Free Essay

Remote Monitoring

In:

Submitted By zulkiflxx
Words 786
Pages 4
Remote Monitoring and Control of Environmental Variables via GSM | Group Members:Maj NasirCapt ZeeshanCapt UsamaCapt Shoaib AliProject Supervisor:Lt Col (Dr) Adil Masood | Dated : 20th March 2014 |

ABSTRACT
Our main goal is to create a stand-alone device to monitor and control the environmental variables in different military storage facilities. The proposed project is a compliant solution to offer a modern and interactive way to efficiently reduce man power for storage management. This report defines the scope of the project and deliverables along with the applications. Furthermore a detailed block diagram of the project is mentioned and then the design implementation is discussed. The sensing unit has been prepared and its integration with the switching unit is in progress. Detailed design, simulations and code of hardware are also mentioned in following contents. Detailed timeline is given according to which the project will be completed well in time.

TABLE OF CONTENTS 1. PROJECT DESCRIPTION.....………………………………………………………………… 3 2. SCOPE…………………………….………………………………………………………….…3 3. SPECIFICATIONS……………….……………………………………………………………..3 4. DELIVERABLES……………….………………………………………………………………3 5. DETAILED DESIGN………….………………………………………………………………..4 6. TIMELINE………………………………………………………………………………………5 7. DEMONSTRATION OUTLINE….…………………………………………………………….5 8. REFERENCES…………………….…………………………………………………………….6 9. APPENDIX………………………………………………………………………………………7

1. Project Description:
Industrial businesses are looking for readymade laid out networks and resources to be utilized to cater their needs of remote monitoring. Human monitoring is obsolete and no longer is being considered better option.
The penetration of cellular network in the rural areas made this remote monitoring better option. This proposed design will utilize wireless sensor network, Global System for Mobile Communication (GSM) and short message service (SMS) to carry out data from the sensors to computers or will directly alert the workers through their mobile phone. This proposed design will eliminate the wired technology and will improve the method of alerting and collecting data in remote place on time.
GSM Module
GSM Module cSensors will be located and different locations in the storage unit. Each sensor data will be transmitted separately thereby alerting the user about the exact location of the data. Thus in case of alarming situation the exact location with accurate data will be displayed and used to control the situation. The design of the project implementation is as follows:

2. Scope: Primary objective is to create a stand-alone device to monitor and control the environmental variables in different military storage facilities. The proposed project is a compliant solution to offer a modern and interactive way to efficiently reduce man power for storage management. Our scope in this project will be about controlling three environmental variables.
a. Temperature
b. Light Intensity
c. Humidity
d. Air Pressure

3. Specifications: The project will meet following specifications:
a. A secure well established NW with backup.
b. In case of Emergency sys can auto execute.
c. One man can control multiple warehouses.
d. Electronic Log of data automatically maintained.

4. Deliverables:
a. In Military setups like ammo, POL, clothing and food storage controlling and monitoring environmental variables.
b. In Agriculture sector, the critical role for the farmers to monitor 24 hours to some critical plants such as vegetable, flowers and some consumable items made this remote monitoring the better option.
c. In offices and for domestic use.

5. Detailed Design: So far the sensing unit has been prepared and the switching unit’s work is in progress. We have used multiple temperature, humidity, light and pressure sensors in each sensing unit. First we planned to send one data of each variable to the switching unit f rom each sensing unit but then it was realized that, in that case exact location of the incident will be difficult to locate. We wrote a different code for the design in order to cater for the aforementioned problem. We have used ATmega16 microcontroller in our sensing unit. This microcontroller gives accurate reading from the sensor through its analogue pins. One microcontroller can accommodate 8 sensors thus we will utilize one microcontroller for 3 temperature , 2 humidity, 2 light and 1 barometric sensor. The microcontroller is programmed in C language using Software. The C language program is given below along with the proteus simulation. The analogue readings have been automatically converted by the ADC of microcontroller which are then converted to a particular scale in order to read the exact sensor data. Then each sensors data is stored in a string prior to which it is converted into ASCII format. Data is transmitted to the switching unit using the UART port. This is connected to MAX202 IC which converts the TTL to RS232 and back also. This has been used in order to send data to greater distance. We have used a 12V voltage adopter with a 5V regulator as shown in the diagram at the bottom. This is done to ensure the power supply to the microcontroller.

Similar Documents

Premium Essay

Remote Monitoring System

...3. Current UTC Systems in South Africa 3.1 Remote Monitoring Systems Remote Monitoring Systems (RMS) are traffic control systems that connect a roadside controller to a central computer to provide a remote monitoring facility at the traffic signal equipment. RMS offers functionality that allows it to monitor digital inputs and outputs, phase outputs and phase lamp monitoring. In the occurrence of any faults, the system connects to the in-station, alerts the operator and lodges the fault simultaneously (Imtech Traffic and Infrastructure UIC Ltd). In addition, these systems offer a range of other features such as traffic data collection, remote clock setting and loading of signal plan configurations. Communication between the roadside controller...

Words: 1337 - Pages: 6

Free Essay

Network Design for Remote Monitoring

...My capstone project is to recommend a Windows networked environment to facilitate the remote monitoring of neuro-surgeries. As a consultant I was approached by XYZ-Monitoring to assist in the design of a network from the ground up that would support the remote monitoring of neuro-surgeries using Cadwell Laboratories’ Cascade system. XYZ-Monitoring (herein referred to as XYZ) wanted a Windows network that would be integrated with their existing Cisco ASA firewall device. XYZ wanted to use a virtualized environment because they had a limited budget for new hardware. They needed a secure solution that would meet HIPAA requirement concerning the security of patient data. XYZ requires all users to connect to their environment through a VPN connection bound to the Cisco ASA firewall. They have three user groups that will need to have access to the environment; however, they have multiple clients that need to remain separated when connected to the network. Given these requirements by XYZ, it was clear they wanted an Active Directory integrated environment so that users would be grouped by job function and by client. XYZ would need at least three high level Organizational Units (OUs), one for each job function; they would also potentially need an OU for each client. They would need Group Policy Objects (GPOs) to provide ease of administration once the design was complete as well as provide access policies to the environment based on job function. Provided with these requirements...

Words: 5873 - Pages: 24

Free Essay

Raymond James Financial Bcd Travel, Houston Texans and Others

...case are simple little issues such as emailing customer credit card numbers and such but I would have definitely have seen these issues but the lapse of these company have cost them security wise. The best way for organizations to strike the right balance between monitoring and invading their employees' privacy would be to evaluate each employees based on their activities. Have each employee make a report of their activities while the company is monitoring them as well the companies should put trust in their employees to report everything they're doing and when it is time to evaluate them cross compare what has been monitored and what the employees have reported. The consequence biased to one side would be if the company were to engage in just invading employee privacy there could be massive repercussions such as the company being sued etc. The other components are people security, establishing ethical behavior in the company, and managers taking the initiative to stop any leakage in the company. The human factor in is the stronger point in this situation its not the technology that's leaking information but the people the technology is just a tool to do so. The same goes for when it comes to monitoring and making sure that information is not leaked from the its the people who have to monitor to make sure that...

Words: 300 - Pages: 2

Premium Essay

Product Bullet Points

...Product Bullet Points: Reliable remote monitoring Program up to 10 wireless devices Adjustable notification settings Large silence button Lightweight with belt clip and lanyard 60 day guarantee Product Features: SIMPLE REMOTE MONITORING Easily integrates with the Vive fall management system for caregiver peace of mind and to promote greater independence REAL-TIME ALERTS With a range of up to 150 feet, the pager provides instant alerts enabling prompt assistance to minimize falls and hazardous wandering CONNECT UP TO 10 DEVICES Program up to ten wireless devices to receive real-time alerts THREE NOTIFICATION SETTINGS Be alerted with an adjustable volume chime, a silent vibration mode or a combination of the two QUICKLY SILENCE ALARMS...

Words: 585 - Pages: 3

Free Essay

Call Center

...service level, number of calls per employee, first call resolution, and transfer rate.  By using the statistical report, it will help show the relationship between their performance and the organization standards or goals and it is easier to visualize.  It can also be utilized by the managers to take necessary corrective actions if needed. The response time and service level can be measured by the monitoring how many calls are answered within how many seconds and total number of calls in a day is being answered.  It is important to monitor the total amount of calls but we must consider the number of calls an employee is answering and should be reported to ensure that individual employee is properly assessed. This will also show if the employees are answering them promptly and not just a handful is answering the calls.    The first call resolution (FCR) measures the individuals’ ability to accomplish the task in one transaction and not transfer the call.  Transfer rate indicates how many calls have been transferred to another party to be handled. Monitoring the number of calls being transferred can identify if there are any performance gaps and training if needed (Reynolds 2012).   Reynolds, Penny (January 2012) The Top 20 Contact Center Metrics for 2012. Multichannel Merchant, Retrieved from...

Words: 252 - Pages: 2

Free Essay

Riordan Manufacturing

...Currently Riordan Manufacturing has several different offices and each office is using a different type of system, but there is not a central system that monitors each of the satellite offices and their production. To assist Riordan become more efficient, they will need to implement a central system to monitor both individual and overlapping system usage. They should create a Data Center in the corporate office that monitors all of the current systems in place. This will allow Riordan Manufacturing to understand how their business is functioning and how application are used more often and which are not utilized enough, helping to determine if they should upgrade or discontinue the use of a system. Each department uses different applications; some of the applications interface with one another and other are stand alone. Riordan also currently has a lot of manual processes, for example how they submit daily inventory records. With the overall updates that our team has posed have more automation will assist Riordan to increase their production and accuracy. We can implement an application that can be used by all of the centers in order to maintain the inventory across the board so the managers are able to see what is in high demand in specific locations. Having an overall view of the inventory will be beneficial to the entire company. If the marketing department has he ability to see the inventory usage then they will know where they need to market certain products better. We...

Words: 420 - Pages: 2

Premium Essay

How Ish Play Their Role

...How ISH can play their monitoring role (by using ISC’s code of activism) * ISH need to set out their policy on how to monitor the investee companies, for example :- (i) Meeting policy with investee company’s board and senior management (dialogue). (ii) How to minimize or dealt with the conflict of interest situation by the ISH. (iii) Strategy on intervene in investee company. (iv) Indicate the type of circumstances where and how further actions need to be taken by ISH. (v) Voting policy and voting disclosure. * Monitoring and communicating:- (i) Monitor the performance of investee company on regular basis. * Review the Annual reports and accounts / general meeting resolution. * Review whether the board of investee company is effective or not. (ii) Regular dialogue with investee company’s board / senior management. (clear information) * Attend investee company meeting and raise question where necessary. * Enter into active dialogue with Company’s board / senior management. ^ enable the ISH to identify the problem at earlier stage and reduce the SH’s value. ^ But ISH may not want to involve in the investee operation. * Intervene where necessary (i) ISH will only intervene when the investee company :- * Engages in risky strategy which will reduce SHs/ value. * Performance is less than satisfactory. * Acquisition / disposal that involve related party transaction (not in arm-length basis). (sell company’s...

Words: 428 - Pages: 2

Free Essay

Mister

...Elias N. Khan Prof. Session CRJ 115 7 December 2015 Packet Sniffers: A Bittersweet Software Packet sniffing software is a controversial subject and a double-edged sword. It can be used to analyze network problems and detect Internet misuse. But at the same time, it allows hackers and people with malicious intention to "sniff" out your password, get your personal information, and invade your privacy. That is also why securing and encrypting data is so important. In this paper, the definition of packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave & Buster's, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. A packet sniffer is "a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network" (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening...

Words: 2443 - Pages: 10

Free Essay

Fiction Corp Network Upgrade

...Ensure Network security is reviewed and improved upon * Ensure minimal or zero network downtime for existing business operations during the move Project goal * Seamless migration of the data center to the new location with minimal or zero disruption to the current business operations * Assess current security flaws and provide solutions to eliminate flaws * Quality assurance-monitor the status of remote systems and determine feasible success /failure toward seamless migration and updated network system Project scope * The scope of the project is to migrate the existing data center to a new location; to assess and eliminate current security flaws in the network * Upgrade and improve redundancy of WAN via T1 & ISDN backup connectivity * The data center move will include 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers * Any network performance problems with existing applications will be addressed * SNMP management system should be configured to detect and report status of the remote...

Words: 1353 - Pages: 6

Premium Essay

Comprehensive Aap

...WWTC Comprehensive AAP Executive Summary The comprehensive visions for the World-Wide Trading Company (WWTC), an aggressively growing online broker firm, is to increase revenue from 10 billion to 40 billion and reduce operating costs from 30 to 15 percent by the year 2018. The key to gains in exponential growth and revenue was addressed by the leased office location in the notoriously known broker/financial capital of the United States, Wall Street, New York City, New York. WWTC encompasses a staff of 9,000 trained employees scattered across the globe. The World-Wide Trading Company’s corporate headquarters will remain in Hong Kong, while The New York office will be used as an international extension. This office will house approximately 200 staff members. The newly hired IT team will provide the New York office with a state of the art network design. The initiative will focus on the reinforcement of reported security vulnerabilities at other WWTC locations. This design will exceed all other previous standards and set the mold for other businesses to emulate. Project Goal The goal of this project is to increase WWTC revenue from 10 billion to 40 billion dollars by the within the next three to four years. The focus lies within reducing operating costs from 30 to 15 percent by using an automated system for the buying and selling of goods, or, e-commerce. With the implementation of a new, highly scalable, fast and efficient Local/Wide Area Network (LAN/WAN), WWTC will...

Words: 7472 - Pages: 30

Free Essay

Organizational Policy Statement

...(certificate revocation list and access control list). This way a previous employee will not have access to company systems. Previous employees having account access to the company’s virtual private networks (VPN) from home or remote locations will be terminated immediately upon employee termination. See ref A, Annex A.8.3.3, pg. 16 a. Any employee going on company approved travel that will require him/her to access company networks remotely, will request access tens days prior to travel. b. Any employee requesting access to the company’s VPN will request access via the proper channels. See ref A, Annex, A.8.1.1, pg 15, A.11.2, pg 22 c. All access requests will be logged and finalized by human resources after employee have reviewed a confidentiality and non-disclosure agreement of company sensitive information IAW ref A, section 8, Annex A.11.4.1, pg 23 A.11.2 pg 22 d. Employee account will expire ten days before employee leaves the company or termination to ensure that all accounts have been closed and access revoked. The network management team will run account active program to see all account active for the employee that is to be released on the 10th day to ensure that the employee is not accessing any resources via remote terminal. See ref A, Annex A.8.3.3, pg 16 All company access requests will be ignited and finalized by human resources. This way the company will be able to keep track of all personnel with internal and external access to the...

Words: 600 - Pages: 3

Premium Essay

Case Studies

...Monitoring Optimization Case Study Food Manufacturer Eliminates SPAN Shortages Fortune 2000 food product manufacturer rapidly increases network visibility, extends useful life for existing tools, and accelerates MTTR for troubleshooting problems “We selected the Anue Net Tool Optimizer to eliminate our SPAN shortage problem. Since it has been deployed, we have also seen a significant improvement in network visibility, cost savings on tools, and faster MTTR for diagnostic troubleshooting.” – Lead Network Administrator “The Anue Net Tool Optimizer allows us to share traffic from our limited number of SPANs with eight tools, without dropping packets or overloading the tools with data.” – Lead Network Administrator Company Profile The Customer is a $4B food product manufacturer in North America (FY 2010). With products that distribute across the continent, in the United States, Canada, and Mexico, the Customer is one of the leaders in packaged coffee, health/natural foods, and a variety of other packaged edibles. Problem The Customer runs a complex network with approximately 7,500 networking devices deployed at their headquarters, as well as 33 remotely located sites, 75% of which are primarily manufacturing facilities. They use a variety of tool types, including Application Performance Management (APM), Intrusion Detection Systems (IDS), URL Filtering, Packet Capture, and Data Loss Prevention (DLP). With such a variety of tools, the Customer’s networking team found...

Words: 1327 - Pages: 6

Free Essay

Network Management

...impact on performance, security, and manageability on a network. An in-band network management has to do with managing devices through common protocols. For example, telnet or SSH and the using of the network itself as a media. This is a way to provide identity based access controls, which will provide a better security. The segregation of management traffic is also a good practice, from production customer traffic. This helps in case your network is congested due to real user traffic. It offers you the ability to login into your devices to address the issue. The con here with in-band management is when your network is down or badly degraded, it will be little help. An out-of-band network management is an alternative means to accessing remote devices. An example in which this is handy to have both networks, would be in the case that the in-band network is down or terribly congested. The out-of-band network management can communicate with devices right through its console, without having the administrator having to go to the data center to correct the in-band network management situation. Each of these, out-of-band and in-band network management, have pros and drawbacks. The in-band management is often referred to as a fitting and a cheap way to obtain your system. The out-of-band management is often thought of as the more expensive way to access your network. But the good thing about out-of-band management is that you are able to diagnose problems even when your data network...

Words: 764 - Pages: 4

Free Essay

It-242

...Christy Williams University of Phoenix- Profressor Sims Wk 6 Assignment Router & Switch Conf. "Let’s go through the basic steps of setting up a Cisco router to provide Internet access to a small network. I’ll assume you have some basic IOS knowledge, including how to log on and how to save and clear configurations. I’ll also assume that you have a solid understanding of networking, including what Network Address Translation (NAT) is. I won’t cover items such as setting up Secure Shell (SSH) access and hardening access lists. You can expand into those areas as you feel comfortable and want to experiment more. What You’ll Need You need a Cisco router with at least two Ethernet interfaces. An 806, 836, 851, or 871 is ideal for a home or small office setup—in fact, that’s what those models are geared towards. You can buy an 851 for a few hundred dollars from various online retailers. However, a 2610 works just as well, and you might have one sitting in the equipment bin at your office that you can ask to borrow. Your router should have IOS 12.2 or later. This article is based on a Cisco 851W with IOS 12.4, including the IOS firewall feature set. You also need a Cisco console cable (sometimes called a rollover cable). One end has an eight-position, eight-conductor modular jack to connect to the router; the other end has a DB-9 serial connector. In recent years...

Words: 1763 - Pages: 8

Free Essay

Paper

...In response to your proposal our company, provide various services for your technology requirements. Such services can assist companies to profit from their existing resources through our services of fully upgrading and completing a full refit of the network to distinguish from other competitive businesses. Our company is headed by professionals of every competence from network design to conform to the correct topology to maximize architecture and array of applications to manage the integrity of the full network. We have hardware and software professionals to configure any software or hardware requests. In addition we have security specialists, analysts and management to assure the compromise of assets never happens, which provide the best in security enterprise software built in house. Our company’s network architect team utilizes a precise mix of technology to provide acceptable network data transfer for the network users' requirements. Network bandwidth is the amount of data that can be transmitted on a network in a particular time span. We noticed in the proposal that there are video and graphic applications which require higher data transfer which our company will provide the needs of your request. In our company we have some of the most competent technicians in this field and other technicians that can assist. There are Network administrators on board to assist with load balancing to ration network bandwidth to compensate for rigorous applications so they won't...

Words: 809 - Pages: 4