SlideShare a Scribd company logo
1 of 8
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 50-57
www.iosrjournals.org
DOI: 10.9790/0661-17215057 www.iosrjournals.org 50 | Page
Data Usage Monitor for a Shared Wireless Network
Connection
Akshay Aggarwal1
, Shantanu Kharia2
1
(Department of Information Technology, VIT University, India)
2
(Department of Information Technology, VIT University, India)
Abstract: This paper proposes a novel method to monitor and control the network usage of a shared wireless
connection. The main objective of this technique is to balance and restrict the shared network data. It facilitates
monitor of data usage by each user individually. This technique is demonstrated through a user-friendly
command line interface. The implementation is tested with Android Mobile Hotspot which exhibited satisfactory
results as discussed in the paper.
Keywords: Batch Scripting, Command Line Interface, Data Usage Monitor, Limiting Data Usage, Network
Profile, Windows Powershell, Windows Task Scheduler
I. Introduction
Disputes in a workplace over a shared internet connection are a common thing. Most of the disputes are
due to the petty reason of unfair usage of data over a connection that is shared by multiple users. We have made
an attempt to try to find a solution to the same problem. In this interface, we have used Batch Files (a type
of script file containing commands that are processed by Windows Command Prompt.) that helped us make use
of other Windows functionalities like Task Scheduler (component of Microsoft Windows that provides the
ability to schedule the launch of programs or scripts at user defined time-intervals or triggers), and PowerShell
(a task automation and configuration management framework from Microsoft that also helps to execute
command line programs and scripts) to help us achieve our functionality of monitoring data usage over a
particular network profile.
The interface allows the user to monitor their data usage and put a limit on the same. The data limit is
recorded at the start of monitor period (which we have set for a month as most data network plans commercially
available work on a monthly basis) and the same is recorded in a text file. The interface then runs and monitors
the data usage. When the data usage surpasses the specified limit, the profile is blocked and the user isn’t
allowed to connect to the network profile until he modifies the limit or the monitor period is finished, as and
however the user chooses to.
Let us take an example to illustrate the point. Suppose there exist an Internet source, W1 (say, a
portable Wi-Fi Adapter). We take the case when the expense of data plans on the network source is being shared
equally by the users in the group. Let A, B, C, D, E, F be six users in the network. We assume each user has their
own device (laptop) through which they establish connection to access data services. The expense, being shared
by all dictates the ethical rule that all users should have access to equal amount of data. Also, each user should
be able to monitor his/her data usage over the connection so as to approximate and adjust (if needed) their data
usage. We seek to provide an interface for the same where the user has the ability to change/modify monitor
period, change limits of data transfer. Added to this is the functionality that once the data usage is exceeded, the
connection should terminate automatically, unless mentioned otherwise. All the features mentioned above have
been implemented by the authors in Windows 7 Operating System wherein no extra software(s) were needed to
be installed. In-built features of Windows OS, like Task Scheduler, Command Line Interface and Powershell
combined with Batch Files were used to implement the system.
II. Currently Existing Technologies
2.1 Data Usage Monitors
All Major Telecom Service Providers send a text message after every session of Data Network Usage.
However, while using a Wireless System with usage spanned over multiple user devices, the data usage for
individual systems is hard to calculate. This becomes even harder when using Desktops or Laptops. The Android
and iOS all have the feature of calculating the data used based on a daily basis. Also, some apps on the
respective platform allow data usage monitoring over custom time periods as well.
Usage Monitors for Laptops or Desktops currently in the market are fuzzy and require the user to
download third-party softwares for the suite to function. Although Windows 8.1 allows users to keep a tab on
the data usage, the functionality isn’t backwards compatible. Also, most of the interfaces that provide the facility
of monitoring data usage feature advertisements (usually push-ads) which the user often finds as irritating and/or
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 51 | Page
misleading.
2.2 Limiting Data Usage
While Android OS has the in-built feature by which it allows the user to limit the data usage, similar
features are also available in iOS too. Talking about desktops and laptops, Windows 8.1 features an upgrade that
allows users to limit their data usage. However, this feature is present just in Windows 8.1 and not in any
previous version of Windows.
There are very less third-party softwares that allow users to put a limit on their data usage without
having them battle against hefty downloads for suites and against advertisements.
Commercial Wi-Fi providers provide an interface allowing the user to monitor their data usage as well
as limit it (not user-defined limit) by the means of login systems. However, we seek to provide an interface that
doesn’t need user to login but still allows them to monitor and limit the data usage.
III. Implementation
We have used the batch files to implement the data usage monitor and limiter. The suite consists of six
batch files and as few as three text files for monitor of a Wireless Network Profile.
The following are the file names and the functionalities included in each one of them.
3.1 run_1.bat
First File of the suite, this file is run only at the first instance when the system is first used. The
functionalities included in this file are- Creating a Limit (in MBs), creating a schedule based on a monthly basis
on the date that is fed by user. The schedule is created using Windows Task Scheduler. The Limit Value is stored
in a text file which is called as limit.txt.
3.2 run_2.bat
Second File of the suite, this file is run by another file called counter.bat when the limit set up by the
user is exceeded. It allows the user to extend the limit in case he/she wants to. After modifying the limit, it
unblocks the network profile that was blocked by counter.bat file so that the user can access the network again.
3.3 run_3.bat
Third File of the suite, this file is the one that is scheduled to run at the end of each monitor period (a
month usually), in case the user has not exhausted the limit set by himself. This file also allows user to modify
the limit for the new monitor period or select a new monitor period altogether.
3.4 Count_init.bat
Fourth file of the suite, this file is the one that logs the starting value of the data used as per system
statistics and stores it in a file called Start.txt. Since only 32-bit integer data can be manipulated using Batch
files, this file takes help of Windows PowerShell to do the necessary computation.
3.5 Counter.bat
This is the file that forms the mind of the limiter. This file reads the current usage value of the data and
subtracts it from the value stored in Start.txt to calculate the data used. As soon as the limit is exceeded, it blocks
the network profile and calls upon run_2.bat to allow the user to modify the limit in case he/she wants to. Like
Count_init.bat, this file uses Windows Powershell for the computation part.
3.6 View.bat
The last file of the suite, it borrows data from Start.txt, limit.txt and system statistics and manipulates
them using Windows PowerShell to tell the user the data they have used and how much data they have left until
they overrun the self-imposed limit.
3.7 Start.txt
Contains the start value from which the calculations are to be done.
3.8 limit.txt
Contains limit value in Bytes that is self-imposed by the user.
3.9 Profile.txt
Contains the name of Profile the user wants to monitor.
IV. Input and Output Screens
The following are the screenshots of the screens with the inputs and the corresponding outputs-
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 52 | Page
Fig. 1(a). run_1.bat. First Screen. Asks the user about the Network Profile Name the user wants to monitor
using the system.
Fig. 1(b). run_1.bat. Feeding the network profile name.
Fig. 2. run_1.bat. First Usage of Interface.
Fig. 3(a). run_1.bat. Prompting the user to create the limit.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 53 | Page
Fig. 3(b). run_1.bat. User gives input to create the limit.
Fig. 4(a). run_1.bat. Creating a new schedule – asking user for date.
Fig. 4(b). run_1.bat. New Schedule Created. Makes Use of Task Scheduler to schedule the task for the
specified date every month.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 54 | Page
Fig. 5. Count_init.bat. Deriving the profile name and modifying the Start.txt file. This file is called by run_1.bat
as soon as the schedule is created.
Fig. 6. counter.bat. Keeps a tab on data usage. This file shouldn’t be closed.
Fig. 7(a). run_2.bat. As soon as the limit gets exceeded, counter.bat calls on run_2.bat to allow user to modify
the limit. Option 2 and 3 are used to exit the program.
Fig. 7(b). run_2.bat. Prompt the user for modified limit.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 55 | Page
Fig. 7(c). run_2.bat. As soon as the limit is modified, the network profile is unblocked and again the counter
starts.
Fig. 8(a). run_3.bat. As soon as network profile is unblocked, run_2.bat calls run_3.bat, allowing the user to
modify limit or monitor period. run_3.bat runs by itself upon completion of monitor period when the limit has
not been exceeded.
Fig. 8(b). run_3.bat. At the end of monitor period, allow user to modify limit for next period or change the
monitor period. This screenshot shows the interface prompting the user for a new limit.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 56 | Page
Fig. 8(c). run_3.bat. After modifying the limit, in case the user didn’t remove the filter before, the network
profile filter, if present, will be removed.
Fig. 8(d). run_3.bat. Prompting the user for changing the monitor period.
Fig. 8(e). run_3.bat. In case the monitor date is same as system date, it calls on Count_init.bat to record the start
date.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 57 | Page
Fig. 9. view.bat. This file allows the user to keep a track on the data used and also know about the remaining
data usage unless the limit gets exceeded.
V. Conclusion And Further Scope of the Paper
The current monitor works for a single network profile, i.e. it can be used to monitor data usage over
only one connection profile at the moment. The authors are working on to extend it to monitor data usage over
multiple connection profiles simultaneously.
Also, we have just handled wireless source of Internet Connection through this interface and in no
manner whatsoever, touched upon a wired or a USB source like a dongle. We are trying to inculcate and merge
other sources viz. wired and USB connections in addition to Wireless System to make it a full-fledged monitor
system.
The current interface works on Windows OS and was developed and tested on Windows 7 Home
Premium version of Windows and later versions and proved successful on each of them. The command line
arguments used in the batch files have limited backward compatibility and so the interface may not work on
Windows NT or even Windows Vista. However, given the limited scope of the older edition of Windows, we
decided to neglect on that part.
The system uses a command line interface, which in turn requires user to get admin privileges. We seek
to make the interface GUI to make it even more user-friendly.
The system is not portable across various platforms like Linux and OSX as of yet. To make the
interface platform independent, we have started to develop the versions for Mac as well as Bash too. However,
our primary interest lies in the expansion of current interface to be able to include other functionalities
mentioned in the scope of the paper.
The system is not fool-proof yet. To be able for it to be effectively usable among a group of say 4
people, we need to introduce security in the interface so that the system itself cannot be hacked by the user and
the prime functionality of limiting the data usage bypassed.
The interface saves the user from having the trouble to schedule the task monitor again and again as it
is taken care of manually. Since, minimum level of human interaction is needed, the script is easy to maintain.
Thus, we were successfully able to create a monitor that is
1. Semi-automated
2. Doesn’t require any installation of any kind
3. Hassle-free, and
4. Effective in doing its job.
For future, our focus would be on maintaining and upgrading the system so as to include the points covered in
scope of the paper.
Acknowledgements
The authors wish to thank first and foremost, our Faculty Guide, Ms. S. Menaka, Assistant Professor
(SG), Operating Systems Division, School of Information Technology, VIT University, Vellore, India for being
available to us all the time and for providing us support and help at all times. We also would like to thank
numerous people on various forums and blogs who helped us when we were stuck while coding.

More Related Content

What's hot

Simulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterSimulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterIJCSIS Research Publications
 
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudApproved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudEditor IJCATR
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Sms base file search & automatic contact saving technique using gsm 38521
Sms base file search & automatic contact saving technique using gsm 38521Sms base file search & automatic contact saving technique using gsm 38521
Sms base file search & automatic contact saving technique using gsm 38521EditorIJAERD
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous databaseeSAT Publishing House
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous databaseeSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementDjadja Sardjana
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based accessijsptm
 
Real time text stream processing - a dynamic and distributed nlp pipeline
Real time text stream  processing - a dynamic and distributed nlp pipelineReal time text stream  processing - a dynamic and distributed nlp pipeline
Real time text stream processing - a dynamic and distributed nlp pipelineConference Papers
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseDavid Murphy
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudEditor IJCATR
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET Journal
 

What's hot (18)

Simulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterSimulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited Metarouter
 
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudApproved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in Cloud
 
Touch With Industry
Touch With IndustryTouch With Industry
Touch With Industry
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Sms base file search & automatic contact saving technique using gsm 38521
Sms base file search & automatic contact saving technique using gsm 38521Sms base file search & automatic contact saving technique using gsm 38521
Sms base file search & automatic contact saving technique using gsm 38521
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Chap03
Chap03Chap03
Chap03
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based access
 
Real time text stream processing - a dynamic and distributed nlp pipeline
Real time text stream  processing - a dynamic and distributed nlp pipelineReal time text stream  processing - a dynamic and distributed nlp pipeline
Real time text stream processing - a dynamic and distributed nlp pipeline
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational Database
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
 

Viewers also liked

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionIOSR Journals
 
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...IOSR Journals
 
Best Power Surge Using Fuzzy Controlled Genetic Technique
Best Power Surge Using Fuzzy Controlled Genetic TechniqueBest Power Surge Using Fuzzy Controlled Genetic Technique
Best Power Surge Using Fuzzy Controlled Genetic TechniqueIOSR Journals
 
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated LoadsClosed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated LoadsIOSR Journals
 
Inverse Kinematics Solution for Biped Robot
Inverse Kinematics Solution for Biped RobotInverse Kinematics Solution for Biped Robot
Inverse Kinematics Solution for Biped RobotIOSR Journals
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageIOSR Journals
 
Investigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersInvestigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersIOSR Journals
 
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)IOSR Journals
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisIOSR Journals
 
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...IOSR Journals
 
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...IOSR Journals
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...IOSR Journals
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...IOSR Journals
 
On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...
On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...
On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...IOSR Journals
 
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...IOSR Journals
 
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC ConverterModelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC ConverterIOSR Journals
 
Smartphone Based Sensing Driver Behavior Modeling
Smartphone Based Sensing Driver Behavior ModelingSmartphone Based Sensing Driver Behavior Modeling
Smartphone Based Sensing Driver Behavior ModelingIOSR Journals
 
Algorithm for the Comparison of Different Types of First Order Edge Detection...
Algorithm for the Comparison of Different Types of First Order Edge Detection...Algorithm for the Comparison of Different Types of First Order Edge Detection...
Algorithm for the Comparison of Different Types of First Order Edge Detection...IOSR Journals
 

Viewers also liked (20)

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud Detection
 
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
 
Best Power Surge Using Fuzzy Controlled Genetic Technique
Best Power Surge Using Fuzzy Controlled Genetic TechniqueBest Power Surge Using Fuzzy Controlled Genetic Technique
Best Power Surge Using Fuzzy Controlled Genetic Technique
 
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated LoadsClosed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
 
Inverse Kinematics Solution for Biped Robot
Inverse Kinematics Solution for Biped RobotInverse Kinematics Solution for Biped Robot
Inverse Kinematics Solution for Biped Robot
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
 
Investigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersInvestigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice Coolers
 
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant Analysis
 
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
 
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
 
On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...
On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...
On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...
 
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
 
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC ConverterModelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
 
Smartphone Based Sensing Driver Behavior Modeling
Smartphone Based Sensing Driver Behavior ModelingSmartphone Based Sensing Driver Behavior Modeling
Smartphone Based Sensing Driver Behavior Modeling
 
Algorithm for the Comparison of Different Types of First Order Edge Detection...
Algorithm for the Comparison of Different Types of First Order Edge Detection...Algorithm for the Comparison of Different Types of First Order Edge Detection...
Algorithm for the Comparison of Different Types of First Order Edge Detection...
 

Similar to Data Usage Monitor for a Shared Wireless Network Connection

127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
IP Messenger And File Transfer over Ethernet LAN
IP Messenger And File Transfer over Ethernet LANIP Messenger And File Transfer over Ethernet LAN
IP Messenger And File Transfer over Ethernet LANdbpublications
 
Comparison of the network performance
Comparison of the network performanceComparison of the network performance
Comparison of the network performanceeSAT Journals
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
 
Windows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of theWindows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of theeSAT Publishing House
 
A new approach of scalable traffic capture model with Pi cluster
A new approach of scalable traffic capture model with Pi cluster A new approach of scalable traffic capture model with Pi cluster
A new approach of scalable traffic capture model with Pi cluster IJECEIAES
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET Journal
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
IRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data VisualizationIRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data VisualizationIRJET Journal
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
 
Google File System
Google File SystemGoogle File System
Google File Systemvivatechijri
 
Running Head System Proposal .docx
Running Head System Proposal                                     .docxRunning Head System Proposal                                     .docx
Running Head System Proposal .docxagnesdcarey33086
 

Similar to Data Usage Monitor for a Shared Wireless Network Connection (20)

chapter 3.pdf
chapter 3.pdfchapter 3.pdf
chapter 3.pdf
 
chapter 3.docx
chapter 3.docxchapter 3.docx
chapter 3.docx
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 
191
191191
191
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
IP Messenger And File Transfer over Ethernet LAN
IP Messenger And File Transfer over Ethernet LANIP Messenger And File Transfer over Ethernet LAN
IP Messenger And File Transfer over Ethernet LAN
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Comparison of the network performance
Comparison of the network performanceComparison of the network performance
Comparison of the network performance
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
Windows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of theWindows 8 vs linux ubuntu 12.10 – comparison of the
Windows 8 vs linux ubuntu 12.10 – comparison of the
 
A new approach of scalable traffic capture model with Pi cluster
A new approach of scalable traffic capture model with Pi cluster A new approach of scalable traffic capture model with Pi cluster
A new approach of scalable traffic capture model with Pi cluster
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
IRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data VisualizationIRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data Visualization
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphones
 
Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...
Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...
Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...
 
Google File System
Google File SystemGoogle File System
Google File System
 
Running Head System Proposal .docx
Running Head System Proposal                                     .docxRunning Head System Proposal                                     .docx
Running Head System Proposal .docx
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

Data Usage Monitor for a Shared Wireless Network Connection

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 50-57 www.iosrjournals.org DOI: 10.9790/0661-17215057 www.iosrjournals.org 50 | Page Data Usage Monitor for a Shared Wireless Network Connection Akshay Aggarwal1 , Shantanu Kharia2 1 (Department of Information Technology, VIT University, India) 2 (Department of Information Technology, VIT University, India) Abstract: This paper proposes a novel method to monitor and control the network usage of a shared wireless connection. The main objective of this technique is to balance and restrict the shared network data. It facilitates monitor of data usage by each user individually. This technique is demonstrated through a user-friendly command line interface. The implementation is tested with Android Mobile Hotspot which exhibited satisfactory results as discussed in the paper. Keywords: Batch Scripting, Command Line Interface, Data Usage Monitor, Limiting Data Usage, Network Profile, Windows Powershell, Windows Task Scheduler I. Introduction Disputes in a workplace over a shared internet connection are a common thing. Most of the disputes are due to the petty reason of unfair usage of data over a connection that is shared by multiple users. We have made an attempt to try to find a solution to the same problem. In this interface, we have used Batch Files (a type of script file containing commands that are processed by Windows Command Prompt.) that helped us make use of other Windows functionalities like Task Scheduler (component of Microsoft Windows that provides the ability to schedule the launch of programs or scripts at user defined time-intervals or triggers), and PowerShell (a task automation and configuration management framework from Microsoft that also helps to execute command line programs and scripts) to help us achieve our functionality of monitoring data usage over a particular network profile. The interface allows the user to monitor their data usage and put a limit on the same. The data limit is recorded at the start of monitor period (which we have set for a month as most data network plans commercially available work on a monthly basis) and the same is recorded in a text file. The interface then runs and monitors the data usage. When the data usage surpasses the specified limit, the profile is blocked and the user isn’t allowed to connect to the network profile until he modifies the limit or the monitor period is finished, as and however the user chooses to. Let us take an example to illustrate the point. Suppose there exist an Internet source, W1 (say, a portable Wi-Fi Adapter). We take the case when the expense of data plans on the network source is being shared equally by the users in the group. Let A, B, C, D, E, F be six users in the network. We assume each user has their own device (laptop) through which they establish connection to access data services. The expense, being shared by all dictates the ethical rule that all users should have access to equal amount of data. Also, each user should be able to monitor his/her data usage over the connection so as to approximate and adjust (if needed) their data usage. We seek to provide an interface for the same where the user has the ability to change/modify monitor period, change limits of data transfer. Added to this is the functionality that once the data usage is exceeded, the connection should terminate automatically, unless mentioned otherwise. All the features mentioned above have been implemented by the authors in Windows 7 Operating System wherein no extra software(s) were needed to be installed. In-built features of Windows OS, like Task Scheduler, Command Line Interface and Powershell combined with Batch Files were used to implement the system. II. Currently Existing Technologies 2.1 Data Usage Monitors All Major Telecom Service Providers send a text message after every session of Data Network Usage. However, while using a Wireless System with usage spanned over multiple user devices, the data usage for individual systems is hard to calculate. This becomes even harder when using Desktops or Laptops. The Android and iOS all have the feature of calculating the data used based on a daily basis. Also, some apps on the respective platform allow data usage monitoring over custom time periods as well. Usage Monitors for Laptops or Desktops currently in the market are fuzzy and require the user to download third-party softwares for the suite to function. Although Windows 8.1 allows users to keep a tab on the data usage, the functionality isn’t backwards compatible. Also, most of the interfaces that provide the facility of monitoring data usage feature advertisements (usually push-ads) which the user often finds as irritating and/or
  • 2. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 51 | Page misleading. 2.2 Limiting Data Usage While Android OS has the in-built feature by which it allows the user to limit the data usage, similar features are also available in iOS too. Talking about desktops and laptops, Windows 8.1 features an upgrade that allows users to limit their data usage. However, this feature is present just in Windows 8.1 and not in any previous version of Windows. There are very less third-party softwares that allow users to put a limit on their data usage without having them battle against hefty downloads for suites and against advertisements. Commercial Wi-Fi providers provide an interface allowing the user to monitor their data usage as well as limit it (not user-defined limit) by the means of login systems. However, we seek to provide an interface that doesn’t need user to login but still allows them to monitor and limit the data usage. III. Implementation We have used the batch files to implement the data usage monitor and limiter. The suite consists of six batch files and as few as three text files for monitor of a Wireless Network Profile. The following are the file names and the functionalities included in each one of them. 3.1 run_1.bat First File of the suite, this file is run only at the first instance when the system is first used. The functionalities included in this file are- Creating a Limit (in MBs), creating a schedule based on a monthly basis on the date that is fed by user. The schedule is created using Windows Task Scheduler. The Limit Value is stored in a text file which is called as limit.txt. 3.2 run_2.bat Second File of the suite, this file is run by another file called counter.bat when the limit set up by the user is exceeded. It allows the user to extend the limit in case he/she wants to. After modifying the limit, it unblocks the network profile that was blocked by counter.bat file so that the user can access the network again. 3.3 run_3.bat Third File of the suite, this file is the one that is scheduled to run at the end of each monitor period (a month usually), in case the user has not exhausted the limit set by himself. This file also allows user to modify the limit for the new monitor period or select a new monitor period altogether. 3.4 Count_init.bat Fourth file of the suite, this file is the one that logs the starting value of the data used as per system statistics and stores it in a file called Start.txt. Since only 32-bit integer data can be manipulated using Batch files, this file takes help of Windows PowerShell to do the necessary computation. 3.5 Counter.bat This is the file that forms the mind of the limiter. This file reads the current usage value of the data and subtracts it from the value stored in Start.txt to calculate the data used. As soon as the limit is exceeded, it blocks the network profile and calls upon run_2.bat to allow the user to modify the limit in case he/she wants to. Like Count_init.bat, this file uses Windows Powershell for the computation part. 3.6 View.bat The last file of the suite, it borrows data from Start.txt, limit.txt and system statistics and manipulates them using Windows PowerShell to tell the user the data they have used and how much data they have left until they overrun the self-imposed limit. 3.7 Start.txt Contains the start value from which the calculations are to be done. 3.8 limit.txt Contains limit value in Bytes that is self-imposed by the user. 3.9 Profile.txt Contains the name of Profile the user wants to monitor. IV. Input and Output Screens The following are the screenshots of the screens with the inputs and the corresponding outputs-
  • 3. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 52 | Page Fig. 1(a). run_1.bat. First Screen. Asks the user about the Network Profile Name the user wants to monitor using the system. Fig. 1(b). run_1.bat. Feeding the network profile name. Fig. 2. run_1.bat. First Usage of Interface. Fig. 3(a). run_1.bat. Prompting the user to create the limit.
  • 4. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 53 | Page Fig. 3(b). run_1.bat. User gives input to create the limit. Fig. 4(a). run_1.bat. Creating a new schedule – asking user for date. Fig. 4(b). run_1.bat. New Schedule Created. Makes Use of Task Scheduler to schedule the task for the specified date every month.
  • 5. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 54 | Page Fig. 5. Count_init.bat. Deriving the profile name and modifying the Start.txt file. This file is called by run_1.bat as soon as the schedule is created. Fig. 6. counter.bat. Keeps a tab on data usage. This file shouldn’t be closed. Fig. 7(a). run_2.bat. As soon as the limit gets exceeded, counter.bat calls on run_2.bat to allow user to modify the limit. Option 2 and 3 are used to exit the program. Fig. 7(b). run_2.bat. Prompt the user for modified limit.
  • 6. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 55 | Page Fig. 7(c). run_2.bat. As soon as the limit is modified, the network profile is unblocked and again the counter starts. Fig. 8(a). run_3.bat. As soon as network profile is unblocked, run_2.bat calls run_3.bat, allowing the user to modify limit or monitor period. run_3.bat runs by itself upon completion of monitor period when the limit has not been exceeded. Fig. 8(b). run_3.bat. At the end of monitor period, allow user to modify limit for next period or change the monitor period. This screenshot shows the interface prompting the user for a new limit.
  • 7. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 56 | Page Fig. 8(c). run_3.bat. After modifying the limit, in case the user didn’t remove the filter before, the network profile filter, if present, will be removed. Fig. 8(d). run_3.bat. Prompting the user for changing the monitor period. Fig. 8(e). run_3.bat. In case the monitor date is same as system date, it calls on Count_init.bat to record the start date.
  • 8. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 57 | Page Fig. 9. view.bat. This file allows the user to keep a track on the data used and also know about the remaining data usage unless the limit gets exceeded. V. Conclusion And Further Scope of the Paper The current monitor works for a single network profile, i.e. it can be used to monitor data usage over only one connection profile at the moment. The authors are working on to extend it to monitor data usage over multiple connection profiles simultaneously. Also, we have just handled wireless source of Internet Connection through this interface and in no manner whatsoever, touched upon a wired or a USB source like a dongle. We are trying to inculcate and merge other sources viz. wired and USB connections in addition to Wireless System to make it a full-fledged monitor system. The current interface works on Windows OS and was developed and tested on Windows 7 Home Premium version of Windows and later versions and proved successful on each of them. The command line arguments used in the batch files have limited backward compatibility and so the interface may not work on Windows NT or even Windows Vista. However, given the limited scope of the older edition of Windows, we decided to neglect on that part. The system uses a command line interface, which in turn requires user to get admin privileges. We seek to make the interface GUI to make it even more user-friendly. The system is not portable across various platforms like Linux and OSX as of yet. To make the interface platform independent, we have started to develop the versions for Mac as well as Bash too. However, our primary interest lies in the expansion of current interface to be able to include other functionalities mentioned in the scope of the paper. The system is not fool-proof yet. To be able for it to be effectively usable among a group of say 4 people, we need to introduce security in the interface so that the system itself cannot be hacked by the user and the prime functionality of limiting the data usage bypassed. The interface saves the user from having the trouble to schedule the task monitor again and again as it is taken care of manually. Since, minimum level of human interaction is needed, the script is easy to maintain. Thus, we were successfully able to create a monitor that is 1. Semi-automated 2. Doesn’t require any installation of any kind 3. Hassle-free, and 4. Effective in doing its job. For future, our focus would be on maintaining and upgrading the system so as to include the points covered in scope of the paper. Acknowledgements The authors wish to thank first and foremost, our Faculty Guide, Ms. S. Menaka, Assistant Professor (SG), Operating Systems Division, School of Information Technology, VIT University, Vellore, India for being available to us all the time and for providing us support and help at all times. We also would like to thank numerous people on various forums and blogs who helped us when we were stuck while coding.