Controlling and Surveying of On-Site and Off-Site Systems Using Web Monitoring

Controlling and Surveying of On-Site and Off-Site Systems Using Web Monitoring

Avinash Kumar (Sharda University, India), Bharat Bhushan Kumar (School of Engineering and Technology, Sharda University, India), Saptadeepa Kalita (School of Engineering and Technology, Sharda University, India), Rajasekhar Chaganti (Department of Computer Science, University of Texas at San Antonio, USA), and Parma Nand (School of Engineering and Technology, Sharda University, India)
DOI: 10.4018/978-1-7998-9426-1.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Monitoring and surveillancing of large amounts of data is a matter of prime concern in the current scenario for major organisations as well as small-scale and large-scale industries. Presently, the increasing need to collect, analyse, and store the data in a real-time environment as well as ensure the qualitative and quantitative analysis of real-time data has become a challenge. In addition, traditional data acquisition and monitoring systems lead industries to face multiple constraints and limitations, which affect their functioning, such as physical infrastructure setup and cost constraints. In this chapter, the surveillance of various applications has been discussed. The chapter also focuses on use of cloud-based model to perform the real-time monitoring with the help of the web. The chapter deeply discusses the use of web for on-site and off-site monitoring of various industries and organizations.
Chapter Preview
Top

Introduction

The Internet, referred to as a system of interconnected networks, has connected people across the world together and has revolutionised communication systems since the end of 20th century. It is a plethora of information about almost everything. Other than communication, the internet is a storehouse of information based on what is requested by the user surfing the internet. The advent of the internet can be credited to the Advanced Research Projects Agency (ARPA), which belongs to the United States Defence (USD). ARPA was into research for time-sharing systems, resource sharing, and packet switching. This led to the incorporation of a data communication network in ARPA which came to be known as ARPA Network (ARPANET) (McKelvey & Driscoll, 2018). Gradually with more research and advancements in the field of networking, the Internet service providers (ISP) emerged commercially and allowed the civil people to use the Internet or World Wide Web (WWW) for personal or related uses. The Internet is based on the framework of the Internet Protocol suite which includes the Transmission Control Protocol/ Internet Protocol (TCP/IP) (Goralski, 2017). This framework consists of IP addresses, routing and subnetting. The Internet can be classified as public, private or organization-specific, called intranet, based on the type of usage and the type of users. It is sometimes interchangeably used with the term WWW, which includes the use of frontend and backend programming languages such as the Hyper-Text Markup Language (HTML), Cascading Style Sheets (CSS), eXtensive Markup Language (XML), JavaScript along with other tools and multimedia technology by designing the web pages and linking pages with the help of hyperlinks and delivering information to users in a more user-friendly manner. Now, it is able to serve a lot of applications as well as services to its users in such a way that one cannot imagine a life without it. Be it the electronic mails, browsing the web, social media applications or entertainment, business and education softwares, all of this is a boon of the internet.

As the internet serves myriad applications to the users, and connects the users to the other parts of the world as well, it is important to safeguard the security of devices and information. It is also important to monitor the browsing activity and ensure safe browsing. Since the Internet serves both home and business activities, surveillance becomes a matter of prime concern. Thus, an important application of the internet can be found in designing and implementing surveillance systems (Isravel et al., 2020). As per the term, surveillance systems are responsible to monitor the activities on the devices, and alert the authorised users using the devices about the same if any suspicious behaviour or anomaly is detected. It can be considered similar to an alert or alarm system and can be both wired or wireless. The choice of a wired or wireless surveillance system depends on the area to monitor and bandwidth factor. The most common example of a surveillance system is a Closed Circuit Television (CCTV) camera, which monitors physical activities in the area where it is deployed. The physical activities detected in the CCTV camera can be monitored with the help of a computer system by the authorized user using it, thereby assisting surveillance. In general, a surveillance system can have either type of recording device based on their method of recording activities, mainly; Digital Video Recorder (DVR) or Network Video Recorder (NVR). A DVR actually records the activity in analog format and then processes it by converting it into digital footage. On the other hand, an NVR only operates with the digital data and processes it even before transmitting it to the monitoring device (Lee et al., 2019; Stolojescu-Crisan et al., 2021). There are multiple ways to track and monitor activities, some of them can be mentioned as classical computer systems, biometric methods, wireless tracking mechanisms such as Remote Frequency Identification (RFID) tagging, Internet of Things (IoT)-based methods, telephonic methods and aerial device-based surveillance such as surveillance through drones. Telephonic methods for surveillance are used to ensure security for Voice-over Internet Protocol (VoIP) communications (Hsieh & Leu, 2017). On large-scale, surveillance systems can be designed using cloud computing frameworks, which can strengthen the storage, processing and dissemination of the data captured by IoT sensors.

Complete Chapter List

Search this Book:
Reset