Smart Doorbell iOS Application By: Ilke Uygun Supervisor: Paul Barry Date: 23 / 02 / 2011.

Slides:



Advertisements
Similar presentations
Eclipse, M2M and the Internet of Things
Advertisements

Eclipse, M2M and the Internet of Things
Network Systems Sales LLC
Enabling the Full Potential of Convergence Confidential SDK 4.4: Software Development Kit LiteScape SDK 4.3 Applied for Gadget development.
XProtect ® Professional Efficient solutions for mid-sized installations.
BrightAuthor v3.7 software and BrightSign XD v4.7 firmware
Gateway Agent Product & Architecture
CAPANINA Multimedia Applications Demo Specifications for Trial 1 Milan Lalovic Wireless Networks, BT Exact.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Building Mobile Apps in the Cloud – Comparing Approaches.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Tax Refund Calculator iPhone app By:Tuna Erdurmaz Date: 12 th of February 2010 Supervisor: Paul Barry.
Location based Streaming Topics for our 1 st presentation  Thesis Description  Positioning System  Streaming over positioning  Questions Session.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Wireless Audio Conferencing System (WACS) Mehmet Ali Abbasoğlu Furkan Çimen Aylin Deveci Kübra Gümüş.
CMPTR1 CHAPTER 3 COMPUTER SOFTWARE Application Software – The programs/software/apps that we run to do things like word processing, web browsing, and games.
Wireless Audio Conferencing System (WACS) Mehmet Ali Abbasoğlu Furkan Çimen Aylin Deveci Kübra Gümüş.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Optimize tomorrow today. TM 1 Optimize tomorrow today. Arlene Minkiewicz, Chief Scientist PRICE Systems, LLC Software.
Performed by: Gadi Marcu & Tomer Alon Instructor: Erez Zilber המעבדה למערכות ספרתיות מהירות High speed digital systems laboratory הטכניון - מכון טכנולוגי.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Android vs iOS vs Windows Phone 7 Alejandro Mesa (am3473)
DCP: The Datagram Control Protocol Eiman Zolfaghari E190 – Technical Communications Professor Hatton April 2002.
IP Camera Security System Dallan Byrne th Electronic and Computer Engineering 2007 Supervisor: Fergal O’ Malley.
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
Rob Williams Program Manager Microsoft Corporation.
Application Layer. Applications A program or group of programs designed for end users. A program or group of programs designed for end users. Software.
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Supervisor: Erez Zilber Semester:Spring 2004 Characterization Presentation.
Mobile Voice Mate Final Presentation H.T.M. Gamage F.
Distributed Software Development Requirements Definition and Design Description Presentation : Live TV Customers : Damir Isovic.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Interconnection Protocol Mustafa Kara Term Work.
Berlin, Björn Schwarze.
© 2012 IBM Corporation IBM Israel Software Lab (ILSL( Daniel Yellin, Director March 2013.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
How to find a great project idea Randy Guthrie – Microsoft Academic Developer Evangelist.
Sensors and Actuator Network Based Architectures and Protocols for Smart Homes Bluetooth enabled Smart Home Mark Shaw Giorgio Politano Supervisor: Mieso.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Daniel Johnson. Playing a media file stored on a remote server on a local client.
L INUX - BASED A IRPLAY S TREAMER AND R ECEIVER September 13rd, 2011.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Technovation Lesson: Effective Presentations Week 10.
1 DOI for eBooks: What are we identifying? Steve Mooney Sophia-Antipolis, France 22 JAN 01.
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
Folio3 IPhone Training Session 1 Presenter: Imam Raza.
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
Internship Experience
1 Multimedia Services Service provider Service client Service registry Publish Find/discovery Bind Multimedia Services Framework and architecture.
Developing TCP/IP-based Server Applications using Indy Components  Christian Wilkerson.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Fire detection portfolio Background for FX  FZ 2013_11_306:EP.
HOME SECURITY SYSTEM Senior Design 1 Fall 2015 [1]
Azam Supervisor : Prof. Raj Jain
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
IFT Proposal Changes Since Atlanta. Feedback During and after Atlanta Adaption indication for TCP is a requirement (SCTP is example). It is desirable.
ISecurity End of Semester Presentation November 29, 2012.
1. ◦ Intro ◦ Client-side security ◦ Server-side security ◦ Complete security ? 2.
Java’s networking capabilities are declared by the classes and interfaces of package java.net, through which Java offers stream-based communications that.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
WHERE TO TRAVEL Capstone Project. Content Introduction Project Management Plan Requirement Specification Design Description Implementation Testing Summary.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Internet Socket Programing
Introduction to Networking
IOS Development Atanas Dobrev.
RTP and RTSP Realtime Transport Protocol
The Internet of Things (IoT) from the back-end perspective
Director, Synon/2 Development
Report from the trenches of an HTML5 game provider
Villas, appartments, residence
Presentation transcript:

Smart Doorbell iOS Application By: Ilke Uygun Supervisor: Paul Barry Date: 23 / 02 / 2011

Evolution of the Idea Mr. Damien Hughes The client, who came up with the idea. Edmund 4 th Year Electrical Eng. Student, working on the hardware side (developing the custom embedded system) SmartDoorbell iOS Application23/02/112

Brief Description of SmartDoorbell SmartDoorbell iOS Application The purpose of SmartDoorbell: Provide control to the user, independent of place. Introduce extra security The project components: Custom hardware embedded to the door iPhone App 23/02/113

Similar Products in Existence Eircom Phonewatch Similar home security & surveillance system. SmartDoorbell iOS Application Viper SmartStart Similar approach App talking to an embedded system. Great opportunity in the market because it is unique. 23/02/114

Software Development Method Evolutionary Prototyping ICONIX Method (subset of Unified Process) SmartDoorbell iOS Application23/02/115

Work Completed So Far The Basic Application is implemented and tested properly. Network Design:  Server / Client model.  Sockets used.  For communication TCP is implemented. SmartDoorbell iOS Application23/02/116

SmartDoorbell in action SmartDoorbell iOS Application23/02/117

Major Technical Challenges Network Design & Programming What would I have done different if we go back to September? SmartDoorbell iOS Application Overall state = Satisfactory 23/02/118

Work Still Have To Do Right now Injecting sensors to the system. (This time implementing UDP) Next iterations: Audio communication (Adding microphones & speakers to the prototype) (UDP) Video communication (Adding IP Cameras to the prototype) (UDP) Web System to log the operations SmartDoorbell iOS Application23/02/119

Problems Still To Solve Haven’t started yet but should have? The push notifications SmartDoorbell iOS Application23/02/1110

Technology Options / Discussions iOS Development Technologies: Xcode: The IDE of Apple. (IB for GUI design, Simulator to test) Objective-C: The mandatory programming language to develop native iOS/ Mac applications. Basically, it is super-set of C. Network Programming Technologies SmartDoorbell iOS Application23/02/1111

Potential Challenges A major issue is security. We have to implement our own protocols on top of TCP & UDP to encrypt the streams so that it is protected. A hacker sneaking into user’s cameras can be a big problem. There has to be no gaps in the system. SmartDoorbell iOS Application23/02/1112

Any Questions? SmartDoorbell iOS Application23/02/1113 “Stay Hungry, Stay Foolish…”