Remote Monitoring

In: Business and Management

Submitted By zulkiflxx
Words 786
Pages 4
Remote Monitoring and Control of Environmental Variables via GSM | Group Members:Maj NasirCapt ZeeshanCapt UsamaCapt Shoaib AliProject Supervisor:Lt Col (Dr) Adil Masood | Dated : 20th March 2014 |

Our main goal is to create a stand-alone device to monitor and control the environmental variables in different military storage facilities. The proposed project is a compliant solution to offer a modern and interactive way to efficiently reduce man power for storage management. This report defines the scope of the project and deliverables along with the applications. Furthermore a detailed block diagram of the project is mentioned and then the design implementation is discussed. The sensing unit has been prepared and its integration with the switching unit is in progress. Detailed design, simulations and code of hardware are also mentioned in following contents. Detailed timeline is given according to which the project will be completed well in time.

TABLE OF CONTENTS 1. PROJECT DESCRIPTION.....………………………………………………………………… 3 2. SCOPE…………………………….………………………………………………………….…3 3. SPECIFICATIONS……………….……………………………………………………………..3 4. DELIVERABLES……………….………………………………………………………………3 5. DETAILED DESIGN………….………………………………………………………………..4 6. TIMELINE………………………………………………………………………………………5 7. DEMONSTRATION OUTLINE….…………………………………………………………….5 8. REFERENCES…………………….…………………………………………………………….6 9. APPENDIX………………………………………………………………………………………7

1. Project Description:
Industrial businesses are looking for readymade laid out networks and resources to be utilized to cater their needs of remote monitoring. Human monitoring is obsolete and no longer is being considered better option.
The penetration of cellular network in the rural areas made this remote monitoring better option. This proposed design will utilize wireless…...

Similar Documents

Network Design for Remote Monitoring

...My capstone project is to recommend a Windows networked environment to facilitate the remote monitoring of neuro-surgeries. As a consultant I was approached by XYZ-Monitoring to assist in the design of a network from the ground up that would support the remote monitoring of neuro-surgeries using Cadwell Laboratories’ Cascade system. XYZ-Monitoring (herein referred to as XYZ) wanted a Windows network that would be integrated with their existing Cisco ASA firewall device. XYZ wanted to use a virtualized environment because they had a limited budget for new hardware. They needed a secure solution that would meet HIPAA requirement concerning the security of patient data. XYZ requires all users to connect to their environment through a VPN connection bound to the Cisco ASA firewall. They have three user groups that will need to have access to the environment; however, they have multiple clients that need to remain separated when connected to the network. Given these requirements by XYZ, it was clear they wanted an Active Directory integrated environment so that users would be grouped by job function and by client. XYZ would need at least three high level Organizational Units (OUs), one for each job function; they would also potentially need an OU for each client. They would need Group Policy Objects (GPOs) to provide ease of administration once the design was complete as well as provide access policies to the environment based on job function. Provided with these......

Words: 5873 - Pages: 24

Monitoring Section

...a large chassis or enclosure. This project deals with the need of monitoring and path of radioactive elements like missiles, RDX, bombs and valuable things. It is mainly consists of two sections one is monitoring section for monitoring and the other one is path section for path. The path section is fixed to radioactive elements and monitoring section monitors the radioactive elements. If the missing radioactive is in centre of the street there is a life threat to public. It is not possible the concern department can reach that place quickly. So they need a rapid movement to alert the public. In order to overcome this problem the alarm will be generated in path section with the help of gsm in monitoring section. This alarming will helps to alert the people. 1.1 Motivation of work At present one of the critical issue in particular, some of dangerous goods such as radioactive sources they may be missing will cause damage to the public, and cause public alarm so we can resolve such type of problems by this Radioactive tracer anti-theft system. 1.2` Organization of Thesis The project thesis consists of five chapters Chapter:1 Includes the introduction to RFID also a brief introduction to embedded systems,and this project Chapter: 2 consists of review of various procedures available for RFID Chapter:3 Comprises of the proposed methodology which explains about the block diagram of Monitoring Tracking Sections and details of all components used in the......

Words: 10647 - Pages: 43

Remote Desktop

...Remote Desktop Project ====================== (Work In Progress) Mark McLoughlin ( December 1st, 2003 1. Problem Description ====================== In enterprise installations system administrators typically have to deal with a large number of pretty basic problems on users' machines. Remotely taking control of a user's desktop to fix the problem while at the same time training the user as to how to resolve the problem for themselves is an effective and simple way to handle these types of support scenarios. Currently there is no way to do this with GNOME. 2. Overview =========== The basic requirement for such a tool is some method of sharing a desktop session between multiple users. The sysadmin sees what the user sees and the user sees what the sysadmin sees. However, the technology behind this is obviously useful in other ways. Here in Sun, for example, we make widespread use of VNC for some basic collaboration. Targetting this project purely at the Remote Assistance use case will leave some users wondering "why ... why on earth did you make it impossible for us to use this like VNC?". This project, therefore, also encompasses the use case of a simple form of collaboration by sharing access to a desktop session. There are various existing technologies in this area which all work in very similar ways. This project will......

Words: 7447 - Pages: 30

Remote Infra Management

...Project Report TOPIC: “REMOTE IT Infrastructure Management ” 1. Abstract The recently launched NASSCOM-McKinsey Report 2006 yet again reaffirmed views of the global gurus that Remote Infrastructure Management (RIM) Services are all set to become the next star of the Indian IT Industry. It clearly states that “going forward, the more traditional IT outsourcing service lines such as hardware and software maintenance, network administration and help desk services will account for 45 per cent of the total addressable market for offshoring and are likely to drive the next wave of growth. . Service lines that have driven recent growth, i.e., application development and maintenance (ADM) and R&D services are already 30-35 % penetrated and are not as likely to grow dramatically”. The Remote/offshore part was easy with BPO having already paved the way for proving service delivery effectiveness from an offshore location and with the advent of sophisticated tools and technologies that enabled remote IT management the proposition was further solidified. International research firm IDC also declared that “more than 85% of infrastructure components can be managed from a central remote location. These components encompass servers/systems, databases, networks, storage, security, applications and e-business infrastructure. Through managing these components from a remote location, companies can cut down their cost of infrastructure operations and management by 40-60 %, also gaining......

Words: 8368 - Pages: 34

Remote Sensing

...Remote sensing and control Chapter 12 Case Study: The Realco Breadmaster 1.Develop a master production schedule for the breadmaker. What do the projected ending inventory and available-to-promise numbers look like? Has Realco “overpromised”? In your view, should Realco update either the forecast or the production numbers? 2.Comment on Jack’s approach to order promising. What are the advantages? The disadvantages? How would formal master scheduling improve this process? What organizational changes would be required? 3.Following up on Question 2, which do you think is worse, refusing a customer’s order upfront because you don’t have the units available or accepting the order and then failing to deliver? What are the implications for master scheduling? 4.Suppose Realco produces 20,000 breadmakers every week, rather than 40,000 every other week. According to the master schedule record, what impact would this have on average inventory levels? Chapter 12 Case Study: The Realco Breadmaster 1.Develop a master production schedule for the breadmaker. What do the projected ending inventory and available-to-promise numbers look like? Has Realco “overpromised”? In your view, should Realco update either the forecast or the production numbers? 2.Comment on Jack’s approach to order promising. What are the advantages? The disadvantages? How would formal master scheduling improve this process? What organizational changes would be required? 3.Following up on Question 2, which do......

Words: 293 - Pages: 2

Remote Working

...Team at Amica Solutions. It will consider the companies recent move to remote working. Twelve staff have been moved from their office base in Newport to remote working, and are now spread across South Wales. The report is sectioned into three key themes, communication, teamworking and change management. It was felt the existing office premises were too small for the expanding business, and that thanks to advances in technology, remote working would be a viable option. However, some staff have expressed concerns about the new way of working, and feel there was little consultation. Remote working is becoming an increasingly popular method of working. Essentially, it is working from home, connecting with the business through the internet and telephones. 2. Communication There are a number of advantages and disadvantages to remote working, and the effects it has on communication within the organisation. Advantages for the company include savings on office costs. Disadvantages can include staff taking advantage of their freedom to do as little work as possible, or their morale decreasing being left primarily alone. Similarly there are advantages and disadvantages for the workers themselves. Advantages can include being able to create their own work-life balance. However, a down side of that is that the staff must be self disciplined enough to carry on with their work. A key disadvantage of remote working is the lack of social contact between staff. It has to be......

Words: 1924 - Pages: 8

Monitoring System

...your love ones stay at the respective places of these life plans is expensive. The funeral home often sets aside one or more large areas for people to gather at a visitation. This area may contain a space to display the body in a casket to visitors who may pay their respects. Funeral and memorial services may also take place at the funeral home. 1.2 Statement of the Problem Nova Funeral has lack of information of computer capabilities and performances although they have a computer but still using typewriter and manually written for Death Certificate and Contracts. 1.3 Objectives of the Study Create and develop a better System that they always do to make their work faster and reliable. Implement general and appropriate Monitoring System. 1.4 Significance of the Study This study aims to create a system wherein we can apply the current knowledge we have in the field of computer programming. It is necessary since we have to develop our skills in an actual programming scenario. And as Information Technology students, we hope to learn more and broaden our ideas in creating a system that needs a wider understanding and analysis of instructions’ flow. 1.5 Scope and Limitations It covers about the use of a simple database for storing and securing information from the company’s clients which indeed is lacking in security and organizing of records. However, since this is only simple database system, there are of course, limitations. These include......

Words: 3357 - Pages: 14

Mobile Remote phone has increased by many folds. The mobile phone has come a very far way from being a device that was initially merely used to make calls from one place to another. Mobile phone technology has evolved to an extent where man wants to customize applications and put them on the phone to suit his needs. The day and age of open source software is in. Computer engineers and technology changers of tomorrow want to create software that is simple, versatile in terms of its functionality yet different in its own way. 1.3 PROBLEM STATEMENT The primary goal of the project is to develop an application that turns a touch screen mobile phone into a wireless keyboard and mouse with touchpad, using a wireless network. Thus it is named as ‘MOBILE-REMOTE’. The application will primarily support cursor positioning, object selection and text input. The operations performed by the user (such as slide or tap on the keypad of the touch screen) are converted to standard input event stream and sent via a Wi-Fi network to the large display devices which analyze and process this input to the user’s intent. The secondary objective of the project is for the mobile device to recognize multiple finger slide gestures and easily switch between different windows on the computer using this feature 1.4 SCOPE OF THE PROJECT The application has a module installed on the server computer and another module installed on the mobile device. To run the application, both devices need to be connected to......

Words: 6366 - Pages: 26

Security Monitoring

...Security Monitoring In today’s business world an organization may consist of many different applications which require a certain level of risk assessment and security measures. Each application within the organization needs to be thoroughly reviewed in order to determine the associated risks and ways in which to protect against them. Another factor to be considered is that risk may vary between internal and external applications. There are many activities which can be incorporated into an organizations security plan which will help to mitigate possible risks and the loss that result from security breaches. It will be difficult for a company to achieve information security objectives without security event monitoring. Security event monitoring is derived from the general practice of monitoring activities that occur on a computer system. Security event monitoring involves recording information that represents activity and analyzing recorded information to identify and respond to questionable activities i.e.; possible security events Making Security Monitoring a Part of Your Best Security Practices. This first step would be to identify what exactly is considered questionable activity. While there is defiantly some level of activity which is considered acceptable the rules and boundaries must be clearly defined. An organization must take into consideration the applications to be used and the minimum level of security that can be used which will still...

Words: 927 - Pages: 4

Nt2580 Remote Access Policies

...NT2580 Week 2 Essay Create a Remote Access Policy Definition NT2580 The requirements for establishing a secure connection between remote locations vary between organizations. The needs of the organization are based on the type of information and data being transferred, as well as the sensitivity of the information. There are several options available to networks to get their data sent securely and reliably. All seven layers of the OSI model must be taken into account when designing secure Remote Access Control Policies. In order to create a secure remote connection between offices in Atlanta, San Francisco, Chicago, and Dallas, a WAN link would be the best type of connection. A dedicated WAN link would offer the organization a secure, reliable, dedicated P2P type of connection. Wide Area Network links would be monitored by the owners of the lines that connect each location. Leased lines from the providers will allow for scalability with potential growth. The downside to this type of connection is the expense and an internet connection is not necessarily provided by the link. In order to add to the security of the network physical and logical access controls are necessary. Logical implementations added to the network will be Acceptable, Email, and Wireless Use policies, Antivirus and firewall software, as well as Extranet, Interconnection, and Host Security. In order to ensure the physical assets, as well as employees, physical security must also be considered.......

Words: 704 - Pages: 3

Remote Access

...Purpose This remote access policy is designed to prevent damage to the organizational network or computer systems and to prevent compromise or loss of data. Approval Any remote access using either dial-in, VPN, or any other remote access to the organizational network must be reviewed and approved by the appropriate supervisor. All employees by default will have account settings set to deny remote access. Only upon approval will the account settings be changed to allow remote access. Remote Computer Requirements 1. The anti-virus product is required to be operating on the computer at all times in real time protection mode. 2. The anti-virus library definitions shall be updated at least once per day. 3. Anti-virus scans shall be done a minimum of once per week. No one should be able to stop anti-virus definition updates and anti-virus scans except for domain administrators. 2. The computer must be protected by a firewall at all times when it is connected to the internet. Several popular choices include Zone Alarm, the Windows XP firewall, and Norton Personal firewall. Remote Connection Requirements The remote user shall use either dial-In or virtual private networking (VPN). Dial-In is typically used when the user in in a local calling area. VPN is typically used when the user would need to dial a long distance number to connect with a dial-in connection. VPN uses a local connection to an internet service provider (ISP) and creates a tunnel through the......

Words: 569 - Pages: 3

Condition Monitoring

...MOM350 CONDITION MONITORING AND MANAGEMENT PROJECT 2 – SPRING 2013 LINN WETTELAND STUD.NR 204592 “USING FAULT TREES TO DETERMINE THE ROOT CAUSE OF ROTATING EQUIPMENT FAILURES” (Robert X. Perez) In the paper “Using fault trees to determine the root cause of rotating equipment failures”, the author, Robert X Perez, explains through his own experience as a senior reliability engineer at Citgo Petroleum Corporation, and through examples of various events in different systems the importance of finding the root cause(s) of failures in rotating equipment. The author explains these “major failures causing significant undesired events are the result of a series of events, and compares it to the reaction of a domino line being tipped over by a single domino chip. And studying chain of event, or probable scenarios is at the heart of RFCA’s” (Perez) The author focuses on FTA (Fault tree analysis) as a tool to determine such root causes. And gives examples of cases where use of these tools could have OR have prevented multiple damages due to one component failure causing failure in surrounding components. RCFA – Root Cause Failure analysis “Root Cause Failure analysis is a structured process to identify any physical, human and latent causes of undesirable event(s).And how such a process can be used in achieving continuous plant reliability improvements by targeting mechanical and organizational deficiencies in a process facility” (Perez). A tool for “Identification and......

Words: 1529 - Pages: 7

Electronic Monitoring

...The widespread use of electronic devices during the Information Age has led to the electronic monitoring of employees by employers. It has become necessary for employers to provide computers, email, and internet access to its employees to conduct business efficiently. This type of access has provided misguided employees with the opportunity to conduct personal business and illegal activities at work. In an effort to address these risks many employers have implemented electronic monitoring tools. Employee monitoring is generally considered to be any type of tracking method used to watch what an employee does while at work. Electronic monitoring is monitoring employees' e-mail, computer files, voice mail, telephone use, as well as the use of video and audio surveillance, computer network monitoring, and keystroke monitoring. According to a 2008 survey done by the American Management Association, sixty six percent of the respondents stated that they were engaged in the electronic monitoring of their employees. Many reasons exist for employers to electronically monitor their employees. The monitoring of employees can lead to results that are beneficial to the employer. One reason employers cite for monitoring employees is to keep employee productivity from decreasing. Internet access allows employees to surf the internet for business purposes but employers fear that they will use it unproductively by visiting travel websites, recipe sites, message boards, shopping......

Words: 533 - Pages: 3

Capturing and Monitoring Telnet Traffic

...communication framework using virtual terminal connection. Data is interspersed in-band with Telnet control information, usually in an 8-byte oriented data communication over TCP. Telnet program runs on a computer and connects you PC to a server on the network. Commands are entered into Telnet program and can execute them as if they were entering them directly on the server console. This implies that you can control the server and communicate with other servers on the network (Sloan, 2001). Telnet traffic refers to a user command and an underlying TCP/IP protocol used for accessing remote computers. Actually, telnet is a mechanism of gaining access to remote computers using command prompts. Through the use of Telnet, an administrator can access someone’s computers remotely permitting access of his data or applications. On the web, HTTP and FTP protocols allow a remote user to request specific files from the remote computer other than being logged on as that computers user. By using Telnet, you log on as a regular user with whatever privileges granted to access specific data and applications. A Telnet command that requests user information over the net may look like this: telnet. Smithspc.t. Com. The result is an invitation to log on with a username and password prompt, of which if accepted, you will be logged on as any other valid user on that computer. Telnet find its applications in computer programming and any other user who find it necessary to use data and applications......

Words: 1994 - Pages: 8

Systems for Remote

...women. A key issue that is raised year after year is the necessary trade-off between devotion to family versus to career. In effect, the complex and long working hours result in the compromise of the quality of child care among the employees. This is understated, yet an increasing psychological concern in the minds of many employees. This affects the overall performance of many employees as they worried on their well being of their child rather than work [1, 2]. There are a variety of child monitor gadgets available in commercial market space that provide child care system. The advantage of having child monitors are their capability to detect intelligently more than what care-takers or nannies can detect by intuition; that is monitoring the location of the child and their condition. However, gadgets have their own limitations and scope of application. According to police statistics for the year 2003 to 2008, four children go missing every day in Malaysia, and three of 978-1-4244-5532-4/09/$26.00 ©2009 IEEE them are girls. These startling figures also show that almost one-third of the 8,000 missing children or 2,500 children are yet to be found. While police have a list of reasons for a child's disappearance, there are no known causes for more than 1,700 children, one-fifth of the total. Between January and May 2008, more than 550 missing children reports were filed. The fear of child abduction is very real. It is something we understandably do......

Words: 3467 - Pages: 14