Wireless sensor network & Private mobile computer

Slides:



Advertisements
Similar presentations
Wireless network Usually use Radio Frequency (RF) technology Adv :
Advertisements

Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
PYP002 Intro.to Computer Science Introduction to Networks1 Networks Chapter 17.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
FIXED WIRELESS ACCESS Majid Al-Shukri Ali Dumyati.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
Network Topologies.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
6-1 Extranet Uses. 6-2 Case 2: Maryland and Colorado Serving their customers without using wires Earth Alert Emergency Management System in Maryland provides.
Stefan Thorvaldsson – What is a network? A network is two or more computer linked together so the are able to share resources. It could.
A network is a collection of computers connected by communication channels that allows you to share information. mputer_network.
Chapter 4 Computer Networks – Part 1
Wide Area Networks Vedant Saran. What is WAN?  A Wide Area Network(WAN) is a network that spreads over a large area such as office companies in different.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Week 12 (2012) Dr. Ghada Drahem. INTENDED LEARNING OUTCOMES This lecture covers: Networking concepts and terminology Common networking and communications.
Introduction to Computing Lecture # 11 Introduction to Computing Lecture # 11.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
A) Describe 3 benefits of a company moving to a wireless network compared to staying with its cabled network(3) b) Describe 2 problems that may occur (2)
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
Getting Online, Working Online
Wireless LAN Dr. Mohammad Rafiq Ahmad A. Al-Dossary
Network Concepts.
Wi-Fi Technology.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Network and hardware revision
LAN, WAN, and Network Topologies
Networking Objectives
Fundamentals of Information Systems, Sixth Edition
Virtual Private Networks (VPN)
Computer Networks Part 1
Ad-hoc Networks.
Wireless Fidelity 1 1.
Mobile &Wireless Computing
Communications and Networks Chapter 9 McGraw-Hill/Irwin
Virtual Private Networks (VPN)
Telecommunications, the Internet, and Wireless Technology
Introduction to Computers
EC-322 COMPUTER NETWORKS E.DIVYA, AP/ECE
Effectiveness of data transfer over wired and wireless media
CHAPTER 1 INTRODUCTION NETWORKING
Mitel Networks SX-200 ICP Sales Training Terminology.
Networking Lexi Becker Chapter is broke in two parts
Chapter 7 Connecting to the Internet
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Localization in WSN Localization in WSN.
Introduction to Computer Administration
Wi-Fi Technology.
VPN What, where, who, why when?.
NWC604COM Ubiquitous Computing
Differences between WSN & MANET By: Dana Alotaibi.
ICT Computing Lesson 4: Computing Network.
EUT 122 Skills and Technology in Communication
Wireless Ad Hoc Networks
Telecommunications, the Internet, and Wireless Technology
Online Learning.
Instructor: Mort Anvari
Vpn’s Virtual private network is a private network that extends across a public network or internet which enables people to send and receive data across.
Getting Online, Working Online
Practical Network Computer Science IT&CS Third Class part Mohanad Ali
Presentation transcript:

Wireless sensor network & Private mobile computer By: Safia Ali Al-Masoud

Outlines WSN Definition WSN Application WSN advantages & disadvantages Private mobile computer Devices of Private mobile computer Limitations of Private mobile computer Private mobile computer Advantages & Disadvantages Outlines

Wireless sensor network (WSN) Wireless sensor network (WSN) is a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location.

Area Monitoring. Health care monitoring. Air pollution monitoring. Forest fire detection. Application

Water quality monitoring Natural disaster prevention Landslide detection Water quality monitoring Natural disaster prevention Cont. app

Advantages Fixable to go through physical partitions. Avoids a lot of wiring. Can accommodate new device at any time . It can be accessed through a centralized monitor.

Disadvantges Easy for hackers to hack a network Costly at large Life of nodes Energy life Gets distracted by various elements Low speed of communication

Wireless sensor network (WSN)

Mobile Private Network Mobile Private Network (MPN) is a service that provides an efficient & secured point-to-point data connectivity between mobile devices or terminals into one private network mobile network.

Benefits of mpn Outside gatherings can't get to your information while it is being transmitted. The information trade is totally private and isolated from the Web. With a devoted system asset, MPN can give a quick and dependable access to business programming, database or terminals, making it a perfect stage for continuous cooperation.

cont.benfit Companies are able to connect to their employees using the corporate network, as long there is mobile data connection. It also enables terminals such as POS machines to be truly mobile via a highly secure private connection.

Advantages High Security level Upgraded System Execution Intranet availability anyplace Advantages

Disadvantages Costs - new technologies and devices are often costly to purchase and require ongoing maintenance and upkeep. Workplace distractions - as the range of technologies and devices increases, so does the potential for them to disrupt productivity and workflow in the business.

How it work Mobile Private Network (MPN) enables the exchange of data between mobile devices or terminals through mobile network With a static IP and a dedicated APN (Access Point Name) assigned to each SIM card, the communication between devices is private and secure via intranet, separating the private APN from the other public APN, directly connecting the SIM to client’s servers.

Cellular phones, communication gadgets which can call from a separation through cell organizing innovation. Wearable PCs, for the most part restricted to practical keys and essentially expected as consolidation of programming operators, for example, wrist trinkets, keyless inserts, and so forth. Devices

Cont. dev Cellular phones, communication gadgets which can call from a separation through cell organizing innovation. Wearable PCs, for the most part restricted to practical keys and essentially expected as consolidation of programming operators, for example, wrist trinkets, keyless inserts, and so forth.

Limitations Range and bandwidth: Mobile Internet access is generally slower than direct cable connections, using technologies such as GPRS and EDGE. Transmission interferences: Weather, terrain, and the range from the nearest signal point can all interfere with signal reception.

References Wikipedia, Wireless Sensor Network URL: https://en.wikipedia.org/wiki/Wireless_sensor_network Mobile Private Network URL: https://www.robi.com.bd/new- business-page/mobile-private- network?lang=eng#qxlxOYhRXJXgD0uy.97 Difference between Wireless Sensor Networks and Wireless ad hoc Networks URL: https://zaidmufti.wordpress.com/2016/09/09/difference- between-wireless-sensor-networks-and-wireless-ad-hoc- networks/