SlideShare a Scribd company logo
SEMINAR
ON
MOBILE DISTRIBUTED SYSTEM FOR PERSONAL SECURITY
Presented By:
Rahul Kulshrestra
Roll No. : - 1300410027
Branch :- C.S.E.
 Introduction
 Technology
 Services
 System architecture
 Analysis
 Problem Discussion
 Problem analysis
 Conclusion
 References
 The goal of this project is to provide a location-based alarm system through which
users can broadcast their last known position in emergency situations.
 The system will be able to send an SMS or an e-mail containing the user’s location
coordinates to the already registered mobile numbers using GCM service.
 The location information is obtained using GPS technology and real-time location
is shown on the receiver’s application using Google Maps API.
 In situations where GPS is not available, the system tracks location using LBS
technology
 From system overview and analysis, we had an outline of the whole system.
 we will introduce the technologies involved in our system.
Hibernate
 Hibernate is a powerful, high performance object/relational persistence and query
service.
Web service
 Web service is defined by W3C7 as "a software system designed to support
interoperable machine to machine interaction over a network. It is a powerful
programming language independent concept for data communication over a
network.
sos
 SOS button in all handsets and the
police network will be integrated with
the mobile phone network to trace
and respond to distress calls in the
shortest possible time,
Global Positioning System (GPS)
The Global Positioning
System (GPS) is a space-
based navigation system that
provides location and time
information in all weather conditions,
anywhere on the Earth
 Security technology
 The communication part works with HTTP protocol. Since HTTP protocol does not
contain security measures, the data can be attainted very easily by an unauthorized
user. To protect the data, it has to be encoded into another format that only the
client and server can understand. As for encryption, security will be ensured even if
the data is compromised, because the list is hidden in the client and server side. The
hacker can only know the index of lists which alone cannot crack the data.
 Location-based services (LBS)
 LBS are a general class of computer program-level services that use location data to
control features.
 As such LBS is an information service and has a number of uses in social networking
today as an entertainment service, which is accessible with mobile devices through the
mobile network and which uses information on the geographical position of the mobile
device. This has become more and more important with the expansion of the smart
phone and tablet markets as well.
 LBS include services to identify a location of a person or object, such as discovering
the nearest banking cash machine
 (a.k.a. ATM) or the whereabouts of a friend or employee.
 LBS include parcel tracking and vehicle tracking services.
 The entire system is based on client/server model. This includes the server/server
communication for data synchronization which can also be regarded as another
kind of client/server model.
 From the user's perspective, the client is the cell phone which is installed our
system, and the server is one of the nodes.
 Using data synchronization nodes connect to each other. One of the nodes can be
viewed as a “client” and the other nodes can be considered as “servers” which are
the destination of the "client".
System architecture
Client Architecture
This section explains how the client architecture was designed and why it is
manipulated in that way. Several design patterns were applied in the client part
because patterns could make the codes more understandable and may be more
efficient. The model-view-controller (MVC) design pattern is used in the client side
especially in user interface because it brings more extensible and readable coding
manner which is better than programming without MVC pattern.
Database Design
This step in the design phase is to determine what kind of data needs to be stored in the
database and find out the relation between them. This data also needs to be present as
objects in the "Data model". In other words, the user's information must be stored in the
database. Information that should be stored includes the user’s email as primary key,
name, phone number, and the user's friends’ information which includes their name and
phone number. The location information must also be stored into database to keep track
of the user's location. This information should consist of the user’s longitude and
latitude, as well as the time when this information was received. The alarm also needs
to be stored into the database.
Database design
System Requirement
The System Requirement is divided into Functional and Non-Function requirements.
1. Functional requirements
 The system should be able to find the location.
o find location information at GPS mode.
o find location information without GPS.
 The system should be able to send notification.
o Send notification by SMS(Short Message Service).
o The notification includes location information.
o The notification could show where you are on a map.
o The notification could show your track on a map.
2. Non-Functional Requirements
 The system is based on client server mode.
 The client works on android phone (primarily).
 The client works on other kind of cell phone (may be in future).
 The system should be able to support multiple server.
o The server may be deployed on different place.
o The user may access any server .
o The data must be synchronized.
 Location Problem
 Mobile positioning
 Mobile positioning determines the user’s actual location information by mobile
 Terminals and mobile networks, such as text messages or mobile signals to a
complete a series of location information services. The mobile positioning method
can be
:
 To solve the problem of locating the user without GPS signal, we considered using an
existing cell tower or Wi-Fi3 access point information. As we know, the mobile phone
sends/receives signal from cell towers that are close to user, in other words the user has a
relationship with cell towers, and the mobile signal covers almost every corner in the city,
if we knew the cell tower pinpoint location and service area.
 The approximate location of the user can be measured wherever they are. However most
modern mobile phone has built in Wi-Fi technology
 Finding the user’s location information without GPS is one of problems
 To solve in this project. We solved this problem by combining existing technology
 our own developments which makes up for the holes in the existing technology improve
the accuracy of the location. Currently, we only calculate the approximate
 It would be better to calculate the accuracy information in meter for instance telling the
user “the precision is around 500 meters”.
 The solution also has limitations given that the location information of access points
and cell towers are in limited cities only.
Pppppppppttttttttttttttttttttt
 http://java.sun.com/javaee/
 http://en.wikipedia.org/wiki/Global_Positioning_System
 http://www.w3.org/TR

More Related Content

Pppppppppttttttttttttttttttttt

  • 1. SEMINAR ON MOBILE DISTRIBUTED SYSTEM FOR PERSONAL SECURITY Presented By: Rahul Kulshrestra Roll No. : - 1300410027 Branch :- C.S.E.
  • 2.  Introduction  Technology  Services  System architecture  Analysis  Problem Discussion  Problem analysis  Conclusion  References
  • 3.  The goal of this project is to provide a location-based alarm system through which users can broadcast their last known position in emergency situations.  The system will be able to send an SMS or an e-mail containing the user’s location coordinates to the already registered mobile numbers using GCM service.  The location information is obtained using GPS technology and real-time location is shown on the receiver’s application using Google Maps API.  In situations where GPS is not available, the system tracks location using LBS technology
  • 4.  From system overview and analysis, we had an outline of the whole system.  we will introduce the technologies involved in our system. Hibernate  Hibernate is a powerful, high performance object/relational persistence and query service. Web service  Web service is defined by W3C7 as "a software system designed to support interoperable machine to machine interaction over a network. It is a powerful programming language independent concept for data communication over a network.
  • 5. sos  SOS button in all handsets and the police network will be integrated with the mobile phone network to trace and respond to distress calls in the shortest possible time,
  • 6. Global Positioning System (GPS) The Global Positioning System (GPS) is a space- based navigation system that provides location and time information in all weather conditions, anywhere on the Earth
  • 7.  Security technology  The communication part works with HTTP protocol. Since HTTP protocol does not contain security measures, the data can be attainted very easily by an unauthorized user. To protect the data, it has to be encoded into another format that only the client and server can understand. As for encryption, security will be ensured even if the data is compromised, because the list is hidden in the client and server side. The hacker can only know the index of lists which alone cannot crack the data.
  • 8.  Location-based services (LBS)  LBS are a general class of computer program-level services that use location data to control features.  As such LBS is an information service and has a number of uses in social networking today as an entertainment service, which is accessible with mobile devices through the mobile network and which uses information on the geographical position of the mobile device. This has become more and more important with the expansion of the smart phone and tablet markets as well.  LBS include services to identify a location of a person or object, such as discovering the nearest banking cash machine  (a.k.a. ATM) or the whereabouts of a friend or employee.  LBS include parcel tracking and vehicle tracking services.
  • 9.  The entire system is based on client/server model. This includes the server/server communication for data synchronization which can also be regarded as another kind of client/server model.  From the user's perspective, the client is the cell phone which is installed our system, and the server is one of the nodes.  Using data synchronization nodes connect to each other. One of the nodes can be viewed as a “client” and the other nodes can be considered as “servers” which are the destination of the "client".
  • 11. Client Architecture This section explains how the client architecture was designed and why it is manipulated in that way. Several design patterns were applied in the client part because patterns could make the codes more understandable and may be more efficient. The model-view-controller (MVC) design pattern is used in the client side especially in user interface because it brings more extensible and readable coding manner which is better than programming without MVC pattern.
  • 12. Database Design This step in the design phase is to determine what kind of data needs to be stored in the database and find out the relation between them. This data also needs to be present as objects in the "Data model". In other words, the user's information must be stored in the database. Information that should be stored includes the user’s email as primary key, name, phone number, and the user's friends’ information which includes their name and phone number. The location information must also be stored into database to keep track of the user's location. This information should consist of the user’s longitude and latitude, as well as the time when this information was received. The alarm also needs to be stored into the database.
  • 14. System Requirement The System Requirement is divided into Functional and Non-Function requirements. 1. Functional requirements  The system should be able to find the location. o find location information at GPS mode. o find location information without GPS.  The system should be able to send notification. o Send notification by SMS(Short Message Service). o The notification includes location information. o The notification could show where you are on a map. o The notification could show your track on a map.
  • 15. 2. Non-Functional Requirements  The system is based on client server mode.  The client works on android phone (primarily).  The client works on other kind of cell phone (may be in future).  The system should be able to support multiple server. o The server may be deployed on different place. o The user may access any server . o The data must be synchronized.
  • 16.  Location Problem  Mobile positioning  Mobile positioning determines the user’s actual location information by mobile  Terminals and mobile networks, such as text messages or mobile signals to a complete a series of location information services. The mobile positioning method can be :
  • 17.  To solve the problem of locating the user without GPS signal, we considered using an existing cell tower or Wi-Fi3 access point information. As we know, the mobile phone sends/receives signal from cell towers that are close to user, in other words the user has a relationship with cell towers, and the mobile signal covers almost every corner in the city, if we knew the cell tower pinpoint location and service area.  The approximate location of the user can be measured wherever they are. However most modern mobile phone has built in Wi-Fi technology
  • 18.  Finding the user’s location information without GPS is one of problems  To solve in this project. We solved this problem by combining existing technology  our own developments which makes up for the holes in the existing technology improve the accuracy of the location. Currently, we only calculate the approximate  It would be better to calculate the accuracy information in meter for instance telling the user “the precision is around 500 meters”.  The solution also has limitations given that the location information of access points and cell towers are in limited cities only.