...2228-2232 Wireless Controlled Omnidirectional Monitoring Robot With Video Support M. A. Meor Said, M.A.Othman, M.M.Ismail, H.A.Sulaiman, M.H.Misran, Z.A. Mohd Yusof Centre for Telecommunication Research and Innovation, Fakulti Kej. Elektronik dan Kej. Komputer, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka, Malaysia ABSTRACT This paper presents the function of Wireless controlled omnidirectional monitoring robot with video support. This project is an elementary that can be controlled with using RF mode and with camera on the robot surface. Generally, the RF has the advantage of adequate range up to 200 meters with proper antennas and the proposed monitoring robot is omnidirectional that it can move in forward and reverse directions, monitoring robot also is able to steer it towards left and right direction. It also have additional webcam/camera that can display on the monitor screen by using the wireless mode, beside that this project also using EPIC software and PIC Microcontroller for controlled the robot. To make sure that the objectives of this project achieved, a systematic method have been applied in order to obtain the future development of the robot especially for the robot motor control circuit and actuator mechanical system. Instead of connecting with wires, every appliance has small transmitters/receivers [4]. The project is to detect an object that is located at some distance within the range of RF transmitter with webcam...
Words: 3266 - Pages: 14
...2228-2232 Wireless Controlled Omnidirectional Monitoring Robot With Video Support M. A. Meor Said, M.A.Othman, M.M.Ismail, H.A.Sulaiman, M.H.Misran, Z.A. Mohd Yusof Centre for Telecommunication Research and Innovation, Fakulti Kej. Elektronik dan Kej. Komputer, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka, Malaysia ABSTRACT This paper presents the function of Wireless controlled omnidirectional monitoring robot with video support. This project is an elementary that can be controlled with using RF mode and with camera on the robot surface. Generally, the RF has the advantage of adequate range up to 200 meters with proper antennas and the proposed monitoring robot is omnidirectional that it can move in forward and reverse directions, monitoring robot also is able to steer it towards left and right direction. It also have additional webcam/camera that can display on the monitor screen by using the wireless mode, beside that this project also using EPIC software and PIC Microcontroller for controlled the robot. To make sure that the objectives of this project achieved, a systematic method have been applied in order to obtain the future development of the robot especially for the robot motor control circuit and actuator mechanical system. Instead of connecting with wires, every appliance has small transmitters/receivers [4]. The project is to detect an object that is located at some distance within the range of RF transmitter with webcam...
Words: 3266 - Pages: 14
...Radio Frequency (RF) Interference Analysis and Optimization By Farhana Jahan ID: 061-19-342 Md. Rafiqul Islam ID: 061-19-370 Md. Mohibul Hasan ID: 061-19-373 A thesis report presented in partial fulfillment of requirements for the degree of Bachelor of Science in Electronics and Telecommunication Engineering Supervised by Mohammed Humayun Manager (Network Department) ADVANCED DATA NETWORKS SYSTEM LIMITED Red Crescent Concord Tower (19th floor) 17, Mohakhali Commercial Area, Dhaka-1212 Department of Electronics and Telecommunication Engineering DAFFODIL INTERNATIONAL UNIVERSITY October 2009 i APPROVAL PAGE This thesis titled „Radio Frequency (RF) Interference Analysis and Optimization‟, Submitted by Md. Rafiqul Islam, Md. Mohibul Hasan and Farhana Jahan to the Department of Electronics and Telecommunication Engineering, Daffodil International University, has been accepted as satisfactory for the partial fulfillment of the requirement for the degree of Bachelor of Science in Electronics and Telecommunication Engineering and approved as to its style and contents. The presentation was held on 19th October 2009. Board of Examiners Mr. Golam Mowla Choudhury Professor and Head Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Chairman) Dr. M. Lutfar Rahman Dean & Professor Faculty of Science and Information Technology Daffodil International University ---------------------(Member) A K M Fazlul...
Words: 18928 - Pages: 76
...WIRELESS BROADBAND NETWORKS - Technical Implementation Guide AMD WHITEPAPER Version 1, Release 0.2 18th May 2004 For more information, see www.amd.co.th and contact us at: Email: partner@amd.co.th / Fax: +1-9177209888 i This page is intentionally left blank. ii For more information, see www.amd.co.th and contact us at: Email: partner@amd.co.th / Fax: +1-9177209888 TABLE OF CONTENTS Page 1. INTRODUCTION ................................................................................................................... 1 1.1 Background .................................................................................................................... 1 1.2 About AMD .................................................................................................................... 1 TECHNOLOGY OVERVIEW ................................................................................................ 2 2.1 Proprietary versus Standards-Based Solutions ............................................................... 3 2.2 Scalability and Interoperability ...................................................................................... 3 2.3 Radio Frequency (RF) .................................................................................................... 4 2.4 Attenuation and Interference .......................................................................................... 5 2.5 Transmitters, Receivers, and Transceivers ..........................................
Words: 7785 - Pages: 32
...“Heaven’s Light is Our Guide” [pic] DEPARTMENT OF Electronics and Telecommunication Engineering Rajshahi University of Engineering & Technology, Bangladesh RADIO RESOURCE MANAGEMENT IN WiMAX Author Md.Masud Hasan Roll No.054005 Department of Electronics and Telecommunication Engineering Rajshahi University of Engineering & Technology Supervised by Md.Delwar Hossain Head Department of Electronics and Telecommunication Engineering Rajshahi University of Engineering & Technology ACKNOWLEDGEMENT All praises to ALLAH, the cherisher and the sustainer of the universe, the most gracious and the most merciful, who bestowed me with health and abilities to complete this thesis successfully. This thesis means to me far more than a honours degree requirement as my knowledge was significantly enhanced during the course of its research and implementation. I am especially thankful to the Faculty and Staff of Rajshahi University of Engineering and Technology (RUET), Rajshahi, Bangladesh, that have always been a source of motivation for me and supported me tremendously...
Words: 15898 - Pages: 64
...SEMINAR REPORT ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use...
Words: 4933 - Pages: 20
...Jacksonville University ABSTRACT This analysis of the information technology infrastructure at United Parcel Service (UPS) begins with a general overview of the company’s information technology (IT) environment to establish awareness of the size and complexity of this corporation. It includes a macro-level breakdown of the technology infrastructure of UPS ranging from the data centers to the PCs currently in operation. The study also more closely analyzes the software and database structure of UPS along with an analysis of the company’s E-commerce activities. It includes an interview with Tom Creech, the North Florida District E-commerce manager at UPS. Finally, research was conducted to evaluate the emerging technologies that UPS is implementing and employing to support the business strategy and maintain its competitive edge. OVERVIEW nfrastructure, data and proprietary e-commerce software elements are the foundation of UPS’s technology success. These tools work together to support its e-commerce strategy, which in turn supports the company’s business strategy. The company’s ongoing investment and research in emerging technologies gives UPS its competitive advantage according to Tom Creech, North Florida District E-commerce Manager. “UPS is always interested in current and emerging technologies that can assist our business and improve our efficiency” (Creech, 2004). Several awards have been presented to UPS for its application and innovativeness in e-commerce technology...
Words: 3557 - Pages: 15
...Jacksonville University ABSTRACT This analysis of the information technology infrastructure at United Parcel Service (UPS) begins with a general overview of the company’s information technology (IT) environment to establish awareness of the size and complexity of this corporation. It includes a macro-level breakdown of the technology infrastructure of UPS ranging from the data centers to the PCs currently in operation. The study also more closely analyzes the software and database structure of UPS along with an analysis of the company’s E-commerce activities. It includes an interview with Tom Creech, the North Florida District E-commerce manager at UPS. Finally, research was conducted to evaluate the emerging technologies that UPS is implementing and employing to support the business strategy and maintain its competitive edge. OVERVIEW I nfrastructure, data and proprietary e-commerce software elements are the foundation of UPS’s technology success. These tools work together to support its e-commerce strategy, which in turn supports the company’s business strategy. The company’s ongoing investment and research in emerging technologies gives UPS its competitive advantage according to Tom Creech, North Florida District E-commerce Manager. “UPS is always interested in current and emerging technologies that can assist our business and improve our efficiency” (Creech, 2004). Several awards have been presented to UPS for its application and innovativeness in e-commerce technology...
Words: 3609 - Pages: 15
...Networking Proposal for Rubha Reidh Name Institution Table of Contents Abstract 3 Introduction 5 Overview of Satellite Link Technology 7 Overview of Fibre Optics Link Technology 9 Choice of Satellite over Fibre Internet Connection 10 Wireless Networking Design 12 Mesh Network Backbone 13 802.11 Access Points 15 Intranet Services 16 Challenges 16 Proposed System Design 17 Phase I: Bed and breakfast building to include the private rooms, common area and lounge 17 Phase II: Extending to cover the lighthouse and associated surrounding area 18 Budget 18 Phase I Deployment 18 Phase II Deployment 19 References 21 Abstract The aim of the Rubha Reidh internet project is to construct a robust computer network to encompass the whole lighthouse area using a high speed and reliable internet connection. This has been determined as mesh networking technology. This network will deliver access to email, Web pages, and internet resources for users in the lighthouse area, using both laptops and desktops, as well as mobile devices with connectivity capability. By leveraging the usage of robust and inexpensive wireless network technology, this plan will substantially decrease expenditures for ensuring internet connectivity for the whole lighthouse area, as well as allow better elasticity in planning and expansion. Rubha Reidh is an automated lighthouse that is located in the Scottish remote western coast. Its remoteness stems from the fact that its nearest neighbour is Melvaig...
Words: 4859 - Pages: 20
...Wireless Electricity Devry University Tech, Society, and Culture Professor February 24, 2013 Table of Contents I. Wireless Electricity: Explanation and History 3 II. Political and Legal Influences 10 III. Economic Questions and Considerations 16 IV. Wireless Technology with Today’s Culture 20 V. Ethical Implications of Wireless Power 26 VI. Environmental Impact 30 VII. Bibliography 33 ABSTRACT: Wireless electricity is not a new idea, but it has recently become revitalized. This paper looks at the different facets of this invigorated technology. First, it talks about what wireless electricity is and the different approaches of producing it. The paper also talks about the history of wireless electricity and what social factors have motivated it to become invigorated. Next, the government involvement and political issues are talked about. Wireless electricity will also affect the economy so its economic impact is also a topic that is discussed. The psychological and sociological effects of wireless electricity will also be well-thought-out in the next section. The cultural background of this technology is studied and highlighted in American culture. Every technology needs to be examined in detail for its effect on the environment and wireless electricity is no different. The last section of this paper talks about the moral and ethical...
Words: 14468 - Pages: 58
...Chapter 12 WLAN Troubleshooting IN ThIs chApTer, you WILL LeArN AbouT The foLLoWINg: ÛÛ Layer 2 retransmissions NÛ RF interference Multipath Adjacent cell interference Low SNR Mismatched power settings Near/far Hidden node NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ 802.11 coverage considerations NÛ Dynamic rate switching Roaming Layer 3 roaming Co-channel interference Channel reuse/multiple channel architecture Single channel architecture Capacity vs. coverage Oversized coverage cells Physical environment NÛ NÛ NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ Voice vs. data ÛÛ Performance ÛÛ Weather Copyright © 2009 John Wiley & Sons, Inc. Diagnostic methods that are used to troubleshoot wired 802.3 networks should also be applied when troubleshooting a wireless local area network (WLAN). A bottoms-up approach to analyzing the OSI reference model layers also applies to wireless networking. A wireless networking administrator should always try to first determine whether problems exist at layer 1 and layer 2. As with most networking technologies, most problems usually exist at the Physical layer. Simple layer 1 problems such as nonpowered access points or client card driver problems are often the root cause of connectivity or performance issues. Because WLANs use radio frequencies to deliver data, troubleshooting a WLAN offers many unique layer 1 challenges not found in a typical wired environment. The bulk of this chapter discusses the numerous potential problems...
Words: 16450 - Pages: 66
...TB 11-5800-229-10 TECHNICAL BULLETIN SYSTEM OVERVIEW GUIDE WARFIGHTER INFORMATION NETWORK - TACTICAL (WIN-T) INCREMENT 2 FInal Draft DISTRIBUTION STATEMENT C: Distribution authorized to U.S. Government Agencies and their contractors. This publication is required for administrative and operational purposes. This determination was made on 15 March 2011. Other requests for this document must be referred to Commander, U.S. Army CECOM Life Cycle Management Command (LCMC), ATTN: AMSEL-LCL-ECM, Aberdeen Proving Ground, MD 21005-1846. WARNING: This document contains technical data whose export is restricted by the Arms Export Control Act (Title 22, U.S.C., Sec 2751, et. seq.) or the Export Administration Act of 1979, as amended, Title 50A, U.S.C., App. Violations of these export laws are subject to severe criminal penalties. Disseminate in accordance with provisions of DoD Directive 5230.25.. DESTRUCTION NOTICE - Destroy by any method that will prevent disclosure of contents or reconstruction of the document. HEADQUARTERS, DEPARTMENT OF THE ARMY 15 JUNE 2012 TB 11-5800-229-10 LIST OF EFFECTIVE PAGES/WORK PACKAGES NOTE: The portion of text affected by the change is indicated by a vertical bar in the outer margins of the page. Changes to illustrations are indicated by a vertical bar adjacent to the title. Zero (0) in the “Change No.” column indicates an original page or work package. Date of issue for the original manual is: Original: 15 June 2012 TOTAL...
Words: 42929 - Pages: 172
...ELECTRONICS AND COMMUNICATION ENGINEERING I YEAR COURSE STRUCTURE |Code |Subject |T |P/D |C | | |English |2+1 |- |4 | | |Mathematics - I |3+1 |- |6 | | |Mathematical Methods |3+1 |- |6 | | |Applied Physics |2+1 |- |4 | | |C Programming and Data Structures |3+1 |- |6 | | |Network Analysis |2+1 |- |4 | | |Electronic Devices and Circuits |3+1 |- |6 | | |Engineering Drawing |- |3 |4 | | |Computer Programming Lab. |- |3 |4 | | |IT Workshop |- |3 |4 | | |Electronic Devices and Circuits Lab |- |3 |4 | | |English Language Communication Skills Lab...
Words: 26947 - Pages: 108
...Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director W IRELESS NETWORK SECURITY Note to Readers This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose. Acknowledgments The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document. First, the authors wish to express their thanks to the staff at Booz Allen Hamilton...
Words: 52755 - Pages: 212
...C O U R S E 5 6 5 Networking Technologies Volume 1 This document should only be used by a Novell-certified instructor. Ifyouthinkthisdocumentwaspirated,call1-800-PIRATESor1-801-861-7101. Networking Technologies Instructor Guide (Volume 1) Education INSTRUCTOR GUIDE 100-004273-001 Revision 1.0 Proprietary Statement Copyright © Novell, Inc. 1994, 1997, 1998. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express prior consent of the publisher. This manual, and any portion thereof, may not be copied without the express written permission of Novell, Inc. Novell, Inc. 1555 North Technology Way Orem, Utah 84097-2399 Disclaimer Novell, Inc. makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes in its content at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any NetWare software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of NetWare software...
Words: 27853 - Pages: 112