VoIP/SIP/IMS Research Papers - Academia.edu (original) (raw)

"" In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government... more

""
In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government with various services.
However it is through the same cyber networks which intrude and attack our privacy, economy, social life in a way which is harmful. Some scholars have interestingly argued that, “in the Internet nobody knows you are a dog”. This raises some legal issues and concerns.
This paper presents important issues on the Security, Prevention, and Detection of Cyber Crime. The paper consists of four parts in Romanic Numbers.
In Part I, the attempt here is simply to familiarize the reader with a careful understanding of the Cyber Crimes. The author will trace back the meaning, history, and types of Cyber Crimes
In Part II, one has to know the concept of Cyber Security; this will include meaning, background, types if any and important of Cyber Security.
Part III will explain on Cyber Prevention and Detection the same will include meaning and history, Cyber Prevention and Detection Methodologies and Legal Instruments.
And Part IV, Personal Assessment basically in Tanzanian Laws.
""

Los sistemas actuales de videoconferencia IP presentan diferentes problemáticas que entorpecen la comunicación a través de ellos. La mayoría están basados en implementaciones propietarias y conllevan costes elevados de adquisición de los... more

Los sistemas actuales de videoconferencia IP presentan diferentes problemáticas que entorpecen la comunicación a través de ellos. La mayoría están basados en implementaciones propietarias y conllevan costes elevados de adquisición de los equipos. Además, la calidad de los recursos multimedia transferidos por estos sistemas acostumbra a ser bastante baja, cosa que afecta a la experiencia del usuario y a la percepción de presencia. Finalmente, la mayoría de las soluciones comerciales no incluyen la opción de asegurar las videoconferencias. En este artículo se presenta una solución implementada basada en un servidor de videoconferencias en software de código abierto. Una capa de señalización basada en el protocolo SIP y un plano multimedia, basado en un replicador de paquetes RTP. Esta solución constituye una plataforma que permite disminuir los costes del sistema usando ordenadores personales con clientes SIP en software, permitiendo reducir drásticamente el coste de los equipos. Finalmente, se propone un mecanismo de protección de los flujos multimedia usando Secure Real-time Transport Protocol (SRTP) y Multimedia Internet Keying (MIKEY) para el intercambio de claves.

With cybercrime’s yearly revenues estimated at $1 trillion and national security networks probed daily and often breached, cyber security is a vital concern for public and private organizations globally. This research ponders the problem... more

With cybercrime’s yearly revenues estimated at $1 trillion and national security networks probed daily and often breached, cyber security is a vital concern for public and private organizations globally. This research ponders the problem of improving information security by looking at organizations under the lens of Socio-technical systems. The main objective of this study is to ascertain if Net Assessment, one of the principal frameworks for analyzing the United States’ national security strategy, can be used to improve an organization’s capabilities in the field of information and cyber security through its multidisciplinary and holistic approach. To reach this goal, the study identifies and analyzes the aspects Net Assessment offers which are not
included in current information security risk management and assessment methodologies.
The research follows an inductive process, designed using a qualitative approach which makes use of content analysis, comparative analysis and purposive sampling. The first step drafts
a list of current information security risk assessment and risk management methodologies, and then isolates a representative sample. The second step identifies and analyzes existing metaanalytical methods and models devoted to the appraisal, selection, and indexing of risk management and assessment methods. It then defines a categorization framework capable of
accurately capturing the different risk management and assessment method’s functionalities. A third step maps the coverage of the two selected methodologies (NIST and ISO) against the identified functionality categories. After a critical analysis of Net Assessment, and a reasoned estimate of its main differences and capabilities in the context of information security, Net Assessment’s features are mapped in the category list.
The comparison of the features of the three methodologies identifies Net Assessment as a very credible avenue for improving multiple aspects currently neglected by the International
Organization for Standardization (ISO) and National Institute of Standards and Technology (NIST) frameworks. The study results maintain that, if implemented as a companion to these standards, Net Assessment may improve an organization’s security strategy, its allocation of funding for security, provide more accurate estimates of risks and threats, better alignment between potential risks and countermeasures, and improve the inputs for real time and automatic tools.

In this paper we address the problem of generating a candidate role set for an RBAC configuration that enjoys the following two key features: it minimizes the admin-istration cost; and, it is a stable candidate role-set. To achieve these... more

In this paper we address the problem of generating a candidate role set for an RBAC configuration that enjoys the following two key features: it minimizes the admin-istration cost; and, it is a stable candidate role-set. To achieve these goals, we implement a three steps methodology: first, we associate a weight to roles; second, we identify and remove the user-permission assignments that can not belong to a role having a weight ex-ceeding a given threshold; third, we restrict the problem of finding a candidate role-set for the given system configuration using only the user-permission assignments that have not been removed in step two (that is, user-permission assignments that belong to roles having a weight exceeding the given threshold). We formally show —proof of our results are rooted in graph theory — that this methodol-ogy achieves the intended goals. Finally, we discuss practical applications of our approach to the role mining problem. 1

Depuis quelques années, la technologie VoIP commence à intéresser les entreprises, surtout celles de service comme les centres d’appels. La migration des entreprises vers ce genre de technologie n’est pas pour rien.

Convergenţa serviciilor de voce, date a creat premisa trecerii la etapa de unificare a comunicaţiilor şi a celei de definire a comunicaţiilor inteligente. Unificarea comunicaţiilor a eliminat nivelul ridicat al latenţei induse, prin... more

Convergenţa serviciilor de voce, date a creat premisa trecerii la etapa de unificare a comunicaţiilor şi a celei de definire a comunicaţiilor inteligente. Unificarea comunicaţiilor a eliminat nivelul ridicat al latenţei induse, prin unificarea interfeţelor pentru managementul comunicaţiilor. Deşi dezvoltarea şi implementarea tehnologiei VoIP nu este la început, organizaţiile urmăresc tot mai mult implementarea unui management bazat pe instrumentele şi serviciile puse la dispoziţie de această tehnologie. Din păcate, potenţialul acestei importante resurse tehnologice nu a fost pe deplin exploatat.

9 786055 201210 RFI D Bile şen leri , Atm el Stu dio 6 Des tek li Gel işti rme Ara çlar ı, Atm el Aile si Dat ash eet s, Gel işti rici Pla tfor m Yaz ılım ları , Ger ekl i Pro gra mla r, Ele ktro nik Dev re Şem alar ı, Gör sel Eği tim Vid... more

9 786055 201210 RFI D Bile şen leri , Atm el Stu dio 6 Des tek li Gel işti rme Ara çlar ı, Atm el Aile si Dat ash eet s, Gel işti rici Pla tfor m Yaz ılım ları , Ger ekl i Pro gra mla r, Ele ktro nik Dev re Şem alar ı, Gör sel Eği tim Vid eol arı, PPT Slay tlar ı

It is very well collected project on Cloud Computing. no need to wandering on internet to search about Cloud computing, Just download it. thanxx A very New Technology In I.T. Industry & Very Important for Everyone i.e. For individuals As... more

It is very well collected project on Cloud Computing. no need to wandering on internet to search about Cloud computing, Just download it. thanxx
A very New Technology In I.T. Industry & Very Important for Everyone i.e. For individuals As Well As Big Corporations .Even Very Big Companies like GOOGLE; FACEBOOK; APPLE; AMAZON; MICROSOFT etc. etc. are investing In Cloud Computing... Do Get This Stuff....

In this paper, we aim to perform a SWOT analysis of Voice over Internet Protocol (VoIP) Technology. SWOT analysis is a powerful evaluation framework that is data-driven and fact-based and specifically useful for planning and informed... more

In this paper, we aim to perform a SWOT analysis of Voice over Internet Protocol (VoIP) Technology. SWOT analysis is a powerful evaluation framework that is data-driven and fact-based and specifically useful for planning and informed decision making. This study, through a critical evaluation of previous literature, seeks to identify the various positive attributes of VoIP technology as compared to traditional PSTN technology. The study also examines the weaknesses associated with VoIP technology where possible improvements are necessary. The potentials for growth and Threats to VoIP were also discussed in the study.

"Internet Protocol Television (IPTV) has gained an enormous growth rate by revolutionizing personal entertainment. High data rates with increased coverage radius of IEEE 802.11n Wireless Local Area Networks (WLANs) motivate the concept of... more

"Internet Protocol Television (IPTV) has gained an enormous growth rate by revolutionizing personal entertainment. High data rates with increased coverage radius of IEEE 802.11n Wireless Local Area Networks (WLANs) motivate the concept of wireless IPTV. Focusing on wireless IPTV, our work deals with the capacity evaluation of IPTV users over IEEE 802.11n. We first present an upper capacity limit for supporting maximum number of users over IEEE 802.11n. We then propose that 4-times packet size is the optimal frame aggregation size for IPTV which maximizes users capacity and QoS. Moreover, we suggest the use of Datagram Congestion Control Protocol (DCCP) at transport layer for IPTV. We show that DCCP increases capacity upto 35% for IPTV by reducing packet losses at Access Point (AP), compared to User Datagram Protocol (UDP). We further evaluate fairness of IPTV traffic in the presence of Transmission Control Protocol (TCP) traffic in the network. Our study concludes that IPTV using DCCP over IEEE 802.11n not only provides increased user’s capacity but also co-exists fairly with TCP traffic. Transmission of combined IPTV and VoIP over a wireless network is a challenging task. We evaluate capacity of combined IPTV and VoIP over IEEE 802.11n. We then evaluate the use of DCCP at transport layer of IPTV. Our study shows that DCCP(TFRC) can provide 25% additional IPTV users. Our results suggest that performance of DCCP is worst in presence of any other UDP flow because of congestion-less mechanism of UDP. Our fairness analysis with TCP traffic shows that IPTV and VoIP using TFRC provide fair share in bandwidth to TCP with 19% increase in combined capacity. We evaluate optimal parameters of IEEE 802.11n AP for running IPTV and VoIP. We show the optimal values and trends of AP parameters including queue size, transmission opportunity, aggregation and block acknowledgement etc. Our study shows that nearly 9 more VoIP users are supported with a queue size of 70 packets and transmission opportunity of 9. Our study concludes that selection of DCCP and optimized parameters over IEEE 802.11n can enhance capacity of IPTV and VoIP by at-least 19% than use of UDP."

Komunikasi merupakan hal yang paling utama dalam keberhasilan suatu kegiatan. Komunikasi yang terjadi dalam suatu jaringan komputer tidak hanya mengolah transfer paket data antar komputer, tapi teknologi komputer saat ini mampu melakukan... more

—Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but... more

—Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bogus positives that block legitimate users. In this paper, authors show application layer DoS attack for SIP server using some open source DoS attack tools and also suggest a mechanism that can protect a given SIP server from application-level DoS attacks especially the attacks targeting the resources including CPU, sockets, memory of the victim server. In this paper author's attempt to illustrate application layer distributed denial of Service (DDoS) attack on SIP Server such as SIP flooding attack, real time transport (RTP) flooding attack using open source DDoS attack tools. We propose a new DDoS defence mechanism that protects SIP servers from application-level DDoS attacks based on the two methodologies: IPtables and fail2ban detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identify bad flows only based on the incoming traffic patterns. A popular software known as Wireshark which is a network protocol analyzer is used to capture the packets during DoS attack from the victim server Ethernet interface to detect the attacking host IP address and analysis the types of attack. We evaluate the performance of the proposed scheme via experiment.

The emergence of Voice-Over-IP (VoIP) technology is creating a major discontinuity in telecommunications. Illegal VoIP or gray call pays a great impact on Bangladesh's voice market. Recently, call centers in Bangladesh have started using... more

The emergence of Voice-Over-IP (VoIP) technology is creating a major discontinuity in telecommunications. Illegal VoIP or gray call pays a great impact on Bangladesh's voice market. Recently, call centers in Bangladesh have started using low cost IP telephony services which minimize the overhead telecom expense. However, BTRC in Bangladesh permits to use IP telephony for both domestic and international call center operation. Thus there is always chance of performing illegal VoIP. This is elaborately discussed in this paper. The aim of this article is to find out some solutions to ensure that the call centers can be run smoothly without any risk. In this article, a number of proposition and methodology have been described both in legal and technical solutions, which include some new guidelines, measuring the technical security parameter for IP telephony, a real time monitoring system including the trunk, data/voice flow, packet filtering and call center architectural schemes. By adopting the proposed scheme the call center operators and governing authority can significantly reduce illegal VoIP if the domestic and international call center can operate from same premise, same server room, same call application cloud and even same IP Local area Network.

Quizz et notions générales portant sur les réseaux et protocoles TCP UDP, kerberos protocole voieIP Ethernet, Wifi, support de transmissions, Cryptographie , cheval de Troie, ver et virus, attaques web , intrusions, pare-feu... more

Quizz et notions générales portant sur les réseaux et protocoles TCP UDP, kerberos protocole voieIP Ethernet, Wifi, support de transmissions, Cryptographie , cheval de Troie, ver et virus, attaques web , intrusions, pare-feu
http://www.quizz.biz/quizz-802325.html

Providing engaging interpretation resources for museum and gallery visitors may have a great impact on the overall museum visiting experience all by assisting museums in maintaining long-term relationships with their public. This paper... more

Providing engaging interpretation resources for museum and gallery visitors may have a great impact on the overall museum visiting experience all by assisting museums in maintaining long-term relationships with their public. This paper focuses on the ways through which AR can be employed in museum and gallery settings as an interpretation medium. It also introduces a new generation of multimedia guides for the museum visit inspired by the concept of Adaptive Augmented Reality (A2R). Adaptive Augmented Reality (A2R) provides visual and acoustic augmentations that come to supplement the artefact or site viewed by a museum or gallery visitor and monitors the cognitive and affective impact of all interactions of the museum visitor both with the physical and the digital environment. The ultimate goal is to make every museum visit unique, by tailoring an Augmented Reality visit with contents that are susceptible to increase the affective impact of the augmented museum visiting experience and hence encourage intrinsic and self-motivated learning.

Today there are so much data being available from sources like sensors (RFIDs, Near Field Communication), web activities, transactions, social networks, etc. Making sense of this avalanche of data requires efficient and fast processing.... more

Today there are so much data being available from sources like sensors (RFIDs, Near Field Communication), web activities, transactions, social networks, etc. Making sense of this avalanche of data requires efficient and fast processing. Processing of high volume of events to derive higher-level information is a vital part of taking critical decisions, and Complex Event Processing (CEP) has become one of the most rapidly emerging fields in data processing. e-Science use-cases, business applications, financial trading applications, operational analytics applications and business activity monitoring applications are some use-cases that directly use CEP. This paper discusses different design decisions associated with CEP Engines, and proposes to improve CEP performance by using more stream processing style pipelines. Furthermore, the paper will discuss Siddhi, a CEP Engine that implements those suggestions. We present a performance study that exhibits that the resulting CEP Engine-Siddhi-has significantly improved performance. Primary contributions of this paper are performing a critical analysis of the CEP Engine design and identifying suggestions for improvements, implementing those improvements through Siddhi, and demonstrating the soundness of those suggestions through empirical evidence.

The various convergent technologies nowadays in computer infrastructure, impose an additional burden on existing networks, the need to save technical and budgetary resources, lead companies and public agencies to verify the existence of... more

The various convergent technologies nowadays in computer infrastructure, impose an additional burden on existing networks, the need to save technical and budgetary resources, lead companies and public agencies to verify the existence of means of better utilization of the infra-structured network, in order to provide Integrated services (IntServ) and / or differentiated (DifServ), causing all or almost all the gain of a structure that required time and financial resources to be assembled. In view of such a scenario, the implementation of VoIP (voice over IP) technologies is shown as not only an alternative but a premise for resource utilization, cost reduction and control of large-scale communications within an organization. The objective of this work is to demonstrate the installation of the 3CX tool (formerly ELASTIX) compiled in Debian / LINUX operating system, its applications and implications in small, medium and large companies and bodies, aiming to be not only an alternative but a service initiative Differentiated technology that converged networks offer us.

Il lavoro esposto in questo elaborato si è focalizzato sull’analisi di sicurezza di cinque instant messaging app (Signal, WhatsApp, Telegram, Viber e LINE) ed è frutto dell’attività svolta durante il tirocinio interno all'Università degli... more

Il lavoro esposto in questo elaborato si è focalizzato sull’analisi di sicurezza di cinque instant messaging app (Signal, WhatsApp, Telegram, Viber e LINE) ed è frutto dell’attività svolta durante il tirocinio interno all'Università degli Studi di Milano supervisionato dal Prof. Stelvio Cimato. Le applicazioni sono state selezionate secondo questi tre criteri: reputazione e popolarità, registrazione al servizio tramite numero telefonico e pubblicazione di documenti ufficiali sulla crittografia implementata.
Il testo vuole svelare al lettore la capacità degli applicativi di proteggere le proprietà della sicurezza informatica indagandoli da quattro prospettive: il protocollo crittografico implementato, le dichiarazioni sui metadati raccolti, le informazioni estraibili da un’intercettazione passiva e la solidità contro un’intercettazione attiva.

"In today’s information-driven business environment, enterprise systems and processes capture an ever-increasing amount of data. To derive meaningful and actionable information from this data, businesses are compelled to commit... more

"In today’s information-driven business environment, enterprise systems and processes capture an ever-increasing amount of data. To derive meaningful and actionable information from this data, businesses are compelled to commit significant resources to perform the necessary analysis. While all business areas are impacted to varying degrees, few face a greater challenge than the information security department. To support its mission to protect critical information assets, the information security department must maintain an ongoing process to capture, analyze and subsequently act on log and alert information collected from a wide array of systems across the enterprise.
Typically, these data must be analyzed and actionable.... Joey Hernandez worked as a SME Reviewer for this ISACA effort"

This review focuses on instructional design literature for the MACE project. It shows the plenty of research in instructional design era for more than 20 years, and offers various approaches, concepts and models in this field. The... more

This review focuses on instructional design literature for the MACE project. It shows the plenty of research in instructional design era for more than 20 years, and offers various approaches, concepts and models in this field. The findings relate to the following keywords: Instructional design in teaching, design architecture, and construction engineering. This report is divided in four sections: “Literature Reviews”, “Articles, Book Chapters and Studies”, “Books”, and “Web Resources”, and is organized in a schedular view. Each section implicates the information about literature reference or website title, keywords, abstract and URL/resource if available.

This article is an exploration of the recent phenomenon of " lottery scam-ming " in Jamaica. By using black market data to identify targets and presenting as call center employees, scammers subversively manipulate the development... more

This article is an exploration of the recent phenomenon of " lottery scam-ming " in Jamaica. By using black market data to identify targets and presenting as call center employees, scammers subversively manipulate the development apparatuses of information communication technologies and business process outsourcing. The victimization the scam produces creates new circuits of interaction with North Americans that invert long-defined relations of capital between the United States and Jamaica and reconfigures transnational connections of commerce and labor. The article demonstrates how scammers, through criminal manipulations of development , are able to reconcile longer histories and broader circuits of inequality through contemporary gain, producing a novel sense of postcolonial repair. [

"It's a Microcontroller Based DIY Electronics Project. Named Wireless RF Module Using PIC Microcontroller. The RF module is a small electronic circuit used to transmit, receive, or transceive radio waves on one of a number of carrier... more

"It's a Microcontroller Based DIY Electronics Project. Named Wireless RF Module Using PIC Microcontroller. The RF module is a small electronic circuit used to transmit, receive, or transceive radio waves on one of a number of carrier frequencies. RF modules are widely used in consumer applications such as garage door openers, wireless alarm systems, industrial remote controls, smart sensor applications, weather monitoring system, RFID, wireless mouse technology and wireless home automation systems. They are often used instead of infrared remote controls as they have the advantage of not requiring line-of-sight operation. Thanxx.
"

All crimes performed or resorted to by abuse of computer network or Internet with the purpose of influencing the functioning of the computer system and also for financial gains are referred to as cybercrime. This paper examines different... more

All crimes performed or resorted to by abuse of computer network or Internet with the purpose of influencing the functioning of the computer system and also for financial gains are referred to as cybercrime. This paper examines different types of cybercrimes that are frequent in Nigeria and also checks the rate at which these crimes are carried out by the use of academic institution networks as the access point. Data was obtained through questionnaires and analyzed. Some of the findings show that the Yahoo Boys attack is very popular even in the academia and that students are the most active participants in cybercrime in the Nigerian institution networks. It is also found that it is possible to create a taxonomy of scams and scammers and develop tools, measures, campaigns and laws that will hurt their bottom line.

Elastix PBX Default Login Details and Default Passwords

Tahun Baru 2015 Masehi di bulan januari ini kita mulai mendalami tentang VoIP biar bisa telponan hemat biaya bahkan bisa di bilang bisa gratis. Kali ini kita coba bahas tentang cara menggunakan VoIP Client contohnya ZoIPer, cek aja di... more

Tahun Baru 2015 Masehi di bulan januari ini kita mulai mendalami tentang VoIP biar bisa telponan hemat biaya bahkan bisa di bilang bisa gratis. Kali ini kita coba bahas tentang cara menggunakan VoIP Client contohnya ZoIPer, cek aja di website nya www.zoiper.com

"Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range... more

"Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more
vulnerable than personal computers because more people are using smartphones to do personal tasks. Nowadays, smartphone users can email, use social networking applications (Facebook and Twitter), buy and download various applications and shop. Furthermore, users can now conduct monetary transactions, such as buying goods, redeeming coupons and tickets, banking and processing point-of-sale payments. Monetary transactions are especially attractive to cyber attackers because they can gain access to bank account information after
hacking a user’s smartphone. Lastly, smartphones are small and are easy to carry anywhere. Unfortunately, the convenience of using smartphones to do personal task is the loophole cyber attackers need to gain access to personal data. Thus, this paper examines the importance of developing a national security policy created for mobile devices in order to protect sensitive,personal data."

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

In this project study of the LTE and its architecture is considered and understand the mechanism of QoS deployment in LTE which introduce the main concept of traffic classification. A simulation based study is performed in OPNET by... more

In this project study of the LTE and its architecture is considered and understand the mechanism of QoS deployment in LTE which introduce the main concept of traffic classification.
A simulation based study is performed in OPNET by deploying a WiMAX network model that performs the same mechanism of QoS in LTE. The simulation considers a simple network topology with three traffic source and destination each of them uses different application the QoS configuration is applied by defining three different classes that are Gold, Silver, Bronze. And the applications used is the HTTP, VoIP, and Video conference. And then the evaluation is performed by comparing the result with QoS and without. And from the simulation result it's obvious that QoS mechanism represent the solution of future needs of networking and communication.

The Research has been produced digital displacement field sensor system. This system can be applied on displacement level monitoring of building, bridge, dike and so forth. This developed system work serial digitally so that It can be... more

The Research has been produced digital displacement field sensor system. This system can be applied on displacement level monitoring of building, bridge, dike and so forth. This developed system work serial digitally so that It can be connected to computer for many purpose. The field Displacement sensor use sliding potentiometer and a 10 bit Analog to Digital Converter (ADC) at microcontroller. The value of field displacement is sent digitally as multi byte serial data through UART serial communication protocol. The acquired data read to computer through COM1 with Borland Delphi 7.0 program. The research A system which can measure field displacement has been acquired from this research. The system has 1 mm resolution specification with the range of measurement up to 57 meters. From the sensor's output has been acquired the output of the system with has the equation y = 0,990x + 0,154 with the linear correlation 0,998.