How to Determine the Position of a GPS Device
|
|
- Sabina Wade
- 3 years ago
- Views:
Transcription
1 Possibility to apply a position information as part of a user s authentication Abstract David Jaroš, Radek Kuchta, Radimir Vrba jarosd@feec.vutbr.cz; kuchtar@feec.vutbr.cz; vrbar@feec.vutbr.cz Faculty of Electrical Engineering and Communication Brno University of Technology Brno, Czech Republic This paper describes basic possibilities of applying position information for the user authentication. There are described available methods for determining position with using Global Position System, Bluetooth and Wi-Fi wireless networks and also IQRF non standard communication network. A user authentication device developed for the secured authentication is described. Keywords: GPS, authentication, position, Bluetooth, Wi-Fi. 1 Introduction Authentication and authorization are asked almost everywhere in the today s world. People must be identified when they download s, read newspaper over the Internet, fill out forms for the government, access company private information, etc. For the user authentication some private credentials are usually required. In many cases users are using their unique identification number or username, and password. If one of these values is wrong, new enter is required. If more than selected number of attempts has been done, user s account is locked. This described scenario is insufficient and some extra information is required for many situations and systems. The paper describes new possibility of using position data as one of the authentication information. When an information system has information about authenticated person s position, it can change access rights or show only part of accessible data. There is more than one possibility how to get position. In all of them authenticated user has to have own identification device with position information. The authentication device can use different methods to determine current position. One of the possibilities is using GPS (Global Position System) or planed Galileo - European satellite navigation system. In this case, identification device is using satellite communication to obtain right position. The other chance is using company wireless network. In this case identification device is wirelessly connected to the selected wireless access point. There is possible to use Wi-Fi or Bluetooth wireless communication network. In all described contingencies the identification device could be a GSM cellular phone. So user doesn t need any special device, it only needs software implementation and because cellular phone is connected to the GSM network, it is also other chance to find position. Security and Protection of Information 009 3
2 Position determination When position of a subject in the space is needed to know three basic conditions have to be fulfilled. First, the space where the subject is found should be described. The most often coordinates are used to describe of the space [3]. Secondly, enough of anchor points with known position have to be had. And finally, distance between the subject and anchor points have to be found. Number of used anchor points depends on dimension of the space [1]. Example for two dimensional system is depicted in Figure 1. General equation used for position determination is ( x = r m) + ( y n), (1) where m and n are coordinates of the centre of a circle (position of an anchor point), x and y are coordinates of points on the circle (possible position of the subject) and r is radius of the circle (distance between the anchor point and the subject). Then we can get equation system for getting position of our subject [4] ( x 6) + ( y 14) = 5,83 () ( x 7) + ( y 7) = 5,65 ( x 17) + ( y 11) = 6 x = 11; y = 11 When equation system is solved, coordinates of position of the subject will be gotten (for our example 11,11). Figure1: Position determination with three wireless connection access points. 4 Security and Protection of Information 009
3 3 Global Position System GPS (Global Position System) was developed by the United States Department of Defense. It is a satellite based navigation system. First GPS were used just for military objectives. Presently GPS is used in public sector and it is for free. Whole main system consists of transmitters that orbit earth and receivers that process specially coded signal from transmitters (satellites). Around the earth orbit 4 satellites in standard case. Satellites orbit in six equally spaced orbital planes. For determination actual position of receiver, receiver needs to determine signal from at least four satellites (3 - dimensional space). Distance between receiver and transmitter (satellite) is calculated using known delay of signal [8]. Transmitted signal contains coded time stamp, time when signal has been transmitted. When the signal is received, time delay is calculated. For this reason clocks in the transmitter and receiver must be very accuracy and synchronized. Transmitter contains atomic clock and accuracy time for receiver is calculated from several received signals. From known delay and known propagation speed of the signal distance between transmitter and receiver could be calculated. For calculating actual receiver position we need to know position of satellites. This information is transmitted with time stamp and is coded in signal, called ephemeris. Whole principle can be depicted in Figure. Figure : Principle of GPS system. 3.1 Features of standard OEM GPS module Nowadays GPS modules [6] offer up to 50 channels, they could receive signal from 50 satellites at the same time. They use various methods for fast fix, first fix can take under 1 second. Position update rate can be 4 Hz. Communication between GPS module and target application is provided by standard serial buses (UART, SPI, IIC, USB) and commonly by protocol NMEA 0183 [7].On the market is wide range of manufacturers of OEM GPS modules (u-blox, sirf, navsync ). Security and Protection of Information 009 5
4 4 Bluetooth Bluetooth is wireless technology that was designed for exchanging data or voice signal over short distances. Bluetooth use ISM (industrial, scientific, medical) unlicensed bandwidth,4 GHz. Range of Bluetooth is divided to 3 classes dependent on maximum permitted power. Maximal range is 100 m for class 1 with maximum permitted power 100 mw. Data rate for Bluetooth version.0 is up to 3 Mbps with EDR (Enhanced Data Rate) [9], [10]. Bluetooth can be used also for roughly localization of devices with this technology. In the area where we do localization must be a number of devices with known position (Access Points). Accuracy of determinate position is dependent on density of access points and their classes or maximum power. Accuracy is proportional to area where is localized device probably found. Situation can be described by Figure 3. In the first case the area of possible position is formed by circle area of range. For this reason it is better to use AP s with smaller range (class, 3), but in the other hand it is increasing probability not to localize the device. In the second case localized device is in ranges of both access points, so it is able to reduce possible position to area that is common for each range. Figure 3: Bluetooth localization. Bluetooth method of localization can be useful for smaller area with high density of APs with short range, for example in factory area. Variety of following cases can be derived from this simple method. [] It is possible to combine this way of localization with the other wireless technologies like Wi-Fi, Zigbee or IQRF [5]. 5 Authentication device For described methods of position determination some user device is needed. In the global model, identification with position information can be described as in Figure 4. In this sequence diagram, two 6 Security and Protection of Information 009
5 main objects are available. The first one is a user s authentication device; the second one is an authentication server. There are two main steps also. In the first step user s credentials are sent to the authentication authority. If user is known and fulfils all requirements, authentication authority will ask authentication device for the position information. If the user is in the selected range, he will be authenticated. It is a basic scenario that can be used for user s authentication with position information. In the previous paragraph some basic possibility of using position information is described, in this part the easiest version of the authentication device is described. Block diagram of the first generation of the user authentication device connected to the user terminal is shown in Figure 5. User is using user terminal to connect to the authentication server in this scenario. This terminal is interconnected with the user authentication device via USB data bus. Described authentication device consist of central processor unit and secured data repository, where user s credentials are stored. To start authentication process user has to unlock the device. In this case keyboard is used to enter input password. The authentication device is connected to the user terminal over the USB. There is a software tool that allows interconnection between the user authentication device and the authentication server on the client terminal. If user is using standard computer without installed software or public computer, the authentication device also contains alphanumeric display where authentication instructions are shown. Thus, web access can be used for the user s authentication. Authentication device also contains finger print reader which can fill keyboard authentication or can increase security features. User Authentication device Authentication server Zpráva1 Hello Hello, I'm server XYZ. Who are you? I'm user ABC. Authentication failed I don t know you. Bye. Internal authentication process Hello user ABC. Where are you? Position Create user Authenticated user Authentication failed You re out of allowed range. Bye. You ve been authenticated. Position check Figure 4: Communication sequence used for user authentication with position information. Security and Protection of Information 009 7
6 Figure 5: The user s authentication device connected over the user s terminal to the authentication server. 6 Feature work We are on the beginning of our work now. Some basic communication tests have been done and the first version of the authentication device has been developed. This device is using Global Position System to get information about the current position. In the next step we plan to create software tool for standard cellular phone with integrated GPS chip. The second generation of the authentication device will contain sophisticated software and wireless communication hardware. This configuration will allow connection to the company network over the Bluetooth and Wi-Fi access points. In this scenario authentication authority will connect to the authentication device over the wireless network with known topology. 7 Conclusions The basic possibilities of user authentication enhanced with position information were described in this paper. The basic version of the user authentication device was also described. The device is using GPS for the position determination. Also other possibilities of wireless networks for position determination were described. The main aim of this paper was to give review of potentiality integration user position information to the authentication process with using user authentication device. 8 Acknowledgement This research and the paper has been supported by the Czech Ministry of Education, Youth and Sports in the frame of MSM MIKROSYN New Trends in Microelectronic Systems and Nanotechnologies Research Project, and partly in C0800 Project - KAAPS Research of Universal and Complex Autentification and Authorization for Permanent and Mobile Computer Networks, under the National Program of Research II. 8 Security and Protection of Information 009
7 Reference [ 1 ] MONAHAN, Kevin, DOUGLASS, Don. GPS Instant Navigation : A Practical Guide from Basics to Advanced Techniques. nd edition.: Fine Edge Productions, s. ISBN [ ] BRUCE, Walter, GILSTER, Ron. Wireless LANs End to End.: Wiley, s. ISBN [ 3 ] CUTLER, Thomas J. Dutton's Nautical Navigation, s. ISBN X. [ 4 ] LARSON, Ron. Geometry. : Houghton Mifflin Harcourt, s. ISBN [ 5 ] GISLASON, Drew. Zigbee Wireless Networking., s. ISBN [ 6 ] DYE, Steve, BAYLIN, Frank. The GPS Manual: Principles & Applications. Baylin/Gale Productions, s. ISBN [ 7 ] LARIJANI, L. Casey. GPS for Everyone : How the Global Positioning System Can Work for You. Amer Interface Corp, s. ISBN [ 8 ] MICHAEL, Ferguson, RANDY, Kalisek, LEAH, Tucker. GPS Land Navigation : A Complete Guidebook for Backcountry Users of the NAVSTAR Satellite System. Glassford Publishing, s. ISBN [ 9 ] ROSS, John. The Book of Wireless : A Painless Guide to Wi-Fi and Broadband Wireless (Paperback). No Starch Press, s. ISBN [ 10 ] BAKKER, Dee M., GILSER, Diane McMichael. Bluetooth End to End, s. ISBN Security and Protection of Information 009 9
Multifactor Authentication Device
ICONS 011 : The Sixth International Conference on Systems Multifactor Authentication Device Jaroslav Kadlec, Radimir Vrba, Radek Kuchta Faculty of Electrical Engineering and Communication Brno University
More informationWireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
More informationZigbee-Based Wireless Distance Measuring Sensor System
Zigbee-Based Wireless Distance Measuring Sensor System Ondrej Sajdl 1, Jaromir Zak 1, Radimir Vrba 1 1 Department of Microelectronics, Brno University of Technology, FEEC, Udolni 53, 602 00 Brno, Czech
More informationTechnical Article Developing Software for the CN3 Integrated GPS Receiver
Technical Article Developing Software for the CN3 Integrated GPS Receiver 1 Intermec Technologies Table of Contents INTRODUCTION... 3 AN OVERVIEW OF GPS TECHNOLOGY... 3 What is GPS?... 3 How GPS works...
More informationChapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
More informationDiscovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
More information1) No configuration is necessary in ZDMC nor in RescueNet Field Data Configuration.
The intent of this document is to provide the reader with the following information pertaining to uploading case files from the X Series to TabletPCR and: General Safety Tips regarding the setup and uploading
More informationGIS Receiver. Zenith02 Zenith 05-S Zenith 05-D
GIS Receiver Zenith02 Zenith 05-S Zenith 05-D ZENITH 02-05 The perfect field and office tools for maintaining your GIS whether you are working for a utility company, local government, federal agency, ensuring
More informationReal Time Tracking In Wireless Network Using Gps/Avl
Real Time Tracking In Wireless Network Using Gps/Avl M. Satheesh Kumar Saveetha University Abstract: The Paper entitled as Real Time Tracking in Wireless Network Using GPS/AVL. The main Objective of this
More informationMobile Tracking Application
Mobile Tracking Application Radhika Kinage 1, Jyotshna Kumari 2, Purva Zalke 3, Meenal Kulkarni 4 Student, Department of Computer Technology, Yeshwantrao Chavan College of Engineering, Nagpur, Maharashtra,
More informationDesign of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2
Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 1 PG Student (M. Tech), Dept. of ECE, Chirala Engineering College, Chirala., A.P, India. 2 Assistant Professor, Dept.
More informationApplying Web Based GPS/GPRS Ticketing and Tracking Mechanism to Reduce Traffic Violation in Developing Countries
Applying Web Based GPS/GPRS Ticketing and Tracking Mechanism to Reduce Traffic Violation in Developing Countries Saed Tarapiah 1, Rajaa AbuHania 2, Islam Hindi 3, Diana Jamal 4 Telecommunication Engineering
More informationMobile Phone Location Tracking by the Combination of GPS, Wi-Fi and Cell Location Technology
IBIMA Publishing Communications of the IBIMA http://www.ibimapublishing.com/journals/cibima/cibima.html Vol. 2010 (2010), Article ID 566928, 7 pages DOI: 10.5171/2010.566928 Mobile Phone Location Tracking
More informationWiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013
WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection
More informationGTS-4E Hardware User Manual. Version: V1.1.0 Date: 2013-12-04
GTS-4E Hardware User Manual Version: V1.1.0 Date: 2013-12-04 Confidential Material This document contains information highly confidential to Fibocom Wireless Inc. (Fibocom). Fibocom offers this information
More informationGPS Based Low Cost Intelligent Vehicle Tracking System (IVTS)
2012 International Conference on Traffic and Transportation Engineering (ICTTE 2012) IPCSIT vol. 26 (2012) (2012) IACSIT Press, Singapore GPS Based Low Cost Intelligent Vehicle Tracking System (IVTS) Dr.
More informationUnlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi
More informationWireless The answer to all our communications needs?
Wireless The answer to all our communications needs? Introduction Since BT s last review of its leased lines back in 2003, there has been a concern in local government that analogue lines will go the way
More informationCHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
More informationFREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID
FREE VOICE CALLING IN WIFI CAMPUS NETWORK ABSTRACT: USING ANDROID The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local
More informationPropsim enabled Aerospace, Satellite and Airborne Radio System Testing
www.anite.com Propsim enabled Aerospace, Satellite and Airborne Radio System Testing Anite is now part of Keysight Technologies Realistic and repeatable real-time radio channel emulation solutions for
More informationAirMax4GW 4G LTE + WiFi Outdoor Gateway
4G LTE + WiFi Outdoor Gateway Solution Hardware Specification The is a standalone 4G LTE outdoor gateway that can distribute 4G or 3G Internet signal through WiFi or Ethernet connec ons. It is equipped
More informationFrom reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
More informationVehicle and Object Tracking Based on GPS and GSM
Vehicle and Object Tracking Based on GPS and GSM 1 Sonali Kumari, 2 Simran Ghai, 3 Bharti Kushwaha 1,2,3 Department of Computer Science, Dronacharya Group of Institutions, Greater Noida (U.P), India Abstract:
More informationLTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationResults of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform
Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform Dinesh Manandhar, Seiya Kawaguchi, Hideyuki Torimoto GNSS Technologies Inc., Japan
More informationImplementing M2M applications via GPRS, EDGE and UMTS. Klaus-Dieter Walter, M2M Alliance e.v., Aachen, Germany. E-mail: kdw@ist1.de. 1 What is M2M?
Implementing M2M applications via GPRS, EDGE and UMTS Klaus-Dieter Walter, M2M Alliance e.v., Aachen, Germany. E-mail: kdw@ist1.de 1 What is M2M? M2M is the abbreviated form of "Machine-to-Machine". The
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationTri-Band RF Transceivers for Dynamic Spectrum Access. By Nishant Kumar and Yu-Dong Yao
Tri-Band RF Transceivers for Dynamic Spectrum Access By Nishant Kumar and Yu-Dong Yao Presentation outline Introduction to WISELAB Active work at WISELAB Tri-band test bed Elements of the test bed Experimentation
More informationBroadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
More informationAccess Control Using Smartcard And Passcode
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676 Volume 4, Issue 5 (Jan. - Feb. 2013), PP 29-34 Access Control Using Smartcard And Passcode Omorogiuwa Eseosa 1., Uhunmwangho
More informationHello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
More informationWireless Internet. Is an system to provide connectivity to customers to the Internet. Service Provider (WISP) TECHNICAL INFO.
Description The Service Provider System (WISP) is an integrated Metropolitan Area Network (MAN) system of connecting customers to the. High-speed wireless data links are used to provide access on a point-to-point
More informationChapter 9 Communications and Networks
Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications
More informationInternational Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 6, June 2014
Real Time Wireless based Train Tracking, Track Identification and Collision avoidance System for Railway Sectors 1 R. Immanuel Rajkumar, 2 Dr.P. E. Sankaranarayanan, and 3 Dr.G.Sundari 1 Research Scholar,
More informationAccessing BlackBerry Data Services Using Wi-Fi Networks
Accessing BlackBerry Data Services Using Wi-Fi Networks 2007 Research In Motion Limited. All rights reserved. 2 of 7 Contents Introduction...3 Wi-Fi access to BlackBerry data services...3 Priority for
More informationBroadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
More informationComputer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
More informationEnterprise VoIP Services over Mobile Ad-Hoc Technologies
Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the
More informationAND8336. Design Examples of On Board Dual Supply Voltage Logic Translators. Prepared by: Jim Lepkowski ON Semiconductor. http://onsemi.
Design Examples of On Board Dual Supply Voltage Logic Translators Prepared by: Jim Lepkowski ON Semiconductor Introduction Logic translators can be used to connect ICs together that are located on the
More informationGPS Vehicle and personal location tracker. User manual
GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...
More informationPoint of View Mobii 925 - Android 4.2 Tablet PC. General notices for use... 2 Disclaimer... 2 Box Contents... 2
Table of Contents General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Buttons and connections... 3 1.2 Start up and shut down... 3 2.0 Introduction to Google Android
More informationCollided Vehicle Position Detection using GPS & Reporting System through GSM
Collided Vehicle Position Detection using GPS & Reporting System through GSM M.M.Raghaveendra 1, N.Sahitya 2, N.Nikhila 3, S.Sravani 4 1 Asst.Professor ECE Department, 2 Student, 3 Student, 4 Student,
More informationD-Link DAP-1360 Repeater Mode Configuration
D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter
More informationFrequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
More informationAdvanced Vehicle Tracking System on Google Earth Using GPS and GSM
IJECT Vo l. 5, Is s u e Sp l - 3, Ja n - Ma r c h 2014 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Advanced Vehicle Tracking System on Google Earth Using GPS and GSM 1 Sowjanya Kotte, 2 Hima Bindhu
More informationTOSR0X-D. USB/Wireless Timer Relay Module. User Manual. Tinysine Electronics @ 2013 Version 1.0
TOSR0X-D USB/Wireless Timer Relay Module User Manual Tinysine Electronics @ 2013 Version 1.0 INTRODUCTION This USB/Wireless Timer Relay Module allows computer control switching of external devices by using
More informationWireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
More informationThis guide describes features that are common to most models. Some features may not be available on your tablet.
User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Android, AdWords, Gmail,
More informationWireless Network Policy
Wireless Network Policy Purpose Guide the deployment and integrity of wireless networking on the Kettering University campus to ensure reliable, compatible, and secure operation Protect the security of
More informationVehicle Tracking System,
Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show
More informationTechnical and Troubleshooting. Guide AIRAVE 2.5
Technical and Troubleshooting Guide AIRAVE 2.5 Welcome! Sprint is committed to developing technologies addressing in-home coverage and ensuring you have a great wireless experience. This booklet provides
More informationVehicle Tracking system with GPS GSM Interface and Self Created Map
Vehicle Tracking system with GPS GSM Interface and Self Created Map Modi Nirav D. Department of Electronics, Bharati Vidyapeeth Deemed University, College of Engineering Pune, Pune ABSTRACT Safety and
More informationHigh-speed Internet Access: Wireless and WiFi
High-speed Internet Access: Wireless and WiFi Richard S. Wolff, Ph. D Montana State University Department of Electrical and Computer Engineering. rwolff@montana.edu 406 994 7172 Wireless: lots of technologies
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by
More informationINTERNET CONNECTIVITY
INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet
More informationsolutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
More informationBORDER ALERT AND SMART TRACKING SYSTEM WITH ALARM USING DGPS AND GSM
BORDER ALERT AND SMART TRACKING SYSTEM WITH ALARM USING DGPS AND GSM NaveenKumar.M #1, Ranjith.R *2 #* Department of Electronics and Instrumentation Engineering, #* Sri Sairam Engineering College, Chennai,
More informationAn in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based
More informationHow To Manage An 802.11 Wireless Network At A University
WIRELESS POLICY 1 INTRODUCTION 1.1 Wireless networking is a fast emerging technology and is set to continue to grow for the foreseeable future. It is recognised that wireless networking could offer benefits
More informationM2M and the PICtail Plus Daughter Board
M2M and the PICtail Plus Daughter Board By Adam Folts Hello, my name is Adam Folts. I am an Applications Engineer at Microchip. This webinar discusses the machine to machine board, M2M, its features, and
More informationGETTING TO KNOW YOUR NEW TELSTRA MOBILE WI-FI 4G
GETTING TO KNOW YOUR NEW TELSTRA MOBILE WI-FI 4G LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Mobile Wi-Fi 4G. This guide will help you get started as quickly and easily
More informationVehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller
Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller A.Kalaiarasi 1, Raviram.P 2, Prabakaran. P M 3, ShanthoshKumar.K 4, Dheeraj B P 5 Assistant Professor, Dept. of EEE,
More informationWireless Telephone System Product Comparison
TM Wireless Telephone System Product Comparison SpectraLink PCS 150E SpectraLink PCS 150E x 4 SpectraLink PCS 3000 Publication Information Toshiba America Information Systems, Inc., Telecommunication Systems
More informationU.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD
U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD [0001] The disclosure relates to mobile networks and, more specifically, to wireless
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationSPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network
u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More informationFlyingDream AAT Driver Quick Guide V1.1
FlyingDream AAT Driver Quick Guide V1.1 1. Introduction: AAT Driver is designed to drive the FlyingDream AAT system. It includes two parts: the TeleFlyLite module and the Driver module. The TeleFlyLite
More informationXBee Wireless Sensor Networks for Temperature Monitoring
XBee Wireless Sensor Networks for Temperature Monitoring Vongsagon Boonsawat, Jurarat Ekchamanonta, Kulwadee Bumrungkhet, and Somsak Kittipiyakul School of Information, Computer, and Communication Technology
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationCustom Integration Solutions
Welcome to this introduction into a true business class network solution for you and your clients This solution has been designed, by integrators, for integrators. We look forward to producing an ever
More informationExtending the range of a wireless network by using mesh topology
Extending the range of a wireless network by using mesh topology This example demonstrates how to configure a FortiGate and two FortiAP wireless access point units to extend the reach and availability
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 Vehicle Tracking System with Smartphone Integration S Om Prakash, R Karthikaeyan 7 Abstract Need for reliable management
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationPurdue University proudly presents. Aaron Jarvis, Network Engineer. www.purdue.edu/securepurdue
Purdue University proudly presents Aaron Jarvis, Network Engineer www.purdue.edu/securepurdue Any devices or software shown during this presentation are for demonstration purposes only. Purdue University
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationQuick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
More informationSerial Communications
Serial Communications 1 Serial Communication Introduction Serial communication buses Asynchronous and synchronous communication UART block diagram UART clock requirements Programming the UARTs Operation
More informationGPS Based Automatic Vehicle Tracking Using RFID Devyani Bajaj, Neelesh Gupta neelesh.9826@gmail.com
GPS Based Automatic Vehicle Tracking Using RFID Devyani Bajaj, Neelesh Gupta neelesh.9826@gmail.com Abstract a vehicle tracking system is an electronic device installed in a vehicle to enable the owner
More informationMessaging and Voice Conferencing through Wi-Fi Network
RESEARCH ARTICLE OPEN ACCESS Messaging and Voice Conferencing through Wi-Fi Network Miss. Nayana H S, Dr. M C Padma Mtech (CE) Department of C S & E, PES College of Engineering, Mandya, Karnataka, India.
More informationBroadband enabling SME's. Tommy McCabe Director, Telecommunications and Internet Federation, IBEC
Broadband enabling SME's Tommy McCabe Director, Telecommunications and Internet Federation, IBEC What is Broadband? Broadband is a combination of two words, broad bandwidth fast, always on internet connection
More informationImplementation of Wi-Ap; An IEEE 802.11b/g Based Electrical Switch Module With Web Enabled Interface for Electrical Appliances Control
Research Journal of Applied Sciences, Engineering and Technology 3(12): 1335-1341, 2011 ISSN:2040-7467 Maxwell Scientific Organization, 2011 Submitted: February 20, 2011 Accepted: March 26, 2011 Published:
More informationMeasuring the Impact of Security Protocols for Bandwidth
International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 131-137 MEACSE Publications http://www.meacse.org/ijcar Measuring the Impact of Security
More informationWISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
More informationWireless Network Standard
Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.
More informationVehicle data acquisition using CAN By Henning Olsson, OptimumG henning.olsson@optimumg.com
Vehicle data acquisition using By Henning Olsson, OptimumG henning.olsson@optimumg.com Introduction: Data acquisition is one of the best tools to increase the understanding of vehicle behavior. One can
More informationWireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
More informationLocal Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral
More informationPositioning in GSM. Date: 14th March 2003
Positioning in GSM Date: 14th March 2003 Overview of seminar Potential applications in cellular network Review of localization system and techniques Localization in GSM system Progress of the project with
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationWireless Phones, GPS and Data Applications
Wireless Phones, GPS and Data Applications James M. Conrad and Santosh Kolenchery Ericsson, Inc., 7001 Development Drive, Research Triangle Park, NC 27709 (919) 472-6178, james.conrad@ericsson.com (919)
More informationPoint of View ProTab 3XXL IPS - Android 4.0 Tablet PC. Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents...
Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC English Contents Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Buttons and connections...
More informationVOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
More informationOverview. 1. GPS data tracking via GSM SMS / GPRS. 2. GPS data logging in internal memory. 3. Alarm alert via GSM SMS / Dialing / GPRS
Vehicle or Personal Position Tracking Vehicle Status and Speed Tracking Auto Accident Report Global Position System (GPS) Navigation System Anti theft Alarm System Overview 1. GPS data tracking via GSM
More informationWired & Wireless LAN Connections
Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short
More informationFOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology
FOMA (R) /Wireless LAN Dual Terminals, Wireless LAN Technology SHINOHARA Masahito, ITOH Masashi, IWATA Shinichiro, NISHIMURA Yasunori, ZAITSU Makoto Abstract FOMA (R) /wireless LAN dual terminals are dual-phone
More informationInternet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
More information