UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
|
|
|
- Beatrice Potter
- 10 years ago
- Views:
Transcription
1 UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE Ha Quoc Trung 1 1 Department of Data Communication and Computer Network, School of Information and Telecommunication Technology, Hanoi University of Science and Technology, Hanoi, Vietnam [email protected] ABSTRACT Ubiquitous computing allows more efficient exploitation of information systems, economizes user cost and effort to use the information system. The network technical room monitoring problem, arising from network management practice, is important to operate the network, to discover and resolve unpredictable situation. In addition, many of monitoring and sensor product are shipped with closed proprietary software, and the interoperability between them is very difficult. In this article, the author present several ubiquitous computing technologies, propose a model of ubiquitous monitoring system for network technical room. This model allows monitoring the network technical room remotely, via variable terminal devices and variable communication infrastructure. The model has been implemented in Hanoi University of Science and Technology (HUST) Network Information Centre with IP Cameras and RFID devices. KEYWORDS Ubiquitous, pervasive, monitoring, distributed system. 1. INTRODUCTION In network management practice, there are many cases that users without technical competence try to modify network configuration both logically such as access to control terminal and physically such as switching cables. These cases lead to network fails that are difficult to discover and repair. These situations raise the need of a monitoring system for the technical room. This kind of monitoring system provides additional information about what is the fail happened, who is responsible for the fail and how to recover the fail [1]. In addition, nowadays networkmonitoring systems can monitor the network devices, network communication channels, but not the space that they are situated [3]. The network technical room monitoring system, in integration with the classic monitoring system, allows monitoring the device environment and to facilitate failing discovering and recovering. With the availability of ubiquitous computing equipment, especially monitoring cameras, card readers, sensors, the task of space monitoring can be done in integration of several systems from different kinds [5]. Natarajan Meghanathan, et al. (Eds): SIPM, FCST, ITCA, WSE, ACSIT, CS & IT 06, pp , CS & IT-CSCP 2012 DOI : /csit
2 260 Computer Science & Information Technology ( CS & IT ) Unfortunately, the monitoring equipment, the sensor systems are normally offered with specific, proprietary software to manage and exploit the devices. So the integration of the systems is difficult, base on fact that very little real-time information is allowed to be accessed from external programs. Anyway, these systems normally offer a web interface allowing users (not user s application) to access collected data. In order to integrate different products in to an unified system, an intermediated component is needed. The functionality of the component is two folds. In relation with the monitoring device, the component must act as the end user, collects and store real-time information and store. In relation with the ubiquitous monitoring system, this component provides real-time processed information, raises triggers and generates event. In our solution, the component is simulated and implemented by a computer, but in the future, this computer can be embedded. In this article, based on ubiquitous computing technology, a model for network technical room monitoring system is proposed. The model allows: (i) using IP camera and RFID card reader to monitor network technical room; (ii) access the monitoring system via different kind of end user devices and communication infrastructures. The model is experimentally implemented and tested at Hanoi University of Science and Technology s Network Information Center. The paper is organized as the following: section 1 gives an introduction, section 2 describes several ubiquitous monitoring technologies such as IP camera, RFID, and some frame work to develop ubiquitous application; section 3 presents the model of network monitoring system; section 4 gives information about implementation and testing and section 5 gives some conclusion and perspectives. 2. UBIQUITOUS TECHNOLOGIES In order to monitoring in an indoor space, the following technologies can be used: IP camera allows monitor and store audio-video information about preconfigured space. A monitoring system using IP camera consists of one or multiple IP camera, distributed on monitored locations, and a concentrated display in a dedicated for monitoring goals space. The IP cameras and the displays are connected by a cable, in some case wireless network, and are controlled by software. The producer of the system normally provides this software. Common functionalities of such system are: - Continuously capture picture or video from monitored space. - Control of detail and quality of the picture and video (i.e. focus, zoom ). - Storage of video and picture (by some rotation mechanism) - Detection abnormal situation: motion, interruption of connection, - Provide an easy-to-use interface for the users. Normally, a system of such type is well packaged, ready for use. If users need some special functionality of the system, the producer provides an API allowing users to develop new functionality. Unfortunately, the API is proprietary, expensive, and support only specific hardware and software from the vendor. That makes the development of new functionality hard.when using the motion detection function of the IP camera for authentication, a disadvantage of IP camera is that we cannot authenticate the person, caused by low quality image. IP Camera is better used in combination with other authentication methods such as fingerprint, RFID or magnetic readers. Anyway, audio-video content information that can be used for validating authentication results [4]. This is the reason why in our solution includes the IP
3 Computer Science & Information Technology ( CS & IT ) 261 Camera component. As mentioned before, one of the problems is the difficulty to develop the function to interact with other systems. RFID (radio frequency identification device) [5] allows identifying people and things by tag attached to them. RFID can be used for monitoring as it provides the capability of authentication. The RFID tag is used to identify the tag bearer. The RFID system consists of RFID reader, the distributed control device and a central database system. The RFID reader reads the ID of the tag; send it to central control system. The control system then verifies the correspond credential and send it back to the control device if passed. The device then activates the mechanism to allow bearer access the protected object. The problem is that RFID tag can be attached with different object. A multiple authentication mechanism can resolve the problem. In our solution, RFID tag is included with IP Camera such that identification by tag can by batch verified by IP Camera. RFID middleware [6,7] processes the data acquired from the reader and then updates it to the backend database or other systems. An open-source RFID middleware is appropriate for our solution to allow we add own business logic and easy to extend the system. There are numbers of different open-source option for RFID middleware like Mobitec, Fosstrak and Rifidi. The reason we use Rifidi is it have complete development tool for design, simulation, testing and a lot of API to develop we application. In addition, the middleware work not only with RFID reader, but also with bar-code scanner, sensor, and other hardware such as cameras [3]. Rifidi Edge is a complete RFID middleware platform with an edge server and development tools to enable the development and deployment of highly customized RFID applications. It contain three conceptual architectural layers: - Sensor Abstraction Layer: allow user connect to device to collect the kind of data required for the application. - Application Engine Layer: The Layer is intended to let application weight loss pills developers build much of the functionality of their RFID applications using esperqueries. - Communication Layer: The edge server has several built in connectors to use, namely JMS and Web Services (via Spring's remote framework). However, as this is application-independent, it is possible to write your own connector (such as a TCP/IP socket connection) if the application needs it. Fortunately, these characteristics make the development of new functionality of the RFID much easier. Context-aware computing. [8] Another requirement of the system is the access by different kind of terminal devices and communication media. The computing part of the system needs to detect the terminal and communication characteristics, and then format the information suitable for this context of interaction. That is called context awareness computing [7]. In our solution, a ubiquitous engine is used to convert and reformat information suitable for different kind of terminal is needed. Ubiquitous computing framework.[9] To implement the context awareness computation, there are variable choices of the implementation framework. In our case, we need a framework allowing connecting different sensor and monitoring system from different producers. That the reasons why we choose a general, universal and open framework. Of course, we ll have more work to develop the needed functionalities. Web Service is the tool that we choose.
4 262 Computer Science & Information Technology ( CS & IT ) Web service provides connectivity, discoverability between software component using HTTP as transmission protocol and XML as data definition language. In ubiquitous computing, web services allow ubiquitous device can send and receive information easily to processing server. We can easily customize the server, the protocol to meet the specification of the sensor part of the system. Combine monitoring As analyzed above, RFID authentication has several advantages: simple and flexible authentication; authenticates by RFID tag id; can be used with physical access control devices. But it also has some disadvantages: no information about access period; It is not strong enough. Every one who has a RFID tag can be authenticated. IP camera monitoring gives us the capability to capture video and picture in a customizable way, but it can not gives us the details functional information about the monitored object. The idea is to combine the monitoring by RFID and by IP camera in a way that authentication can be double checked by the 2 systems online or offline. The log and traces from RFID will be extended with video and pictures from the IP Camera monitoring system. These video and pictures are taken from preconfigured action for indoor network technical room- spaces. To accomplish this task, interaction between 2 systems has to be designed and implemented, with condition that RFID sub-system is open source, while IP camera system is closed and proprietary. 3. THE SYSTEM MODEL AND FUNCTIONALITY The system requirement: Technical room monitoring requires the following functionalities: (i) supports traceable entries, operations and exit in the working space; (ii) supports traceable activities on pre-configured equipment; (iii) provides automatically identification and authentication of the object; (iv) provides access to the system via different devices and communication media. The system is organized in 3 subsystems: the local subsystem, the central subsystem and the monitoring subsystem. The local subsystem is for administrator-monitor. The central system consists of overall monitoring logics of the system. The monitoring points server for real-time monitoring, access control and authentication. Local Subsystem Mobile Application Desktop Application Desktop Application Central Subsystem Central Server Monitoring Subsystem Monitored points Monitored points Monitored points Figure 1: The system overall architecture
5 Computer Science & Information Technology ( CS & IT ) 263 The monitoring subsystem has several monitoring points. Each monitoring point consists of: an IP camera, RFID reader(s), a LCD for each RIFD, a computer and a mechanical access control device (lock, barrier ). The RFID reader is used to control the physical access to the space via mechanical device. The IP Camera is installed and configured to control the entrance and part of the space. The LCD is installed next to the entrance, serving for announcing welcome message for the user. These 3 components are controlled with a computer. This computer is autonomous, self-activate, and will be embedded. The computer provides a web-service for other part to access collected information from monitoring devices. The principal functions of each monitoring point are: - RFID Authentication and Checking. - Device monitoring by predefined detection zone. - Configure monitoring devices. Central system consists of processing server. The server collects information from monitoring points, process this information with management information in the database. The server publishes this information using a web server. On this server, context awareness module allows providing information for different access contexts. The functions of central module are: - Users (technical administrator) management - Devices and technical rooms management - Grouping users and devices - Search and summary - Abnormal situation detection and alert. The local system in fact is the client end user interface. As well as we use Web Interface, the problem to resolve is to provide web information conforming to the device s and communication link s capability. The functional model of the system is described in Figure 2 : Functional Model Figure 2: Functional model In this article, we don t concentrate on the detail analyze of each function. We concentrate on the functions of each monitoring point. The components of each monitoring point are described on Figure 3: Monitoring point.
6 264 Computer Science & Information Technology ( CS & IT ) Collective Module WS1-3 WS4 WS5 WS6 IP Camera SW Mini LCD SW Lock SW RFID SW IP Camera Mini LCD Mechanical Lock RFID Figure 3: Monitoring point As mentioned above, in each monitoring point we have to allow interaction between components. We use web services to transfer from normal software user interface to programmable interfaces. The list of the web services is presented in Table 1: Monitoring point web services. Table 1: Monitoring point web services WS Name Description 1 Forced monitoring 2 Conditional monitoring Activated when a predefined entrance is accessed, or administrators need to view the IP Camera directly. Accept monitoring commands and transfers to Camera Activated when a predefined condition is true (a device is accessed, some one operates on some devices). Based on motion detection. 3 Configuration Receive configuration from collective modules and transfer it to camera. Configuration information is depended on monitored devices. 4 Display announce 5 Authentication sending Receive text (audio) message from collective module and send to LCD and speaker. Raised when RFID reader is accessed and sending information 6 Allow access Raised when authentication is successful
7 Computer Science & Information Technology ( CS & IT ) IMPLEMENTATION AND EXPERIMENTATION The model is implemented in the server room at the HUST s network information center. One monitoring system uses 1 camera, 1 RFID card reader, one PC to collect information from camera and RFID reader. 4 monitoring points are deployed in server room and 3 network technical rooms in the same building. For experimental purpose, 4 devices are controlled in the server room. In each network technical room we monitor only one device. Information about 20 administrators and 3 roles are stored in the central DB. The system has been tested in 3 months. The system helps the managers to: - Control the entry and exit of the technical room; - Enforce the RFID authentication by camera support; - Control the important devices (servers and network equipment). - Determine initiator of the selected configuration activities. - Access system anytime and anywhere. 5. CONCLUSIONS The paper presents the model of the ubiquitous network technical room monitoring and its experimental implementation. The main contributions are: Study the monitoring technical room problem Study several ubiquitous computing technologies Propose the model of the ubiquitous network technical room monitoring Implement the model with web services with. The model allows connecting several proprietary products. In the future, the system will be extended to serve multiple network technical rooms, and to integrate more ubiquitous computing technologies such as batch, bioinformatics. ACKNOWLEDGMENTS I would like to thank HUST s BKNIC staffs, which give me the possibility to implement and test my solution. This work is also supported by Ministerial Project B REFERENCES [1] Ko, Ren-Song. (2011), Anywhere/Anytime Software and Information Access via Collaborative Assistance. Eduard Babkin, Ubiquitous Computing, [2] Marie-Luce. (2011), Uncertainty and Error Handling in Pervasive Computing: A User's Perspective. Eduard Babkin. (2011), Ubiquitous Computing, [3] Nicolas Ferry. (2011), Vincent Hourdin, Stéphane Lavirotte, Gaëtan Rey, Michel Riveill and Jean- Yves Tigli. (2011). WComp, a Middleware for Ubiquitous Computing, Ubiquitous Computing,
8 266 Computer Science & Information Technology ( CS & IT ) [4] Wanderley Lopes de Souza, Antonio Francisco do Prado, Marcos Forte and Carlos Eduardo Cirilo. (2011). Content Adaptation in Ubiquitous Computing. Ubiquitous Computing, [5] Bakhouya, Mohamed. (2008). Ubiquitous and pervasive application design, Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing. [6] Roussaki, Ioanna, Strimpakou, Maria and Pils, Carsten. (2007). Distributed Context Retrieval and Consistency Control in Pervasive Computing. Plenum Press, Netw. Syst. Manage., Vol. 15, [7] Reyes, Fernando Martinez and Greenhalgh, Chris. (2009). The User's Touch: A Design Requirement for Smart Spaces. IJAPUC, Vol. 1, [8] Grzywaczewski, Adam, et al. (2009). An Investigation of User Behavior Consistency for Context- Aware Information Retrieval Systems. IJAPUC, Vol. 1, [9] Chang, Po-Chien. 1,.(2009). Understanding Consumers' Behavior when Using a Mobile Phone as a Converged Device. IJAPUC, Vol. 1, Authors Ha Quoc Trung (Ph. D.) Graduated from Technical University of Sofia in 1996, speciality Electronic, Microelectronic and Automation. In 2004 he completed his Ph. D. degree in School of Advance Research Practice (Ecole Pratique de Hautes Etudes-Paris, France). From 1999 to recent he is lecturer at department of data communication and computer network. His research interests are: distributed algorithm, system and application, ubiquitous computing.
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards
, pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun
INTERNET OF THINGS Recent Advances and Applications MengChu Zhou, Tongji University and New Jersey Institute of Technology
INTERNET OF THINGS Recent Advances and Applications MengChu Zhou, Tongji University and New Jersey Institute of Technology What is the next Industrial Revolution? The 1st answer People producing their
Asset Tracking System
Asset Tracking System System Description Asset & Person Tracking 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and
An Intelligent Middleware Platform and Framework for RFID Reverse Logistics
International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics
Remote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY
RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable
Cisco Context-Aware Mobility Solution: Put Your Assets in Motion
Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will
Best Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com
Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
Introduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
>>IP. VIDEO INTERCOM & SMART HOME TCP/IP video intercom solution expert
Enjoy value-added service Seamlessly connected with IP camera Embedded SIP protocol Support App function >>IP VIDEO INTERCOM & SMART HOME TCP/IP video intercom solution expert Solution SIP Intercom Security
NSR TM. Open the Era of Embedded Security Integration Systems. Network Security Recorder. Integrated Security
Integrated Security Networ k Security Recorder NSR TM Network Security Recorder Open the Era of Embedded Security Integration Systems NSR (Network Security Recorder) is developed by Anson and will be promoted
Passive RFID Solutions for Asset Tracking and Inventory Management
Passive RFID Solutions for Asset Tracking and Inventory Management Introduction: In the present context of business, it is becoming essential for the business world to provide electronic commerce in addition
Simplifying and Empowering the Implementation of Enterprise Mobile Strategy
mfrontiers white paper November 2013 Enterprise Mobility Management Platform with Simplifying and Empowering the Implementation of Enterprise Mobile Strategy Page 1 of 9 Simplifying and Empowering the
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
RFID System Description for Logistics & Inventory
RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.
Future Directions for Internet of Things Work
Future Directions for Internet of Things Work Naming Architecture for Object to Object Communications 77 th IETF Anaheim, March 2010 Gyu Myoung Lee ([email protected])
W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier
W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...
CDW Advanced Image Deployment Service Customer Guide
CDW Advanced Image Deployment Service Customer Guide Contents Service Description... 2 Image Deployment Solutions... 2 Why would my organization use this service?... 2 Benefits of Advanced Imaging over
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
RFID Tracking System Installation
RFID Tracking System Installation Installation Guide Version 3.x 3M Track and Trace Solutions 3M Center, Building 225-4N-14 St. Paul, Minnesota 55144-1000 78-8123-9919-0, Rev. E 2003-2009, 3M. All rights
WEB SERVICE FOR STUDENT ATTENDANCE MANAGEMENT SYSTEM
WEB SERVICE FOR STUDENT ATTENDANCE MANAGEMENT SYSTEM Anusha V Pai 1, Atul Krishna 2, Kshama P M 3, Menita Correa 4 1,2,3,4 Department of CSE, Canara Engineering College, (India) ABSTRACT Attendance is
IP Wireless / Wired Camera NIGHT VISION & REMOTE PAN/TILT ROTATE. User Manual
IP Wireless / Wired Camera NIGHT VISION & REMOTE PAN/TILT ROTATE User Manual WELCOME This model IP Camera is an integrated wireless IP Camera solution. It combines a high quality digital Video Camera with
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
Cisco IPICS Push-to-Talk Management Center
Cisco IPICS Push-to-Talk Management Center Product Overview The Cisco IP Interoperability and Collaboration System (IPICS) Push-to-Talk Management Center (PMC) client (Figure 1) is a Microsoft Windows
Management of VMware ESXi. on HP ProLiant Servers
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
Development of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry
Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry July 2014 Introduction Trying to find your way around a large hospital or locating a high-value medical device such as
Why Can t We Be Friends?
Why Can t We Be Friends? Monitoring the Server Room by Introducing Modbus to SNMP Stanley Liu Product Manager, Data Acquisition & Control Division Overview IA devices are very useful for monitoring server
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Domus, the connected home
Domus, the connected home Amazouz Ali, Bar Alexandre, Benoist Hugues, Gwinner Charles, Hamidi Nassim, Mahboub Mohamed, Mounsif Badr, Plane Benjamin {aamazouz, abar, hbenoist, cgwinner, nhamidi, mmahboub,
Access Control in Surveillance Station 7.0
Access Control in Surveillance Station 7.0 With Axis Network Door Controller A1001 Synology Inc. Synology_ACISS_20150305 Table of Contents Chapter 1: Introduction... 3 1.1 What Is Access Control?... 3
CARRIOTS TECHNICAL PRESENTATION
CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO [email protected] @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM
Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Introduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
Implementing SIP and H.323 Signalling as Web Services
Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de
An Intelligent Car Park Management System based on Wireless Sensor Networks
An Intelligent Car Park Management System based on Wireless Sensor Networks Vanessa W.S. Tang, Yuan Zheng, Jiannong Cao Internet and Mobile Computing Lab Department of Computing, The Hong Kong Polytechnic
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An International online open access peer reviewed journal
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An International online open access peer reviewed journal Research Article ISSN 2277 9140 ABSTRACT An e-college Time table Retrieval
Functional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
Notification messages
AXIS P8221 Network I/O Audio Module TECHNICAL NOTE Notification messages How to integrate AXIS P8221 Updated: August 19, 2011 Rev: 1.1 TABLE OF CONTENTS 1 INTRODUCTION 3 1.1 HTTP and TCP 3 1.2 VAPIX 3
MASHUPS FOR THE INTERNET OF THINGS
MASHUPS FOR THE INTERNET OF THINGS Matthias Heyde / Fraunhofer FOKUS glue.things a Mashup Platform for wiring the Internet of Things with the Internet of Services 5th International Workshop on the Web
Remote Client Program... 3. Web Client... 39
Remote Client / Web Client USER MANUAL T Series Digital Video Recorder Remote Client Program... 3 Remote Client Program Installation... 4 Remote Client... 6 Main Window... 6 Site Registration... 7 Group
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
Integrated Building Management and Security System. Building Automation & Security. www.lonix.com
Integrated Building Management and Security System Building Automation & Security www.lonix.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 GREEN BUILDING REQUIREMENTS...
Trademark Notice. General Disclaimer
Trademark Notice General Disclaimer Intelligent Management, Centralized Operation & Maintenance Huawei Data Center Network Management Solution A data center is an integrated IT application environment
Autos Limited Ghana Vehicle Tracking Business Proposal
Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize
Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle
C Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle Hou-Tsan Lee, Wei-Chuan Lin, Jing-Siang Huang Department of Information Technology, TakMing University of Science and Technology
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
IP Surveillance. Presentation for BICSI Regional Conference Troy, Michigan March 15, 2011. Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link
IP Surveillance Presentation for BICSI Regional Conference Troy, Michigan March 15, 2011 Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link Agenda Analog or IP Security Cameras VGA or Megapixel Resolution
Field Inspection Remote Access Comparison
Field Inspection Remote Access Comparison Questions? From your BS&A program, go to Help>Contact Customer Support and select Request Support Phone Call or Email Support. Or, you may call us at (855) 272-7638
Only Athena provides complete command over these common enterprise mobility needs.
Mobile devices offer great potential for making your enterprise run faster, smarter, and more profitably. However, mobile devices can create considerable challenges for your IT organization, since they
How To Set Up Egnyte For Netapp Sync For Netapp
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
Intelligent Infrastructure
Intelligent Infrastructure Management Update Frank Velleca Market Manager - Siemon What is Intelligent Infrastructure Management (IIM)? A combination of hardware and software designed to help better manage
- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected]
Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected] Biometric Systems Biometrics
Team Quicken Loans: Mobile RFID Inventory Tracking System. Project Plan. Spring 2014
Team Quicken Loans: Mobile RFID Inventory Tracking System Project Plan Spring Michigan State University Student Team Josh Rasor Jacob Riesser Keyur Patel Quicken Loans Professional Team Jim Brzuch Patrick
Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM)
Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM) Purpose This technical note describes the components and process of the new power and environmental
Media Call Center. Quick Start Guide. www.dialogic.ro
Media Call Center Quick Start Guide With more than twelve years of expertise in the Computer Telephony Integration field, Mediatel Data Company has demonstrated a commitment to developing powerful solutions
Managing Enterprise-wide Printing: The IT Challenge
Managing Enterprise-wide Printing: The IT Challenge Presented by September 2002 There is a way To inject true efficiency into enterprisewide printing To have enterprise-wide visibility, total control and
Associate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
The Ubiquitous Web, UPnP and Smart Homes
The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision
TMS Phone Books Troubleshoot Guide
TMS Phone Books Troubleshoot Guide Document ID: 118705 Contributed by Adam Wamsley and Magnus Ohm, Cisco TAC Engineers. Jan 05, 2015 Contents Introduction Prerequisites Requirements Components Used Related
Crow Limited Warranty. Print Version 017
Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose
Trust: When Physical and Logical Security Worlds Collide
Trust: When Physical and Logical Security Worlds Collide Bob Beliles VP. Enterprise Business Development Hirsch Electronics Copyright 2009 Trusted Computing Group Copyright 2009 Trusted Computing Group
A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION
Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Remote Monitoring and Controlling System Based on ZigBee Networks
Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr
IP Video Surveillance
IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access
ParkiNG systems Payment systems Payment terminals
ParkiNG systems Payment systems Payment terminals crosspark cross aptm cross aptl AUTOMATIC BARRIER PARKING SYSTEM AUTOMATIC PAYMENT TERMINAL PAYMENT STATION Parking system PARKING GUIDANCE SYSTEM PGS
A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
Huawei One Net Campus Network Solution
Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Contents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
Data Center Network Evolution: Increase the Value of IT in Your Organization
White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new
Endoscope Tracking System
Endoscope Tracking System ENDORA Tracking System Workflow Storage: Displays which cabinet the endoscope is in Timestamps when endoscope enters the cabinet Procedure: Links patient ID to endoscope used
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
