Professional Documents
Culture Documents
Dr. R. K. Singh
Submitted by
Raj Mohan Dwivedi
1
Kashmere Gate, Delhi - 110006
Certificate
This is to certify that the project report entitled “ A Google Map based Automated Tower
an authentic work carried out by him/her at CAIN TECHNOGIES (INDIA) PVT LTD
under my guidance. The matter embodied in this project work has not been submitted
earlier for the award of any degree or diploma to the best of my knowledge and belief.
Date:
2
Abstract
A Google Maps based Automated Tower Monitoring System is a software application which
uses Google Maps API to provide services to users to visualize and manage complex network
of the BTS Mobile towers. Automated Tower Monitoring System (ATMS) is a software
of the towers. The application provides the current status of parameters to be monitored in the
GMAP based ATMS provides visualization of the complex network, by overlaying persistent
and real-time information such as circle, cluster and tower names and current status of
parameters in the passive monitoring on the geographical maps provided by Google so that
there could be a better analysis regarding location of towers and avail other useful services
Methodology of the work includes understanding the architecture of the existing system,
understanding the Model View Controller design pattern used in the application, providing
database connectivity and developing application logic and providing GMAP interface
3
ACKNOWLEDGEMENT
I am extremely grateful to the management of the CAIN TECHNOLOGIES PVT LTD. for
I would also like to thank Mr. Rajeev Gupta (President) and Col. Vinod Batra (Vice
President) Cain Technologies Pvt. Ltd. for giving me the opportunity to work on “A
SERVICES”. I extend my professional gratitude to Mr. Rajat Gupta (Director) and Mr.
Rishabh Saini (GM-IT) for sharing their knowledge and guiding me towards the successful
completion of my report.
I am extremely grateful to the staff of Cain Technologies, Noida for their cooperation and for
The constant source of inspiration and supervision at every stage of the study were my
Faculty Guide, Dr. R.K. Singh and Mr. Nidhish Shroti. It was an honour to work under them.
Without their able guidance, this endeavour would never have been successful.
Finally I wish to express my gratitude to all those who have extended a hand of cooperation
4
Table of Contents
1. Introduction…………………………......……………………………………….7
1.1 About the Organization……………………………………………………..8
1.2 Objective of the Project.................................................................................12
1.3 Scope of the Project.......................................................................................12
1.4 Methodology of working...............................................................................12
2. Literature Overview.............…...........................................................................14
2.1 Overview of ATMS.......................................................................................15
2.2 Business Requirements of ATMS................................................................17
2.3 Architecture of ATMS..................................................................................20
2.4 Sequence Diagram of ATMS.......................................................................22
2.5 Google Maps…..............................................................................................23
2.7 AJAX.............................................................................................................26
3. Analysis…………………………………………………………………………38
3.1 Problem Identification..................................................................................39
3.2 Architecture of Proposed System................................................................40
3.3 Use Case Diagram.........................................................................................41
3.4 Schema Design...............................................................................................42
4. System Function Design......................................................................................44
5. Implementation....................................................................................................46
5.1 Tools and Techniques....................................................................................47
5.2 Methodology...................................................................................................48
5.3 Screenshots.....................................................................................................49
8. Conclusion..................................................................................................…......54
9. Recommendations................................................................................................56
10. Bibliography.......................................................................................................57
5
List of Figures
Figures Page No
I Project Organization 11
II Methodology 13
IV Sequence Diagram of AT MS 22
V AJAX Model 1 27
VI AJAX Model 2 29
X Schema Design 42
6
Chapter 1
Introduction
7
1.1 About the organization
Mission
To produce state of art simulation and modelling products through innovative R&D for
Vision
Goals
development company, and maintain position by providing excellent quality performance and
perfection and expanding our business in the International Defence market, and use
professional expertise in providing the best solutions and products to the customers.
War-games: War-game are being developed all over the world for defence forces for
8
engagement or drill and to exercise commanders. War-game could be of tactical or
strategic in nature. Some of CRDC war gaming products which are under
Logistics planner
Simulators
EW Cockpit Simulator
Warhead fragmentation
Fragment penetration
9
Trajectory modelling
Damage assessment
Error estimation
System Analysis
Logistics planning
Navigation tool
Policy Analysis
Stress vs. performance analysis tool (tank drivers, gunners, soldiers, pilots etc)
Telecom Services
10
Technology
They have been designed and created to function as an integrated solution. By employing
these technologies, we can provide high quality state of the art world class products. We have
Artificial Intelligence
Decision Support through BBN, Fuzzy Logic, Rule Base, Cognitive Architectures.
Agent Technologies
11
Figure I
P
12
The objective of the project is to study the Automated Tower Monitoring System and to
Scope of the project is to add GMAP interface to already existing ATMS which includes
• Requirements classification.
13
1.4.4 Implementation of basic functionalities
Study of
concepts
of existing
System
Analysis
Design of
GMAP
module
Coding
Figure II
14
Chapter 2:
Literature review
15
2.1 Overview
BTS Towers. The basic aim of ATMS is to deliver smart and fast reporting mechanism for
optimized performance and logical analysis, thereby reducing the overall operating costs of
the BTS. ATMS enables Operators & Infrastructure providers to monitor and control the
BTSs in real-time.
Monitoring and control of BTS tower installed at remote location and working unmanned can
be monitored and controlled from control room. The RMC communicates with central
server(s), via short data messaging. Messages are sent on every defined alarm & event
conditions and based on data logging time interval from the remote units. By deploying many
such units, it becomes Distributed Control System controlled from central server. Alarm,
Event and other data logged at central server, option to escalate alarm conditions through
emails and SMS. Network Operation Indicator Services is a system that connects to the
electrical supply, shelter and easements & pylons that account for nearly 75 percent of
network rollout costs. Monitoring of passive part is as essential as active infrastructure. This
system generates escalation messages based on criticality of faults. It recovers fault messages.
16
Loss of Uptime = Loss Revenue
Humidity
• Failures like:
o Generator ON/OFF
o PIU Restart
The Telecom operators are optimizing on the capital investments involved in cell site roll-out
by entering into sharing arrangements for the passive infrastructure and certain active
17
infrastructure elements. The infrastructure companies are competing for business from the
operators, and uptime of the tower is a critical differentiator for them. In future, however, the
infrastructure companies are believed to compete on the basis of additional value added
The biggest challenge that the infrastructure companies are facing is the energy situation at a
cell site. Effective management of various energy assets like the DG Sets, the EB Power, and
the Battery Back-up will be the key to successfully meeting the Service Level Agreements.
The Nestech Consortium Private Limited Network Scan for Telecom Operations Solution is
analytics for predicting downtime and triggering O&M actions to address the same. The
solution offers significant leverage on the remotely collected data for intelligent operator-wise
(ATMS) for optimizing overall equipment efficiency and reducing operating costs. The
ATMS Solution from Nestech is designed to gather performance parameter data from the
passive infrastructure usually found in wireless network sites. The System is designed to
The screen(s) will display all outstanding faults to be recovered and thus require attention.
Depending on the details of the problem, action needs to be taken based on the nature of the
faults that have been reported and the appropriate action necessary for the fault should be
18
taken. The screen should be updated every minute and all the faults should appear on the
All status updates will be received and delivered automatically by the NOC. In the event of
SIM failures, the feedback and escalation procedures will be done manually by NESTECH’s
field team. Records of all incidents will be maintained by the system and NESTECH shall be
Based upon the fault information received from the towers, the NESTECH NOC will be
responsible for verifying the nature of the fault and taking appropriate action. Depending
upon the business rules, these faults would then have to be classified as on different severity
levels (like minor, major, chronic and catastrophic) based upon guidelines provided by
Quippo will provide an escalation matrix for the different types of faults for each tower that
will be monitored. Quippo will be responsible for updating this matrix on a regular basis and
ensuring the validity of the same. All changes to the escalation matrix will have to be given to
The NESTECH NOC will report and escalate the alarms to the concerned O&M personnel
based upon business rules that have been setup according to the escalation matrix provided by
Quippo. Repeated attempts to deliver the message will be done (up to 3 tries) before a failure
result is noted. NESTECH will provide complete reports of message deliveries and failures to
19
Quippo on a weekly basis. When a number fails, NESTECH NOC will try to manually
contact that number within 24 hours to check to see if the number is active and ascertain
possible reasons of failure. If the number is still unreachable, then NESTECH will report such
numbers on a daily basis on email to a designated contact within Quippo for further action
A single view of the entire network of towers should be available from which user would be
able to drill down to the single individual towers. Reports should also indicate the health of
the entire network with parameters such as the percentage of the towers with a high priority
fault, percentage of towers with a low priority fault, continuous occurring of certain types of
faults etc
Daily reports on the entire list of faults that happened during the day will be sent to the
appropriate people in Quippo. The format of the reports will be mutually decided to
understand if these reports need to be on a circle-by-circle basis or severity of the fault basis
etc. Similarly, higher level reports that indicate the health of the entire network will be sent
out to top management at the end of the month or on periodicity that is mutually decided
20
2.3 Architecture of ATMS
21
Figure III
Presentation view is designed using Java Swings. The data input is in XML format which are
22
This layer is compiled in a jar file which can be run on any machine, ruling out all platform
dependencies.
This Layer is fully tested on Windows, Linux and UNIX platforms, which makes this layer
Business Layer comprises of Servlets. These are Java programming language classes that
dynamically process requests send from End user residing at the presentation layer as
mentioned above. In response to this request, response is a well constructed XML validated
on a specified schema. HTML pages will be bundled with web components during
application assembly.
Incoming messages/string from tower coming through bearbox hits on the Web Container
which further redirects it to servlet. This is the point where Business rules validation is
This is the basic database management system which holds the entire NOC data and its
backup for roll back and restore, and data analysis. It will comprise of following:-
• Static parameters
23
• Dynamic parameters
• Escalation Matrix
• Escalation status
• Report data
Figure IV
24
2.6.1 Introduction
Google Maps (formerly Google Local) is a web mapping service application and technology
provided by Google, free (for non-commercial use), that powers many map-based services,
including the Google Maps website, Google Ride Finder, Google Transit, and maps
embedded on third-party websites via the Google Maps API. It offers street maps, a route
planner for travelling by foot, car, or public transport and an urban business locator for
numerous countries around the world. According to one of its creators (Lars Rasmussen),
With the introduction of an easily pan able and searchable mapping and satellite imagery tool,
Google's mapping engine prompted a surge of interest in satellite imagery. Sites were
established which feature satellite images of interesting natural and man-made landmarks,
including such novelties as "large type" writing visible in the imagery, as well as famous
Like many other Google web applications, Google Maps uses JavaScript extensively. As the
user drags the map, the grid squares are downloaded from the server and inserted into the
page. When a user searches for a business, the results are downloaded in the background for
insertion into the side panel and map; the page is not reloaded. Locations are drawn
A hidden IFrame with form submission is used because it preserves browser history. The site
also uses JSON for data transfer rather than XML, for performance reasons. These techniques
both fall under the broad Ajax umbrella. As Google Maps is coded almost entirely
in JavaScript and XML, some end users have reverse-engineered the tool and produced
25
client-side scripts and server-side hooks which allowed a user or website to introduce
Using the core engine and the map/satellite images hosted by Google, such tools can
introduce custom location icons, location coordinates and metadata, and even custom map
When users first navigate to the Google Maps web application, they see a broad map of the
United States along with a search box at the top of the window. When they type an address or
general location into the search field, Google sends the entry to its global servers and searches
for the closest location match. The corresponding location data is then retrieved from
TeleAtlas, the source of the map imagery in Google Maps. The application renders the
corresponding map from TeleAtlas into the main frame of the window and places a visual
Finding a Business
The search field in Google Maps also combines the powerful indexing of generic Google web
searches. Users can not only search for addresses and locations, but also businesses in
specific areas. When a user enters a type of business and a general location into the search
box, Google Maps searches the web for a matching entry. When the application locates an
appropriate business, it also searches for the company's address and then grabs the
26
Finding Directions
In addition to searching for locations or business, Google Maps enables users to find driving
or walking directions between two addresses of their choice. When users enter direction
mode, they can type two or more addresses into the search fields and then begin looking for
directions. Google's map servers store millions of potential route combinations, which are
then sorted through to find the fastest directions between the submitted locations. Once a
route has been determined, Google Maps displays an image of the entire trip and draws a line
Google launched the Google Maps API in June 2005 to allow developers to integrate Google
Maps into their websites. It is a free service, and currently does not contain ads, but Google
states in their terms of use that they reserve the right to display ads in the future.
By using the Google Maps API, it is possible to embed Google Maps site into an external
website, on to which site specific data can be overlaid. Although initially only
a JavaScript API, the Maps API has since expanded to include an API for Adobe
Flash applications, a service for retrieving static map images, and web services for
performing geocoding, generating driving directions, and obtaining elevation profiles. Over
350,000 web sites use the Google Maps API, making it the most heavily used web application
development API.
The Google Maps API is free for commercial use providing that the site on which it is being
used is publicly accessible and does not charge for access. Sites that do not meet these
27
The success of the Google Maps API has spawned a number of competing alternatives,
including the Yahoo! Maps API, Bing Maps Platform, MapQuest Development Platform,
and OpenLayers.
2.7.1 Overview
AJAX is the name given to a set of modern web application development technologies,
previously known as dynamic HTML (DHTML) and remote scripting. As defined by J.J
Garret, AJAX is not a new technology, it incorporates: standards based presentation using
XHTML and CSS (Cascading Style Sheets), dynamic display and interaction using the
DOM (Document Object Model), data interchange and manipulation, asynchronous data
The combination of these technologies makes AJAX to be unique and powerful on the Web.
Its power is becoming evident by web applications such as Google Suggest and Google Map.
And other well known examples are Gmail, and the new version of Yahoo Mail. The
popularity of AJAX changes the way web application works, which means we need to
recheck the software architecture we are using. In AJAX-based web application architecture,
the client side AJAX engine is the key to this model. User events trigger asynchronous calls
to the client side engine instead of a page request to the server. The server accepts the
asynchronous call and sends data or business logic to the client. The client side is then
responsible for locally rendering the application’s user interface required to present the data
and user interaction with the data. Such separation of the presentation layer and server-side
business logic provides meaningful benefit for software development and maintenance.
28
Ajax isn’t a technology. It’s really several technologies, each flourishing in its own right,
The classic web application model works like this: Most user actions in the interface trigger
an HTTP request back to a web server. The server does some processing — retrieving data,
crunching numbers, talking to various legacy systems — and then returns an HTML page to
the client. It’s a model adapted from the Web’s original use as a hypertext medium, but as
fans of The Elements of User Experience know, what makes the Web good for hypertext
29
Figure V
The traditional model for web applications (left) compared to the Ajax model (right)
This approach makes a lot of technical sense, but it doesn’t make for a great user experience.
While the server is doing its thing, the user is waiting. And at every step in a task, the user
Obviously, if we were designing the Web from scratch for applications, we wouldn’t make
users wait around. Once an interface is loaded, the user interaction should not come to a halt
every time the application needs something from the server. In fact, the user should not see
30
How Ajax is Different
introducing an intermediary — an Ajax engine — between the user and the server. It seems
like adding a layer to the application would make it less responsive, but the opposite is true.
Instead of loading a webpage, at the start of the session, the browser loads an Ajax engine —
written in JavaScript and usually tucked away in a hidden frame. This engine is responsible
for both rendering the interface the user sees and communicating with the server on the user’s
behalf. The Ajax engine allows the user’s interaction with the application to happen
staring at a blank browser window and an hourglass icon, waiting around for the server to do
something.
31
Figure VI
The synchronous interaction pattern of a traditional web application (top) compared with the
Every user action that normally would generate an HTTP request takes the form of a
JavaScript call to the Ajax engine instead. Any response to a user action that doesn’t require a
trip back to the server — such as simple data validation, editing data in memory, and even
some navigation — the engine handles on its own. If the engine needs something from the
server in order to respond — if it’s submitting data for processing, loading additional
32
interface code, or retrieving new data — the engine makes those requests asynchronously,
usually using XML, without stalling a user’s interaction with the application.
Google is making a huge investment in developing the Ajax approach. All of the major
products Google have introduced over the last year — Orkut, Gmail, the latest beta version
of Google Groups, Google Suggest, and Google Maps — are Ajax applications. (For more on
the technical nuts and bolts of these Ajax implementations, check out these excellent analyses
of Gmail, Google Suggest, and Google Maps.) Others are following suit: many of the features
that people love in Flickr depend on Ajax, and Amazon’s A9.com search engine applies
similar techniques.
These projects demonstrate that Ajax is not only technically sound, but also practical for real-
world applications. This isn’t another technology that only works in a laboratory. And Ajax
applications can be any size, from the very simple, single-function Google Suggest to the
Ajax is an important development for Web applications, and its importance is only going to
grow. And because there are so many developers out there who already know how to use
these technologies, we expect to see many more organizations following Google’s lead in
Moving Forward
The biggest challenges in creating Ajax applications are not technical. The core Ajax
technologies are mature, stable, and well understood. Instead, the challenges are for the
designers of these applications: to forget what we think we know about the limitations of the
33
Partial Page Updating
You don’t have to update the data on an entire page. You can update only the portions of the
page that require it. This should mean no full page refreshes, less data to be transferred, and
an improved flow for the user experience. You don’t have to stutter from page to page.
Invisible Data Retrieval The longer you look at a web page, the greater its chance to go out of
date. With an Ajax application, even though on the surface the web page might not be told to
Constant Updating
Because you’re not waiting for a page refresh every time, and because Ajax can retrieve data
under the covers, the web application can be constantly updated. A traditional software
application such as Word or Outlook will alter the menus it displays or the views it shows,
dependent on its configuration, or the data it holds or the situation or circumstances it finds
itself in. It doesn’t have to wait for a server or user to perform an action before it can
download new mail or apply a new template. Ajax techniques enable web applications to
Smooth Interfaces
An interface that doesn’t have to be changed is almost inevitably a user interface that is easier
to use. Ajax can cut both ways here in that you can use it to modify parts of the interface and
simply confuse users by changing the ground beneath their feet. In theory, by making subtle
alterations, you could aid the user’s passage through an interface or wizard and speed up the
process.
34
As shown in the previous examples, some of the most impressive Ajax applications are those
where you had to look for the Ajax functionality, such as Basecamp. If Ajax can be used to
make your applications simpler while improving the user’s experience, then that must be an
improvement.
Drag-and-drop functionality is one of the neatest features of most software applications, from
Windows Explorer to Windows Desktop. It doesn’t strictly qualify as Ajax functionality. It’s
something that’s been possible for a great many years in web applications, even before the
introduction of the XMLHttpRequest object. Most developers seem to opt for Flash or some
similarly heavyweight solution rather than using the JavaScript and DOM solutions. In the
functionality can be used to manage front-end changes, and then these changes are submitted
via Ajax to the server. For example, you drag several items on the screen into new positions,
and then you log out. Later, when you come back, those items are located in the same
positions.
2.7.2 JavaScript
JavaScript is an essential piece of the Ajax package. JavaScript serves as the intermediary
between the browser (the client) and the server so that a web page can be dynamically
updated without refreshing the entire page. JavaScript was developed by Brendan Eich and
Because JavaScript offered a means to add interactivity to HTML pages, it quickly became
popular and widely used. Different versions were developed both by Netscape and other
browser manufacturers, but eventually the JavaScript language was standardized by the
35
standard defines the core of the JavaScript language. Most browsers today support the third
JavaScript is thus, a client-side scripting language. There is also a server-side version that is
browsers to take decisions and process information. This is the key to interactivity. JavaScript
is the only scripting language currently supported by the popular web browsers. Netscape
Navigator only supports JavaScript, whereas Microsoft Internet Explorer supports both
JavaScript and VBScript. JavaScript can also be used on web servers for what's called server
Uses of JavaScript-
Validate forms at the client-side saving both the precious server resources and time.
• Create mouse over effects, change background colour of a document with a click of a
Button interactivity!
JavaScript is based on Object Oriented Programming concept. Its syntax is quite similar to C,
36
JavaScript is added to an HTML page using the SCRIPT tag. The script tags should be placed
inside the head tag of the document. If an older browser looks at a page containing script tags
it will ignore them, as older browsers are written to ignore tags they can't interpret.
JavaScript code should also be placed inside an HTML Comment tag set.
When used with JavaScript the ending comment tag will also start with two slashes // which
is the JavaScript code for comment. This tells the JavaScript interpreter to ignore that
statement. This is a standard way for adding JavaScript to your HTML pages so that it works
properly for browsers that are JavaScript enabled and those that do not support JavaScript.
<HTML>
<HEAD>
<SCRIPT LANGUAGE="JAVASCRIPT">
<! -- hide JavaScript code from browsers that are not JavaScript enabled
</SCRIPT>
</HEAD>
<BODY>
</BODY>
</HTML>
You may also put in a single line of code attached to an event. Events will be explained later.
37
<HTML_TAG Attribute="option" onEvent="JavaScript code statements go here">stuff in
The browser provides us with a series of objects. The browser window that the page is
displayed in is known as the window object. The HTML page displayed by your browser is
known as the document object. The document object is probably the most commonly used
object in client-side JavaScript. The HTML elements that you add to a page also extend the
object hierarchy. An example is the FORM element and the elements that reside inside the
form. This means that you can reference these objects, as illustrated in the HTML page
below:
window.document.forms [0]
It refers to the first form in the document. Forms are implemented as arrays in the DOM. If
there is more than one form on page the numbers will start at zero and go up.
window.document.Form1
window.document.Form1.FirstName.value
Refers to the value typed into the textbox named FirstName by the client, in the form named
Form1
<HTML>
<HEAD>
<TITLE>Simple Form</TITLE>
</HEAD>
<BODY>
<FORM NAME="Form1">
38
Name: <INPUT TYPE="TEXT" NAME="FirstName"><BR>
</FORM>
<FORM NAME="Form2">
</FORM>
</BODY>
</HTML>
Objects located in the current document, in the current window can drop the reference to
Forms [0]
Form1
Form1.FullName.value
It refers to the value typed, in the browser by the client, into the textbox named FullName, in
2.7.4 XML
XML is a very popular language for data exchange. It’s well suited for organizing data and
for sharing data because it allows you to classify data, create very specific rules for the format
of the data, and output the data to a variety of places. For example, the same data could be
used in a database, a web page, and a printed form. XML is not proprietary and is not limited
39
XML can be used to exchange, share, and store data. XML documents form a tree
XML has very simple syntax rules. XML with correct syntax is "Well Formed". Valid XML
All modern browsers have a built-in XML parser that can read and manipulate XML.
The DOM (Document Object Model) defines a standard way for accessing XML.
The XMLHttpRequest object provides a way to communicate with a server after a web page
has loaded.
The XML DOM defines a standard way for accessing and manipulating XML documents.
The XML DOM is platform and language independent and can be used by any programming
XSLT is the style sheet language for XML files. With XSLT you can transform XML
40
The purpose of a DTD is to define what elements, attributes and entities is legal in an XML
document. With DTD, each of your XML files can carry a description of its own format with
it. DTD can be used to verify that the data you receive, and your own data, is valid.
XML Schema
XML Schema is an XML based alternative to DTD. Unlike DTD, XML Schemas has support
Chapter 3:
Analysis
41
3.1 Requirements Analysis of Google Maps
• It will not replace the existing system but provides an alternative in respect of using
functionalities.
• Existing application does not provide any Geographical view of the location of the
towers.
• It does not provide any facility to visualize this complex network of BTS towers
• Google Maps API can be used which will help in representation of towers on the
• Rather than using a GIS package, using the freely available Google Maps API will
42
HTTP/XML JDBC
GUI Servlets/JSP NOC (Database
(Swings) (Appl. Server) Server)
Presentation Layer Application Layer Database Layer
Figure VII
GUI Web
(Swings) Browser
NOC (Database
Application Layer Server)
AJAX INTERFACE
43
XMLHTTPReque
st
Object
Figure VIII
User Login
Administrator Managers
Customizing the
Interface
Browsing
44 the portal
Central Monitoring Local Monitoring
Team Team
Figure IX
Site_Engineer
Tower_Current_Status
Cluster
Circle
Anchor_Tenant
45
Figure X
Chapter 4:
System Design
46
4. System Function Design
4.1 Login
Various stakeholders of the system log in to the portal as different users of the portal. The
functionalities of the portal they can use will depend on the account through which they log
in. Categorization of the users has been done on the following basis-
• Central Monitoring Team- Responsible for the monitoring of all the circles.
• Top management officials in the Quippo concerned with the operation of ATMS.
47
4.2 Browsing the portal-
Portal browsing involves the interaction of various users with the map interface for using
different functionalities provided by the Google Map API. The map interface has been
I. Layer 1- The Map Area shows the telecom circle names on the coloured polygons in the
country map of India. This is the basic interface for all the users except Local Monitoring
Team. Users can further zoom in to the clusters. When users select a circle, an Information
window is displayed showing the full information about that circle such as number of clusters
and total number of towers, number of live towers, number of critical towers, number of non
critical towers, number of non responding towers in that circle and the name of circle
manager.
II. Layer 2- The map displays the area corresponding to one circle and all cluster names are
overlaid on it. This is the default map interface for the local monitoring team. When users
select a particular cluster, an information window will pop up and displays basic information
such as total number of towers in the circle, number of live towers, number of critical towers,
number of non critical towers, number of not responding towers and the name of cluster
manager.
III. Layer 3- The map area displays all the towers on the map through markers. Towers will
48
• Yellow markers- Towers having non critical faults
Users can interact with the map by panning and zooming using the mouse and graphical
interface controls. When a marker is selected, the information for that resource will be shown
in an information window that will pop up above the marker. Information window will
display the current status of all the parameters in the passive monitoring of the infrastructure
at the site. Also when the mouse is brought over a marker, a message box will open showing
site address and the site status whether running on DG, battery or mains.
Chapter 5
49
Implementation
Tools Used-
NetBeans IDE
Technology Used-
50
GMAP JavaScript API for implementing the functionalities to be used in Google maps
Techniques used-
- The business logic is implemented in the Model. It is developed through server side
programming.
- Presentation logic, i.e. Interface design is implemented in the view. View is responsible for
handling.
1. Understanding the Model View Controller design pattern used in the application
3. Designing a web page in HTML 5.0 standard using CSS and following Document
Object Model, and registering for Using GMAP JavaScript API in the web page.
51
4. Coding for database connectivity with the application to perform insertion,
5. Developing Java Beans having setter and getter methods for efficiently storing and
retrieving data.
offered by the GMAP API for manipulating the maps such as-
• Adding content on the Google Map in the form of cluster names and tower
changes.
7. Finally deploying web archive (war) file into the Apache Tomcat Application
Server.
5.3 Interfaces
These are the interfaces displayed directly when a user clicks on any of the options in the
menu.
Screen 1
Description-
52
Screen 1: Home Page
Screen 2
Description-
53
When user selects a circle name in the dropdown list, circle area selected is displayed on the
Google maps.
Screen 3
Description-
54
When the option “View Current Status of Tower” is clicked, a form opens.
When user selects a circle name and a cluster name and tower name from drop down lists,
user is shown the location of tower on the page.
Screen 4
55
Description-
When the option “Insert New Tower Information” is clicked, a form opens.
When user selects cluster name in the dropdown list and inputs the latitude and longitude and
clicks on “submit” button, data is saved into the database.
56
Screen 5
Description
When the user clicks on “Delete Existing Tower Information”, a form opens
prompting user to enter circle name, cluster name and tower name. After user
clicks on “submit” button, tower information is deleted from the database.
Screen 5:
57
Screen 6
Description
58
Chapter 6:
Conclusion
59
6. Conclusion
After the integration of GMAP interface into existing ATMS, the current application will
provide added functionalities at low costs and it will become more users friendly.
• Trainee learnt the concepts involved with the development of a System in real world
scenario.
• Trainee learnt various technologies and tools used in the software development.
60
Chapter 7:
Recommendations
61
7. Recommendations
1. Google Map JavaScript API Premiere can be used instead of free version of Google Map
API as it will enable the company to get paid for developing the application Google Map
2. Using the Google Map API Premiere will remove the limitation with free version of
Google Map API that there cannot be more than 500000 page views in a day. Monitoring
more than 4000 towers through the map may cross the limit of page views made to Google
Maps in a single day more than 500000 in a day and then users can no longer use the map for
3. Using Premiere version of Google Map API will also remove another limitation that
application can not only be accessible on the intranet. For making this application only
accessible within intranet so that general public cannot use it, Google Map API Premiere
should be used.
62
Bibliography
[1] Jing Yuan Zhang, Hao Shi, “Geospatial Visualization using Google Maps: A Case
[2] Gang Wang, Fuling Bian, Integrating HDRI into Google Maps with Ajax, 2007
[3] Yang, Jianhua Xu, Design and Implementation of Campus Spatial Information Service
[4] Gibbins Hussein, Buyya Rajkumar, Gridscape II: A Customizable and Pluggable Grid
Monitoring Portal and its Integration with Google Maps, Proceedings of the Fifth
2006
[5] Hofstede Rick, Fioreze Tiago, SURFmap: A network monitoring tool based on the Google
[6] Yao-Jan Wu, Yinhai Wang, Dalin Qian, A Google-Map-Based Arterial Traffic
[7] Xiaojun Tan, Mu Zhou, Xiang Zuo, Yuyong Cui, Integration WebGIS with AJAX and
XML Based on Google Maps, First International Conference on Intelligent Networks and
63
[8] Wang Yan, Logistics Network System Based on the Google Maps API, IEEE 2010
[9] Kiwon Lee, Technical Architecture for Land Monitoring Portal using Google Maps API
and Open Source GIS, IEEE, 2009
[10] Zhang Jun, Anbao Wang, Useful Resources Integration Based on Google Maps,
2009
http://www.adaptivepath.com/publications/essays/archives/000385.php, 2005
64