Free Essay

Pervasive Computing

In:

Submitted By morvie
Words 2036
Pages 9
Pervasive Computing

Pervasive computing is a trend towards information being readily available to anyone, anywhere at anytime. This trend is due to the decrease in powerful microprocessors being embedded in everyday objects enabling users and devices to connect wirelessly to the internet, devices, and to other users from wherever they may happen to be. Pervasive computing thus provides users with the ability to access and take action on information conveniently. This idea of pervasive computing is to enable users to interact other users and access information in a more natural form such as merely speaking and gesturing. Mobile phones and personal digital assistants (PDAs) have become very much a part of everyday life due to the many functions they provide and the functions that are yet to be implemented. These functions are made possible through chips being made smaller and able to compact different functionalities. Pervasive computing will usher in new forms of collaboration, communication, the ease of acquiring information, and performing functions that will become the norm in homes, clothing, and businesses. What pervasive computing does is eliminates the steps to complete tasks. For example if a student needed to go to a library to do research for a term paper he/she would get dressed, drive, walk, or take public transportation to reach the library, and ask a librarian to direct him/her to the resources. Today all it takes is having an internet connection and the library comes to the student. Eliminating steps to achieve a goal, whatever the goal maybe, reduces time and money. The valuable time someone saves in completing a task, creates more time to pursue others. Smart home is one of the many examples of pervasive computing where devices communicate with other devices in the home. “Over the last 15 years, computerized controls have become more and more common in our homes.” Although the smart home differs from other homes, the main difference is that in a regular home each device is separate and functions independent of other devices. In a smart home a communications infrastructure is installed that allows various systems and devices in the home to communicate with each other therefore allowing the passing of information and commands through this connection. When designing a smart home, every effort should be made to ensure that it works in the same or a similar manner to other houses. “Therefore, pushing a door should still open it and clicking a light switch should still turn the light on or off. However, the house can also be operated in a variety of other ways that may be more useful or appropriate for the person living there.” An advantage of the smart home technology is that equipment that already exists in the home can be adjusted to provide more functions. For example, “detectors normally used for security alarms can be used to identify if someone is in a room or if the room temperature has changed.” In addition, equipment can be implemented to open and close doors and windows automatically. For the most part, the smart home is computerized and built on existing bus wiring in the house. “The computers control our washing machines, microwaves, heating, and provide new ways to monitor the safety and security of the homes.” The goal is to create and expand the use of existing computers into other parts of the home through a single network that can be easily controlled. Through computers it would be possible to eliminate the step of flicking a switch manually versus controlling the lights remotely. These computers are linked together using either a dedicated cable or by sending a special signal through the main electricity cables. The security alarm panel in the house also operates as an answering machine and can be used to dial into the house and tell it to do certain things. This system relies on a PIN number, similar to the one used at a cash point to ensure that only authorized users can control the house in this way. The system has a series of voice prompts that will guide the user through the operation of the house. For example, if you are late coming home one evening you can call the house and command it to close the curtains when it gets dark. Also, if you have been away from the house for a few days and want to be sure the house is warm on your return; you can call the house and switch the central heating on. This system can also be used to call you at work or on a mobile phone if someone rings your doorbell when you are not in the house. Some of the main features of a smart home include, but are not limited to:

• Integrated Security • Safety Systems • Independent Living • Telephone Control • Dedicated Wiring Bus • Power Line Communication • Infrared Communication • Radio Frequency Communication

Another aim of the smart home is to eliminate the need for mechanical switches and allowing computerized systems to make decisions. In the smart home the switch takes on a different function. Rather than regulating the flow of electricity, the switch sends a signal to a communication network (bus system), informing the network of the new position of the switch. The regulation of electrical flow takes place at the controller rather than at the switch unit. If the bus system connects more than just lights, it is possible to radically change the way the home is controlled. Since the switch is no longer directly related to any particular device, it can operate any device on the network that has been commanded to respond to the signal from the switch. Devices in the home are now able to change status in response to a signal on a network and so commands no longer need to come from a physical switch. While many smart homes rely on distributed control systems that do not need a personal computer to operate, computers can be used as an interface with the home. These computers can be used to send messages to, and receive messages from the smart home. According to Duncan Graham, the use of a web server in the home would allow a visual representation of the home to be created as a web page and accessed from a web browser. This could be used to control the home either from inside over a local area network (LAN) or remotely if an internet connection is always on in the home. In Barcelona, a company called Eneo Labs specializes in providing services for a “Connected Home” as they call it. One of the services they provide is having the ability to monitor your home through you phone real time. Another would be to send alerts by SMS if anything in the home malfunctioned. General Manager Javier Zamora explains how smart houses consist of two components. An “information network” (Figure 1), which can be considered as the nervous system in the human body, connects all devices in the home making it possible to communicate; and a brain (Figure 2) co-ordinates the environments inside the home to connect to what goes on outside. The Connected Home became possible to ADSL (figure 1) lines rolled out into homes which set up the information network.
[pic]Figure 1

[pic]Figure 2

“It would also be security-conscious and aware of its occupants’ well being, monitoring whether some one has fallen, and control temperature and light settings, depending on what is happening outside.” CNN.

The use of the wireless application protocol (WAP) allows mobile telephones to link to a limited version of the internet. Setting up the home with a (WAP) server will allow for control through a mobile phone or other remote device. Recent developments in speech recognition technologies are making it possible for spoken commands to operate the home. In the past microphones would have to be positioned close to the user's mouth in order to eliminate background interference, but more centrally located microphones now solve these problems and enhance the technology. Each room in the home can have a temperature sensor that maintains the room at the temperature set on the main controller. The central heating can also be turned on and off from any remote control device. Externally, there can be a detector that measures wind speed and light level. Internally, each room can be equipped with a multi-function detector head that looks similar to a smoke detector. The detector can measure smoke, temperature (for fire and heating), light level, movement (using passive infrared), and carbon monoxide. This detector also has an infrared receiver, emergency light, siren, and microphone. These detectors are used to allow the house to respond to changing conditions and to remote control devices. The security system panel can be used to act as the answering machine for the smart house. Setting the alarm will activate the central locking system, and this will close all windows and doors and can also switch off any devices needed. For example, you may want it to turn off any lights left on during the daytime or turn off the electrical devices in case of a power outage or fire. The security system can also be operated through the internal telephone or by dialing into the house from an outside line. If necessary, special replacement plugs can be fitted into the home that will allow remote control of the appliances. The adaptors can be turned on or off from buttons on the plug, or through any of the remote control devices.

The designers of a smart home need to take into account not only the form of the house itself but also the requirements (both generic and specific). The Joseph Rowntree Foundation (JRF) has used Echelon's Lon Works communication protocol in the development of its smart homes, but this is only one of the potential ways of achieving interoperability. The underlying technologies used will determine some of the subsequent specification decisions. The design and structure of the building in which they will be installed will influence the technologies decided on. The choice of the most appropriate transmission media will depend on the house in which they will be installed. In a new build or major refurbishment project, a dedicated wiring bus system may prove more appropriate. An appropriate understanding of the user and their needs will form an essential part of any specification. Motorized devices tend to be an expensive element of any installation and so the costs / benefits of their usage must be carefully considered. The distributed nature of most smart homes systems means that the failure of a single device is unlikely to disrupt the whole system. The use of battery back-up systems that are often incorporated in low voltage devices should also be considered in case of power failure.

In September 2005, a host of new wireless gadgets designed to help make buildings and homes "smart" debuted at the ZigBee Open House and Exposition in Chicago. Among the gadgets was a domestic awareness system that warns you if the stove is left on or if the basement starts flooding. Another system at the exposition allows you to network your home entertainment system with environmental controls such as light dimmers or a thermostat. Underlying the systems is a new wireless-networking standard called ZigBee that was developed by the ZigBee Alliance. Many earlier smart systems used proprietary technology; ZigBee is built on an Institute of Electrical and Electronics Engineers (IEEE) global standard (802.15.4). This is similar to the standards that govern Bluetooth and Wi-Fi. Technology however, unlike Bluetooth and Wi-Fi networks which require central hubs that distribute information to dispersed devices, ZigBee allows devices to form mesh networks. Mesh networks are far more robust than their hub and spoke counterparts as each unit can relay information to its neighbors. If a node breaks down, other nodes can automatically reroute transmissions around it. This is an advantage in something like a building-wide lighting system because you would not want one bad switch to bring the whole thing down. Mesh networking could let ZigBee systems link as many as 64,000 devices. In contrast, Bluetooth networks are limited to just eight nodes.

Similar Documents

Premium Essay

The Survey and Future Evolution of Green Computing

...IEEE/ACM International Conference on Green Computing and Communications The Survey and Future Evolution of Green Computing Qilin Li Production and Technology Department Sichuan Electric Power Science and Research Institute Chengdu, Sichuan, P.R.China li_qi_lin@163.com Mingtian Zhou School of Computer Science and Technologies University of Electronic Science and Technology Chengdu, Sichuan, P.R.China mtzhou@uestc.edu.cn Although green computing is becoming increasingly important in IT systems, it presents challenging problems to system designers. Designers need to take into account energy consumption during the phase of system design and to find solutions to reduce it. Green computing involves all aspects of IT systems, such as chips, system architectures, compilers, operating systems, communication networks and application services, and so on[1]. Further, these aspects are interdependent and complicated. As a result, building lowcost and low-power-consumption systems is a challenging and important activity. Such a new computing paradigm introduces new technical challenges to system designers. In light of today’s requirements for green computing, we present latest research efforts that attempt to deal with them and indicate still open issues. We thus discuss the connotation of green computing and sketch our view on the next generation of IT systems for green computing. We further identify key issues relevant to green computing and evaluate different approaches to these...

Words: 2936 - Pages: 12

Premium Essay

Thesis in Factors Affecting the Study Habbit of the Students

...------------------------------------------------- ICT * *   *   * Stands for "Information and Communication Technologies." ICT refers to technologies that provide access to information through telecommunications. It is similar to Information Technology (IT), but focuses primarily on communication technologies. This includes the Internet, wireless networks, cell phones, and other communication mediums. In the past few decades, information and communication technologies have provided society with a vast array of new communication capabilities. For example, people can communicate in real-timewith others in different countries using technologies such as instant messaging, voice over IP (VoIP), and video-conferencing. Social networking websites like Facebook allow users from all over the world to remain in contact and communicate on a regular basis. Modern information and communication technologies have created a "global village," in which people can communicate with others across the world as if they were living next door. For this reason, ICT is often studied in the context of how modern communication technologies affect society. Tech Factor:  1 2 3 4 5 6 7 Updated: January 4, 2010 Webopedia.com Sign Up    |    Sign In    ------------------------------------------------- Top of Form SEARCH Bottom of Form * Term of the Day * Recent Terms * Did You Know? * Quick Reference * All Categories * Resources * WeboBlog ...

Words: 2728 - Pages: 11

Free Essay

I Nformation Technology

...campus. The discussion starts off with a background and purpose of the research project, and then it explains the research focus and gives a brief overview of the project‘s approach towards a literature research. History of Green computing In 1992, the U.S. Environmental Protection Agency launched Energy Star, a voluntary labeling program which is designed to promote and recognize energy-efficiency in monitors, climate control equipment, and other technologies. This resulted in the widespread adoption of sleep mode among consumer electronics. The term "green computing" was probably coined shortly after the Energy Star program began; For a PC disposal, it is necessary to know everything there is to know in order to be involved in green computing. Basically, the whole green aspect came about quite a few years back when the news that the environment was not a renewable resource really hit home and people started realizing that they had to do their part to protect the environment. Basically, the efficient use of computers and computing is what green computing is all about. The triple bottom line is what is important when it comes to anything green and the same goes for green computing. This considers social...

Words: 2205 - Pages: 9

Premium Essay

Reaction Paper

...The topic of the video which is about the history of computer was kind of interesting since it high lightened our mind about where the computer had really came from. Not only have that, it also made us understand how the computers of today became very wonderful and powerful. Before, computers only existed in the imagination of humans and were believed that creating such monstrous device was impossible. It was a huge leap in the field of computer during the 19th century when Charles Babbage developed the 1st modern computer called the difference machine. The most advantageous feature of this machine is that it reflected Babbage’s attitude of being a perfectionist. Although his work was not finished, the detailed text that was written by Ada was significant in modifying his versions and for documentary purposes of his work. The rapid increase of the American population, on the other hand, triggered the development of a machine that will help the census tabulate such population very fast. Hermin Horrith’s occupation was very helpful to the development of this machine since he used business to gain money to revise his machine which had later evolved into the international business machine. Although war causes devastation to the environment as well as the people involved, it also had contributed to the development of computers, which is the birth of ENIAC, the first large-scale, general purpose, digital computer that is used to calculate the paths of artillery shells. It was a good...

Words: 320 - Pages: 2

Free Essay

C++ Case Statements

...CMIS102 Homework Assignment 2 (Worth 13% of your grade) Student Name: Ariel Cintron Class/Section: CMIS102 / 6383 Professor Name: Ronald Mcfarland Assignment due date: Feb 01 2012 Problem definition: Calculate the total price to purchase all the components required to build a state-of-the-art gaming computer from components available on the internet. A. Problem Analysis – Following the directions in the assignment, clearly write up your problem analysis in this section. The input consists of computer base price (CompPrice), the CPU choice (CPU_choice), the RAM choice (RAM_choice), and the Graphics Card choice (VideoCard_choice). Once the customer has entered a choice of an option, the program will determine the corresponding cost of that option: CPU_cost, RAM_cost, VideoCard_cost. The only item output is the computer selling price (ComputerPrice). To determine the ComputerPrice, the following computation is: ComputerPrice = CompPrice + CPU_cost + RAM_cost + VideoCard_cost. B. Program Design – Following the directions in the assignment, clearly write up your problem design in this section and comment your pseudocode. Things the program must do: 1. Input the computer base price 2. Process the various options to compute the additional costs 3. Total all the costs 4. Display the final selling price The main Module will contain the following submodules: Compute_CPU_Cost Compute_RAM_Cost ...

Words: 908 - Pages: 4

Free Essay

Phd Candiate

...Profile: I'm a researcher in the faculty of graduate studies, Albalqa’ Applied University, Jordan. Also I'm working as Systems Operator in Computer Department and administrate over 22 branches of the company at Jordanian Electric Power Company (JEPCO). I hold B.Sc Degree in Management Information Systems (MIS), Also Master Degree in Business Administration (MBA) from Albalqa' Applied University (BAU). My research interest in the areas of e-Government, eServices, web analytics and business management. I have authored and co-authored several journal papers joint with professionals™ researchers in Ballarat, and Deakin University. Australia. |Personal Data |: |Name |: | | | |Nationality |: | | | |Birth Date |: | | | |Marital Status |: | | | |Gender |: | | | |Address |: | ...

Words: 836 - Pages: 4

Free Essay

Triumph of the Nerds

...REACTION PAPER Prepared to: MS. AILEEN L. RILLON The Triumph of the Nerds is a documentary chronicles of the rise of the personal computer/home computer beginning in the 1970s with the Altair 8800, Apple I and Apple II and VisiCalc. It highlighted the progress and competitiveness of the market between companies like Microsoft, Apple, IBM, Xerox, and Lotus, just to name a few. It continues through the IBM PC and Apple Macintosh revolution through the 1980s and the mid 1990s, ending at the beginning of the Dot-com boom with the release of Windows 95. The Triumph of the Nerds is one of the most important stories in human culture. It is the great story in the history that has affected the daily living of the individuals today…and obviously, for the next years, centuries, and millennium to come. With the human, he has transformed the existence of the people at the speed of an avalanche. It created another new dimension to discover and to explore. It leads our lives in another portal of world. Consider current trends such as today’s youth do not like to talk on the telephone. They should rather communicate via electronic telegrams tapped out with their thumbs. That is very strange. What if those “nerds” did not come up with the idea of creating computer? What would possibly happen to us? In a world characterized by a chaotic lifestyle of the “instant”, it is not uncommon to be caught in the whirlwind of hi-tech era. One very obvious application of computers in our lives is the...

Words: 593 - Pages: 3

Free Essay

Information Technology

...EDWIN ADJEI BOATENG C/O MR. WILLIAM OHENE - ADU P. O. BOX 1294 KUMASI MOBILE: 0245009355 / 0268978260 E-MAIL ADDRESS: eboatengadjei@yahoo.com , eboatengadjei@hotmail.com CAREER OBJECTIVE A computer science graduate, who is keen to find a position as an IT Manager. I am very reliable, industrious, trustworthy, respectful young man and receptive to new but brilliant ideas. I can work with little or without supervision and also work as part of a team. EDUCATIONAL BACKROUND • 2007 – 2011 Kwame Nkrumah University of Science and Technology • 2002 – 2005 Kumasi Polytechnic • 1999 – 2001 Akwamuman Senior High School • 1995 – 1998 Senchi-Ferry Methodist Junior High School • 1988 – 1994 B. Akoto Experimental QUALIFICATION BSc. (Hons) in Computer Science at KNUST Course content includes: Database Management and Administration, Programming in C++, Java and Visual Basic .NET, System Analysis, Networking, Computer Security and Management Science, Business Management and Economics, Management Information System, Etcetera. HND ELECTRICAL/ELECTRONIC ENGINEERING Course content includes: Network Analysis, Engineering Mathematics, Digital Electronics, Telecommunications, Power Systems, Computer Technology, Computer Literacy, Microcomputer, Computer Applications, Fault Diagnosis, Control Systems, Equipment Maintenance, Power Electronics, Etcetera. CISCO (CCNA Exploration: Network Fundamentals) at College...

Words: 649 - Pages: 3

Free Essay

Relationship Between Extent of Computer Technology Usage and Study Habit of Fourth Year High School Students

...Chapter 1 The Problem and Its Background This chapter is the preface about our problem, the relationship between extent of computer technology usage and study habit of students from Rogationist College and the its background. Introduction Nowadays, technology became an inseparable part of our lives. It now rules the life of an average student and in the field of education in any corner of the world. It has taken over the field of education. Its influence has been taken across the world in every possible way. According to Charlie S. (2012) “Computer has been taking big parts of our lives, in different sectors such as medicine, architecture, communication, research, sports and education. But it greatly affects the sector of education, especially the students”. In this world of competition, the students should have to be educated. Everything is not taught by a teacher or in school. In facing big challenges in life, students take extra learning through technology/computers. These computers can be used for their personal or recreational activities such as listening to music, watching movies or videos, chatting, browsing, playing games and etc. We can also express our feelings through it, through social networking sites. Furthermore, the work of the students became easier in searching information they want to learn. Technology has been part of our lives like language, ritual values, arts and more. It also affects our ways of thinking that can contribute to a more progressive...

Words: 5843 - Pages: 24

Free Essay

Computer Systems

...P4 - Describe the features and functions of information systems Features of information systems Information systems have five main features, which are data, people, hardware, software and telecommunications. Data – The data input to the system has to be as accurate as possible, subject to it's cost and timescales for capture. It should then be stored in the most logical way. This often differs from how the data is input. The data then needs to be summarised to create information in a way that best meets the needs of the system's user, this may not necessarily be the most logical way or the easiest or cheapest for the IT team. People – People are involved both in capturing the data and in exploiting the information. It is important to motivate those who capture the data by highlighting the value that the exploited data brings to the organisation. Hardware – In a small organisation the MIS ( management information system) may run on just the sales or finance director's PC. In larger businesses it usually runs on a server either shared or dedicated with internet or intranet access for those who need it. It is unusual to require specialised hardware. Software – The simplest MIS can be built using standard software. However, most MIS use specialised software, which has the most common features of an MIS already built in. The developer configures this by describing the database and its structure, where the data comes from, how to summarise the data ans what standard...

Words: 385 - Pages: 2

Premium Essay

Computer Addiction

...Chapter II History of Computer Addiction Computer addiction was noticed in 1973 in some people.The addiction is a mental illness which causes the excessive use of computers to the extent of it interfering with daily life. Its excessive use may also explain problems in social interaction, personality, mood, work ethic and relationships. Effects of Computer Addiction to Students Computer addiction can have a variety of negative effects on a person. The most immediate are social. The user withdraws from friends and family as he spends more and more time on the computer. Relationships begin to wither as the user stops attending social gatherings, skips meetings with friends and avoids family members to get more computer time. Even when they do interact with their friends, users may become irritable when away from the computer, causing further social harm. Excessive computer use can take an emotional toll. The user gradually withdraws into an artificial world. Constant computer gaming can cause someone to place more emotional value on events within the game than things happening in their real lives. Excessive viewing of Internet pornography can warp a person's ideas about sexuality. Someone whose primary friends are screen names in a chat room may have difficulty with face-to-face interpersonal communication.  It is known that we are living in technological era. The computers become irreplaceable tool in everyday life of almost each person. The adult users generally use it...

Words: 981 - Pages: 4

Premium Essay

Management Information Systems - Ups Case Study

...What are the inputs, processing, and outputs of UPS's package tracking system? There are two sides to UPS's package tracking system: the external, customer-oriented side, and the internal company and employee oriented side. The input starts with customer with the creation of a scannable bar-coded “smart” label which can be done from the UPS website or using a special software provided by UPS, both accessible via the internet. These labels will contain data about the sender, the destination, and package arrival times. This data is received by UPS's central computer for processing and the information is then forwarded to one of their distribution centers where logistical planning will occur. UPS drivers are given a handheld Delivery Information Acquisition Device (DIAD) which can immediately record and upload pickup and delivery information and pictures of recipient signature to the UPS network, called UPSnet, for storing and processing. The data being sent from the DIAD is gathered from the scannable label on packages, recipient signatures captured, time card info, satellite feed of traffic patterns and changing schedules. Finally, all this information's outputs will include the UPS intranet available company-wide to distribution centers, customer service centers, etc., and the internet via UPS's website or embedded UPS functions within corporate customer's own websites. What technologies are used by UPS? How are these technologies related to UPS's business strategy? The technologies...

Words: 902 - Pages: 4

Free Essay

Development and Validation of Computer Assisted Instruction

...Review of related literature and studies Literature * Kim (2006) how visual learning can affect the students way of learning. * Smith (2002) visual learners prefer to see how to do things rather than just talking about it. * Lehman, newby, russel, stepic (2005) computer-based tutorials have advantages such as students can interact with embedded questions then easily give feedbacks. * Laird (1985) by stimulating the senses, especially the visual sense, learning can be enhanced. * Computer assisted instruction – is an integrated module for the development and evaluation of the learning scheme of the users on the material provided. * * computer-assisted instruction (CAI), a program of instructional material presented by means of a computer or computer systems. The use of computers in education started in the 1960s. With the advent of convenient microcomputers in the 1970s, computer use in schools has become widespread from primary education through the university level and even in some preschool programs. Instructional computers are basically used in one of two ways: either they provide a straightforward presentation of data or they fill a tutorial role in which the student is tested on comprehension. If the computer has a tutorial program, the student is asked a question by the computer; the student types in an answer and then gets an immediate response to the answer. If the answer is correct, the student is routed to more challenging problems; if the...

Words: 394 - Pages: 2

Premium Essay

Ethics

...1.0 Explain how computers have impacted the community. 2.0 Evaluate the impact of computer technology. 3.0 Explain dilemmas associated with technologies. 4.0 Describe potential computer and system reliability problems. 5.0 Describe system reliability issues and prevention methods. 1.0 Explain how computers have impacted the community Imagine eleven years ago when computers you cost over a thousand bucks back in the early 90’s and it was big and bulky. According to Kelly Weidenfeld back those times we all remember AOL, If you didn’t had aol you didn’t had internet. Now in today’s time we can are using high speed internet and even FIOS as right now. Technology is really having a serious impact on today’s society Computers are being used for everything these days for example banks, fast food, groceries and even at work and hospitals. Comparing the past to the present everyone now has uses some form of a computer they used on a daily basics. 2.0 Evaluate the impact of computer technology Goldberg. S. (1984). He indicates that we are moving from the era of the industrial revolution into a different era called the Technological Revolution. He also emphasize that computer will have a permanent and enduring effect on our country and her people. We can see that in today’s time computers are almost everywhere we go we see them in schools, malls, cars and businesses. Stan goes on to say that computers is a vehicle which can be used to excite the learner...

Words: 756 - Pages: 4

Free Essay

Ping Sweeps and Port Scans

...Ping Sweeps and Port Scans James A. Fort SEC 280 Professor Dau July 15, 2012 Ping Sweeps and Port Scans With computer networks becoming larger hackers are looking more and more for ways to illegally gain access to our networks and procure information about our customers that they can use for their gain. Some tools that hackers are using are called ping sweeps and port scans. Now in the hands of Network Administrators these tools are not something to be afraid of, but in the hands of hackers they are something to be aware of because they have the ability to provide relevant information to a potential attacker. Ping sweeps and port scans will probably be the first steps of the attack because they provide the potential attacker a lot about our network as well as services, and open ports, on a computer system or our network. Ping sweep would be the first tool an attacker would take when he chooses to target our company’s computer systems. It is made up of a series of ICMP echo requests sent to a range of IP addresses to determine which IPs are in use by a host. A ping sweep is a valuable tool that can provide an attacker with a network map of all devices on the network, including hosts, routers, and other networked devices. With this information an attacker can establish an attack plan on network servers and hosts or can be used just to clog up the network. With the appropriate firewall in place protecting the network from pings outside of the LAN, then we can eliminate...

Words: 562 - Pages: 3