SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan – Feb. 2015), PP 38-42
www.iosrjournals.org
DOI: 10.9790/0661-17113842 www.iosrjournals.org 38 | Page
An in-building multi-server cloud system based on shortest
Path algorithm depending on the distance and measured
Signal strength
1
Abhirup Bhawal, 2
Anindita Nath, 3
Suchismita Mitra, 4
Puspendu Roy,
5
Pradip Kumar Das
Abstract: In this paper we are proposing a system that will work as a virtual cloud computing environment.
Our system will be suitable for an office for example software development firm. Cloud Computing is an
emerging technology now a days. In cloud computing, the resources are shared within a network using web
server. We have designed a cloud computing environment having multiple upload stations and numerous client
nodes. Most commonly, the cloud computing environment has one server and multiple nodes connected with it.
It server multiple purposes at a time. We have designed a cloud computing environment with decentralized
multiple upload stations. In our system, we have assumed that the client nodes can be mobile and it can change
its location according to time. We have also assumed that, the users will not have a fixed working desk and they
can do their work from any desk they want. They need to log in to the system using their pre-defined user-id and
password and he will get access to the system with all features. Now, once a user will try to upload some data in
the upload stations, our system will intelligently find out the nearest server from the location of the client. The
data will be uploaded in that upload station. As all the upload stations are inter connected, if he or she wants to
retrieve that information later, he or she will be able to do that easily. This concept can also be implemented in
multi-floor office area. We are using Bluetooth as the medium of transmission as it is low power consuming and
less costly than other available standard options.
Keywords: Cloud Computing, Upload Stations, Bluetooth.
I. Introduction
The technologies we are using to design the system are cloud computing, Bluetooth, Ad-Hoc Network.
A brief description of those technologies follow.
Cloud Computing
Cloud Computing is computing in which large groups of remote servers are networked to allow
centralized data storage and online access to computer services and resources. Clouds can be classified as
public, private or hybrid. Cloud computing relies on sharing resources to achieve coherence and economies of
scale, similar to a utility over a network. At the foundation of cloud computing is the broader concept of
converged infrastructure and shared services. The primitive goal of cloud computing environment is to
maximize the use of computing power thus reducing environmental damages as well since less power, air
conditioning, Rackspace etc. The present availability of high-capacity networks, low cost computers and storage
devices as well as the widespread adaptation of hardware virtualization, service-oriented architecture and
autonomic and utility computing have led to growth in cloud computing.
Bluetooth
Bluetooth is a wireless technology standard for exchanging data over short distances and operates in
the 2.4 GHz frequency band without a license for wireless communication. This communication protocol has
primarily been designed for low-power consumption and low cost. This technology can be used for real-time
data transfer usually between 10-100 meters which is reasonable within a small building. The data-transfer rate
of the Bluetooth Technology is quite acceptable i.e. 3-4 Mbps. Moreover, the Bluetooth devices require low
power to work. Thus this is low power consuming and it is less costly. As a result Bluetooth is a low power
consuming and cost efficient wireless medium of transmission.
Ad-Hoc Network
The wireless ad-hoc network is used in our project. It’s basically a decentralized, infrastructure-less
network because it doesn’t rely on a pre-existing infrastructure like the routers or access points. The nodes in
this kind of network is completely dynamic. In this system, each node that participates in data transmission,
dynamically determines the node to whom the data needs to be forwarded.
An in-building multi-server cloud system based on shortest path algorithm depending on…
DOI: 10.9790/0661-17113842 www.iosrjournals.org 39 | Page
II. Motivation
Cloud computing is an emerging technology of today’s era. It not only makes any system more
efficient and easy to use and access, but also it reduces the requirements of the client machines. Cloud
computing environment serves two purposes. Firstly, the client nodes don’t need to be highly configured to do
the high computing jobs. If we configure the server highly, it will serve the purpose of processing all the
requests from the client nodes. Secondly, the data storage becomes centralized. As a result the chances of losing
the important data due to accidents or server failures become less. But major disadvantage of this kind of
systems is network limitation. The number of channels in a server is limited this is why, the number of users
who can use the system resources becomes limited and it increases the waiting time eventually. As a solution to
this problem we thought of a cloud computing system where there will be multiple upload stations. Thus, the
number of users who can use the system at a time increases. Implementing multiple upload stations we actually
get another important benefit. In existing cloud computing systems the client nodes needs to be fixed, but in our
case the users can also be movable which will make the work environment more comfortable.
III. Methodology
In our system we have considered that we have multiple upload stations working as servers. Those
upload station has fixed location on the floor and those are interconnected. In the following figure a top-view of
the system is shown. In that figure, the blue circles represent the mobile devices and the green circles represent
the static devices.
Fig. 1 – The top-view of our system
This project can be divided basically in two parts. Firstly, we have designed an application that will be
running in each and every user’s machine. This application will make the user able to upload their data to one of
the upload stations. Secondly, during any upload that will take place, we need to determine the nearest server
from the user’s location. Our area of thrust in this project was to handle multiple upload stations and how those
stations can run independently as well as syncing with each other.
A. User application running in every device
We have designed a platform for an office of software development firm. In that application, each user
has to log in using their user-id and password. After successfully logging into the system, they can access
various features like writing notes, saving them in the upload station, running and compiling source codes. For
implementing those features, we used data structures that will be stored in binary files as we tried to avoid the
burdens in the client nodes as well as the upload stations. For each feature, a particular response is being
transmitted to the upload stations or the servers. The upload station is processing the request and sending back
the proper response to the client node. When a user is being registered, a particular block of memory is allocated
to that user, and all the documents or files he or she will be creating will be stored in that place. Each and every
file in the upload stations are stored in an encrypted way to reduce of chance of data misplacement. We are DES
encryption standard to achieve that. Moreover there are some files those are being used for general purpose, like
storing the user-id and passwords of the users. In DES cryptography system, each file is encrypted with a
randomly generated string of characters. In our system to provide the information those are stored in the upload
stations an extra layer of protection, we are changing the randomly generated key string in a timely manner and
encrypting again. Thus if anyone steals any data, it will be tough for him or her to decipher the actual content of
the file. Apart from that whenever we are transmitting any data we are sending the data after encryption. After
receiving the data in the upload station, the data is decrypted and processed after that. Thus, if someone taps the
data on the fly, he will not be able to understand the actual data. There are two parts in this application, i.e. the
server and the client. Fig. 2 depicts the flow diagram that is happening in the client node.
An in-building multi-server cloud system based on shortest path algorithm depending on…
DOI: 10.9790/0661-17113842 www.iosrjournals.org 40 | Page
Fig. 2 the flow diagram of the client part of the application
Step algorithm for client:
Step 1 – The client has to login to the system for using the entire system and facilities thus the system prompts
the user to login first.
Step 2 – The login request is generated and sent to the server.
Step 3 – Server responses to the login request.
Step 4 – If the server grants the login for the user, control is passed to step 5 else it is sent back to the step 1.
Step 5 – The user in the client node gets a home screen containing several options to start the work.
In the same manner the server works in our system. The flow diagram and the step algorithm are
described below.
Fig. 3 – The flow diagram for the server part
Step algorithm for server:
Step 1 – The server is always in listening mode.
Step 2 – Request from the client node is received.
Step 3 – the request is checked whether it is a valid request or not.
Step 4 – If the request is accepted and correct in the specific protocol then continue to step 4 else back to step
1 for receiving the next request.
Step 5 – The received request is passed to the request handler.
Step 6 – The request handler finishes the specified task, and then the processed result is sent back to the client
node from where the request has been received.
Step 7 – The control is again sent back to Step 1.
B. Determine the nearest server based on the user’s location
To determine the nearest upload station node, a response request is sent to all the upload stations. Then,
if the upload station response back within a threshold time, the time is stored. According to the times required
for responding back, we are approximately calculating the distance from the client node to the upload station.
Then those distances are sorted in ascending order to find out the nearest upload station. Once we have selected
An in-building multi-server cloud system based on shortest path algorithm depending on…
DOI: 10.9790/0661-17113842 www.iosrjournals.org 41 | Page
the nearest upload station, our system is sending the data to that upload station. Fig. 4 depicts the flow diagram
for selecting the nearest upload station.
Fig. 4 – Flow diagram for selecting the nearest upload station
C. Data structure
The entire building block of the permanent data storage system is data structures like, dictionary, list,
tuples etc. We have chosen to use simple text files to store the data permanently and to use basic data structures
extensively as mentioned earlier. We have used dictionary to store several data which is responsible for the user
to grant access to number of services. A dictionary is a special kind of data-structure of python, which support
the following features. Keys must be immutable, and this key can be number, string, tuple or anything, but, it
cannot be changed after creation, because of hashing. And moreover, the keys must be unique again because of
hashing. There are no restrictions of values in a dictionary, and the keys will be listed in arbitrary order1. For
instance, the file responsible for the users to login to the system looks like this: Here, the username field is a
string, containing the username, and there is a tuple corresponding to the key i.e. the username, and the first
field of the tuple contains the password, and the second field contains the string for the generation of the
cryptographic key which we use to encrypt the data stored by the user. There are several other similar kinds of
files containing other related data. For example, the next screenshot shows the text file containing the list of the
files, a user saved in the system. In this case, we have used a dictionary, where the username has been used as
the key, and there is a list corresponding to each key, containing the name of the files saved by the user. As I
have mentioned in the motivation, we are trying to build a system, which will be low power consuming as well
as cost efficient, we have purposely chosen to use data-structures stored in simple text files, instead of database.
As a result the whole system will not be bulky and will be very suitable for the smaller systems as well as for the
larger systems. Fig. 5 depicts one of the data structure used for our system.
Fig. 5 – Data structure showing the files saved the users
IV. Results
The results and the finding of our project are portrayed in this section. The fig. 6 depicts the user
interface that a user gets whenever he or she is logging into the system.
Fig. 6 – The user interface of the user after logging into the system
The next figure i.e. Fig. 6 depicts the results of the encryption and decryption we are using to protect
the information in the upload stations as well as during transmission.
An in-building multi-server cloud system based on shortest path algorithm depending on…
DOI: 10.9790/0661-17113842 www.iosrjournals.org 42 | Page
Fig. 7 – Result showing the encryption that is being used in our system
V. Conclusion And Future Work
Our system is working as per our expectation. The algorithms that was initially sketched upon papers
with pencils using the mathematical formulas and concepts are working in a real life system. Moreover, we are
still working in the system to make it further better. In future we will try to integrate this system with body area
network and wearable system so that it can be used to ease our daily life burdens and tasks that we perform
every day.
Acknowledgement
We sincerely thank Mr. Avranil Tah, Founder of ESL and Mr. Arnab Pal, Techno-Marketing
Consultant of ESL for guiding us during the project. Their help in this project really made our task easy. We
faced many difficulties in that period of time, regarding the transmission of Bluetooth which we ultimately
managed to solve by their intense guidance. Moreover, we want to thank our colleagues and friends for drawing
our attention to the most important and vital overlooked points.
Ad

More Related Content

What's hot (18)

Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
victor okoth
 
Dce rpc
Dce rpcDce rpc
Dce rpc
pratosh123
 
04 Client Server Technology
04 Client Server Technology04 Client Server Technology
04 Client Server Technology
Laguna State Polytechnic University
 
internet basics
internet basics internet basics
internet basics
Ahmed Saihood
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
SKS
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing Environment
Purushottam Dahal
 
Client server technology
Client server technologyClient server technology
Client server technology
Anwar Kamal
 
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
ijcsit
 
Lis 4482 final report
Lis 4482 final reportLis 4482 final report
Lis 4482 final report
PeterCummingsIII
 
Distributed computing environment
Distributed computing environmentDistributed computing environment
Distributed computing environment
Ravi Bhushan
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
Vedpal Yadav
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
rosu555
 
Client server based computing
Client server based computingClient server based computing
Client server based computing
Mohammad Affan
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
Rence Montanes
 
Bcc network connection
Bcc network connectionBcc network connection
Bcc network connection
MDMusab
 
Mail server report
Mail server reportMail server report
Mail server report
Navjot Navi
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
MNM Jain Engineering College
 
Computing Environment
Computing EnvironmentComputing Environment
Computing Environment
kem warren
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
victor okoth
 
Network virtualization seminar report
Network virtualization seminar reportNetwork virtualization seminar report
Network virtualization seminar report
SKS
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing Environment
Purushottam Dahal
 
Client server technology
Client server technologyClient server technology
Client server technology
Anwar Kamal
 
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
Distributed Cloud Computing Environment Enhanced With Capabilities For Wide-A...
ijcsit
 
Distributed computing environment
Distributed computing environmentDistributed computing environment
Distributed computing environment
Ravi Bhushan
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
Vedpal Yadav
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
rosu555
 
Client server based computing
Client server based computingClient server based computing
Client server based computing
Mohammad Affan
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
Rence Montanes
 
Bcc network connection
Bcc network connectionBcc network connection
Bcc network connection
MDMusab
 
Mail server report
Mail server reportMail server report
Mail server report
Navjot Navi
 
Computing Environment
Computing EnvironmentComputing Environment
Computing Environment
kem warren
 

Viewers also liked (20)

Graphs
GraphsGraphs
Graphs
Ghaffar Khan
 
Analysis of Algorithms II - PS3
Analysis of Algorithms II - PS3Analysis of Algorithms II - PS3
Analysis of Algorithms II - PS3
AtakanAral
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s
Krish_ver2
 
Top-k shortest path
Top-k shortest pathTop-k shortest path
Top-k shortest path
redhatdb
 
Unit26 shortest pathalgorithm
Unit26 shortest pathalgorithmUnit26 shortest pathalgorithm
Unit26 shortest pathalgorithm
meisamstar
 
Multi-core processor and Multi-channel memory architecture
Multi-core processor and Multi-channel memory architectureMulti-core processor and Multi-channel memory architecture
Multi-core processor and Multi-channel memory architecture
Umair Amjad
 
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Mohanlal Sukhadia University (MLSU)
 
Intel core i3, i5, i7 , core2 duo and atom processors
Intel core i3, i5, i7 , core2 duo and atom processorsIntel core i3, i5, i7 , core2 duo and atom processors
Intel core i3, i5, i7 , core2 duo and atom processors
FadyMorris
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithm
Srikrishnan Suresh
 
Dijkstra's algorithm
Dijkstra's algorithmDijkstra's algorithm
Dijkstra's algorithm
gsp1294
 
Intel Core i7 Processors
Intel Core i7 ProcessorsIntel Core i7 Processors
Intel Core i7 Processors
Anagh Vijayvargia
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processor
sagar solanky
 
Unix command-line tools
Unix command-line toolsUnix command-line tools
Unix command-line tools
Eric Wilson
 
D0941824
D0941824D0941824
D0941824
IOSR Journals
 
J0335961
J0335961J0335961
J0335961
IOSR Journals
 
B0330107
B0330107B0330107
B0330107
IOSR Journals
 
D006462595
D006462595D006462595
D006462595
cokcokcokcok
 
Seminar gp torino_2012_answering_questions_from_players
Seminar gp torino_2012_answering_questions_from_playersSeminar gp torino_2012_answering_questions_from_players
Seminar gp torino_2012_answering_questions_from_players
Zeun1982
 
Oxford
OxfordOxford
Oxford
Alaïs Mathias
 
Analysis of Algorithms II - PS3
Analysis of Algorithms II - PS3Analysis of Algorithms II - PS3
Analysis of Algorithms II - PS3
AtakanAral
 
2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s 2.3 shortest path dijkstra’s
2.3 shortest path dijkstra’s
Krish_ver2
 
Top-k shortest path
Top-k shortest pathTop-k shortest path
Top-k shortest path
redhatdb
 
Unit26 shortest pathalgorithm
Unit26 shortest pathalgorithmUnit26 shortest pathalgorithm
Unit26 shortest pathalgorithm
meisamstar
 
Multi-core processor and Multi-channel memory architecture
Multi-core processor and Multi-channel memory architectureMulti-core processor and Multi-channel memory architecture
Multi-core processor and Multi-channel memory architecture
Umair Amjad
 
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Shortest path (Dijkistra's Algorithm) & Spanning Tree (Prim's Algorithm)
Mohanlal Sukhadia University (MLSU)
 
Intel core i3, i5, i7 , core2 duo and atom processors
Intel core i3, i5, i7 , core2 duo and atom processorsIntel core i3, i5, i7 , core2 duo and atom processors
Intel core i3, i5, i7 , core2 duo and atom processors
FadyMorris
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithm
Srikrishnan Suresh
 
Dijkstra's algorithm
Dijkstra's algorithmDijkstra's algorithm
Dijkstra's algorithm
gsp1294
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processor
sagar solanky
 
Unix command-line tools
Unix command-line toolsUnix command-line tools
Unix command-line tools
Eric Wilson
 
Seminar gp torino_2012_answering_questions_from_players
Seminar gp torino_2012_answering_questions_from_playersSeminar gp torino_2012_answering_questions_from_players
Seminar gp torino_2012_answering_questions_from_players
Zeun1982
 
Ad

Similar to An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength (20)

Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
Hussain Hamil
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
prakashvs7
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
DrThenmozhiKarunanit
 
introduction to distributed computing.pptx
introduction to distributed computing.pptxintroduction to distributed computing.pptx
introduction to distributed computing.pptx
ApthiriSurekha
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
Bhavani Thangavel
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
homeworkping7
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
cloud computing is the delivery of computing services
cloud computing is the delivery of computing servicescloud computing is the delivery of computing services
cloud computing is the delivery of computing services
abidhassan225
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
Mohammad Ilyas Malik
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
IJIR JOURNALS IJIRUSA
 
Clientserver
ClientserverClientserver
Clientserver
Madhumithah Ilango
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
Cloud Basics.pptx
Cloud Basics.pptxCloud Basics.pptx
Cloud Basics.pptx
ramanathan2006
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
Offline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization SystemOffline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization System
ijceronline
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
introduction to distributed computing.pptx
introduction to distributed computing.pptxintroduction to distributed computing.pptx
introduction to distributed computing.pptx
ApthiriSurekha
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
cloud computing is the delivery of computing services
cloud computing is the delivery of computing servicescloud computing is the delivery of computing services
cloud computing is the delivery of computing services
abidhassan225
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
Mohammad Ilyas Malik
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
IJIR JOURNALS IJIRUSA
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Offline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization SystemOffline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization System
ijceronline
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
Ad

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

Recently uploaded (20)

Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Generative AI & Large Language Models Agents
Generative AI & Large Language Models AgentsGenerative AI & Large Language Models Agents
Generative AI & Large Language Models Agents
aasgharbee22seecs
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan – Feb. 2015), PP 38-42 www.iosrjournals.org DOI: 10.9790/0661-17113842 www.iosrjournals.org 38 | Page An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength 1 Abhirup Bhawal, 2 Anindita Nath, 3 Suchismita Mitra, 4 Puspendu Roy, 5 Pradip Kumar Das Abstract: In this paper we are proposing a system that will work as a virtual cloud computing environment. Our system will be suitable for an office for example software development firm. Cloud Computing is an emerging technology now a days. In cloud computing, the resources are shared within a network using web server. We have designed a cloud computing environment having multiple upload stations and numerous client nodes. Most commonly, the cloud computing environment has one server and multiple nodes connected with it. It server multiple purposes at a time. We have designed a cloud computing environment with decentralized multiple upload stations. In our system, we have assumed that the client nodes can be mobile and it can change its location according to time. We have also assumed that, the users will not have a fixed working desk and they can do their work from any desk they want. They need to log in to the system using their pre-defined user-id and password and he will get access to the system with all features. Now, once a user will try to upload some data in the upload stations, our system will intelligently find out the nearest server from the location of the client. The data will be uploaded in that upload station. As all the upload stations are inter connected, if he or she wants to retrieve that information later, he or she will be able to do that easily. This concept can also be implemented in multi-floor office area. We are using Bluetooth as the medium of transmission as it is low power consuming and less costly than other available standard options. Keywords: Cloud Computing, Upload Stations, Bluetooth. I. Introduction The technologies we are using to design the system are cloud computing, Bluetooth, Ad-Hoc Network. A brief description of those technologies follow. Cloud Computing Cloud Computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services and resources. Clouds can be classified as public, private or hybrid. Cloud computing relies on sharing resources to achieve coherence and economies of scale, similar to a utility over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. The primitive goal of cloud computing environment is to maximize the use of computing power thus reducing environmental damages as well since less power, air conditioning, Rackspace etc. The present availability of high-capacity networks, low cost computers and storage devices as well as the widespread adaptation of hardware virtualization, service-oriented architecture and autonomic and utility computing have led to growth in cloud computing. Bluetooth Bluetooth is a wireless technology standard for exchanging data over short distances and operates in the 2.4 GHz frequency band without a license for wireless communication. This communication protocol has primarily been designed for low-power consumption and low cost. This technology can be used for real-time data transfer usually between 10-100 meters which is reasonable within a small building. The data-transfer rate of the Bluetooth Technology is quite acceptable i.e. 3-4 Mbps. Moreover, the Bluetooth devices require low power to work. Thus this is low power consuming and it is less costly. As a result Bluetooth is a low power consuming and cost efficient wireless medium of transmission. Ad-Hoc Network The wireless ad-hoc network is used in our project. It’s basically a decentralized, infrastructure-less network because it doesn’t rely on a pre-existing infrastructure like the routers or access points. The nodes in this kind of network is completely dynamic. In this system, each node that participates in data transmission, dynamically determines the node to whom the data needs to be forwarded.
  • 2. An in-building multi-server cloud system based on shortest path algorithm depending on… DOI: 10.9790/0661-17113842 www.iosrjournals.org 39 | Page II. Motivation Cloud computing is an emerging technology of today’s era. It not only makes any system more efficient and easy to use and access, but also it reduces the requirements of the client machines. Cloud computing environment serves two purposes. Firstly, the client nodes don’t need to be highly configured to do the high computing jobs. If we configure the server highly, it will serve the purpose of processing all the requests from the client nodes. Secondly, the data storage becomes centralized. As a result the chances of losing the important data due to accidents or server failures become less. But major disadvantage of this kind of systems is network limitation. The number of channels in a server is limited this is why, the number of users who can use the system resources becomes limited and it increases the waiting time eventually. As a solution to this problem we thought of a cloud computing system where there will be multiple upload stations. Thus, the number of users who can use the system at a time increases. Implementing multiple upload stations we actually get another important benefit. In existing cloud computing systems the client nodes needs to be fixed, but in our case the users can also be movable which will make the work environment more comfortable. III. Methodology In our system we have considered that we have multiple upload stations working as servers. Those upload station has fixed location on the floor and those are interconnected. In the following figure a top-view of the system is shown. In that figure, the blue circles represent the mobile devices and the green circles represent the static devices. Fig. 1 – The top-view of our system This project can be divided basically in two parts. Firstly, we have designed an application that will be running in each and every user’s machine. This application will make the user able to upload their data to one of the upload stations. Secondly, during any upload that will take place, we need to determine the nearest server from the user’s location. Our area of thrust in this project was to handle multiple upload stations and how those stations can run independently as well as syncing with each other. A. User application running in every device We have designed a platform for an office of software development firm. In that application, each user has to log in using their user-id and password. After successfully logging into the system, they can access various features like writing notes, saving them in the upload station, running and compiling source codes. For implementing those features, we used data structures that will be stored in binary files as we tried to avoid the burdens in the client nodes as well as the upload stations. For each feature, a particular response is being transmitted to the upload stations or the servers. The upload station is processing the request and sending back the proper response to the client node. When a user is being registered, a particular block of memory is allocated to that user, and all the documents or files he or she will be creating will be stored in that place. Each and every file in the upload stations are stored in an encrypted way to reduce of chance of data misplacement. We are DES encryption standard to achieve that. Moreover there are some files those are being used for general purpose, like storing the user-id and passwords of the users. In DES cryptography system, each file is encrypted with a randomly generated string of characters. In our system to provide the information those are stored in the upload stations an extra layer of protection, we are changing the randomly generated key string in a timely manner and encrypting again. Thus if anyone steals any data, it will be tough for him or her to decipher the actual content of the file. Apart from that whenever we are transmitting any data we are sending the data after encryption. After receiving the data in the upload station, the data is decrypted and processed after that. Thus, if someone taps the data on the fly, he will not be able to understand the actual data. There are two parts in this application, i.e. the server and the client. Fig. 2 depicts the flow diagram that is happening in the client node.
  • 3. An in-building multi-server cloud system based on shortest path algorithm depending on… DOI: 10.9790/0661-17113842 www.iosrjournals.org 40 | Page Fig. 2 the flow diagram of the client part of the application Step algorithm for client: Step 1 – The client has to login to the system for using the entire system and facilities thus the system prompts the user to login first. Step 2 – The login request is generated and sent to the server. Step 3 – Server responses to the login request. Step 4 – If the server grants the login for the user, control is passed to step 5 else it is sent back to the step 1. Step 5 – The user in the client node gets a home screen containing several options to start the work. In the same manner the server works in our system. The flow diagram and the step algorithm are described below. Fig. 3 – The flow diagram for the server part Step algorithm for server: Step 1 – The server is always in listening mode. Step 2 – Request from the client node is received. Step 3 – the request is checked whether it is a valid request or not. Step 4 – If the request is accepted and correct in the specific protocol then continue to step 4 else back to step 1 for receiving the next request. Step 5 – The received request is passed to the request handler. Step 6 – The request handler finishes the specified task, and then the processed result is sent back to the client node from where the request has been received. Step 7 – The control is again sent back to Step 1. B. Determine the nearest server based on the user’s location To determine the nearest upload station node, a response request is sent to all the upload stations. Then, if the upload station response back within a threshold time, the time is stored. According to the times required for responding back, we are approximately calculating the distance from the client node to the upload station. Then those distances are sorted in ascending order to find out the nearest upload station. Once we have selected
  • 4. An in-building multi-server cloud system based on shortest path algorithm depending on… DOI: 10.9790/0661-17113842 www.iosrjournals.org 41 | Page the nearest upload station, our system is sending the data to that upload station. Fig. 4 depicts the flow diagram for selecting the nearest upload station. Fig. 4 – Flow diagram for selecting the nearest upload station C. Data structure The entire building block of the permanent data storage system is data structures like, dictionary, list, tuples etc. We have chosen to use simple text files to store the data permanently and to use basic data structures extensively as mentioned earlier. We have used dictionary to store several data which is responsible for the user to grant access to number of services. A dictionary is a special kind of data-structure of python, which support the following features. Keys must be immutable, and this key can be number, string, tuple or anything, but, it cannot be changed after creation, because of hashing. And moreover, the keys must be unique again because of hashing. There are no restrictions of values in a dictionary, and the keys will be listed in arbitrary order1. For instance, the file responsible for the users to login to the system looks like this: Here, the username field is a string, containing the username, and there is a tuple corresponding to the key i.e. the username, and the first field of the tuple contains the password, and the second field contains the string for the generation of the cryptographic key which we use to encrypt the data stored by the user. There are several other similar kinds of files containing other related data. For example, the next screenshot shows the text file containing the list of the files, a user saved in the system. In this case, we have used a dictionary, where the username has been used as the key, and there is a list corresponding to each key, containing the name of the files saved by the user. As I have mentioned in the motivation, we are trying to build a system, which will be low power consuming as well as cost efficient, we have purposely chosen to use data-structures stored in simple text files, instead of database. As a result the whole system will not be bulky and will be very suitable for the smaller systems as well as for the larger systems. Fig. 5 depicts one of the data structure used for our system. Fig. 5 – Data structure showing the files saved the users IV. Results The results and the finding of our project are portrayed in this section. The fig. 6 depicts the user interface that a user gets whenever he or she is logging into the system. Fig. 6 – The user interface of the user after logging into the system The next figure i.e. Fig. 6 depicts the results of the encryption and decryption we are using to protect the information in the upload stations as well as during transmission.
  • 5. An in-building multi-server cloud system based on shortest path algorithm depending on… DOI: 10.9790/0661-17113842 www.iosrjournals.org 42 | Page Fig. 7 – Result showing the encryption that is being used in our system V. Conclusion And Future Work Our system is working as per our expectation. The algorithms that was initially sketched upon papers with pencils using the mathematical formulas and concepts are working in a real life system. Moreover, we are still working in the system to make it further better. In future we will try to integrate this system with body area network and wearable system so that it can be used to ease our daily life burdens and tasks that we perform every day. Acknowledgement We sincerely thank Mr. Avranil Tah, Founder of ESL and Mr. Arnab Pal, Techno-Marketing Consultant of ESL for guiding us during the project. Their help in this project really made our task easy. We faced many difficulties in that period of time, regarding the transmission of Bluetooth which we ultimately managed to solve by their intense guidance. Moreover, we want to thank our colleagues and friends for drawing our attention to the most important and vital overlooked points.
  翻译: