SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 50-57
www.iosrjournals.org
DOI: 10.9790/0661-17215057 www.iosrjournals.org 50 | Page
Data Usage Monitor for a Shared Wireless Network
Connection
Akshay Aggarwal1
, Shantanu Kharia2
1
(Department of Information Technology, VIT University, India)
2
(Department of Information Technology, VIT University, India)
Abstract: This paper proposes a novel method to monitor and control the network usage of a shared wireless
connection. The main objective of this technique is to balance and restrict the shared network data. It facilitates
monitor of data usage by each user individually. This technique is demonstrated through a user-friendly
command line interface. The implementation is tested with Android Mobile Hotspot which exhibited satisfactory
results as discussed in the paper.
Keywords: Batch Scripting, Command Line Interface, Data Usage Monitor, Limiting Data Usage, Network
Profile, Windows Powershell, Windows Task Scheduler
I. Introduction
Disputes in a workplace over a shared internet connection are a common thing. Most of the disputes are
due to the petty reason of unfair usage of data over a connection that is shared by multiple users. We have made
an attempt to try to find a solution to the same problem. In this interface, we have used Batch Files (a type
of script file containing commands that are processed by Windows Command Prompt.) that helped us make use
of other Windows functionalities like Task Scheduler (component of Microsoft Windows that provides the
ability to schedule the launch of programs or scripts at user defined time-intervals or triggers), and PowerShell
(a task automation and configuration management framework from Microsoft that also helps to execute
command line programs and scripts) to help us achieve our functionality of monitoring data usage over a
particular network profile.
The interface allows the user to monitor their data usage and put a limit on the same. The data limit is
recorded at the start of monitor period (which we have set for a month as most data network plans commercially
available work on a monthly basis) and the same is recorded in a text file. The interface then runs and monitors
the data usage. When the data usage surpasses the specified limit, the profile is blocked and the user isn’t
allowed to connect to the network profile until he modifies the limit or the monitor period is finished, as and
however the user chooses to.
Let us take an example to illustrate the point. Suppose there exist an Internet source, W1 (say, a
portable Wi-Fi Adapter). We take the case when the expense of data plans on the network source is being shared
equally by the users in the group. Let A, B, C, D, E, F be six users in the network. We assume each user has their
own device (laptop) through which they establish connection to access data services. The expense, being shared
by all dictates the ethical rule that all users should have access to equal amount of data. Also, each user should
be able to monitor his/her data usage over the connection so as to approximate and adjust (if needed) their data
usage. We seek to provide an interface for the same where the user has the ability to change/modify monitor
period, change limits of data transfer. Added to this is the functionality that once the data usage is exceeded, the
connection should terminate automatically, unless mentioned otherwise. All the features mentioned above have
been implemented by the authors in Windows 7 Operating System wherein no extra software(s) were needed to
be installed. In-built features of Windows OS, like Task Scheduler, Command Line Interface and Powershell
combined with Batch Files were used to implement the system.
II. Currently Existing Technologies
2.1 Data Usage Monitors
All Major Telecom Service Providers send a text message after every session of Data Network Usage.
However, while using a Wireless System with usage spanned over multiple user devices, the data usage for
individual systems is hard to calculate. This becomes even harder when using Desktops or Laptops. The Android
and iOS all have the feature of calculating the data used based on a daily basis. Also, some apps on the
respective platform allow data usage monitoring over custom time periods as well.
Usage Monitors for Laptops or Desktops currently in the market are fuzzy and require the user to
download third-party softwares for the suite to function. Although Windows 8.1 allows users to keep a tab on
the data usage, the functionality isn’t backwards compatible. Also, most of the interfaces that provide the facility
of monitoring data usage feature advertisements (usually push-ads) which the user often finds as irritating and/or
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 51 | Page
misleading.
2.2 Limiting Data Usage
While Android OS has the in-built feature by which it allows the user to limit the data usage, similar
features are also available in iOS too. Talking about desktops and laptops, Windows 8.1 features an upgrade that
allows users to limit their data usage. However, this feature is present just in Windows 8.1 and not in any
previous version of Windows.
There are very less third-party softwares that allow users to put a limit on their data usage without
having them battle against hefty downloads for suites and against advertisements.
Commercial Wi-Fi providers provide an interface allowing the user to monitor their data usage as well
as limit it (not user-defined limit) by the means of login systems. However, we seek to provide an interface that
doesn’t need user to login but still allows them to monitor and limit the data usage.
III. Implementation
We have used the batch files to implement the data usage monitor and limiter. The suite consists of six
batch files and as few as three text files for monitor of a Wireless Network Profile.
The following are the file names and the functionalities included in each one of them.
3.1 run_1.bat
First File of the suite, this file is run only at the first instance when the system is first used. The
functionalities included in this file are- Creating a Limit (in MBs), creating a schedule based on a monthly basis
on the date that is fed by user. The schedule is created using Windows Task Scheduler. The Limit Value is stored
in a text file which is called as limit.txt.
3.2 run_2.bat
Second File of the suite, this file is run by another file called counter.bat when the limit set up by the
user is exceeded. It allows the user to extend the limit in case he/she wants to. After modifying the limit, it
unblocks the network profile that was blocked by counter.bat file so that the user can access the network again.
3.3 run_3.bat
Third File of the suite, this file is the one that is scheduled to run at the end of each monitor period (a
month usually), in case the user has not exhausted the limit set by himself. This file also allows user to modify
the limit for the new monitor period or select a new monitor period altogether.
3.4 Count_init.bat
Fourth file of the suite, this file is the one that logs the starting value of the data used as per system
statistics and stores it in a file called Start.txt. Since only 32-bit integer data can be manipulated using Batch
files, this file takes help of Windows PowerShell to do the necessary computation.
3.5 Counter.bat
This is the file that forms the mind of the limiter. This file reads the current usage value of the data and
subtracts it from the value stored in Start.txt to calculate the data used. As soon as the limit is exceeded, it blocks
the network profile and calls upon run_2.bat to allow the user to modify the limit in case he/she wants to. Like
Count_init.bat, this file uses Windows Powershell for the computation part.
3.6 View.bat
The last file of the suite, it borrows data from Start.txt, limit.txt and system statistics and manipulates
them using Windows PowerShell to tell the user the data they have used and how much data they have left until
they overrun the self-imposed limit.
3.7 Start.txt
Contains the start value from which the calculations are to be done.
3.8 limit.txt
Contains limit value in Bytes that is self-imposed by the user.
3.9 Profile.txt
Contains the name of Profile the user wants to monitor.
IV. Input and Output Screens
The following are the screenshots of the screens with the inputs and the corresponding outputs-
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 52 | Page
Fig. 1(a). run_1.bat. First Screen. Asks the user about the Network Profile Name the user wants to monitor
using the system.
Fig. 1(b). run_1.bat. Feeding the network profile name.
Fig. 2. run_1.bat. First Usage of Interface.
Fig. 3(a). run_1.bat. Prompting the user to create the limit.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 53 | Page
Fig. 3(b). run_1.bat. User gives input to create the limit.
Fig. 4(a). run_1.bat. Creating a new schedule – asking user for date.
Fig. 4(b). run_1.bat. New Schedule Created. Makes Use of Task Scheduler to schedule the task for the
specified date every month.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 54 | Page
Fig. 5. Count_init.bat. Deriving the profile name and modifying the Start.txt file. This file is called by run_1.bat
as soon as the schedule is created.
Fig. 6. counter.bat. Keeps a tab on data usage. This file shouldn’t be closed.
Fig. 7(a). run_2.bat. As soon as the limit gets exceeded, counter.bat calls on run_2.bat to allow user to modify
the limit. Option 2 and 3 are used to exit the program.
Fig. 7(b). run_2.bat. Prompt the user for modified limit.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 55 | Page
Fig. 7(c). run_2.bat. As soon as the limit is modified, the network profile is unblocked and again the counter
starts.
Fig. 8(a). run_3.bat. As soon as network profile is unblocked, run_2.bat calls run_3.bat, allowing the user to
modify limit or monitor period. run_3.bat runs by itself upon completion of monitor period when the limit has
not been exceeded.
Fig. 8(b). run_3.bat. At the end of monitor period, allow user to modify limit for next period or change the
monitor period. This screenshot shows the interface prompting the user for a new limit.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 56 | Page
Fig. 8(c). run_3.bat. After modifying the limit, in case the user didn’t remove the filter before, the network
profile filter, if present, will be removed.
Fig. 8(d). run_3.bat. Prompting the user for changing the monitor period.
Fig. 8(e). run_3.bat. In case the monitor date is same as system date, it calls on Count_init.bat to record the start
date.
Data Usage Monitor for a Shared Wireless Network Connection
DOI: 10.9790/0661-17215057 www.iosrjournals.org 57 | Page
Fig. 9. view.bat. This file allows the user to keep a track on the data used and also know about the remaining
data usage unless the limit gets exceeded.
V. Conclusion And Further Scope of the Paper
The current monitor works for a single network profile, i.e. it can be used to monitor data usage over
only one connection profile at the moment. The authors are working on to extend it to monitor data usage over
multiple connection profiles simultaneously.
Also, we have just handled wireless source of Internet Connection through this interface and in no
manner whatsoever, touched upon a wired or a USB source like a dongle. We are trying to inculcate and merge
other sources viz. wired and USB connections in addition to Wireless System to make it a full-fledged monitor
system.
The current interface works on Windows OS and was developed and tested on Windows 7 Home
Premium version of Windows and later versions and proved successful on each of them. The command line
arguments used in the batch files have limited backward compatibility and so the interface may not work on
Windows NT or even Windows Vista. However, given the limited scope of the older edition of Windows, we
decided to neglect on that part.
The system uses a command line interface, which in turn requires user to get admin privileges. We seek
to make the interface GUI to make it even more user-friendly.
The system is not portable across various platforms like Linux and OSX as of yet. To make the
interface platform independent, we have started to develop the versions for Mac as well as Bash too. However,
our primary interest lies in the expansion of current interface to be able to include other functionalities
mentioned in the scope of the paper.
The system is not fool-proof yet. To be able for it to be effectively usable among a group of say 4
people, we need to introduce security in the interface so that the system itself cannot be hacked by the user and
the prime functionality of limiting the data usage bypassed.
The interface saves the user from having the trouble to schedule the task monitor again and again as it
is taken care of manually. Since, minimum level of human interaction is needed, the script is easy to maintain.
Thus, we were successfully able to create a monitor that is
1. Semi-automated
2. Doesn’t require any installation of any kind
3. Hassle-free, and
4. Effective in doing its job.
For future, our focus would be on maintaining and upgrading the system so as to include the points covered in
scope of the paper.
Acknowledgements
The authors wish to thank first and foremost, our Faculty Guide, Ms. S. Menaka, Assistant Professor
(SG), Operating Systems Division, School of Information Technology, VIT University, Vellore, India for being
available to us all the time and for providing us support and help at all times. We also would like to thank
numerous people on various forums and blogs who helped us when we were stuck while coding.

More Related Content

DOCX
Hari proposal
PDF
An Investigation of Using Privilege Level System to Restrict Employers for Us...
PDF
Network lectures mohammad hassan husain محاظرات الشبكات_محمد حسن حسين
PDF
Web Server-based Distributed Machine Socialization System
PDF
ORUTA BASE PAPER
PDF
50120140505007
PDF
A prototype framework_for_high_performance_push_no
PDF
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Hari proposal
An Investigation of Using Privilege Level System to Restrict Employers for Us...
Network lectures mohammad hassan husain محاظرات الشبكات_محمد حسن حسين
Web Server-based Distributed Machine Socialization System
ORUTA BASE PAPER
50120140505007
A prototype framework_for_high_performance_push_no
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing

What's hot (18)

PDF
Simulation for Data Security Improvement in Exploited Metarouter
PDF
Approved TPA along with Integrity Verification in Cloud
PDF
Touch With Industry
PDF
Volume 2-issue-6-1939-1944
PDF
Sms base file search & automatic contact saving technique using gsm 38521
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Paper id 712019116
PDF
Data migration system in heterogeneous database
PDF
Data migration system in heterogeneous database
PDF
International Journal of Computational Engineering Research(IJCER)
PPT
PDF
Widyatama.lecture.applied networking.iv-week-12.network-management
PDF
A provenance policy based access
PDF
Real time text stream processing - a dynamic and distributed nlp pipeline
PDF
Security Issues Surrounding Data Manipulation in a Relational Database
PDF
Accountability in Distributed Environment For Data Sharing in the Cloud
PDF
Oruta phase1 report
PDF
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
Simulation for Data Security Improvement in Exploited Metarouter
Approved TPA along with Integrity Verification in Cloud
Touch With Industry
Volume 2-issue-6-1939-1944
Sms base file search & automatic contact saving technique using gsm 38521
International Journal of Computational Engineering Research(IJCER)
Paper id 712019116
Data migration system in heterogeneous database
Data migration system in heterogeneous database
International Journal of Computational Engineering Research(IJCER)
Widyatama.lecture.applied networking.iv-week-12.network-management
A provenance policy based access
Real time text stream processing - a dynamic and distributed nlp pipeline
Security Issues Surrounding Data Manipulation in a Relational Database
Accountability in Distributed Environment For Data Sharing in the Cloud
Oruta phase1 report
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
Ad

Viewers also liked (20)

PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
Analysis of Spending Pattern on Credit Card Fraud Detection
PDF
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
PDF
Best Power Surge Using Fuzzy Controlled Genetic Technique
PDF
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
PDF
Inverse Kinematics Solution for Biped Robot
PDF
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
PDF
Investigation of Thermal Insulation on Ice Coolers
PDF
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
PDF
Data mining Algorithm’s Variant Analysis
PDF
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
PDF
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
PDF
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
PDF
Security Issues in Next Generation IP and Migration Networks
PDF
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
PDF
On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...
PDF
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
PDF
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
PDF
Smartphone Based Sensing Driver Behavior Modeling
PDF
Algorithm for the Comparison of Different Types of First Order Edge Detection...
Encryption Technique for a Trusted Cloud Computing Environment
Analysis of Spending Pattern on Credit Card Fraud Detection
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Best Power Surge Using Fuzzy Controlled Genetic Technique
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Inverse Kinematics Solution for Biped Robot
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Investigation of Thermal Insulation on Ice Coolers
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Data mining Algorithm’s Variant Analysis
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
Security Issues in Next Generation IP and Migration Networks
The Effect of Imbalance on the Performance of Unpaced Production Line – A Mat...
On Some Types of Fuzzy Separation Axioms in Fuzzy Topological Space on Fuzzy ...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
Smartphone Based Sensing Driver Behavior Modeling
Algorithm for the Comparison of Different Types of First Order Edge Detection...
Ad

Similar to Data Usage Monitor for a Shared Wireless Network Connection (20)

PDF
Netscan and Networx for Management Bandwidth and Traffic with Simple Routing
PPT
Ch24 system administration
PPTX
network monitoring system ppt
PDF
Network Monitoring System ppt.pdf
PDF
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
DOC
Web design and_development
PDF
HOST AND NETWORK SECURITY by ThesisScientist.com
PDF
How to Monitor DOCSIS Devices Using SNMP, InfluxDB, and Telegraf
PDF
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
PDF
Cyber security and cyber law
DOCX
Network Design for a company
PDF
Introdunction to Network Management Protocols - SNMP & TR-069
PDF
SNMP Monitoring at scale - Icinga Camp Milan 2023
PPTX
Lecture 10 the user experience (1)
PPT
Presentation of Monitoring System for Network Resources
PPTX
Lecture 10 the user experience
PPTX
Ch15 power point
PDF
OSMC 2023 | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf
PPTX
Monitoring of computers
Netscan and Networx for Management Bandwidth and Traffic with Simple Routing
Ch24 system administration
network monitoring system ppt
Network Monitoring System ppt.pdf
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Web design and_development
HOST AND NETWORK SECURITY by ThesisScientist.com
How to Monitor DOCSIS Devices Using SNMP, InfluxDB, and Telegraf
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
Cyber security and cyber law
Network Design for a company
Introdunction to Network Management Protocols - SNMP & TR-069
SNMP Monitoring at scale - Icinga Camp Milan 2023
Lecture 10 the user experience (1)
Presentation of Monitoring System for Network Resources
Lecture 10 the user experience
Ch15 power point
OSMC 2023 | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf
Monitoring of computers

More from IOSR Journals (20)

PDF
A011140104
PDF
M0111397100
PDF
L011138596
PDF
K011138084
PDF
J011137479
PDF
I011136673
PDF
G011134454
PDF
H011135565
PDF
F011134043
PDF
E011133639
PDF
D011132635
PDF
C011131925
PDF
B011130918
PDF
A011130108
PDF
I011125160
PDF
H011124050
PDF
G011123539
PDF
F011123134
PDF
E011122530
PDF
D011121524
A011140104
M0111397100
L011138596
K011138084
J011137479
I011136673
G011134454
H011135565
F011134043
E011133639
D011132635
C011131925
B011130918
A011130108
I011125160
H011124050
G011123539
F011123134
E011122530
D011121524

Recently uploaded (20)

PPTX
Welding lecture in detail for understanding
PPTX
Geodesy 1.pptx...............................................
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
composite construction of structures.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Internet of Things (IOT) - A guide to understanding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
Welding lecture in detail for understanding
Geodesy 1.pptx...............................................
Strings in CPP - Strings in C++ are sequences of characters used to store and...
CH1 Production IntroductoryConcepts.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
composite construction of structures.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
OOP with Java - Java Introduction (Basics)
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Arduino robotics embedded978-1-4302-3184-4.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Internet of Things (IOT) - A guide to understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Embodied AI: Ushering in the Next Era of Intelligent Systems

Data Usage Monitor for a Shared Wireless Network Connection

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 50-57 www.iosrjournals.org DOI: 10.9790/0661-17215057 www.iosrjournals.org 50 | Page Data Usage Monitor for a Shared Wireless Network Connection Akshay Aggarwal1 , Shantanu Kharia2 1 (Department of Information Technology, VIT University, India) 2 (Department of Information Technology, VIT University, India) Abstract: This paper proposes a novel method to monitor and control the network usage of a shared wireless connection. The main objective of this technique is to balance and restrict the shared network data. It facilitates monitor of data usage by each user individually. This technique is demonstrated through a user-friendly command line interface. The implementation is tested with Android Mobile Hotspot which exhibited satisfactory results as discussed in the paper. Keywords: Batch Scripting, Command Line Interface, Data Usage Monitor, Limiting Data Usage, Network Profile, Windows Powershell, Windows Task Scheduler I. Introduction Disputes in a workplace over a shared internet connection are a common thing. Most of the disputes are due to the petty reason of unfair usage of data over a connection that is shared by multiple users. We have made an attempt to try to find a solution to the same problem. In this interface, we have used Batch Files (a type of script file containing commands that are processed by Windows Command Prompt.) that helped us make use of other Windows functionalities like Task Scheduler (component of Microsoft Windows that provides the ability to schedule the launch of programs or scripts at user defined time-intervals or triggers), and PowerShell (a task automation and configuration management framework from Microsoft that also helps to execute command line programs and scripts) to help us achieve our functionality of monitoring data usage over a particular network profile. The interface allows the user to monitor their data usage and put a limit on the same. The data limit is recorded at the start of monitor period (which we have set for a month as most data network plans commercially available work on a monthly basis) and the same is recorded in a text file. The interface then runs and monitors the data usage. When the data usage surpasses the specified limit, the profile is blocked and the user isn’t allowed to connect to the network profile until he modifies the limit or the monitor period is finished, as and however the user chooses to. Let us take an example to illustrate the point. Suppose there exist an Internet source, W1 (say, a portable Wi-Fi Adapter). We take the case when the expense of data plans on the network source is being shared equally by the users in the group. Let A, B, C, D, E, F be six users in the network. We assume each user has their own device (laptop) through which they establish connection to access data services. The expense, being shared by all dictates the ethical rule that all users should have access to equal amount of data. Also, each user should be able to monitor his/her data usage over the connection so as to approximate and adjust (if needed) their data usage. We seek to provide an interface for the same where the user has the ability to change/modify monitor period, change limits of data transfer. Added to this is the functionality that once the data usage is exceeded, the connection should terminate automatically, unless mentioned otherwise. All the features mentioned above have been implemented by the authors in Windows 7 Operating System wherein no extra software(s) were needed to be installed. In-built features of Windows OS, like Task Scheduler, Command Line Interface and Powershell combined with Batch Files were used to implement the system. II. Currently Existing Technologies 2.1 Data Usage Monitors All Major Telecom Service Providers send a text message after every session of Data Network Usage. However, while using a Wireless System with usage spanned over multiple user devices, the data usage for individual systems is hard to calculate. This becomes even harder when using Desktops or Laptops. The Android and iOS all have the feature of calculating the data used based on a daily basis. Also, some apps on the respective platform allow data usage monitoring over custom time periods as well. Usage Monitors for Laptops or Desktops currently in the market are fuzzy and require the user to download third-party softwares for the suite to function. Although Windows 8.1 allows users to keep a tab on the data usage, the functionality isn’t backwards compatible. Also, most of the interfaces that provide the facility of monitoring data usage feature advertisements (usually push-ads) which the user often finds as irritating and/or
  • 2. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 51 | Page misleading. 2.2 Limiting Data Usage While Android OS has the in-built feature by which it allows the user to limit the data usage, similar features are also available in iOS too. Talking about desktops and laptops, Windows 8.1 features an upgrade that allows users to limit their data usage. However, this feature is present just in Windows 8.1 and not in any previous version of Windows. There are very less third-party softwares that allow users to put a limit on their data usage without having them battle against hefty downloads for suites and against advertisements. Commercial Wi-Fi providers provide an interface allowing the user to monitor their data usage as well as limit it (not user-defined limit) by the means of login systems. However, we seek to provide an interface that doesn’t need user to login but still allows them to monitor and limit the data usage. III. Implementation We have used the batch files to implement the data usage monitor and limiter. The suite consists of six batch files and as few as three text files for monitor of a Wireless Network Profile. The following are the file names and the functionalities included in each one of them. 3.1 run_1.bat First File of the suite, this file is run only at the first instance when the system is first used. The functionalities included in this file are- Creating a Limit (in MBs), creating a schedule based on a monthly basis on the date that is fed by user. The schedule is created using Windows Task Scheduler. The Limit Value is stored in a text file which is called as limit.txt. 3.2 run_2.bat Second File of the suite, this file is run by another file called counter.bat when the limit set up by the user is exceeded. It allows the user to extend the limit in case he/she wants to. After modifying the limit, it unblocks the network profile that was blocked by counter.bat file so that the user can access the network again. 3.3 run_3.bat Third File of the suite, this file is the one that is scheduled to run at the end of each monitor period (a month usually), in case the user has not exhausted the limit set by himself. This file also allows user to modify the limit for the new monitor period or select a new monitor period altogether. 3.4 Count_init.bat Fourth file of the suite, this file is the one that logs the starting value of the data used as per system statistics and stores it in a file called Start.txt. Since only 32-bit integer data can be manipulated using Batch files, this file takes help of Windows PowerShell to do the necessary computation. 3.5 Counter.bat This is the file that forms the mind of the limiter. This file reads the current usage value of the data and subtracts it from the value stored in Start.txt to calculate the data used. As soon as the limit is exceeded, it blocks the network profile and calls upon run_2.bat to allow the user to modify the limit in case he/she wants to. Like Count_init.bat, this file uses Windows Powershell for the computation part. 3.6 View.bat The last file of the suite, it borrows data from Start.txt, limit.txt and system statistics and manipulates them using Windows PowerShell to tell the user the data they have used and how much data they have left until they overrun the self-imposed limit. 3.7 Start.txt Contains the start value from which the calculations are to be done. 3.8 limit.txt Contains limit value in Bytes that is self-imposed by the user. 3.9 Profile.txt Contains the name of Profile the user wants to monitor. IV. Input and Output Screens The following are the screenshots of the screens with the inputs and the corresponding outputs-
  • 3. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 52 | Page Fig. 1(a). run_1.bat. First Screen. Asks the user about the Network Profile Name the user wants to monitor using the system. Fig. 1(b). run_1.bat. Feeding the network profile name. Fig. 2. run_1.bat. First Usage of Interface. Fig. 3(a). run_1.bat. Prompting the user to create the limit.
  • 4. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 53 | Page Fig. 3(b). run_1.bat. User gives input to create the limit. Fig. 4(a). run_1.bat. Creating a new schedule – asking user for date. Fig. 4(b). run_1.bat. New Schedule Created. Makes Use of Task Scheduler to schedule the task for the specified date every month.
  • 5. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 54 | Page Fig. 5. Count_init.bat. Deriving the profile name and modifying the Start.txt file. This file is called by run_1.bat as soon as the schedule is created. Fig. 6. counter.bat. Keeps a tab on data usage. This file shouldn’t be closed. Fig. 7(a). run_2.bat. As soon as the limit gets exceeded, counter.bat calls on run_2.bat to allow user to modify the limit. Option 2 and 3 are used to exit the program. Fig. 7(b). run_2.bat. Prompt the user for modified limit.
  • 6. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 55 | Page Fig. 7(c). run_2.bat. As soon as the limit is modified, the network profile is unblocked and again the counter starts. Fig. 8(a). run_3.bat. As soon as network profile is unblocked, run_2.bat calls run_3.bat, allowing the user to modify limit or monitor period. run_3.bat runs by itself upon completion of monitor period when the limit has not been exceeded. Fig. 8(b). run_3.bat. At the end of monitor period, allow user to modify limit for next period or change the monitor period. This screenshot shows the interface prompting the user for a new limit.
  • 7. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 56 | Page Fig. 8(c). run_3.bat. After modifying the limit, in case the user didn’t remove the filter before, the network profile filter, if present, will be removed. Fig. 8(d). run_3.bat. Prompting the user for changing the monitor period. Fig. 8(e). run_3.bat. In case the monitor date is same as system date, it calls on Count_init.bat to record the start date.
  • 8. Data Usage Monitor for a Shared Wireless Network Connection DOI: 10.9790/0661-17215057 www.iosrjournals.org 57 | Page Fig. 9. view.bat. This file allows the user to keep a track on the data used and also know about the remaining data usage unless the limit gets exceeded. V. Conclusion And Further Scope of the Paper The current monitor works for a single network profile, i.e. it can be used to monitor data usage over only one connection profile at the moment. The authors are working on to extend it to monitor data usage over multiple connection profiles simultaneously. Also, we have just handled wireless source of Internet Connection through this interface and in no manner whatsoever, touched upon a wired or a USB source like a dongle. We are trying to inculcate and merge other sources viz. wired and USB connections in addition to Wireless System to make it a full-fledged monitor system. The current interface works on Windows OS and was developed and tested on Windows 7 Home Premium version of Windows and later versions and proved successful on each of them. The command line arguments used in the batch files have limited backward compatibility and so the interface may not work on Windows NT or even Windows Vista. However, given the limited scope of the older edition of Windows, we decided to neglect on that part. The system uses a command line interface, which in turn requires user to get admin privileges. We seek to make the interface GUI to make it even more user-friendly. The system is not portable across various platforms like Linux and OSX as of yet. To make the interface platform independent, we have started to develop the versions for Mac as well as Bash too. However, our primary interest lies in the expansion of current interface to be able to include other functionalities mentioned in the scope of the paper. The system is not fool-proof yet. To be able for it to be effectively usable among a group of say 4 people, we need to introduce security in the interface so that the system itself cannot be hacked by the user and the prime functionality of limiting the data usage bypassed. The interface saves the user from having the trouble to schedule the task monitor again and again as it is taken care of manually. Since, minimum level of human interaction is needed, the script is easy to maintain. Thus, we were successfully able to create a monitor that is 1. Semi-automated 2. Doesn’t require any installation of any kind 3. Hassle-free, and 4. Effective in doing its job. For future, our focus would be on maintaining and upgrading the system so as to include the points covered in scope of the paper. Acknowledgements The authors wish to thank first and foremost, our Faculty Guide, Ms. S. Menaka, Assistant Professor (SG), Operating Systems Division, School of Information Technology, VIT University, Vellore, India for being available to us all the time and for providing us support and help at all times. We also would like to thank numerous people on various forums and blogs who helped us when we were stuck while coding.