Internet Accessible Home Control Team 61. Team 61 Members Brandon Dwiel, Project Manager Sammi Karei Brandon McCormack Richard Reed Anthony Kulis Dr.

Slides:



Advertisements
Similar presentations
StreamBlade SOE TM Initial StreamBlade TM Stream Offload Engine (SOE) Single Board Computer SOE-4-PCI Rev 1.2.
Advertisements

EEE436 / CS422 Final Presentation Group
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
Network Layer and Transport Layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Embedded Network Controller with Web Interface Bradley University Department of Electrical & Computer Engineering By: Ed Siok Advisor: Dr. Malinowski.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
1 Java Networking – Part I CS , Spring 2008/9.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
ECE 4220 Real Time Embedded Systems Final Project Presentation Spring 2014 University of Missouri Columbia By: Michael Brauch Temperature Data Logger.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
PIC Evaluation & Development Board Project Team Chad Berg – CprE Luke Bishop – CprE Tyson Stichka – EE Nick Veys - CprE Financial Budget Abstract/Background.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Networking Components Chad Benedict – LTEC
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Hands-On Microsoft Windows Server 2008
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Midterm Review - Network Layers. Computer 1Computer 2 2.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
DEC0905 Remote Control of Home Appliances ABSTRACT The objective of this project is to enable users to remotely control home appliances and systems over.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
CINEMA’s UbiComp Subsystem Stefan Berger and Henning Schulzrinne Department of Computer Science Columbia University
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Managing Windows Server 2008 R2 Lesson 2. Objectives.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Course Presentation EEL5881, Fall, 2003 Project: Network Reliability Tests Project: Network Reliability Tests Team: Gladiator Team: Gladiator Shuxin Li.
CHAPTER FOUR COMPUTER SOFTWARE.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Version 3.0 Module 11 TCP Application and Transport.
Statistics Monitor of SPMSII Warrior Team Pu Su Heng Tan Kening Zhang.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Computer Emergency Notification System (CENS)
1 Electronic Messaging Module - Electronic Messaging ♦ Overview Electronic messaging helps you exchange messages with other computer users anywhere in.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
Smart Parking System PREPARED BY : GHADEER AQRAA AND MARAH JABER.
Logic Analyzer ECE-4220 Real-Time Embedded Systems Final Project Dallas Fletchall.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
Linux Operations and Administration Chapter Eight Network Communications.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
COMPUTER NETWORKS Hwajung Lee. Image Source:
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Fermilab Scientific Computing Division Fermi National Accelerator Laboratory, Batavia, Illinois, USA. Off-the-Shelf Hardware and Software DAQ Performance.
Architecture Review 10/11/2004
Data Networking Fundamentals
Chapter 3: Windows7 Part 4.
Presentation transcript:

Internet Accessible Home Control Team 61

Team 61 Members Brandon Dwiel, Project Manager Sammi Karei Brandon McCormack Richard Reed Anthony Kulis Dr. Haibo Wang, Faculty Technical Advisor

Presentation Outline Executive Summary Subsystems ◦ Graphical User Interface ◦ Peripheral Hardware ◦ Low-Level Software ◦ Processing Core ◦ High-Level Software Video Demonstration Implementation Timeline Summary

Executive Summary The Internet Accessible Home Control System is a working prototype of an intelligent home system Integration of home components into one controllable system More modules can be developed and added to the system to provide extra functionality Each module is plug and play

Subsystems Graphical User Interface Peripheral Hardware Low-Level Software Processing Core High-Level Software

Graphical User Interface

Configuration

Graphical User Interface Key Code

Subsystems Graphical User Interface Peripheral Hardware Low-Level Software Processing Core High-Level Software

Peripheral Hardware Subsystem Includes Necessary Hardware Used to Gather and Transmit Data for the IAHC Components ◦ Single Board Computer ◦ Infrared Sensors ◦ Keypad

Subsystem Components Single Board Computer (SBC) ◦ Technologic Systems TS-7300 ◦ 200MHz ARM9 microprocessor ◦ 32MB SDRAM ◦ Debian Linux Distribution ◦ 55 Digital I/O lines ◦ Ethernet ◦ SD Card slots

Subsystem Components Sensors ◦ “Eyes” of the IAHC ◦ Detects human movement ◦ Three AMN11112 Infrared Radiation (IR) sensors provide 180 degree coverage ◦ 100 degree horizontal viewing angle ◦ 16 ft max detection range ◦ Communicate through I/O ports on SBC

Subsystem Components Keypad ◦ 16 Button ◦ Matrix Keypad ◦ Enter ‘A’ to initiate Key Code Session, then four digit pin

Peripheral Hardware Block Diagram

Future Development Less Expensive SBC Sensors with smaller viewing angle

Subsystems Graphical User Interface Peripheral Hardware Low-Level Software Processing Core High-Level Software

Low-Level Software Subsystem Provide Software to Enable the Processing Core to Communicate with the Peripheral Hardware

Subsystem Components Sensor Circuitry ◦ Overcome Pull-Up Resistors on SBC ◦ Small Enough to be Housed with Sensors

Subsystem Components Software ◦ Each Level Should Only Interact With the Adjacent Level

Software DAQ is the Main Executable ◦ Communicates with the Hardware Through Keypad and Sensor Software

Software The Keypad Software Uses the API Provided by the GPIO Driver Responsible for Recognizing the Entered Keycode Sensor Software Does Everything Involved with Reading from the Sensors

Software GPIO Driver Software is the Only Software that Directly Interacts with the Hardware Provides an API to Allow Interaction Between the Keypad and Sensor Software and the Hardware

Software Flow Chart

Future Improvements Expansion for more Sensors

Subsystems Graphical User Interface Peripheral Hardware Low-Level Software Processing Core High-Level Software

Processing Core Collects module data Manages connections to other components Uses that data to decide what actions need to be taken

Processing Core Implemented using Erlang Listens over a sockets Multi-process design

Processing Core Socket Manager Listens over TCP socket for modules Break packets into manageable parts Send out updates to other processes

Processing Core State Manager Keeps track of what is going on in system Handles requests for data from other processes Tells Rule Manager to reevaluate

Processing Core Rule Manager Stores the current rules the system is using Evaluates the rules to see if action should be taken Takes any actions needed

Processing Core Future Improvements Increase ability to handle new and different conditions and actions Improve ability to work with many modules

Subsystems Graphical User Interface Peripheral Hardware Low-Level Software Processing Core High-Level Software

High-Level Software Subsystem Operates within the Debian Linux environment Main Purposes Control SBC Administration

Subsystem Layout The network interface application has been named the System Information Server (SIS) ◦ Written in the scripting language called Python which is derived from the secure and robust language called Lisp ◦ Restricted to being a simple network interface ◦ Upon successful call, the SIS “hands off” the actual control/information processing to separate applications

SIS White Listed Access Using if/elif/else commands, the SIS compares calls to the white list, passing acceptable calls, and rejecting bad ones

Control 3 Main Control Calls 1.Text Message 2.Audible Alert 3.Reboot

Text Messaging Steps to generate Text Messages 1. SIS receives Text Message control call 2. SIS calls Messaging Script 3. Messaging Script instantiates client called Mutt using prebuilt text files containing the body of the message and phone numbers targeted for delivery 4. Mutt passes compiled message to onboard SMTP MTA called MSMTP for delivery to SMTP Server (eg smtp.gmail.com) 5. SMTP Server delivers to cellular provider, transforming into SMS Protocol.

Audible Alerts Steps to create Audible Alerts 1. SIS receives Audible control call 2. SIS starts the script to generate a system auditory alert 3. The Audible script instantiates the binary called Beep with proper arguments for frequency, duration, and repetitions

Reboot Steps for Reboot Control 1. SIS receives Reboot control message 2. SIS instantiates the Reboot system binary

Administration Four Main Administration Functions 1.Configuration 2.IP Information 3.Host Name Information 4.System Logs

Configuration The SIS Configuration File is the SIS Help information call that displays the messages accepted by the protocol

IP Information The IP information call is a simple tool for the end user to locate the SBC on the network ◦ Especially useful for technical support reasons

Host Name The SBC host name has been set to a default of the SBCs MAC Address ◦ Provides the User Interface a quick and simple way to assign rules to a particular SBC if multiple modules are deployed

System Logs System Logs are vital administration tools that contain hardware diagnostics, software alerts, and user information

SIS Future Development Message Confidentiality Algorithms Message Authentication Algorithms Partial Control and Partial Administration start up options

Video Demonstration

Implementation Timeline Weeks Prepare To Present to Users Begin user Testing Finalize Launch Capabilities Second Round User Tests Internal Load Testing Final round of user tests Finalize hardware design Finalize Software

Cost Breakdown Total Prototype Cost: $419.70

Summary Inexpensive modular home control systems will become increasingly prevalent Our prototype provides a working system from which to build a consumer model

Questions?