ATTIC BOULDERING IN ACTION Brandon Powell EKU Technology department EET 499 CET/CEN Capstone project 2009.

Slides:



Advertisements
Similar presentations
SUPERCOMPUTER TO THE RESCUE Justin Curry EKU, Dept. of Technology, CEN/CET)
Advertisements

5-Network Defenses Dr. John P. Abraham Professor UTPA.
Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
MICROCONTROLLED HOME Keith Jones EKU Deparment of Technology CEN.
Trojan Horse Program Presented by : Lori Agrawal.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Introduction to Systems Architecture Kieran Mathieson.
Chapter 9: Troubleshooting and Repairing Networking.
Wireless Networking By Brian Bogue. Change Access Password.
Home Media Server With PLEX 499 CAPSTONE SPRING 2014 MATTHEW MARRS EASTERN KENTUCKY UNIVERSITY.
Parts of a Computer.
Unmanned Surveillance Tank Frederick Guilfoil Eastern Kentucky University Dept. of Technology, CEN 499.
PI : TV A PI MEDIA CENTER Michael Hoskins Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
OUTLINE  Motivation  Introduction  Problem Statement  Assumptions  Proposed Solution  Results  Conclusions  Future Work  References  Acknowledgements.
Stephen Riddle (EKU, Dept. of Technology, NET program) Presented by: Stephen Riddle.
IT Tech Recording and Virtual Machines Doug Waterman.
Microcontroller Based Wireless Camera Security System John Saylor Computer Electronic Networking.
FRONT DOOR MONITOR Tremayne L. Perkins EKU Dept of Technology, CEN/CET.
Micro Controlled Cabin Lights Ron Acker EKU Dept. of Technology, CEN/CET.
MICROCONTROLLER BASED PARKING GARAGE Kevin Reynolds EKU, Dept. of Technology Computer Electronic Networking.
SET UP A SOHO SERVER AND NETWORK: THE BASICS Tony Hancock (NET 2012 Capstone. EKU) Presented by: Tony Hancock.
Homeland Security System Danny Butler EKU, Dept. of Technology.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
THE WOK ANTENNA Charles C. Noe EKU_CEN_Capstone2009.ppt.
GROUP INVOLVED IN A WEB APPLICATION DEVELOPMENT Continue.
Active Home Timmy Henery Affiliation EKU, Dept. of Technology.
Random Encryption Program Patrick Lowe EKU - Department of Technology CEN.
PHP MYWIKI Brian Casey Eastern Kentucky University.
Motoring a Web Cam By Kevin Papreck. Definition & Requirements I had to develop a two-axis web cam that can be controlled over the internet. Along with.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
PERSONAL INTERACTIVE COMPUTER NETWORK TECHNOLOGY BASED SUPPORT Christopher E. Lang Computer Electronic Networking Dept. of Technology Eastern Kentucky.
ALL CAPS TITLE Presenter’s Firstname Lastname Affiliation (such as EKU, Dept. of Technology, CEN/CET)
Bowling Alley Communications Mark Patterson EKU Dept. of Technology, CEN.
CIS CORPORATION CORBIN, KY SUMMER 2007 WALTER WAHLSTEDT CIS Internship.
MOVIE TERMINAL APPLICATION Michael Disney EKU, Dept. of Technology, CEN/CET.
Modular Automation Training System Jeremy Hiler & Cristy Jones Eastern Kentucky University Department of Technology CEN/Industrial Tech CE/Computer Science.
SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Firewall Security.
Altiris ® as a Remote Deployment Solution Wesley Chitwood EKU, Dept. of Technology, CEN/CET.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
HOME AUTOMATION: WEB BASED CONTROL Anthony Campbell Eric Poynter EKU, Dept. of Technology Computer Electronic Networking.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
ALL CAPS TITLE Presenter Name Affiliation (University)
Managing Devices Lesson 5. Objectives Objective Domain Matrix Technology SkillObjective Domain DescriptionObjective Domain Number Connecting Plug-and-Play.
Master/Slave networking configuration Alan Maynard Computer Electronic Networking.
SOLARPACKING Mitch Vernon Eastern Kentucky University.
LINUX CLUSTERING USING OPENMOSIX Jose Matthews Computer Electronic Networking, EKU College of Business and Technology.
ALL CAPS TITLE Group Name Presenter Names Affiliation Information.
MY NETWORK TAP Richard Elswick Easter Kentucky University.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Home Security Cameras Emmanuel Payton EKU Dept of Technology CEN/CET.
ALL CAPS TITLE Source Author Name(s) & Affiliation (University/Lab/Company) Presented by: Your Group Name & Member Names.
G046 Lecture 04 Task C Briefing Notes Mr C Johnston ICT Teacher
HOME AUTOMATION Robert Brandenburg EKU, Dept. of Technology, CEN/CET.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NUR IZZATI BINTI AHMED AZMAN TSK 1.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Jordan Terry Eastern Kentucky University
Clinton A Jones Eastern Kentucky University Department of Technology
ALL CAPS TITLE Source Author Name(s) & Affiliation (University/Lab/Company) Presented by: Your Group Name & Member Names For the final capstone presentation.
NSE4-5.4 Dumps
مقدمة في الحاسب الآلي T. Arwa Alsarami.
Networks Software.
HOME AUTOMATION: WEB BASED CONTROL
SUSPICIOUS ACTIVITY DETECTION
24/7/365 Remote Computer Support
IP Control Gateway (IPCG)
Presentation transcript:

ATTIC BOULDERING IN ACTION Brandon Powell EKU Technology department EET 499 CET/CEN Capstone project 2009

2 Outline Motivation Introduction Problem Statement Proposed Solution Results Conclusions Future Work

Motivation My good friend (and Landlord) likes to boulder Bouldering: the sport of rock climbing on large boulders or low cliffs He built a bouldering wall in our attic When we climb and want to take pictures, it becomes a hassle and we don’t always capture the action 3

4

Introduction Webcam’s and webcam software have been increasing in popularity While normally used for security reasons, they have many functionalities I researched Capture software Network storage capabilities Remote administration 5

Software Researched Camlan Camuni Camzoomer iCatcher Netobserve uViewIt Wcapture Webcam tracker live 6

Software Researched Settled with Windows Server 2003 Dorgem Real VNC Linksys backup software 7

Problem Statement How do I get a webcam to take pictures for me in close proximity while climbing? How do I access those pictures anywhere on the network? How to I maintain the server when it’s in the attic without input devices? 8

Proposed Solution Steps taken to solve the problem Brainstorming Proposed solution with justification Arranging for software/hardware Assembly Testing & troubleshooting Verifying results 9

Server Box 512 megabytes RAM 60 gigabyte HD DVD-rom Logitech QuickCam cmmunicate STX (1.3 MP) AMD processor Gigabyte wireless PCI card Gigabyte K8 Triton Mobo 10

Router and Network Storage Linksys WRVS4400 V 1.1 Wireless-N Gigabit Router Linksys NAS 200 Network Storage System Used DMZ 11

DMZ Placed into its own sub network in order to protect the rest of the network if an intruder was to succeed Hosts in the DMZ to provide services to both the internal and external network, while an intervening firewall controls the traffic between the DMZ servers and the internal network clients 12

13

Results Everything worked as planned! Plenty of glitches I had to work out though 14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

Video 38

Conclusions Significance of results Back up your pictures over the network Activities which you want pictures of, but have no one to actually take the pictures are now possible Set up the camera at a party and capture throughout the evening Other possibilities 39

Conclusions Learning experience How to use DMZ How to use motion detection How to use a network storage device How to remotely connect throughout the network 40

Future Work Possible extensions Better webcam for more quality images Recording video and images Other ways to utilize the network storage device Any Suggestions?? 41

References how-to-use-your-pc-and-webcam-as-a- motion-detecting-and-recording- security-camera/ how-to-use-your-pc-and-webcam-as-a- motion-detecting-and-recording- security-camera/ roducts/NAS200 roducts/NAS200 42

Thanks 43