You are on page 1of 26

WAP BASED SYSTEM FOR REMOTE MONITORING & CONTROL OF HOME AUTOMATION

Abstract
Security integrated system, based on the WAP framework for remote monitoring and control of home appliances. mobility and location services. A WAP gateway located nearer to the home appliances is responsible for executing the supplied control algorithm.

Introduction
The aim of the proposed work is to present a security integrated system, based on the WAP framework for remote monitoring and control of home appliances. A WAP gateway located nearer to the home appliances is responsible for executing the supplied control algorithm. While serving concurrent requests from other clients, user can gain access to the system through WAP enabled mobile phone.

Existing System
Devices are controlled by RFID with in a LAN connection.
Devices are controlled by WEB using Internet.

DRAWBACKS OF EXISTING SYSTEM


No Mobility and Location services.
Less Security

Proposed System
Devices are controlled by WAP using Mobile. The kernel of the integrated system relies on data flow programming platform. The kernel has interfaces to a WAP server through Java , servlet and JSP. The user can remotely set the control algorithm. In addition, this supports mobility and location services. Furthermore, our solution can be used to scale networks that are deployed in large setting.

System Configuration
Hardware Specification
Processor Hard Disk RAM Pentium III 40 GB 128 MB : : : : : : Windows 2000/xp JSP, Servlets MS-Access WML Web-Logic 8.1 Nokia Browser 4.0

Software Specification
Operating Systems Front End Back End Programming Interface Web Server Nokia Simulator

Modules
Security Module. RMI Server Module. User Viewer Module. Web Cam Module.

Serial Port Communication Module.


Embedded Software/Hardware Module

Security Module
Giving security to the home appliances. Only authorized members can access the home appliances. Using username and password encryption, giving security.

RMI Server Module.

Router Module
Input Parameters:
Data Packets from Ingress Machine. Forward feedback from the Router or Ingress Router. Backward feedback from the Router or Egress Router. Hop count.

Output Parameters:
Data Packets. Forward feedback. Incremented Hop count. Backward feedback.

Egress Router Module


Input Parameters:
Data Packets from Router. Forward feedback from the Router.

Output Parameters:
Data Packets. Backward feedback.

Destination Module
Message received from the egress router will be stored in the corresponding folder as a text file depends upon the Source Machine Name.

Functional Diagram

ADVANTAGES OF NCC
Buffering of packets in carried out in the edge routers rather than in the core routers .
The packets are sent into the network based on the capacity of the network and hence there is no possibility of any undelivered packets present in the network.

Absence of undelivered packets avoids overload due to retransmission.


Fair allocation of bandwidth is ensured.

Disadvantages
NCC is implemented for only text format. Currently it is not possible to kill the process in windows platform. NCC is working under intranet, not possible to control as server.

Conclusion
NCC successfully prevents congestion collapse from undelivered packets. Unlike existing Internet congestion control approaches, which rely solely on end-to-end control, NCC is able to prevent congestion collapse from undelivered packets.

No Congestion, No Traffic Issue,

Smooth Data Flow

Future Enhancement
1.

Grabbing the Image Convert into Pixels. Store into Array. Divide into packets. Send to destination system. Join the array and rejoin as an image.
2.

Control the current network processes from server. Delete unwanted processes, speed up the

THANK YOU

You might also like