Unit 1 Assignment 1 Nt1310

Decent Essays
SYSTEM IMPLEMENTATION: At some fixed interval the PC Master sends request to the Wireless sensor node through the sub master for Data collection. The request send by the PC Master is in the form of frames. The frame which is transmitted by PC master will contain both the sub master id & the wireless sensor node id from where the data should be retrieved. The sub master receives the frame is then check for the wireless sensor node id and then it retransmit to the wireless sensor node as it is. If one of the sub masters become fails then remaining other sub master can also send the data of the other wireless sensor node. The RF module is interfaced to ARM controller. The wireless sensor nodes are in range which receives all the incoming frames and stores it in …show more content…
If the incoming frames slave ID matches with their own slave ID then they accept the frame and sends the parameter back to the master .If the slave ID does not match then the slave discards the frame. Wireless sensor nodes will measure the different parameters like temperature, light intensity and Gas by using different sensors and will send back the sensed data to PC master unit through sub master units. The data will also be displayed on LCD of the sub master unit. Relays are used for controlling action. If the sensed parameters at one of the wireless sensor node are not as per the expected parameters, then the controlling action will be taken by the PC master terminal. We have a main PC master terminal which has the VB software already installed into it .The PC master terminal which is used to monitor the status of all the wireless sensor nodes which covers the whole area. This reduces cable connections and accidental potential due complexity of cables. RF transmitter namely IEEE802.15.4 technology standard, is one of the WPAN standards. IEEE 806.15.4 aims at short distance double direction communication with lower complexity,

Related Documents

  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    C. Services & Applications 1. TRUSTED a) Microsoft Active Directory (AD) Domain: In order to resolve the issues inherent in a peer-to-peer network, a centralized means of user authentication and resource sharing must be implemented. Microsoft Active Directory (AD) is a centrally administered, hierarchical structure designed to manage user access to shared network resources in a domain. Windows Server 2012 R2 Datacenter edition operating system (OS) is required to establish and manage the company’s AD domain.…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    This protocol is classified into rounds; every round composed of two phases; Set-up Phase (1) Advertisement Phase (2) Cluster Set-up Phase Steady Phase (1) Schedule Creation (2) Data Transmission A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs. Non-CH nodes take the advertisement packet with the strongest obtained signal strength.…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 362 Words
    • 2 Pages

    To perform the Radio access network using two methods: a) Using Wireless Insite (commonly known as built in post processing). b) Using MATLAB (commonly known as the post-processing). c) Cell association and cell dominance formation using wireless Insite to get UE to be associated(served) with single femtocell eNB(preferred to be robust signal) and viewing it (UE). Fig2. Cell association for the UEs 4.…

    • 362 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    WSUS is a Windows Server Update Service, that allows the administrators to have a server with Windows updates on site. Administrators can test new updates and approve the successfully tested Windows updates for release. Only the approved updates will be applied to the client computers. Using Group Policy, the administrators can point client computers to WSUS server, so the client computers will only receive the tested and approved updates from this server, instead of receiving all the updates (including potentially harmful updates) from the Windows update web site. This assures, that none of the new Windows updates will create unexpected issues with the clients' systems.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Step1: Start the program Step2: Initialize the nodes by fixing the number of nodes, type of antenna used, type of routing protocol and plotting circumference Step3: Frequency is allocated for the MIMO antennas. Step4: Positioning and plotting the nodes Step5: Base Bandwidth allocation for primary and secondary nodes • Primary network range-…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices. Because of the continuing modifying the code base, the result may not be consistent and consist bugs. NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    A relay is not equipped with satellite and terrestrial antennas but routes tree nodes' video traffic using the WiFi (802.11n) link from source nodes. If nodes communicate over WiFi (802.11n) then connectivity is formed on orthogonal channel using pair of 802.11n routers. However,if nodes communicate over LTE, it share resources over a single channel.…

    • 431 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    First to connect to the internet you need an internet service provider to have access to the internet which is a router to connect to your home network to the ISP. It can be wired or wireless connected to your home network. The web browser is a program which allows me to browse web pages such as my sync email account. You need a domain name to identify the IP address to have access; they are used in URLs to find particular web pages. URL first part is named a protocol finder and indicates what protocol should be used, the last part is a resource name and it identifies the IP address of where the resource is placed.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    In data communication, they are always striving to increase throughput, this would include allowing nodes to transmit information over a single broadcast link without interfering with each other. To achieve this, multiple access protocols coordinate the transmission. The three classes of multiple access protocols are, random access, taking-turns and channel partitioning. With random access protocol, each node tries to randomly to use the complete broadcast link, without any regard to the other nodes. Taking-turns protocol uses some type of turning mechanism, which designates which node is allowed to transmit.…

    • 944 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1 Assignment

    • 449 Words
    • 2 Pages

    My choice for a genetic disorder is Spinal Muscular Atrophy also known as SMA. SMA is an inherited or genetic disorder that affects spinal motor neurons. Without these properly functioning neurons, patients have increased muscle weakness. In some severe cases patients will lose the ability to breath or swallow on their own. According to the National Human Genome Research Center, 1 in 6,000 to 1 in 10,000 people are affected by SMA.…

    • 449 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Pc 517 Project

    • 674 Words
    • 3 Pages

    Letter of Intent for EEC 517 Project PC based home automation and Energy Saving System using PIC18F4520 Parth Rathod Department of Electrical engineering and Computer Science Cleveland State University p.rathod@vikes.csuohio.edu Feb 09, 2018 1. Introduction Home Automation is an approach to provide a network in the house which links computers and peripheral equipment like dish washers, washing machines, microwaves, sub systems like Heating, Ventilation, Air conditioning and other electrical appliances. The aim of the project is to control home appliances like lights, fans, AC, etc. through simple mouse click on the personal computer. Here microcontroller is interfaced to light and temperature sensors and separately the PC is interfaced with…

    • 674 Words
    • 3 Pages
    Decent Essays