     Technology). This version is now often referred to as SHA-
people by allowing them multi-sharing of the computer         0. It was withdrawn by NSA shortly after publication and
screen for their assignments through cellular technology like was superseded by the revised version, published in 1995 in
a Cell Phone. It requires a PC with a modem setup. The        FIPS PUB 180-1 and commonly referred to as SHA-1.
computer/laptop contains important data or information.                SHA-1 differs from SHA-0 only by a single
This information can be accessed by the user anywhere         bitwise rotation in the message schedule of its compression
anytime through her mobile phone. The Cell Phone must be      function; this was done, according to NSA, to correct a flaw
Internet enabled. When a request is send by the cell phone    in the original algorithm which reduced its cryptographic
to the respective modem which is received using the GSM       security. However, NSA did not provide any further
                                                              explanation or identify the flaw that was corrected.
                                                   www.ijmer.com                                               4019 | Page
International Journal of Modern Engineering Research (IJMER)
                 www.ijmer.com         Vol.2, Issue.6, Nov-Dec. 2012 pp-2594-2600       ISSN: 2249-6645
Weaknesses have subsequently been reported in both SHA            Environments (IDEs) but lacks usability in more general
and SHA-1. SHA-1 appears to provide greater resistance to         scenarios. Unfortunately no hard research has been done on
attacks, supporting the NSA’s assertion that the change           the efficacy of the technique but it is important to remember
increased the security.                                           that desktop sharing is just one facet of collaboration
                                                                  technology.
                                                                            Help desk is a generic name typically associated
                                                                  with an end-user support center. Prior to the creation of a
                                                                  dedicated help desk, end-users often resorted to contacting a
                                                                  friend or colleague for assistance. Today's savvy technology
                                                                  managers realize that it is critical to transform outdated
                                                                  "help desks," which rely primarily on telephone
                                                                  communications, into efficiently managed "service desks"
                                                                  that efficiently and economically accommodate multiple
                                                                  forms of interaction - from voice and data to email and
                                                                  instant messaging. They also understand that by
                                                                  transitioning to self-assist and remote incident resolution
                                                                  they can reduce service desk operational costs by half, while
                                                                  dramatically improving the quality of service provided.
One iteration within the SHA-1 compression function:                        Although the telephone is the preferred method of
A, B, C, D and E are 32-bit words of the state;                   seeking support, end-users can encounter frustration when
F is a nonlinear function that varies;                            calling the help desk. End-users often lack confidence that
n denotes a left bit rotation by n places;                        they will be able to adequately describe the issue they are
n varies for each operation;                                      experiencing or fear embarrassment for their lack of
Wt is the expanded message word of round t;                       application and or computer knowledge and skills. This can
Kt is the round constant of round t;                              lead to confusion and misinterpretation for the support
Denotes addition modulo 232                                       specialist as they attempt to resolve the issue. Concern over
                                                                  a language barrier is a potential drawback of phone support
          III.      LITRATURE SURVEY                              as well. The end-user may become frustrated and abandoned
          Desktop sharing commonly refers to a remote             the call before their issue is resolved if they're unable to
frame buffer technology. Desktop sharing allows a user to         understand a support specialist due to a thick accent.
send screen data to be drawn elsewhere and receive input                    In order to overcome such problem, the Help Desk
remotely. Its applications vary from remote system                can capture the customers desktop and solve the problem
administration to accessing virtual machines. There has           themselves.
been much research concerning the use of desktop sharing
as a platform for collaboration. A few useful features appear                  3. SYSTEM ARCHITECTURE
in several papers.
          The BASS Application Sharing System established
the idea of applying a secondary protocol to re-encode video
and stream it separately from the frame buffer for any video
playing on the screen. Additionally the sharing system
supports per-application sharing by removing all non-
application specific information from the remote frame
buffer. In one system researchers enhanced the Virtual
Network Computing (VNC) protocol by adding an
additional layer of authentication to allow for view-only or
normal interactivity connections.
          Systems that support multicast (multiple people
only seeing one screen) tend to use the Binary Floor Control                          Fig. 1,
Protocol to determine controllability of the screen at any
one point in time. There are also other papers of interest that            A user has to send an SMS by the cell phone to the
cover non-desktop sharing collaboration. For example,             home server. It will be received through hardware modules
research on remote pair programming, where two users              like modem, microcontroller and a microprocessor. The
work on the same code at the same time using shared               system responds back by sending an acknowledgment
cursors and synchronized codebases, differs from desktop          message asking user to prove his /her authenticity.
sharing because both users are still seeing different                      Incase of authentic password reception, the system
desktops. Instead of actually visualizing the other               generates a onetime password for the user to establish the
collaborator’s desktop, a user of the Sangam tool has a           connectivity. As soon as the system is connected, the data
synchronized view and cursor with the other collaborators.        transfer can take place. For providing security to the data
This approach works well in very specialized environments         transmission, a very powerful encryption algorithm is used.
such      as    programming       Integrated    Development

                                                     www.ijmer.com                                                 4020 | Page
International Journal of Modern Engineering Research (IJMER)
                   www.ijmer.com         Vol.2, Issue.6, Nov-Dec. 2012 pp-2594-2600       ISSN: 2249-6645
                                                                                      VI.     CONCLUSION
                                                                      In conclusion, we feel that the proposed system has a great
                                                                      potential in revolutionizing the concept of Desktop Sharing.
                                                                      As Mobile phones are small in size and easily portable, they
                                                                      become a smarter choice for accessing the remote desktop
                                                                      than a PC or a laptop. They can be easily carried and
                                                                      handled by their users. They are a smarter means of working
                                                                      on Remote Systems than a traditional desktop computer or a
                                                                      laptop. Also a cell phone can become a remote control for
                                                                      its users in switching on or off the light bulbs or also act as
                                                                      an indicator showing temperature readings in high
                                                                      temperature zones.

                                                                                           REFERENCES
                                                                      [1]   Two Factor Authentication Using Mobile Phones Fadi
                                                                            Aloul,Syed Zahidi, Wassim El-Hajj
                   Fig. 2, Sequence Diagram                           [2]   Towards Ubiquitous Computing via Secure Desktop
                                                                            Service Pan-Lung Tsai, Student Member,IEEE, and
                                                                            Chin-Laung Lei, Member , IEEE
                                                                      [3]   A Herzberg,”Payments and Banking with Mobile
                                                                            Personal Devices”, Communications of the ACM,
                                                                            46(5), 53-59, May 2008
                                                                      [4]    J. Brainard, A. Juels, R. L. Rivest,” Fourth Factor
                                                                            Authentication”: ACM CCS, 168-179,2010
                                                                      [5]   National Institute on Standards and Technology
                                                                            Computer Security Resource Center, NIST's Policy on
                                                                            Hash Functions, March 29, 2009.
                                                                      [6]   Niels Ferguson, Bruce Schneier, and Tadayoshi
                                                                            Kohno, Cryptography Engineering (http:/ / www.
                                                                            schneier. com/ book-ce. html), John Wiley
                                                                            & Sons, 2010.
                                                                      [7]   A. Josang and G. Sanderud, “Security in Mobile
                                                                            Communications: Challenges and Opportunities” in
                                                                            Proc. Of the Australian information security workshop
                                                                            conderence on sACSW frontiers, 43-48, 2003.

                    Fig. 3,   Use case diagram


                   IV.        ADVANTAGES
4.1 Anyone can access data from a PC anywhere and anytime
    by simply sending an SMS.
4.2 It saves money by lowering your monthly utility bills.
4.3 Easy to operate and use as Mobile Phones are extensively
    used.
4.4 Has negligible portability issues as Cell Phones easily fit in
    pockets.

                  V.      DISADVANTAGES
5.1 The energy required to run the devices .This problem can be
    removed by using solar technology to run the system.
5.2 Installation will need expertise person the local resident will
    face a problem in installation.
5.3 There is maintenance of this system is required as this is a
    new technology and have potential risks. Regular checkup
    of the security and other critical operations are necessary for
    such new technology.




                                                         www.ijmer.com                                                  4021 | Page

More Related Content

What's hot

Information and communication technology tools(ict)
Information and communication technology tools(ict)Information and communication technology tools(ict)
Information and communication technology tools(ict)voc35 brislin
 
User interface software tools past present and future
User interface software tools past present and futureUser interface software tools past present and future
User interface software tools past present and futureAlison HONG
 
User Interface Design For Programmers
User Interface Design For ProgrammersUser Interface Design For Programmers
User Interface Design For ProgrammersChris Poteet
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarTapesh Chalisgaonkar
 
Design computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesDesign computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesSwapnali Pawar
 
Well Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and MobilityWell Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and MobilitySymantec APJ
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration StrategiesJoe Honan
 
PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)SHRIBALAJIINFOTECH
 
Making Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnMaking Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnSandy Kemsley
 
Nec Executive Knowledge Worker
Nec   Executive Knowledge WorkerNec   Executive Knowledge Worker
Nec Executive Knowledge Workerhypknight
 
Mobile sector's idea
Mobile sector's ideaMobile sector's idea
Mobile sector's ideaChen Chen
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computerssir-smartt
 
1. palma integration of learning across subject discipline
1. palma  integration of learning across subject discipline1. palma  integration of learning across subject discipline
1. palma integration of learning across subject disciplineDonah Basco
 

What's hot (20)

Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Information and communication technology tools(ict)
Information and communication technology tools(ict)Information and communication technology tools(ict)
Information and communication technology tools(ict)
 
User interface software tools past present and future
User interface software tools past present and futureUser interface software tools past present and future
User interface software tools past present and future
 
User Interface Design For Programmers
User Interface Design For ProgrammersUser Interface Design For Programmers
User Interface Design For Programmers
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
 
MSCIT Unit 1
MSCIT Unit 1MSCIT Unit 1
MSCIT Unit 1
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
Design computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesDesign computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile Technologies
 
Well Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and MobilityWell Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and Mobility
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration Strategies
 
PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)
 
Chap1
Chap1Chap1
Chap1
 
Making Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnMaking Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, Tallinn
 
MS-CIT Unit 4 (slide share)
MS-CIT Unit 4 (slide share)MS-CIT Unit 4 (slide share)
MS-CIT Unit 4 (slide share)
 
Plantronics UC Presentation
Plantronics UC PresentationPlantronics UC Presentation
Plantronics UC Presentation
 
Nec Executive Knowledge Worker
Nec   Executive Knowledge WorkerNec   Executive Knowledge Worker
Nec Executive Knowledge Worker
 
Mobile sector's idea
Mobile sector's ideaMobile sector's idea
Mobile sector's idea
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
 
1. palma integration of learning across subject discipline
1. palma  integration of learning across subject discipline1. palma  integration of learning across subject discipline
1. palma integration of learning across subject discipline
 

Viewers also liked

Dv2645244526
Dv2645244526 Dv2645244526
Dv2645244526 IJMER
 
Marketing a small business
Marketing a small businessMarketing a small business
Marketing a small businessdenise2228
 
On pairs of Special Polygonal numbers with Unit difference
On pairs of Special Polygonal numbers with Unit differenceOn pairs of Special Polygonal numbers with Unit difference
On pairs of Special Polygonal numbers with Unit differenceIJMER
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 
Impact of Hybrid Pass-Transistor Logic (HPTL) on Power, Delay and Area in VL...
Impact of Hybrid Pass-Transistor Logic (HPTL) on Power, Delay  and Area in VL...Impact of Hybrid Pass-Transistor Logic (HPTL) on Power, Delay  and Area in VL...
Impact of Hybrid Pass-Transistor Logic (HPTL) on Power, Delay and Area in VL...IJMER
 
Ijmer 46060106
Ijmer 46060106Ijmer 46060106
Ijmer 46060106IJMER
 
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...IJMER
 
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...IJMER
 
Protocol
ProtocolProtocol
Protocolso1166
 
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...IJMER
 
Cw3210561060
Cw3210561060Cw3210561060
Cw3210561060IJMER
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
презентация уко1 вер.3
презентация уко1 вер.3презентация уко1 вер.3
презентация уко1 вер.3uca51
 
Nanotechnology: Shaping the world atom by atom
Nanotechnology: Shaping the world atom by atomNanotechnology: Shaping the world atom by atom
Nanotechnology: Shaping the world atom by atomIJMER
 
EWIL: description of the training approach
EWIL: description of the training approachEWIL: description of the training approach
EWIL: description of the training approachEWIL_EU
 
Comprehensive Long-Run Incremental Cost (LRIC)-Voltage Network Pricing Approa...
Comprehensive Long-Run Incremental Cost (LRIC)-Voltage Network Pricing Approa...Comprehensive Long-Run Incremental Cost (LRIC)-Voltage Network Pricing Approa...
Comprehensive Long-Run Incremental Cost (LRIC)-Voltage Network Pricing Approa...IJMER
 
Speech Compression Using Wavelets
Speech Compression Using Wavelets Speech Compression Using Wavelets
Speech Compression Using Wavelets IJMER
 
Wheel Speed Signal Time-Frequency Transform and Tire Pressure Monitoring Sys...
Wheel Speed Signal Time-Frequency Transform and Tire  Pressure Monitoring Sys...Wheel Speed Signal Time-Frequency Transform and Tire  Pressure Monitoring Sys...
Wheel Speed Signal Time-Frequency Transform and Tire Pressure Monitoring Sys...IJMER
 
Как сделать документы красивыми
Как сделать документы красивымиКак сделать документы красивыми
Как сделать документы красивымиYury Kniazhevich
 

Viewers also liked (20)

Dv2645244526
Dv2645244526 Dv2645244526
Dv2645244526
 
Marketing a small business
Marketing a small businessMarketing a small business
Marketing a small business
 
On pairs of Special Polygonal numbers with Unit difference
On pairs of Special Polygonal numbers with Unit differenceOn pairs of Special Polygonal numbers with Unit difference
On pairs of Special Polygonal numbers with Unit difference
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
Impact of Hybrid Pass-Transistor Logic (HPTL) on Power, Delay and Area in VL...
Impact of Hybrid Pass-Transistor Logic (HPTL) on Power, Delay  and Area in VL...Impact of Hybrid Pass-Transistor Logic (HPTL) on Power, Delay  and Area in VL...
Impact of Hybrid Pass-Transistor Logic (HPTL) on Power, Delay and Area in VL...
 
Ijmer 46060106
Ijmer 46060106Ijmer 46060106
Ijmer 46060106
 
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
On ranges and null spaces of a special type of operator named 𝝀 − 𝒋𝒆𝒄𝒕𝒊𝒐𝒏. – ...
 
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
Influence of Mineralogy and Fabric on the Engineering Properties of the Miang...
 
Protocol
ProtocolProtocol
Protocol
 
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
 
Cw3210561060
Cw3210561060Cw3210561060
Cw3210561060
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
презентация уко1 вер.3
презентация уко1 вер.3презентация уко1 вер.3
презентация уко1 вер.3
 
Nanotechnology: Shaping the world atom by atom
Nanotechnology: Shaping the world atom by atomNanotechnology: Shaping the world atom by atom
Nanotechnology: Shaping the world atom by atom
 
EWIL: description of the training approach
EWIL: description of the training approachEWIL: description of the training approach
EWIL: description of the training approach
 
Comprehensive Long-Run Incremental Cost (LRIC)-Voltage Network Pricing Approa...
Comprehensive Long-Run Incremental Cost (LRIC)-Voltage Network Pricing Approa...Comprehensive Long-Run Incremental Cost (LRIC)-Voltage Network Pricing Approa...
Comprehensive Long-Run Incremental Cost (LRIC)-Voltage Network Pricing Approa...
 
Speech Compression Using Wavelets
Speech Compression Using Wavelets Speech Compression Using Wavelets
Speech Compression Using Wavelets
 
Wheel Speed Signal Time-Frequency Transform and Tire Pressure Monitoring Sys...
Wheel Speed Signal Time-Frequency Transform and Tire  Pressure Monitoring Sys...Wheel Speed Signal Time-Frequency Transform and Tire  Pressure Monitoring Sys...
Wheel Speed Signal Time-Frequency Transform and Tire Pressure Monitoring Sys...
 
Как сделать документы красивыми
Как сделать документы красивымиКак сделать документы красивыми
Как сделать документы красивыми
 
Daniel - Pre daniel
Daniel - Pre danielDaniel - Pre daniel
Daniel - Pre daniel
 

Similar to Smart Connect Using Cellular Technology

A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile ComputingSara Alvarez
 
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Olivia Moran
 
Vdi Wp
Vdi WpVdi Wp
Vdi WpConRes
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it applicationKumar
 
Microsoft HOmeOS Whitepaper 2012
Microsoft  HOmeOS Whitepaper 2012Microsoft  HOmeOS Whitepaper 2012
Microsoft HOmeOS Whitepaper 2012Domotica daVinci
 
Mobile technology-Unit 1
Mobile technology-Unit 1Mobile technology-Unit 1
Mobile technology-Unit 1Swapnali Pawar
 
White paper desktop-virtualization-ps
White paper desktop-virtualization-psWhite paper desktop-virtualization-ps
White paper desktop-virtualization-psSuneel Dogra
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
NEW Advanced low cost voice recognition based smart homeoffice
NEW Advanced low cost voice recognition based smart homeofficeNEW Advanced low cost voice recognition based smart homeoffice
NEW Advanced low cost voice recognition based smart homeofficemohammed shoaib uddin
 
Welcome To The Mobile World
Welcome To The Mobile WorldWelcome To The Mobile World
Welcome To The Mobile WorldFrank La Vigne
 
Computer application in business
Computer application in businessComputer application in business
Computer application in businessManas Saha
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)Karteek Irukulla
 
It 443 lecture 1
It 443 lecture 1It 443 lecture 1
It 443 lecture 1elisha25
 
Rugged Mobile Business Solution - Top 10 Trend in Supply Chain Technology
Rugged Mobile Business Solution - Top 10 Trend in Supply Chain TechnologyRugged Mobile Business Solution - Top 10 Trend in Supply Chain Technology
Rugged Mobile Business Solution - Top 10 Trend in Supply Chain TechnologyIntermec Asia
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
virtualization whitepaper en
virtualization whitepaper envirtualization whitepaper en
virtualization whitepaper eneyeOS
 
SIPquest-Intel Sept29.ppt
SIPquest-Intel Sept29.pptSIPquest-Intel Sept29.ppt
SIPquest-Intel Sept29.pptVideoguy
 
Lesson one introduction to mc
Lesson one  introduction to mcLesson one  introduction to mc
Lesson one introduction to mcssuser8662bb
 

Similar to Smart Connect Using Cellular Technology (20)

A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
 
Vdi Wp
Vdi WpVdi Wp
Vdi Wp
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 
Microsoft HOmeOS Whitepaper 2012
Microsoft  HOmeOS Whitepaper 2012Microsoft  HOmeOS Whitepaper 2012
Microsoft HOmeOS Whitepaper 2012
 
Mobile technology-Unit 1
Mobile technology-Unit 1Mobile technology-Unit 1
Mobile technology-Unit 1
 
White paper desktop-virtualization-ps
White paper desktop-virtualization-psWhite paper desktop-virtualization-ps
White paper desktop-virtualization-ps
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
NEW Advanced low cost voice recognition based smart homeoffice
NEW Advanced low cost voice recognition based smart homeofficeNEW Advanced low cost voice recognition based smart homeoffice
NEW Advanced low cost voice recognition based smart homeoffice
 
Pda
PdaPda
Pda
 
Welcome To The Mobile World
Welcome To The Mobile WorldWelcome To The Mobile World
Welcome To The Mobile World
 
Computer application in business
Computer application in businessComputer application in business
Computer application in business
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
Technology update
Technology updateTechnology update
Technology update
 
It 443 lecture 1
It 443 lecture 1It 443 lecture 1
It 443 lecture 1
 
Rugged Mobile Business Solution - Top 10 Trend in Supply Chain Technology
Rugged Mobile Business Solution - Top 10 Trend in Supply Chain TechnologyRugged Mobile Business Solution - Top 10 Trend in Supply Chain Technology
Rugged Mobile Business Solution - Top 10 Trend in Supply Chain Technology
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
virtualization whitepaper en
virtualization whitepaper envirtualization whitepaper en
virtualization whitepaper en
 
SIPquest-Intel Sept29.ppt
SIPquest-Intel Sept29.pptSIPquest-Intel Sept29.ppt
SIPquest-Intel Sept29.ppt
 
Lesson one introduction to mc
Lesson one  introduction to mcLesson one  introduction to mc
Lesson one introduction to mc
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Smart Connect Using Cellular Technology

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4019-4021 ISSN: 2249-6645 Smart Connect Using Cellular Technology Ms. Priyanka V. Kampasi, Prof. Y.C. Kulkarni, 1,2 Bharati Vidyapeeth’s College of Engineering/IT, Pune, India ABSTRACT: Technical developments in computer system, it shall respond back by sending an hardware and software make it possible to introduce acknowledgment message asking password so as to confirm automation into virtually all aspects of human-machine that an authentic user has made the request. systems. Automation has made Software applications much As soon as the correct password is received as a more efficient to use. This paper proposes that automation response to the request, the system shall generate 4-digit can be applied to desktop sharing in which a system can conformation code for establishing the connectivity. As soon operate automatically anywhere in the world using GSM as the system is connected, the data transfer can take place. technology & VIRTUAL LAN concept. For providing security to the data transmission, SHA-1 The proposed system will be used to make the algorithm is used. purpose of data access simpler, keeping in mind the needs The system is basically focused for those people of the IT industries. Through this system, automated desktop who travel around the globe and need to be consistently sharing can be implemented with effective cause. Today's connected to their workplace or home at the same time. desktop conferencing and groupware software often assume The proposed system has a great potential and it will benefit a serial work model in which information (pictures, the masses for a long time. documents, and presentations) are prepared by one person Everybody these days possesses a Mobile Phone. and then disseminated to others for comments, revision, or As it is small in size and portable, it become a smarter review. However, many types of collaborative work are choice for accessing the remote desktop than a PC or a much more parallel, with many people viewing, updating, laptop. This paper proposes the use of Mobile Phones and adding information concurrently across cross- (equipped with Internet features) by the IT professionals to platform display sharing between Mac OS, Windows, and access their office computers after proper authentication UNIX operating systems. The current EMSL Televiewer check. prototype supports display sharing of application windows, The overall system will require hardware screen regions, and desktops. This system proposes components like a Modem, Microcontroller, Microprocessor enhancements to the EMSL Televiewer that will provide and a USB Port to accomplish this task. For secure collaborative annotations over the display, shared mouse transmission of data between the cellular device and the PC, cursors, pointer, high performance data compression, and encryption algorithm (SHA 1) will be used. session recording capabilities. When completed, the EMSL Apart from this if ROBOT APIs are used then we Televiewer will provide researchers and the scientific can use our Mobile phone as a remote control for switching community a powerful tool that can by itself open up many on or off the lights, adjusting the thermostat of our AC. It new avenues for collaboration and will fit well with other could also be used for indicating the temperature in high tools to provide a comprehensive collaborative temperature zones like Nuclear Reactors. environment. The whole application is divided into modules according to their functionalities. The output of one module Keywords: Cell Phone, Desktop Sharing, Encryption, is input for the next module. Intended Audience and GSM, Microcontroller. Reading Suggestions This document is intended for the persons in the following categories Students doing I. INTRODUCTION Graduation in Computers. Internal and External guide. The concept of Desktop Sharing has revolutionized Most of the industries need it for their project development. the work of IT professionals immensely. While sitting at home or while roaming, an IT professional can work on his II. The SHA-1 hash function office computer anytime. The Computer system in the office SHA-1 produces a 160-bit message digest based on can be accessed by the employee anywhere. Yes, of Course principles similar to those used by Ronald L. Rivest of MIT there are security considerations that must be met. That is, in the design of the MD4 and MD5 message digest the authenticity of the person requesting access to the algorithms, but has a more conservative design. The original workplace computer. Earlier even though a person could specification of the algorithm was published in 1993 as the remotely access his/her office computer but still he/she Secure Hash Standard, FIPS PUB 180, by US government required a desktop computer or a laptop. The Goal of standards agency NIST (National Institute of Standards and designing this application is for the benefit of industry Technology). This version is now often referred to as SHA- people by allowing them multi-sharing of the computer 0. It was withdrawn by NSA shortly after publication and screen for their assignments through cellular technology like was superseded by the revised version, published in 1995 in a Cell Phone. It requires a PC with a modem setup. The FIPS PUB 180-1 and commonly referred to as SHA-1. computer/laptop contains important data or information. SHA-1 differs from SHA-0 only by a single This information can be accessed by the user anywhere bitwise rotation in the message schedule of its compression anytime through her mobile phone. The Cell Phone must be function; this was done, according to NSA, to correct a flaw Internet enabled. When a request is send by the cell phone in the original algorithm which reduced its cryptographic to the respective modem which is received using the GSM security. However, NSA did not provide any further explanation or identify the flaw that was corrected. www.ijmer.com 4019 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-2594-2600 ISSN: 2249-6645 Weaknesses have subsequently been reported in both SHA Environments (IDEs) but lacks usability in more general and SHA-1. SHA-1 appears to provide greater resistance to scenarios. Unfortunately no hard research has been done on attacks, supporting the NSA’s assertion that the change the efficacy of the technique but it is important to remember increased the security. that desktop sharing is just one facet of collaboration technology. Help desk is a generic name typically associated with an end-user support center. Prior to the creation of a dedicated help desk, end-users often resorted to contacting a friend or colleague for assistance. Today's savvy technology managers realize that it is critical to transform outdated "help desks," which rely primarily on telephone communications, into efficiently managed "service desks" that efficiently and economically accommodate multiple forms of interaction - from voice and data to email and instant messaging. They also understand that by transitioning to self-assist and remote incident resolution they can reduce service desk operational costs by half, while dramatically improving the quality of service provided. One iteration within the SHA-1 compression function: Although the telephone is the preferred method of A, B, C, D and E are 32-bit words of the state; seeking support, end-users can encounter frustration when F is a nonlinear function that varies; calling the help desk. End-users often lack confidence that n denotes a left bit rotation by n places; they will be able to adequately describe the issue they are n varies for each operation; experiencing or fear embarrassment for their lack of Wt is the expanded message word of round t; application and or computer knowledge and skills. This can Kt is the round constant of round t; lead to confusion and misinterpretation for the support Denotes addition modulo 232 specialist as they attempt to resolve the issue. Concern over a language barrier is a potential drawback of phone support III. LITRATURE SURVEY as well. The end-user may become frustrated and abandoned Desktop sharing commonly refers to a remote the call before their issue is resolved if they're unable to frame buffer technology. Desktop sharing allows a user to understand a support specialist due to a thick accent. send screen data to be drawn elsewhere and receive input In order to overcome such problem, the Help Desk remotely. Its applications vary from remote system can capture the customers desktop and solve the problem administration to accessing virtual machines. There has themselves. been much research concerning the use of desktop sharing as a platform for collaboration. A few useful features appear 3. SYSTEM ARCHITECTURE in several papers. The BASS Application Sharing System established the idea of applying a secondary protocol to re-encode video and stream it separately from the frame buffer for any video playing on the screen. Additionally the sharing system supports per-application sharing by removing all non- application specific information from the remote frame buffer. In one system researchers enhanced the Virtual Network Computing (VNC) protocol by adding an additional layer of authentication to allow for view-only or normal interactivity connections. Systems that support multicast (multiple people only seeing one screen) tend to use the Binary Floor Control Fig. 1, Protocol to determine controllability of the screen at any one point in time. There are also other papers of interest that A user has to send an SMS by the cell phone to the cover non-desktop sharing collaboration. For example, home server. It will be received through hardware modules research on remote pair programming, where two users like modem, microcontroller and a microprocessor. The work on the same code at the same time using shared system responds back by sending an acknowledgment cursors and synchronized codebases, differs from desktop message asking user to prove his /her authenticity. sharing because both users are still seeing different Incase of authentic password reception, the system desktops. Instead of actually visualizing the other generates a onetime password for the user to establish the collaborator’s desktop, a user of the Sangam tool has a connectivity. As soon as the system is connected, the data synchronized view and cursor with the other collaborators. transfer can take place. For providing security to the data This approach works well in very specialized environments transmission, a very powerful encryption algorithm is used. such as programming Integrated Development www.ijmer.com 4020 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-2594-2600 ISSN: 2249-6645 VI. CONCLUSION In conclusion, we feel that the proposed system has a great potential in revolutionizing the concept of Desktop Sharing. As Mobile phones are small in size and easily portable, they become a smarter choice for accessing the remote desktop than a PC or a laptop. They can be easily carried and handled by their users. They are a smarter means of working on Remote Systems than a traditional desktop computer or a laptop. Also a cell phone can become a remote control for its users in switching on or off the light bulbs or also act as an indicator showing temperature readings in high temperature zones. REFERENCES [1] Two Factor Authentication Using Mobile Phones Fadi Aloul,Syed Zahidi, Wassim El-Hajj Fig. 2, Sequence Diagram [2] Towards Ubiquitous Computing via Secure Desktop Service Pan-Lung Tsai, Student Member,IEEE, and Chin-Laung Lei, Member , IEEE [3] A Herzberg,”Payments and Banking with Mobile Personal Devices”, Communications of the ACM, 46(5), 53-59, May 2008 [4] J. Brainard, A. Juels, R. L. Rivest,” Fourth Factor Authentication”: ACM CCS, 168-179,2010 [5] National Institute on Standards and Technology Computer Security Resource Center, NIST's Policy on Hash Functions, March 29, 2009. [6] Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno, Cryptography Engineering (http:/ / www. schneier. com/ book-ce. html), John Wiley & Sons, 2010. [7] A. Josang and G. Sanderud, “Security in Mobile Communications: Challenges and Opportunities” in Proc. Of the Australian information security workshop conderence on sACSW frontiers, 43-48, 2003. Fig. 3, Use case diagram IV. ADVANTAGES 4.1 Anyone can access data from a PC anywhere and anytime by simply sending an SMS. 4.2 It saves money by lowering your monthly utility bills. 4.3 Easy to operate and use as Mobile Phones are extensively used. 4.4 Has negligible portability issues as Cell Phones easily fit in pockets. V. DISADVANTAGES 5.1 The energy required to run the devices .This problem can be removed by using solar technology to run the system. 5.2 Installation will need expertise person the local resident will face a problem in installation. 5.3 There is maintenance of this system is required as this is a new technology and have potential risks. Regular checkup of the security and other critical operations are necessary for such new technology. www.ijmer.com 4021 | Page