SlideShare a Scribd company logo
A Web Based Client and Server Model for Controlling Electronic Warfare
Monitoring Receivers
Abstract:
The basic concept of electronic warfare monitoring receivers is to exploit the
enemy’s signals. It is to provide intelligence on enemy’s order of battle, intentions
and capabilities where to use some countermeasures to deny effective use of
communications. The signals can be detected by using frequency, bandwidth and
demodulation. Here, we are going to control the electronic warfare receiver by
using web based client and server.
The monitoring receiver can detect the different modulation signals such as
Amplitude modulation, frequency modulation, and pulse signal etc. our project
includes controlling of monitoring receivers to intercept and demodulate mainly
AM,FM modulated communicated intelligence by controlling and configuring the
receiver with the relevant command structure. The receiver is remotely controlled
via LAN using TCP/IP protocol.
Modules:
Client
Router
Server
Ip address
Longitude and Latitude

Client:
The client is the end user of the network and needs to be secured the most. The client end usually
exposes data through the screen of the computer. Client connections to server should be secured
through passwords and upon leaving their workstations clients should make sure that their
connection to the server is securely cut off in order to make sure that no hackers or intruders are
able to reach the server data. Not only securing the workstations connection to the server is
important but also securing the files on the workstation (client) is important as it ensures that no
hackers are able to reach the system. Another possibility is that of introducing a virus or running
unauthorized software on the client workstation thus threatening the entire information bank at
the server.

Server:
The server can be secured by placing all the data in a secure, centralized location that is protected
through permitting access to authorized personnel only. Virus protection should also be available
on server computers as vast amounts of data can be infected. Regular upgrades should be
provided to the servers as the software and the applications need to be updated. Even the entire
body of data on a server could be encrypted in order to make sure that reaching the data would
require excessive time and effort

Router:
A router is a device that forwards data packets between computer networks, creating an overlay
internetwork. A router is connected to two or more data lines from different networks. When a
data packet comes in one of the lines, the router reads the address information in the packet to
determine its ultimate destination. Then, using information in its routing table or routing policy,
it directs the packet to the next network on its journey. Routers perform the "traffic directing"
functions on the Internet. A data packet is typically forwarded from one router to another through
the networks that constitute the internetwork until it reaches its destination node.
IP Address:
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network interface
identification and location addressing. Its role has been characterized as follows: "A name
indicates what we seek. An address indicates where it is. A route indicates how to get there
Longitude and Latitude:
Longitude:
It is a geographic coordinate that specifies the east-west position of a point on the Earth's surface.
It is an angular measurement, usually expressed in degrees and denoted by the Greek letter
lambda (λ). Points with the same longitude lie in lines running from the North Pole to the South
Pole. By convention, one of these, the Prime Meridian, which passes through the Royal
Observatory, Greenwich, England, was intended to establish the position of zero degrees
longitude.
Latitude:
It is a geographic coordinate that specifies the north-south position of a point on the Earth's
surface. Latitude is an angle (defined below) which ranges from 0° at the Equator to 90° (North
or South) at the poles. Lines of constant latitude, or parallels, run east–west as circles parallel to
the equator. Latitude is used together with longitude to specify the precise location of features on
the surface of the Earth.
System Requirement specification:
Hardware Requirements:
Processor

- Pentium –III

Speed

- 1.1 GHz

RAM

- 256 MB (min)

Hard Disk

- 20 GB

Floppy Drive

- 1.44 MB

Key Board

- Standard Windows Keyboard

Mouse

- Two or Three Button Mouse

Monitor

- SVGA

Software Requirements:


Operating System

:Windows95/98/2000/XP



Application Server

: Tomcat5.0/6.X



Front End

: HTML, Java, Jsp



Scripts



Server side Script



Database

: My sql



Database Connectivity

: JDBC.

: JavaScript.
: Java Server Pages.

More Related Content

What's hot

Ravindra type of network
Ravindra type of networkRavindra type of network
Ravindra type of network
Sanjna Singh
 
Outdoor lighting system
Outdoor lighting systemOutdoor lighting system
Outdoor lighting system
Quang Do
 
Wlan 1
Wlan 1Wlan 1
Wlan 1
sharan Kumar
 
IS L06 Communications and Networks
IS L06 Communications and NetworksIS L06 Communications and Networks
IS L06 Communications and Networks
Jan Wong
 
Interconnecting Devices
Interconnecting DevicesInterconnecting Devices
Interconnecting Devices
trisson255
 
Network software
Network softwareNetwork software
Network software
SakthiVinoth78
 
Deployment guide1
Deployment guide1Deployment guide1
Deployment guide1
Programmer
 
Week 3 indiv to post ok
Week 3 indiv to post okWeek 3 indiv to post ok
Week 3 indiv to post ok
robertwn
 
Transmission Modes By Faisal Shahzad
Transmission Modes By Faisal ShahzadTransmission Modes By Faisal Shahzad
Transmission Modes By Faisal Shahzad
Faisal Shehzad
 
Data communication & networks
Data communication & networksData communication & networks
Data communication & networks
Gc university faisalabad
 
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
Acad
 
Connectivity devices
Connectivity devicesConnectivity devices
Connectivity devices
PRINCE KUMAR
 
Week 12
Week 12Week 12
Week 12
s1180064
 
IT307 Exploring the Networks.pptx
IT307 Exploring the Networks.pptxIT307 Exploring the Networks.pptx
IT307 Exploring the Networks.pptx
ShubhamTripathi290909
 
Transmission modes (simplex, duplex & half duplex)
Transmission modes (simplex, duplex & half duplex)Transmission modes (simplex, duplex & half duplex)
Transmission modes (simplex, duplex & half duplex)
Rahul Kumar
 
Unit 3
Unit 3Unit 3
1834902097 class note 2 transmission modes in computer networks
1834902097 class note 2     transmission modes in computer networks1834902097 class note 2     transmission modes in computer networks
1834902097 class note 2 transmission modes in computer networks
MehediHassan468099
 
Notes on Class 3
Notes on Class 3Notes on Class 3
Notes on Class 3
Shakhawat Ahammed
 

What's hot (18)

Ravindra type of network
Ravindra type of networkRavindra type of network
Ravindra type of network
 
Outdoor lighting system
Outdoor lighting systemOutdoor lighting system
Outdoor lighting system
 
Wlan 1
Wlan 1Wlan 1
Wlan 1
 
IS L06 Communications and Networks
IS L06 Communications and NetworksIS L06 Communications and Networks
IS L06 Communications and Networks
 
Interconnecting Devices
Interconnecting DevicesInterconnecting Devices
Interconnecting Devices
 
Network software
Network softwareNetwork software
Network software
 
Deployment guide1
Deployment guide1Deployment guide1
Deployment guide1
 
Week 3 indiv to post ok
Week 3 indiv to post okWeek 3 indiv to post ok
Week 3 indiv to post ok
 
Transmission Modes By Faisal Shahzad
Transmission Modes By Faisal ShahzadTransmission Modes By Faisal Shahzad
Transmission Modes By Faisal Shahzad
 
Data communication & networks
Data communication & networksData communication & networks
Data communication & networks
 
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
 
Connectivity devices
Connectivity devicesConnectivity devices
Connectivity devices
 
Week 12
Week 12Week 12
Week 12
 
IT307 Exploring the Networks.pptx
IT307 Exploring the Networks.pptxIT307 Exploring the Networks.pptx
IT307 Exploring the Networks.pptx
 
Transmission modes (simplex, duplex & half duplex)
Transmission modes (simplex, duplex & half duplex)Transmission modes (simplex, duplex & half duplex)
Transmission modes (simplex, duplex & half duplex)
 
Unit 3
Unit 3Unit 3
Unit 3
 
1834902097 class note 2 transmission modes in computer networks
1834902097 class note 2     transmission modes in computer networks1834902097 class note 2     transmission modes in computer networks
1834902097 class note 2 transmission modes in computer networks
 
Notes on Class 3
Notes on Class 3Notes on Class 3
Notes on Class 3
 

Viewers also liked

Très raffiné
Très raffinéTrès raffiné
Très raffiné
labrador
 
Voip solution
Voip solutionVoip solution
Voip solution
NTCOM Ltd
 
Quitte
QuitteQuitte
Quitte
labrador
 
Phonics pictures
Phonics picturesPhonics pictures
Phonics pictures
Bayan Chehab
 
New Media, New Beijing?
New Media, New Beijing?New Media, New Beijing?
New Media, New Beijing?
Beatriz Garcia
 
Introduction to Erlang
Introduction to ErlangIntroduction to Erlang
Introduction to Erlang
Pete Nicholls
 
Taller de informatica
Taller de informaticaTaller de informatica
Taller de informatica
ximena05
 
Mạng viễn thông
Mạng viễn thôngMạng viễn thông
Mạng viễn thông
NTCOM Ltd
 
CBC LifeLine Advertising
CBC LifeLine AdvertisingCBC LifeLine Advertising
CBC LifeLine Advertising
cbcadvertising
 
Sijil penghargaan
Sijil penghargaanSijil penghargaan
Sijil penghargaan
sulan anak uma
 
Timothy Yeo’s resume
Timothy Yeo’s resumeTimothy Yeo’s resume
Timothy Yeo’s resume
Timothy Yeo
 
New Media and the Beijing Olympics
New Media and the Beijing OlympicsNew Media and the Beijing Olympics
New Media and the Beijing Olympics
University of Salford, Manchester
 
人生的「一字境界」給
人生的「一字境界」給人生的「一字境界」給
人生的「一字境界」給
Chung Yen Chang
 
Perlaksanaan umrah kanak kanak .pdf
Perlaksanaan umrah kanak kanak .pdfPerlaksanaan umrah kanak kanak .pdf
Perlaksanaan umrah kanak kanak .pdf
Mohd Saupi Pauzi
 
κεφ5 αντιστηρίξεις αποστραγγίσεις
κεφ5 αντιστηρίξεις αποστραγγίσειςκεφ5 αντιστηρίξεις αποστραγγίσεις
κεφ5 αντιστηρίξεις αποστραγγίσεις
Γεωργία Βαλωμένου
 
Material tablas-rendimiento-consumo-combustible-costo-maquinaria-pesada
Material tablas-rendimiento-consumo-combustible-costo-maquinaria-pesadaMaterial tablas-rendimiento-consumo-combustible-costo-maquinaria-pesada
Material tablas-rendimiento-consumo-combustible-costo-maquinaria-pesada
Corporaciones Amc Sac
 
416 e español
416 e español416 e español
416 e español
Postales Innovo Peru
 

Viewers also liked (19)

Très raffiné
Très raffinéTrès raffiné
Très raffiné
 
Voip solution
Voip solutionVoip solution
Voip solution
 
Quitte
QuitteQuitte
Quitte
 
簡報1
簡報1簡報1
簡報1
 
Phonics pictures
Phonics picturesPhonics pictures
Phonics pictures
 
New Media, New Beijing?
New Media, New Beijing?New Media, New Beijing?
New Media, New Beijing?
 
Introduction to Erlang
Introduction to ErlangIntroduction to Erlang
Introduction to Erlang
 
Taller de informatica
Taller de informaticaTaller de informatica
Taller de informatica
 
Mạng viễn thông
Mạng viễn thôngMạng viễn thông
Mạng viễn thông
 
CBC LifeLine Advertising
CBC LifeLine AdvertisingCBC LifeLine Advertising
CBC LifeLine Advertising
 
Primen1
Primen1Primen1
Primen1
 
Sijil penghargaan
Sijil penghargaanSijil penghargaan
Sijil penghargaan
 
Timothy Yeo’s resume
Timothy Yeo’s resumeTimothy Yeo’s resume
Timothy Yeo’s resume
 
New Media and the Beijing Olympics
New Media and the Beijing OlympicsNew Media and the Beijing Olympics
New Media and the Beijing Olympics
 
人生的「一字境界」給
人生的「一字境界」給人生的「一字境界」給
人生的「一字境界」給
 
Perlaksanaan umrah kanak kanak .pdf
Perlaksanaan umrah kanak kanak .pdfPerlaksanaan umrah kanak kanak .pdf
Perlaksanaan umrah kanak kanak .pdf
 
κεφ5 αντιστηρίξεις αποστραγγίσεις
κεφ5 αντιστηρίξεις αποστραγγίσειςκεφ5 αντιστηρίξεις αποστραγγίσεις
κεφ5 αντιστηρίξεις αποστραγγίσεις
 
Material tablas-rendimiento-consumo-combustible-costo-maquinaria-pesada
Material tablas-rendimiento-consumo-combustible-costo-maquinaria-pesadaMaterial tablas-rendimiento-consumo-combustible-costo-maquinaria-pesada
Material tablas-rendimiento-consumo-combustible-costo-maquinaria-pesada
 
416 e español
416 e español416 e español
416 e español
 

Similar to A web based client and server model for controlling electronic warfare monitoring receivers

lecture note 2023 up10 stud2.ppt for ans
lecture note 2023 up10 stud2.ppt for anslecture note 2023 up10 stud2.ppt for ans
lecture note 2023 up10 stud2.ppt for ans
peterhaile1
 
data communication and networking.pptx
data communication and networking.pptxdata communication and networking.pptx
data communication and networking.pptx
AreebaAhmad24
 
Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176
Nazmun Nahar
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
MahfujurRahman63
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
prajapatidev644
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
Deepshika Reddy
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
Baig Mirza
 
What is the backbone for the Internet- Briefly describe how the Intern.docx
What is the backbone for the Internet- Briefly describe how the Intern.docxWhat is the backbone for the Internet- Briefly describe how the Intern.docx
What is the backbone for the Internet- Briefly describe how the Intern.docx
dorisc7
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
Sweta Kumari Barnwal
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
SankalpThaware
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
LemuelCondes4
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
SimarpreetKaur735622
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
Network
NetworkNetwork
Network
Mark Muhama
 
Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)
IMRAN KHAN
 
Prepare 2 COMPUTER_NETWORKS Lecture 1 & 2.pptx
Prepare 2 COMPUTER_NETWORKS Lecture 1 & 2.pptxPrepare 2 COMPUTER_NETWORKS Lecture 1 & 2.pptx
Prepare 2 COMPUTER_NETWORKS Lecture 1 & 2.pptx
NisbaRani2
 
Computer networks
Computer networks Computer networks
Computer networks
Syed Khawar Abbas Asad
 
Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1
vishal choudhary
 
Introductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptxIntroductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptx
vishal choudhary
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
AfsanaAkterRubi
 

Similar to A web based client and server model for controlling electronic warfare monitoring receivers (20)

lecture note 2023 up10 stud2.ppt for ans
lecture note 2023 up10 stud2.ppt for anslecture note 2023 up10 stud2.ppt for ans
lecture note 2023 up10 stud2.ppt for ans
 
data communication and networking.pptx
data communication and networking.pptxdata communication and networking.pptx
data communication and networking.pptx
 
Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
 
What is the backbone for the Internet- Briefly describe how the Intern.docx
What is the backbone for the Internet- Briefly describe how the Intern.docxWhat is the backbone for the Internet- Briefly describe how the Intern.docx
What is the backbone for the Internet- Briefly describe how the Intern.docx
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Network
NetworkNetwork
Network
 
Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)
 
Prepare 2 COMPUTER_NETWORKS Lecture 1 & 2.pptx
Prepare 2 COMPUTER_NETWORKS Lecture 1 & 2.pptxPrepare 2 COMPUTER_NETWORKS Lecture 1 & 2.pptx
Prepare 2 COMPUTER_NETWORKS Lecture 1 & 2.pptx
 
Computer networks
Computer networks Computer networks
Computer networks
 
Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1
 
Introductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptxIntroductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptx
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 

Recently uploaded

A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 

Recently uploaded (20)

A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 

A web based client and server model for controlling electronic warfare monitoring receivers

  • 1. A Web Based Client and Server Model for Controlling Electronic Warfare Monitoring Receivers Abstract: The basic concept of electronic warfare monitoring receivers is to exploit the enemy’s signals. It is to provide intelligence on enemy’s order of battle, intentions and capabilities where to use some countermeasures to deny effective use of communications. The signals can be detected by using frequency, bandwidth and demodulation. Here, we are going to control the electronic warfare receiver by using web based client and server. The monitoring receiver can detect the different modulation signals such as Amplitude modulation, frequency modulation, and pulse signal etc. our project includes controlling of monitoring receivers to intercept and demodulate mainly AM,FM modulated communicated intelligence by controlling and configuring the receiver with the relevant command structure. The receiver is remotely controlled via LAN using TCP/IP protocol. Modules: Client Router Server Ip address Longitude and Latitude Client: The client is the end user of the network and needs to be secured the most. The client end usually exposes data through the screen of the computer. Client connections to server should be secured through passwords and upon leaving their workstations clients should make sure that their connection to the server is securely cut off in order to make sure that no hackers or intruders are able to reach the server data. Not only securing the workstations connection to the server is important but also securing the files on the workstation (client) is important as it ensures that no hackers are able to reach the system. Another possibility is that of introducing a virus or running
  • 2. unauthorized software on the client workstation thus threatening the entire information bank at the server. Server: The server can be secured by placing all the data in a secure, centralized location that is protected through permitting access to authorized personnel only. Virus protection should also be available on server computers as vast amounts of data can be infected. Regular upgrades should be provided to the servers as the software and the applications need to be updated. Even the entire body of data on a server could be encrypted in order to make sure that reaching the data would require excessive time and effort Router: A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node. IP Address: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there Longitude and Latitude: Longitude: It is a geographic coordinate that specifies the east-west position of a point on the Earth's surface. It is an angular measurement, usually expressed in degrees and denoted by the Greek letter lambda (λ). Points with the same longitude lie in lines running from the North Pole to the South Pole. By convention, one of these, the Prime Meridian, which passes through the Royal Observatory, Greenwich, England, was intended to establish the position of zero degrees longitude.
  • 3. Latitude: It is a geographic coordinate that specifies the north-south position of a point on the Earth's surface. Latitude is an angle (defined below) which ranges from 0° at the Equator to 90° (North or South) at the poles. Lines of constant latitude, or parallels, run east–west as circles parallel to the equator. Latitude is used together with longitude to specify the precise location of features on the surface of the Earth. System Requirement specification: Hardware Requirements: Processor - Pentium –III Speed - 1.1 GHz RAM - 256 MB (min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA Software Requirements:  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts  Server side Script  Database : My sql  Database Connectivity : JDBC. : JavaScript. : Java Server Pages.