International Designers B202 Group Design Project.

Slides:



Advertisements
Similar presentations
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Your future is bright blue! So Smart, Its Simple..
Network Asset Management at Jefferson Lab Bryan Hess, Andy Kowalski, Brent Morris,
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
By K atherine I E buoh ( M sc ) Information Technology Implementation Of Technical Analysis Stock Trading Application For The Nigerian Stock Exchange.
Zigbee Networks Using Xbee Modules By Paul Olson.
Jonathan Poynter.  Reasoning Why I chose this idea.  Introduction  The Problem  Assumptions  Solution  Results  Conclusion.
Networking Components Chad Benedict – LTEC
Technical Training: DIR-615
Web Page A page displayed by the browser. Website Collection of multiple web pages Web Browser: A software that displays web pages on client computer.
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) BY: SAMHITA KAW IS 373.
Credit Card Fraud Detection
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Codeigniter is an open source web application. It occupies a very small amount of space in the memory and is most useful for developers who aim to develop.
Honeypot and Intrusion Detection System
MultiFarm Dealers Meeting, Dead Sea, Israel, 2008.
Calendar System Dale Wassum August 4, 2004 CPSC 463 :: Summer II 2004 :: Dr. Pargas.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
LOGO 2 nd Project Design for Library Programs Supervised By Dr: Mohammed Mikii.
Presentation seminar on   Google Chrome OS is Linux based OS  Google Chrome is an open source, lightweight OS.  It is based.
Local IPv6 Networking March 2000 Adelaide IETF Bob Hinden / Nokia.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Web Controlled of Robot Georgi Chakarov Ivelin Stoyanov.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Aquarium Project Week#13 Tian Xie Final Project – Major Studio.
Price range varies from $17.99 to $34.99 or more. Device 1 Device 2 Network Connection.
Securing Interconnect Networks By: Bryan Roberts.
International Designer B202 Group Design Project.
 Introduction  Problem  Solution  Future work.
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
KX-HTS Step by Step Guide Initial Set-up
Vulnerable Web Server g Network Setup Guide
released for field test training
Internet Protocol Address
Tor Good + Evil.
Connect(register) old KX-HDVxxx to HTS824(HTS32) by manual operation (sample case: old KX-HDV130 that does not support automatic registration ) 1st release:
Web Development Web Servers.
Backdoor Attacks.
Immortals Security Solutions We are immortal through our work
Students vs IoT security
Outline Introduction Standards Project General Idea
Computer Networking Devices
Benefits To Used PHP To Create Websites. PHP – Hypertext Transfer Protocol PHP consider the most famed programming language for developing websites or.
By Janet Crawford and Dam Luong Submitted to the Faculty of
Introduction to Networking
Introducing To Networking
Network Attacks Dylan Small.
Cloud based Open Source Backup/Restore Tool
PHP / MySQL Introduction
Why is it important? ❏ Most website owners do not think that if they paste address on page or post than they have too much risk of spam. ❏
Chapter 2. Malware Analysis in VMs
ISMS Information Security Management System
Upgrading Firmware of ZyXEL ADSL Router P660RU & P660Hw
Bridge Configuration For ZyXEL ADSL Wireless Router
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
COMPUTER NETWORK TECHNOLOGY
THE REAL WORLD APPLICATIONS OF PYTHON. INTRODUCTION Python is an interpreted, high-level, general-purpose programming language. Created by Guido van Rossum.
Tareq Khan, Ph.D. Assistant Professor,
Web Servers (IIS and Apache)
Hardware Graduation Project (2) Seminar
Calypso Service Architecture
Presentation transcript:

International Designers B202 Group Design Project

Introduction The aim of this project is using Arduino and some specific sensor to take control of something on internet.

Analysis and Design Product demonstration template

Design Requirement Real time monitor of the box and response time within 10 sec. Website Security – user must login Transactions History Wireless Standard 802.1b/g Sensitivity (Detection Range) Easy to use Safety Lightweight (easy to carry) Power Consumption

Prototype

Side view of our product

Design highlights requirement : internet security (protect the user)

Design highlights -

Testing The first tests was made on our local host using the program Wamp as virtual server (average response time 2sec) Simple counter function has been used. Simple counter function has been used. Tested on a real server (average response time 10sec) Released of beta version to get feedback

Problems Jumpers Automatic connection to the router Firmware mismatch Dedicated Ip Address was needed for the website Time respond was too late on the real web server

Innovations and Creative Magnet Switch Dedicated IP Address

Conclusion Design specification TheoryFeaturesMethods

Questions???

Reference TeraTerm 4.69: LogMeTT ( Monitor tool for WiFly: WiFly Shield code library alpha 2 release: SparkFun ( Code for TeraTerm to connect to router manually: CTaylor (2010, March 04) WiFly Wireless SpeakJet Server Message posted to Connecting to bridge ramtin (2010, July 09) Wifly on Arduino Message posted to bin/yabb2/YaBB.pl?num= Php manual Philip Olson,( 2011,May 13) PHP Manual Message posted to