Volume 6 Issue 12- December 2016


Page Title Full Text
401-405 Segmented File Transfer
Lalit Adithya, Sampada K S

Of the many methods that can be used to download or upload a text or binary file to the internet, the method of Segmented File Transfer is one that is the lest applied even though the advantages of implementing the concept has a lot of advantages. This paper presents the advantages of using the concept of segmented file transfer while showing the necessary implementation details that are required to implement this concept for a download manager.

Keywords— Segmented File Download, Byte Serving, Segmented File Upload

Full Text PDF
406-409 Comparative Study of Packet Sniffing tools for HTTP Network Monitoring and Analyzing
Dr. Aruna Varanasi, P. Swathi

The use of computers has expeditiously increased in the last few decades. Coupled with this has been the exponential growth of the internet. Computers can now exchange the large volumes of information. This has resulted in an ever increasing need for tools and applications that can monitor and analysing the network traffic.
Monitoring tools helps network administrators in evaluating and diagnosing problems with servers, the network wire, hubs and applications. But other than artificial intelligence machines cannot recognize personalities and content, they can also be used for communication and exchange of information pertaining to unlawful activity. This is why law enforcement agencies have shown increased interest in network monitoring tools and application to analyse the data. By monitoring and analysing the data, flowing across the net can help detect and prevent crime. Such monitoring tools and applications have an important role in intelligence gathering.
In this paper explained related HTTP packet sniffing tools such as wireshark, TCP DUMP, TCP Flow, and Colasoft Capsa and their limitations of reconstructing HTTP web pages by packet analysis & decode. I gave a brief introduction of packet sniffing and how it is works and its components and Challenges to extract HTTP web pages data.

Keywords—Networking, HTTP, Monitoring, Analyse, Sniffing.

Full Text PDF
410-413 Automatic Safety Home Bell System with Message Enabled Features
T.Venkat Narayana Rao, Karttik Reddy Yellu

The doorbell plays an important role in home security, an efficient and consistent system must be developed for better safety which could be accessed at a lower price. In today’s world, there are many doorbells systems performing different operations. This paper focus  on  IOT related automatic doorbell systems which are designed to ring the bell automatically when a visitor approaches the door. If the visitor stands for more than a specified time span  without the door being opened, an SMS will be sent to a registered mobile number of  the house member and the response of the house member (i.e in the form of an SMS) will be displayed on an LCD screen placed beside the door so that the visitor can read the SMS and  act accordingly. This system is intended to service old age people and also to identify the unauthorized persons, if any.

Indexed Terms: automatic, doorbell, IOT, low price, security, SMS

Full Text PDF
414-418 Internet of Things: Security Challenges and Issues
T. Venkat Narayana Rao, Sangam Shayideep, Jayesh Jahagirdar

The Internet of Things, a developing worldwide Internet-based technical architecture which facilitates trading of merchandise and enterprises in worldwide supply chain networks affects the privacy and security of the included partners. In order to tackle this some measures should be taken which ensures client privacy, access control, data authentication and architecture’s resilience to attacks.
No doubt that security is the most needed of prerequisites for the across the board implementation of numerous IoT visions. The scope for IoT security is incredibly wide, in no less than four dimensions. As far as security extension is concerned it rarely incorporates addressed tasks like digital forgetting, privacy, communication, computation and sensing. It additionally requests novel and better strategies for software, hardware and data protection that may access to IoT devices physically. The common components of IoT devices are Sensors and actuators and create many problems related to security including the integrity of actuating events and physical signals. In the final stage of processing of amassed data, numerous semantic attacks can be expected. In this paper various challenges and issues of IoT implementations are discussed.

Full Text PDF