A Load Balancing Protocol for IP Based Pervasive Networks

Size: px
Start display at page:

Download "A Load Balancing Protocol for IP Based Pervasive Networks"

Transcription

1 Smart Computing Review, vol. 2, no. 2, October Smart Computing Review A Load Balancing Protocol for IP Based Pervasive Networks Ali Ziya Alkar 1 and John Şefik Roach 2 1 Electrical and Electronics Engineering Dept. Hacettepe University/ Beytepe, Ankara, Turkey / alkar@hacettepe.edu.tr 2 Research and Development Department, Renko LTD. / Gölbaşı, Ankara, Turkey / johnroach1985@gmail.com * Corresponding Author: Ali Ziya Alkar Received July 9, 2012; Revised September 26, 2012; Accepted October 1, 2012; Published October 31, 2012 Abstract: IP based solutions without network routers are becoming popular as the need to lower complexity and maintenance cost emerges. The systems without a central server are relatively inexpensive and easier to configure per each system environment. The only necessity is to be at close proximity to a direct internet connection. In this way the home/industrial automation systems could be accessed and controlled through a direct internet connection directly even in dynamic IP configurations. In addition there are advances where the communication between devices is made possible. Communication between IP based pervasive devices may load the server used while relaying the data from one device to another. This study looks at load-balancing issues of the IP based pervasive devices among intercommunicating units. The suggested methodology has been tested on an IP based pervasive system. Keywords: IP, network, automation, pervasive, load balancing Introduction I P Based solutions especially in the world of automation have become popular as interconnected devices have exponentially increased through the years. The network solutions with a central server are not easy to maintain and configure [1]. Therefore systems with direct ability to connect and interact autonomously are expected to dominate the market in the near future. One of the typical scenarios in the internet based automation systems is a refrigerator being connected through the internet to look up its food contents, as well as the expiration date of the items, and the like which can be made possible via an RF ID marking system. In this way, it is possible to keep track of what to buy thus unnecessary purchases can be DOI: /smartcr

2 340 Alkar et al.: A Load Balancing Protocol for IP Based Pervasive Networks avoided. At home, one will be able to designate the hours during which children may watch TV even while not physically present by remotely arranging the settings accordingly. Television may be turned on via the internet and channels can be blocked [2][3]. Heaters or airconditioner units may be turned on prior to arriving home. Settings of the refrigerator may be changed while on vacation to conserve power. The applications are not only limited to home [4][5][6]. Drug inventories may be tracked in pharmaceutical warehouses for better service. Humidity levels around farm fields may be followed up remotely, via sensors for proper irrigation [7] There are internet based automation examples [8] that have been implemented without using a router where the system is based on a special dedicated network which is not a generic solution. Another proposed approach [9] is the research which is only based on a model and without any hardware implementations. The study in [7] is a solution for home automation systems that provides means to access a server without the necessity of a router. These kinds of systems are likely to increase in the future as there are no set up requirements and enable communication in an efficient way. However as in this system and all systems that depend on a remote server, data transfer load will increase upon the said server when user interaction and appliances increase. In this paper, we present a load balancing protocol that will allow home automation appliances and sensors to communicate with each other. This new load balancing protocol will allow a better service performance to the masses that use automation in their daily lives and disburden the load of the manufacturers or the server providers. The proposed system has been tested on the framework in [7]. Some of the other benefits of this new protocol are to be manufacturer independent and its added security functions which is becoming an important concern in pervasive systems. The next section will briefly explain the units in the basis of the framework mentioned in the reference design in [7] for the sake of completeness. Section 3 discusses the load balancing protocol suggested with a sample run. Section 4 is the conclusions. IP BASED HOME AUTOMATION FRAMEWORK Before we detail the load balancing solution to the systems that use a central server we would like to describe the base system that is our point of concern. The base system is outlined in Figure.1 as described in [7] with our extensions to the framework. Internet Application Server User IPAcBox Enabled Hardware Figure 1. General Overview of the system with added protocols The user connects to a predetermined configured application server, which is located anywhere in the world through the internet by either a mobile phone or a laptop/desktop computer. The IP enabled home network devices or appliances are connected to the same application server, and stay connected as long as they are not disconnected. The dashed lines in the Figure.1, between the IP enabled hardware are implemented as a part of our work in this study. The IPAcBox system described is formed of hardware and software components as outlined below. More details can be obtained from [7]. The hardware technology is implemented on a microcontroller based interfacing circuitry that communicates with the appliance and the software server [9][10][11]. This hardware unit with a microcontroller, special interfacing circuitries and network connection is named as the IP Access Box (IPAcBox). The data packets sent from the appliance are processed and sent to the network via the IPAcBox. Software modules required by the software server are the

3 Smart Computing Review, vol. 2, no. 5, October PHP 1 server, an object oriented open source programming language, SSH 2, SQL 3 database and an open port for the chat software server to communicate with the IPAcBox. IPAcBox connects to a designated server. In the server, a database to compare and analyze the information sent via the IPAcBox is available, along with PHP and an object oriented open source programming language software to provide a user interface to process the incoming data. In terms of operation, the system needs no further configuration on the user side. This is a very important feature provided by the unique connection scheme as described in [7]. After the physical connection of the hardware to the appliance through the USB interface, the user connects to the homepage of the software server. The user creates a profile in the first run of the program. Then the user accesses the designated home page by entering the username and password. The name, unique serial number for the item, and the passwords of the products can be added. Figure 2. Device management The devices such as a fridge as seen in this example, can be added to the main screen after the user logs in as shown in In Figure.2. It can be seen that the device is turned on and the user can select the appliance to visualize further about the appliance. LOAD BALANCING PROTOCOL The problem with the current system, and all pervasive systems that need to intercommunicate with each other is that all data needed to be sent through the application server which could overload the application server in situations where there are too many IP enabled items connected. The limit of the items connected is about 100 for a server with 2 GB memory. While designing the load balancing protocol, the security of information and fast data transmission were kept in mind. To this extent, we have used a native SSH (Secure Shell) protocol and a communication protocol that has been suggested in this paper. During this research there were two things that was essential to our study: The first was that the items must not exchange data without the user s consent and the second was that the user should not have to know the extensive knowledge of the 1 PHP is a general-purpose server-side scripting language originally designed for Web development to produce dynamic Web pages. 2 Secure Shell (SSH) is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client (running SSH server and SSH client programs, respectively). 3 SQL (Structured Query Language) is a programming language designed for managing data in relational database management systems (RDBMS).

4 342 Alkar et al.: A Load Balancing Protocol for IP Based Pervasive Networks software that is running in the background [12][13][14]. Thus, we have proposed the following communication protocol and divided this section into three parts; these are the network creation, server-ipacbox and the inter IPAcBox protocols. Network Creation After adding an appliance, the user is diverted to a new page requesting a new network to be created as shown in Figure.3. Figure 3. User network creation notices The user will still be able to use the items in the list however; the items will not be able to interact with each other without adding a network. In Figure.3, we can see that the user has two items that might interact with each other namely, the camera and the TV. When the add a new network link is accessed the user is directed to a simple form where a network name can be entered. After the network is created, the server appoints a unique name by simply adding a UNIX timestamp and the user s md5 4 coded username at the end of the user given name for added security. An example will be: Mynetwork.fce5b6340a460aa23d2acf6c8817b where Mynetwork is the user given name of the network while the rest is generated by the server. Once the network has been created, the user will be redirected back to the item catalogue as can be seen in Figure.4. Figure 4. Item notices for the selected network 4 The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value. MD5 has been employed in security applications, and is also commonly used to check data integrity. MD5 was designed by Ron Rivest. An MD5 hash is typically expressed as a 32-digit hexadecimal number.

5 Smart Computing Review, vol. 2, no. 5, October As it can be seen here, each network will be represented as in the form of a green box. In each network box, information about the network is clearly displayed. In Figure.4, one can see that the network is offline since there are no items added. To add an item the user simply needs to drag the items icon on the green network box, when that is done, the user will have the following screenshot as seen in Figure.5. Figure 5. Added item to network screenshot Now the user can see that the network is online and with a TV in the network. What if the user wants to simply get the camera data and give the output to the TV? In order to do that the user must simply drag the camera to the network box and simply click and drag the camera s blue box on to the TV s blue box. In the end, the screen shot will look like as in Figure. 6. Figure 6. CAM and TV working together As one can see, the CAM item is sending Video output to the TV. If the TV item was dragged over the CAM, an error would have been shown to inform the user that the TV has no data to share with the CAM. In the following section the background processes will be detailed. Server IPAcBox protocol

6 344 Alkar et al.: A Load Balancing Protocol for IP Based Pervasive Networks The authentication protocol of IPAcBox is detailed in [7]. If the IPAcBox firmware and server lists are up to date, then a special communication channel in the server has been established, which will be used only for unsecured transactions where the transfer speed is more important than safe transactions. The communication channel mentioned above could be thought as a chat room where only authenticated appliances are allowed. To this extent, an asynchronous multi-threaded script has been written. The following steps will be described by using the chart shown in Figure.7. Create Network For IPAcBox Application Server User Created Network ID P1 IPAcBox Python Layer P2 S1 Figure 7. Network Creation Process P1: Once the communication channel has been added, the IPAcBox will ask for its network name. If no network has been defined for the item, the server will send the following message; MAC@<IPBOX.IP>:def_network_please server@<server.ip>:@<mac>#no_network_def MAC@<IPBOX.IP>:got_message_no_network_def to indicate that no network has been defined. As one can see from the above the data transmission is quite simple. The value <server.ip> is actually the servers IP and the <MAC> is the unique MAC address for the item. If a network is later on defined by the user, the IPAcBox will receive the following message: server@<server.ip>:@<mac>#network_def#<unique_nam> MAC@<IPBOX.IP>:I_m_part_of_network Now the IPAcBox knows it belongs to a network which is named by the variable <unique_nam>. P2: Once the IPAcBox establishes that it is in a network and may be connected to other devices, it simply starts up a mini server. Although limited, this server will allow the IPAcBox to read any data streams sent to it by other IPAcBox enabled systems. S1: The network information related to the network such as its unique name is stored within a CSV file within the IPAcBox. The network is now established and a mini server has started in the IPAcBox. Inter IPAcBox protocol The chart in Figure.8 and its proceeding information will explain how inter item communication will be possible. The following steps detail this intercommunication.

7 Smart Computing Review, vol. 2, no. 5, October Inter Item Communications Init phase Application Server Layer P2 P5 IPAcBox 1 (TV) P1 P3 IPAcBox 2 (CAM) P1 P4 P6 Figure 8. Intercommunications of multiple items P1: Once the IPAcBox establishes that it is in a network it starts up a mini server. This mini server can be thought as an asynchronous multi-threaded chat server. P2: Server receives the word that the user wants to connect the CAM to the TV. Looking at which item is dragged on which item, the server assumes that the CAM will be feeding the TV with data rather than the other way around. Hence, it sends the MAC address of the CAM to the TV. P3/P4: Once the TV is informed about the MAC address of the destination, a connection will be established using the basic principles of the TCP/IP protocol. The IPAcBox of the TV scans for the IP that is used by that MAC address specified by the server. Once this IP (which is a local IP) is found the script sends the destination IPAcBox the simple command MAC1@<IPBOX1.IP1>:want_to_connect MAC2@<IPBOX2.IP2>:got_to_check_with_the_appserver In the above example the MAC1 named item (the TV) wishes to connect with MAC2 named item (the CAM) where MAC1 and MAC2 are their relevant unique MAC addresses. Due to security reasons, MAC2 must check with the application server whether the connection can be allowed. This is an added security feature of this protocol and implemented in P5. P5: The IPAcBox2 (the CAM) connects to the server using SSH. A small script on the server gets and checks the connected appliance s MAC, IP address and its encryption key. The encryption key (for the CAM) and the MAC2 address are unique and embedded within the IPAcBox2 (the CAM 2). If the encryption key and MAC address are correctly defined, the script accepts the second argument (using SSH) which is the TV s MAC. The server side script will this time check if IPAcBox1 (the TV) is really attached to the same network and if a valid output can be sent from the CAM to the TV. If all these are checked, the script will send via SSH, a file including an encryption key and a valid port, which will be used for the real time picture transmission. Once the file is sent, the server will inform IPAcBox2 by sending the following message: (not through SSH) server@<server.ip>:@<mac2>#go_out#<encrypted_file> to acknowledge the communication request of IPAcBox. P6:Once encrypted file has been received by the CAM and an acknowledgement has been sent back to the server the CAM will then check the file for consistency and will open said port. Once the port is opened and data is ready to be streamed, it will send the following message to the TV

8 346 Alkar et al.: A Load Balancing Protocol for IP Based Pervasive Networks MAC2@<IPBOX2.IP2>: appserver_said_ok After this, the data from the CAM will go directly to the TV using the internal IP s, IP1 and IP2 rather than going through the server within the internet. Load balancing Effects on the Server In order to demonstrate the need to set up a protocol to balance the load on the server and set up a secure protocol to divert the traffic to directly communicate the devices with each other some simulations have been performed. A simulation scenario of the new protocol clearly illustrates the effect of hierarchical data processing with no balancing. In Figure.9, the graph shows the access time for up to 1000 users with increasing number of appliances per user. Each appliance directly interacts with the server when users ask for information. Here we are assuming the user is seeking information from all appliances at once. Figure 9. The response time in No Load Balancing As we can see in the graph in Figure.9, as the number of appliances increases so does the time that it takes to evaluate and display the data to the user. In the next simulation, the load balancing algorithms and methodology utilized described in this paper is run. We observe that even though the number of appliances increases the delay time between responses on the server, it will not change as drastically as in the no load balancing case. In this test run we have again set the number of users as The graph for this test run is in Figure.10. Figure 10. The response time in with Load Balancing

9 Smart Computing Review, vol. 2, no. 5, October CONCLUSIONS In this paper, we introduced an elegant and unique procedure to balance the load in strongly connected pervasive devices which becomes a greater concern as the units communicate with each other. The directed traffic in this solution will allow more data to be sent between items without increasing the load on the server or on the out bounding bandwidth upon the user s network. This newly introduced load balancing feature offers novel benefits to IP automation designs. While in this paper we have only given an example on a TV connecting to a web CAM, the examples can be numerous where interconnecting items could form a dynamic hierarchy, ever changing, according to the users needs. By applying this framework, interconnecting items will have faster response time compared to a hierarchical access through the application server thus enabling users to connect and control various appliances without putting great loads on to the server and the internet connection bandwidth belonging to the user. References [1] A. R. Al-Ali, M. AL-Rousan, Java-Based Home Automation System, IEEE Transactions on Consumer Electronics, vol. 50, no. 2, May Article (CrossRef Link) [2] R. J. C. Nunes, A Web-Based Approach to the Specification and Programming of Home Automation Systems, in Proc. of IEEE MELECON 2004, pp.693, May 12-15, Article (CrossRef Link) [3] G. Song, Z. Wei, W. Zhang, A. Song, Design of a Networked Monitoring System for Home Automation, IEEE Transactions on Consumer Electronics, vol. 53, no. 3, Aug Article (CrossRef Link) [4] K. Tan, T. Lee, C. Yee Soh, Internet-Based Monitoring of Distributed Control Systems-An Undergraduate Experiment, IEEE Transactions on Education, vol. 45, no. 2, May Article (CrossRef Link) [5] C. C. Ko, B. M. Chen, S. Hu, V. Ramakrishnan, C. D. Cheng, Y. Zhuang, J. Chen, A Web-Based Virtual Laboratory on a Frequency Modulation Experiment, IEEE Transactions on Systems, Man, and Cybernetics-Part C: Application and Reviews, vol. 31, no. 3, pp , Aug Article (CrossRef Link) [6] P. Lin, H. Broberg, Internet Based Monitoring and Control for HVAC Applications, IEEE Industry Applications Magazine, pp , Jan Article (CrossRef Link) [7] A. Z. Alkar, J. Roach, D. Baysal, IP Based Home Automation System, IEEE Transactions on Consumer Electronics, vol. 56, no. 4, pp , Nov Article (CrossRef Link) [8] N.-S. Liang, L.-C. Fu, C.-L. Wu, An Integrated, Flexible, And Internet-Based Control Architecture For Home Automation System In The Internet Era, in Proc. of IEEE International Conference on Robotics and Automation, vol. 2, pp , Article (CrossRef Link) [9] J. C. Nunes, J. C. M. Delgado, An Internet application for home automation, in Proc. of 10th Mediterranean Electrotechnical Conference, pp , Article (CrossRef Link) [10] J. L. Ryan, Home Automation, Electronics and Communication Engineering Journal, pp.185, Jul./Aug Article (CrossRef Link) [11] G. Song, Y. Zhou, W. Zhang, A. Song, A Multi-interface Gateway Architecture for Home Automation Networks, IEEE Transactions on Consumer Electronics, vol. 54, no. 3, pp.1110, Aug Article (CrossRef Link) [12] H. S. Kim, J.-H. Song, S. Lee, Energy-Efficient Traffic Scheduling in IEEE for Home Automation Networks, IEEE Transactions on Consumer Electronics, vol. 53, no. 2, pp.369, May Article (CrossRef Link) [13] P. Bergstrom, K. Driscoll, J. Kimball, Making Home Automation Communications Secure, IEEE Computer, pp.50, Oct Article (CrossRef Link) [14] I. Han, H.-S. Park, Y.-K. Jeong, K.-R. Park, An Integrated Home Server for Communication, Broadcast Reception, and Home Automation, IEEE Transactions on Consumer Electronics, vol. 52, no. 1, pp.104, Feb Article (CrossRef Link)

10 348 Alkar et al.: A Load Balancing Protocol for IP Based Pervasive Networks John Şefik Roach is currently working for Renko Ltd. in Ankara, Turkey. John is a Certified Application Developer (APTECH), Certified Information Systems Manager (APTECH), Open Software Developer. His specialties are but not limited to Java, Python, C#, C, JSP, ASP.Net, PHP, HTML/CSS/JavaScript, XML, Assembly, SQL, Microsoft SQL Server, Network Systems, RHL, Debian, UNIX, and Windows. Reliability tests for hardware and basic circuit design. His main interests are embedded software designs and computer networks. He is a member of the IEEE. Ali Ziya Alkar received his B.S. degree in 1988 at Electrical & Electronics Engineering Department, Hacettepe University, Ankara, Turkey. He completed his M.S. study in 1991 at the Electrical & Computer Engineering Department of the University of Colorado at Boulder, Colorado, U.S.A. In 1995 he received his Ph.D. from the same university. His main interests are computer architecture and design, and application of security algorithms to VLSI and embedded systems. Supervised and completed several government funded research projects. He is an Associate Professor at the Dept. of Electrical and Electronics Engineering, Hacettepe University. He is a member of the IEEE and advisor officer for IEEE at Hacettepe University. Copyrights 2012 KAIS

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,

More information

Synapse s SNAP Network Operating System

Synapse s SNAP Network Operating System Synapse s SNAP Network Operating System by David Ewing, Chief Technology Officer, Synapse Wireless Today we are surrounded by tiny embedded machines electro-mechanical systems that monitor the environment

More information

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Design and Development of SMS Based Wireless Home Appliance Control and Security System Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad 1, Md. Al Muzahid 2 and Md. Saifuddin Faruk 3 The rapid change in the wireless communication

More information

INTELLIGENT HOME MONITORING AND WIRELESS CONTROL SYSTEM

INTELLIGENT HOME MONITORING AND WIRELESS CONTROL SYSTEM INTELLIGENT HOME MONITORING AND WIRELESS CONTROL SYSTEM Vishnu Prajapati 1,Shashank Gole 2,Prathamesh Deshpande 3 Siddhesh Wadekar 4, Prof. Shubhangi Wankhede 5 1,2,3,4,5 Department of Electronics and

More information

WLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL *

WLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL * WLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL * Bhargavi Hiremagalur and Dulal C. Kar Department of Computing and Mathematical Sciences, Texas A&M University-Corpus Christi,

More information

Monitoring Traffic manager

Monitoring Traffic manager Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Design and Development of SMS Based Wireless Home Appliance Control and Security System Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/

More information

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Vol. 8, No. 4 (2015), pp. 275-286 http://dx.doi.org/10.14257/ijca.2015.8.4.27 Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Sol Lim, Kye Joo Lee, So Yeon Kim, Chang Seok Chae,

More information

JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS. Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany

JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS. Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS Christof Röhrig, 1 Andreas Jochheim 2 Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany Abstract: This paper

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Signature Amortization Technique for Authenticating Delay Sensitive Stream Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,

More information

RemotelyAnywhere Getting Started Guide

RemotelyAnywhere Getting Started Guide April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...

More information

Implementation of the Remote Control and Management System. in the Windows O.S

Implementation of the Remote Control and Management System. in the Windows O.S IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012 11 Implementation of the Remote Control and Management System in the Windows O.S Seung-Ju Jang Dong-Eui University,

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Building a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home

Building a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Building a Basic Communication Network using XBee DigiMesh Jennifer Byford April 5, 2013 Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Abstract: Using Digi International s in-house

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

Orixcloud Backup Client. Frequently Asked Questions

Orixcloud Backup Client. Frequently Asked Questions Frequently Asked Questions Version 1.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means. No rights

More information

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Implementation of Embedded Web server using TEA algorithm

Implementation of Embedded Web server using TEA algorithm Implementation of Embedded Web server using TEA algorithm Arunkumar G 1, Dr. T.C. Manjunath 2, Harish H.M 3, Jayaprakasha.H 4 1 Department of E&C, S.T.J.I.T, Ranebennur 2 Principal, HKBKCE, Bangalore 3,4

More information

Home Automation Management with WLAN (802.11b) and RF Remote Control

Home Automation Management with WLAN (802.11b) and RF Remote Control Home Automation Management with WLAN (802.11b) and RF Remote Control Mhmood Shuker Assistant Professor, Mosul Technical Institute Dr. Abdul Sattar Khidhir Lecturer, Mosul Technical Institute Firas Abdul

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Section A Notes to the Application

Section A Notes to the Application Explanatory Note 1 (Hosting OG/BSS - For Normal Trading) Section A Notes to the Application a. Hosting OG Server Hardware Configuration and Software Package : Hosting OG will support both standard and

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

Design and Implementation of a Reliable Wireless Real-Time Home Automation System Based on Arduino Uno Single-Board Microcontroller

Design and Implementation of a Reliable Wireless Real-Time Home Automation System Based on Arduino Uno Single-Board Microcontroller Design and Implementation of a Reliable Wireless Real-Time Home Automation System Based on Arduino Uno Single-Board Microcontroller Bader M. O. Al-thobaiti, Iman I. M. Abosolaiman, Mahdi H. M. Alzahrani,

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Niagara IT Manager s Guide

Niagara IT Manager s Guide 3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common

More information

Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant

Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant International Journal of Computational Engineering Research Vol, 03 Issue, 4 Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant 1, Mr.S.Vimalraj, 2, Gausalya.R.B, 3, Samyuktha.V,

More information

A Model Design of Network Security for Private and Public Data Transmission

A Model Design of Network Security for Private and Public Data Transmission 2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali

More information

A Resilient Device Monitoring System in Collaboration Environments

A Resilient Device Monitoring System in Collaboration Environments , pp.103-114 http://dx.doi.org/10.14257/ijsh.2014.8.5.10 A Resilient Device Monitoring System in Collaboration Environments KeeHyun Park 1 and JongHwi Lee 1 Department of Computer Engineering, Keimyung

More information

The data between TC Monitor and remote devices is exchanged using HTTP protocol. Monitored devices operate either as server or client mode.

The data between TC Monitor and remote devices is exchanged using HTTP protocol. Monitored devices operate either as server or client mode. 1. Introduction TC Monitor is easy to use Windows application for monitoring and control of some Teracom Ethernet (TCW) and GSM/GPRS (TCG) controllers. The supported devices are TCW122B-CM, TCW181B- CM,

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

IDIS Product Security

IDIS Product Security (Mar.10.2015) 2014 IDIS Co., Ltd. All rights reserved. IDIS and identifying product names and numbers herein are registered trademarks of IDIS Co., Ltd. All non-idis brands and product names are trademarks

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

System Services. Engagent System Services 2.06

System Services. Engagent System Services 2.06 System Services Engagent System Services 2.06 Overview Engagent System Services constitutes the central module in Engagent Software s product strategy. It is the glue both on an application level and on

More information

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Open Access Research and Design for Mobile Terminal-Based on Smart Home System Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

CARRIOTS TECHNICAL PRESENTATION

CARRIOTS TECHNICAL PRESENTATION CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO alvaro.everlet@carriots.com @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM

More information

Design and Implementation of Home Monitoring System Using RF Technology

Design and Implementation of Home Monitoring System Using RF Technology International Journal of Advances in Electrical and Electronics Engineering 59 Available online at www.ijaeee.com & www.sestindia.org/volume-ijaeee/ ISSN: 2319-1112 Design and Implementation of Home Monitoring

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

Portal Authentication Technology White Paper

Portal Authentication Technology White Paper Portal Authentication Technology White Paper Keywords: Portal, CAMS, security, authentication Abstract: Portal authentication is also called Web authentication. It authenticates users by username and password

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

Domus, the connected home

Domus, the connected home Domus, the connected home Amazouz Ali, Bar Alexandre, Benoist Hugues, Gwinner Charles, Hamidi Nassim, Mahboub Mohamed, Mounsif Badr, Plane Benjamin {aamazouz, abar, hbenoist, cgwinner, nhamidi, mmahboub,

More information

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager.

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager. DNA White Paper Prepared by Ian Silvester DNA Manager Danwood Group Service Noble House Whisby Road Lincoln LN6 3DG Email: dna@danwood.com Website: www.danwood.com\dna BI portal: https:\\biportal.danwood.com

More information

CXA 204 1I Basic Administration for Citrix XenApp 6

CXA 204 1I Basic Administration for Citrix XenApp 6 COURSE DESCRIPTION CXA 204 1I Basic Administration for Citrix XenApp 6 Basic Administration for Citrix XenApp 6 training course provides the foundation necessary for administrators to effectively centralize

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

SIP Protocol as a Communication Bus to Control Embedded Devices

SIP Protocol as a Communication Bus to Control Embedded Devices 229 SIP Protocol as a Communication Bus to Control Embedded Devices Ramunas DZINDZALIETA Institute of Mathematics and Informatics Akademijos str. 4, Vilnius Lithuania ramunas.dzindzalieta@gmail.com Abstract.

More information

GSM Based Home Automation, Safety and Security System Using Android Mobile Phone

GSM Based Home Automation, Safety and Security System Using Android Mobile Phone GSM Based Home Automation, Safety and Security System Using Android Mobile Phone Akanksha Singh (Student) Arijit Pal (Student) Bijay Rai (Assistant Professor) Department Of Electrical & Electronics Department

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

2 6th December 2012 Copyright Eddie Obeng 2010 Pentacle 2011 All rights reserved

2 6th December 2012 Copyright Eddie Obeng 2010 Pentacle 2011 All rights reserved Table of Contents 1 Introduction 2 System Requirements 3 Technical service / support 4 Administration 5 Data storage / location 6 Security 7 Ports/ firewalls/ network impact 8 Performance 9 Standards/interoperability

More information

3 Software Defined Radio Technologies

3 Software Defined Radio Technologies 3 Software Defined Radio Technologies 3-1 Software Defined Radio for Next Generation Seamless Mobile Communication Systems In this paper, the configuration of the newly developed small-size software defined

More information

Configuring the WT-4 for ftp (Ad-hoc Mode)

Configuring the WT-4 for ftp (Ad-hoc Mode) En Configuring the WT-4 for ftp (Ad-hoc Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2) ftp server for transmission

More information

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS

More information

Online Communication of Critical Parameters in Powerplant Using ZIGBEE

Online Communication of Critical Parameters in Powerplant Using ZIGBEE International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Online Communication of Critical Parameters in Powerplant Using ZIGBEE D.Santhiya 1, R.Renita Priyatharshini 2,K.C.Dhivya

More information

Exploring the Remote Access Configuration Utility

Exploring the Remote Access Configuration Utility Exploring the Remote Access Configuration Utility in Ninth-Generation Dell PowerEdge Servers The Remote Access Configuration Utility supports local and remote server management in ninth-generation Dell

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator

The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Vol.8, No.3 (2014), pp.107-118 http://dx.doi.org/10.14257/ijsh.2014.8.3.10 The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Woon-Yong

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Design and Implementation of Client Server Network Management System for Ethernet LAN

Design and Implementation of Client Server Network Management System for Ethernet LAN Design and Implementation of Client Server Network Management System for Ethernet LAN Ms. MAY PAING PAING ZAW and Ms. SU MYAT MARLAR SOE Abstract Network Management Systems have played a great important

More information

Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements

Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements , pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

NanoMon: An Adaptable Sensor Network Monitoring Software

NanoMon: An Adaptable Sensor Network Monitoring Software NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and Telecommunications Research Institute (ETRI) Gajeong-dong

More information

Intelligent Home Automation and Security System

Intelligent Home Automation and Security System Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

Flexible Architecture for Internet of Things Utilizing an Local Manager

Flexible Architecture for Internet of Things Utilizing an Local Manager , pp.235-248 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.24 Flexible Architecture for Internet of Things Utilizing an Local Manager Patrik Huss, Niklas Wigertz, Jingcheng Zhang, Allan Huynh, Qinzhong Ye

More information

A Comparison of Mobile Peer-to-peer File-sharing Clients

A Comparison of Mobile Peer-to-peer File-sharing Clients 1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics

More information

Plc Based Monitoring and Controlling System Using Wi-Fi Device

Plc Based Monitoring and Controlling System Using Wi-Fi Device IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 4, Ver. II (Jul - Aug. 2014), PP 29-34 Plc Based Monitoring and Controlling System

More information

How to Configure Dynamic DNS on a Virtual Access Router

How to Configure Dynamic DNS on a Virtual Access Router How to Configure Dynamic DNS on a Virtual Access Router Issue 1.0 Date 03 April 2012 Table of contents 1 About this document... 3 1.1 Scope... 3 1.2 Readership... 3 1.3 Terminology... 3 2 Introduction...

More information

Information Technology Career Field Pathways and Course Structure

Information Technology Career Field Pathways and Course Structure Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating

More information

AKCess Pro Server Management Software

AKCess Pro Server Management Software Management Software v.100.00x takes the best from IP Video Monitoring Software and is the first to combine it with Environmental / Security Sensor and Access Control equipment in one centralized management

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Study on Differential Protection of Transmission Line Using Wireless Communication

Study on Differential Protection of Transmission Line Using Wireless Communication Study on Differential Protection of Transmission Line Using Wireless Communication George John.P 1, Agna Prince 2, Akhila.K.K 3, Guy Marcel 4, Harikrishnan.P 5 Professor, Dept. of EEE, MA Engineering College,

More information

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,

More information

Software Version 7.1.2.7

Software Version 7.1.2.7 Technical Information Software Version 7.1.2.7 DDF4220HDV Picodome MDF4220HD DDF4320HD-DN DDF4520HDV-DN English Version 1.0 / 2014-03-20 1 Abstract This document contains information on new features and

More information

SmartSync Backup Efficient NAS-to-NAS backup

SmartSync Backup Efficient NAS-to-NAS backup Allion Ingrasys Europe SmartSync Backup Efficient NAS-to-NAS backup 1. Abstract A common approach to back up data stored in a NAS server is to run backup software on a Windows or UNIX systems and back

More information

Before taking this course, Citrix recommends that learners have the following:

Before taking this course, Citrix recommends that learners have the following: Course CXA-206 Citrix XenApp 6.5 Administration Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize and manage applications

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

System-on-a-Chip with Security Modules for Network Home Electric Appliances

System-on-a-Chip with Security Modules for Network Home Electric Appliances System-on-a-Chip with Security Modules for Network Home Electric Appliances V Hiroyuki Fujiyama (Manuscript received November 29, 2005) Home electric appliances connected to the Internet and other networks

More information