SlideShare a Scribd company logo
1 of 19
The Communication System
Military Safe Communication System
Prototype
Introduction
This project is a demonstration of the idea of
Safe Communication technique. This provide a
prototype for the same.
It is a console based application which
demonstrate the complete process of the
System.
Today modern countries like USA, UK, Russia, China etc. have made
tremendous progress in technology, for the defense and military. They
are developing weapons like Nuclear Bombs, Aircrafts etc. Our
country India is not far behind them, but it’s a bitter truth that we are
still facing many security issues in our country. And the most
convincing example is of Pulwama Attack which took place on 14th of
this February,2019. We lost our 44 soldiers in the attack. This shows
that we still need many improvements in our defense and military
services. Our country had faced many terror attacks which are not
tolerable at all. This attacks significantly show that we need
improvement in our Military Communications. The leaking of
information must need to be restricted.
Our project is based on the same. We are developing a secure and
safer Communication System which will be very useful in future
communications. This project is basically a prototype of the system, it
demonstrate how the system will work, how message will be sent, how
safer communication can be achieved, how we can avoid leaking in
sensible information and etc.
This project is aimed to be used in Indian Military, Defense, Detective
Agencies, Police. We are working on the same.
Purpose and Outcome of Project
About Project Implementation
The code of this project is written in C++ Programming Language. It is a
console based program. We have defined each and every part of the
communication system using Object Oriented Programming Approach. A
close idea of the implementation will be discussed.
System Transmitter Repeater
Receiver
with Sensor
We have build the total system by dividing it in the constituent parts. All this
components are implemented using classes in C++, and each system has its own
function, data, property and connections. All the Communicating Components are
inherited from a common class Station, and hence they share some common
behaviors, like receiving message, sending message and etc.
Station
Repeater Sensor Receiver
Transmitter
We have implemented a class Message which denotes a Packet of message. The
original information has been stored in encrypted form in the packet so no one can
access the information without having the decryption key. For security reasons the
key will be not shared with the Sensor until it signifies the message has not been
leaked. Key will be kept at Transmitter, and once the sensor gives green flag, then
only the key will be sent to sensor, which will decrypt the message and then
receiver will receive the message safely. If sensor found that information has been
leaked from message packet, it will just corrupt the message packet and suspend it.
It will ask transmitter to resend the message. And this process will continue till
sensor confirms that message has been safely received.
This is how the system works and ensures that no leak of data will happen.
Complete implementation details are shared further.
Message Packet
• Encrypted Message
• Safety Services
System
System class handles all the background process of communication.
• It provides user interface for the program. It accept input message from
user.
• It also have responsibility to initiate system, check for exceptions.
• Close system securely.
• Accept user message.
• Check for available transmitters and send message to transmitter for
further processing.
Message
Message class represent a Message Packet which will be actually transmitted from
one component to another component of system. The text message will be only
available at Transmitter and Receiver, and in all other process, the message will be
sent packed in the message packet. This packet act as a shielding for the message.
• Give the current encryption status of Message.
• Give the current corrupting status of Message.
• Ensure avoiding leak of message.
• Signify message as corrupted if information leaked however.
Transmitter
Transmitter receives the message from System and handles all the
further processing.
• Receive plane message from System.
• Generate a random key and encrypt message and pack message in
packet.
• Store key to itself.
• Check for available Repeaters and send Message Packet.
• Monitor all the further process and wait for reply from sensor.
• Decide to send or not to send the decryption key to sensor.
• Resend the same message upon request from sensor.
Repeater
Repeater act an intermediate process for Communication. It amplifies the
message and also check for vulnerabilities in message, if found then signify the
same in message packet.
• Receive message packet from transmitter.
• Check for the virus and other vulnerabilities.
• Mark message as corrupted if found something incorrect.
• Send Message packet to sensor for scanning.
Sensor
Sensor stage precedes the Receiver. It ensures that message is safe
and then only sends it to receiver finally.
• Receive message from Repeater.
• Check if message is corrupted.
• If message found corrupted, request it again from transmitter
with completely as a new packet.
• If message is safe, then request and accept key from Transmitter
and decrypt message.
• Send decrypted message to Receiver.
Receiver
It receives the safe message from Sensor and finally handle it to the Recipient. It
also shows the original size of message, from which we can judge if message has
been safely received or not.
Advantages
• This communication System can be used for Military, Police,
Detective departments which needs transmitting sensible
information from places to places.
• Many terror attacks can be avoided.
• Ensures the safety of communication.
• Private data security.
THANK
YOU

More Related Content

What's hot

IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoTIRJET Journal
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gNoor Mohammad's Faltoos
 
sms based enotice board
sms based enotice boardsms based enotice board
sms based enotice boardDinesh Kumaar
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alertsPraween Lakra
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetSean Xie
 
Wireless Electronic Notice Board using GSM Technology
Wireless Electronic Notice Board using GSM TechnologyWireless Electronic Notice Board using GSM Technology
Wireless Electronic Notice Board using GSM TechnologySaban Kumar K.C.
 
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet FiltersCyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet FiltersGyanmanjari Institute Of Technology
 
A Remote home security system
A Remote home security systemA Remote home security system
A Remote home security systemPriyanka Tyagi
 
gsm and tdma technology
gsm and tdma technologygsm and tdma technology
gsm and tdma technologynarayana swamy
 
Wireless E-Notice Board Using Bluetooth Report.docx
Wireless E-Notice Board Using Bluetooth Report.docxWireless E-Notice Board Using Bluetooth Report.docx
Wireless E-Notice Board Using Bluetooth Report.docxAbhishekGM10
 

What's hot (20)

IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoT
 
Swiching
SwichingSwiching
Swiching
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5g
 
Cellular system
Cellular system Cellular system
Cellular system
 
sms based enotice board
sms based enotice boardsms based enotice board
sms based enotice board
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alerts
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Firewall
FirewallFirewall
Firewall
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - Stuxnet
 
Wireless Electronic Notice Board using GSM Technology
Wireless Electronic Notice Board using GSM TechnologyWireless Electronic Notice Board using GSM Technology
Wireless Electronic Notice Board using GSM Technology
 
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet FiltersCyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
 
ANTI SLEEP ALARM
ANTI SLEEP ALARMANTI SLEEP ALARM
ANTI SLEEP ALARM
 
Rangefinder ppt
Rangefinder pptRangefinder ppt
Rangefinder ppt
 
A Remote home security system
A Remote home security systemA Remote home security system
A Remote home security system
 
gsm and tdma technology
gsm and tdma technologygsm and tdma technology
gsm and tdma technology
 
GSM BASED GAS LEAKAGE DETECTION SYSTEM
GSM BASED GAS LEAKAGE DETECTION SYSTEMGSM BASED GAS LEAKAGE DETECTION SYSTEM
GSM BASED GAS LEAKAGE DETECTION SYSTEM
 
middleware
middlewaremiddleware
middleware
 
Wireless E-Notice Board Using Bluetooth Report.docx
Wireless E-Notice Board Using Bluetooth Report.docxWireless E-Notice Board Using Bluetooth Report.docx
Wireless E-Notice Board Using Bluetooth Report.docx
 
Fyp
FypFyp
Fyp
 

Similar to The Communication System C++ Project

Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptxmusfirafatima3
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
Command Transfer Protocol (CTP) for Distributed or Parallel Computation
Command Transfer Protocol (CTP) for Distributed or Parallel ComputationCommand Transfer Protocol (CTP) for Distributed or Parallel Computation
Command Transfer Protocol (CTP) for Distributed or Parallel Computationpaperpublications3
 
DataCommunication Network - Unit 5.pdf
DataCommunication Network - Unit 5.pdfDataCommunication Network - Unit 5.pdf
DataCommunication Network - Unit 5.pdfkrishnapriya673257
 
Current Security Threats and Identifying Vulnerabilities i
Current Security Threats and Identifying Vulnerabilities iCurrent Security Threats and Identifying Vulnerabilities i
Current Security Threats and Identifying Vulnerabilities iOllieShoresna
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxhallettfaustina
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxdohertyjoetta
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxvannagoforth
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxRizwanBasha12
 
Hop by-hop message authentication and source privacy in wire
Hop by-hop message authentication and source privacy in wireHop by-hop message authentication and source privacy in wire
Hop by-hop message authentication and source privacy in wireSelva Raj
 
Hop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copyHop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copySelva Raj
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxpooleavelina
 
Communcation systems
Communcation systemsCommuncation systems
Communcation systemsMR Z
 

Similar to The Communication System C++ Project (20)

Dos unit 2
Dos unit 2Dos unit 2
Dos unit 2
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
Command Transfer Protocol (CTP) for Distributed or Parallel Computation
Command Transfer Protocol (CTP) for Distributed or Parallel ComputationCommand Transfer Protocol (CTP) for Distributed or Parallel Computation
Command Transfer Protocol (CTP) for Distributed or Parallel Computation
 
DataCommunication Network - Unit 5.pdf
DataCommunication Network - Unit 5.pdfDataCommunication Network - Unit 5.pdf
DataCommunication Network - Unit 5.pdf
 
network security
network securitynetwork security
network security
 
Ch06
Ch06Ch06
Ch06
 
Current Security Threats and Identifying Vulnerabilities i
Current Security Threats and Identifying Vulnerabilities iCurrent Security Threats and Identifying Vulnerabilities i
Current Security Threats and Identifying Vulnerabilities i
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
 
Network Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docxNetwork Security Essentials Applications and StandardsSixth E.docx
Network Security Essentials Applications and StandardsSixth E.docx
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Hop by-hop message authentication and source privacy in wire
Hop by-hop message authentication and source privacy in wireHop by-hop message authentication and source privacy in wire
Hop by-hop message authentication and source privacy in wire
 
Hop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copyHop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copy
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
 
Communcation systems
Communcation systemsCommuncation systems
Communcation systems
 

Recently uploaded

SQL Injection Introduction and Prevention
SQL Injection Introduction and PreventionSQL Injection Introduction and Prevention
SQL Injection Introduction and PreventionMohammed Fazuluddin
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAlluxio, Inc.
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdfkalichargn70th171
 
APVP,apvp apvp High quality supplier safe spot transport, 98% purity
APVP,apvp apvp High quality supplier safe spot transport, 98% purityAPVP,apvp apvp High quality supplier safe spot transport, 98% purity
APVP,apvp apvp High quality supplier safe spot transport, 98% purityamy56318795
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfkalichargn70th171
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems ApproachNeo4j
 
how-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdfhow-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdfMehmet Akar
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...Alluxio, Inc.
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationHelp Desk Migration
 
IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024vaibhav130304
 
Workforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfWorkforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfDeskTrack
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesNeo4j
 
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfMicrosoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfQ-Advise
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdfStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdfsteffenkarlsson2
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignNeo4j
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAlluxio, Inc.
 

Recently uploaded (20)

SQL Injection Introduction and Prevention
SQL Injection Introduction and PreventionSQL Injection Introduction and Prevention
SQL Injection Introduction and Prevention
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
APVP,apvp apvp High quality supplier safe spot transport, 98% purity
APVP,apvp apvp High quality supplier safe spot transport, 98% purityAPVP,apvp apvp High quality supplier safe spot transport, 98% purity
APVP,apvp apvp High quality supplier safe spot transport, 98% purity
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
 
how-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdfhow-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdf
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024
 
5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand
 
Workforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfWorkforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdf
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 
AI Hackathon.pptx
AI                        Hackathon.pptxAI                        Hackathon.pptx
AI Hackathon.pptx
 
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfMicrosoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdfStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by Design
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 

The Communication System C++ Project

  • 1. The Communication System Military Safe Communication System Prototype
  • 2. Introduction This project is a demonstration of the idea of Safe Communication technique. This provide a prototype for the same. It is a console based application which demonstrate the complete process of the System.
  • 3. Today modern countries like USA, UK, Russia, China etc. have made tremendous progress in technology, for the defense and military. They are developing weapons like Nuclear Bombs, Aircrafts etc. Our country India is not far behind them, but it’s a bitter truth that we are still facing many security issues in our country. And the most convincing example is of Pulwama Attack which took place on 14th of this February,2019. We lost our 44 soldiers in the attack. This shows that we still need many improvements in our defense and military services. Our country had faced many terror attacks which are not tolerable at all. This attacks significantly show that we need improvement in our Military Communications. The leaking of information must need to be restricted. Our project is based on the same. We are developing a secure and safer Communication System which will be very useful in future communications. This project is basically a prototype of the system, it demonstrate how the system will work, how message will be sent, how safer communication can be achieved, how we can avoid leaking in sensible information and etc. This project is aimed to be used in Indian Military, Defense, Detective Agencies, Police. We are working on the same. Purpose and Outcome of Project
  • 4. About Project Implementation The code of this project is written in C++ Programming Language. It is a console based program. We have defined each and every part of the communication system using Object Oriented Programming Approach. A close idea of the implementation will be discussed.
  • 5. System Transmitter Repeater Receiver with Sensor We have build the total system by dividing it in the constituent parts. All this components are implemented using classes in C++, and each system has its own function, data, property and connections. All the Communicating Components are inherited from a common class Station, and hence they share some common behaviors, like receiving message, sending message and etc. Station Repeater Sensor Receiver Transmitter
  • 6. We have implemented a class Message which denotes a Packet of message. The original information has been stored in encrypted form in the packet so no one can access the information without having the decryption key. For security reasons the key will be not shared with the Sensor until it signifies the message has not been leaked. Key will be kept at Transmitter, and once the sensor gives green flag, then only the key will be sent to sensor, which will decrypt the message and then receiver will receive the message safely. If sensor found that information has been leaked from message packet, it will just corrupt the message packet and suspend it. It will ask transmitter to resend the message. And this process will continue till sensor confirms that message has been safely received. This is how the system works and ensures that no leak of data will happen. Complete implementation details are shared further. Message Packet • Encrypted Message • Safety Services
  • 8. System class handles all the background process of communication. • It provides user interface for the program. It accept input message from user. • It also have responsibility to initiate system, check for exceptions. • Close system securely. • Accept user message. • Check for available transmitters and send message to transmitter for further processing.
  • 10. Message class represent a Message Packet which will be actually transmitted from one component to another component of system. The text message will be only available at Transmitter and Receiver, and in all other process, the message will be sent packed in the message packet. This packet act as a shielding for the message. • Give the current encryption status of Message. • Give the current corrupting status of Message. • Ensure avoiding leak of message. • Signify message as corrupted if information leaked however.
  • 12. Transmitter receives the message from System and handles all the further processing. • Receive plane message from System. • Generate a random key and encrypt message and pack message in packet. • Store key to itself. • Check for available Repeaters and send Message Packet. • Monitor all the further process and wait for reply from sensor. • Decide to send or not to send the decryption key to sensor. • Resend the same message upon request from sensor.
  • 14. Repeater act an intermediate process for Communication. It amplifies the message and also check for vulnerabilities in message, if found then signify the same in message packet. • Receive message packet from transmitter. • Check for the virus and other vulnerabilities. • Mark message as corrupted if found something incorrect. • Send Message packet to sensor for scanning.
  • 16. Sensor stage precedes the Receiver. It ensures that message is safe and then only sends it to receiver finally. • Receive message from Repeater. • Check if message is corrupted. • If message found corrupted, request it again from transmitter with completely as a new packet. • If message is safe, then request and accept key from Transmitter and decrypt message. • Send decrypted message to Receiver.
  • 17. Receiver It receives the safe message from Sensor and finally handle it to the Recipient. It also shows the original size of message, from which we can judge if message has been safely received or not.
  • 18. Advantages • This communication System can be used for Military, Police, Detective departments which needs transmitting sensible information from places to places. • Many terror attacks can be avoided. • Ensures the safety of communication. • Private data security.