Tuesday, February 18, 2020
Anti-car theft system Coursework Example | Topics and Well Written Essays - 1750 words
Anti-car theft system - Coursework Example GSM based anti-car theft is based on operation through the consideration of GSM module and micro controller programming (Chandra, 2005). The system used in the security comprises GSM which functions as an intermediate between the car owner and the entire car system. The system is responsible for both receiving of calls for system activation and also its deactivation and sending a text message to the owner. The output of the system is fed in to the microcontroller. The microcontroller is considered the main brain behind the entire system with a written program stored in the Read Only Memory. The controller with the direction of the written program connects and coordinates the system of operation through different aspects. The connection occurs when the system is active as it monitors both the car doors and the boot of the car to each if there is opening of the car by a stranger. The system also works to demobilize the car by disconnecting the ignition line from the battery supply through the actuator(EberspaÃËcher, VoÃËgel & Bettstetter, 2001). The design also works with the start up an alarm for the purpose of al ert. If the system is inactive there will be disabling of all the outputs and sensor inputs. In the project, there was utilizing of the design through locally assembled microcontroller and other few basic components of electronic components to achieve both the controller and the controlled. Microcontrollers have been seen to be used in performance of the simple security task inn which performance of humans might be able to degrade over time(Halonen, Romero & Melero, 2003). The engineering technique that has been used in the design is that which makes it reliable,durable and capable for offering guarantee security at all times, the power supply that has been used provides the voltage and current which is required for effective performance
Tuesday, February 4, 2020
Business technology 250 Assignment Example | Topics and Well Written Essays - 2000 words
Business technology 250 - Assignment Example The NIC allows a computing device to connect to a particular network. The network controller provides the hardware and circuitry needed to relay messages on a particular type of data link layer standard. Of these standards Ethernet has gained significant popularity and is widely used across the globe. It is for this purpose Ethernet enabled NIC would be made use of (Posey 2006). Wireless access point (WAP): Wireless access point is basically a device that allows wireless devices such as Smartphones, tablet PCs and Laptops to gain access to wired networks via some standard (Enterasys 2013). Through access point a number of devices are able to use the services of a network without the use of additional wiring. A WLAN controller is used to help manage Wireless access points within an office or a particular area (Enterasys 2013). DSL (asymmetric digital subscriber line) Modem: ADSL technology enables the transmission of data at a faster rate than traditional modems. The transmission medi um in both types of modems is the same that is copper telephone lines. The frequencies used by ADSL are different from those that are used during a telephone call. A device known as DSL filter allows the division of a telephone connection for the purposes of ADSL services and voice calls (ANSI 1998). Switch: A network switch is a device that is used to connect two or more than two devices with each other. In some cases a switch is used to connect two different sections of a network (Kohlhepp 2000). Switches are mainly used in those network areas where great emphasis is placed on the performance of the network and its security. Some vendors of switches provide firewall protection and network intrusion detection along with the switch to enhance its performance (Kohlhepp 2000). Gateway: A gateway is a computational system that has the capability to link two different networks that make use of different communication protocol. A gateway can comprise of hardware components, software comp onents or a combination of both. Unlike the switch a gateway tends to operate at any layer of the OSI model. The layer at which the gateway operates depends on the type of protocol being used (Allen-Bradley 2013). VPN software: VPN software helps establish the process of tunneling. VPN tunneling is a technology that allows users to create and manage logical network connections (Bender 2010). Through tunneling packets that are created in a certain VPN are encoded with a certain carrier protocol which is decoded only at the receiving end. Through tunneling certain threats and attacks can be averted and the security of the network can be strengthened (Bender 2010). Architecture of the system: Architecture in computers refers to the process of designing the structure of a computer system, microprocessor or even a program of a system. The architecture that is required in the case scenario can be divided into three main blocks of network foundation, network services and user services. Net work foundation: Like the foundation of a building the network foundation is considered as a building block on which the infrastructure and the rest of the services rely on (Cisco 2012). The network foundation ensures that information is easily transported from one location to the other without any hindrance. The network foun
Subscribe to:
Posts (Atom)