SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
1
CHAPTER 1
INTRODUCTION
2
INTRODUCTION
1.1. OVERVIEW
Internet of Things (IoT) is a concept that visualizes all objects around us as part
of internet. Internet of things coverage is very wide and includes variety of objects like
smart phones, digital cameras, sensors, etc. Once all these devices are connected to each
other, they enable more and more smart processes and services that support our basic
needs, economies, environment, health etc. Such large number of devices connected to
internet provides many kinds of services and produce huge amount of data and
information.
Cloud computing is a one such model for on-demand access to a shared pool of
configurable resources ( compute, networks, servers, storage applications, services,
software etc.) that can be easily provisioned as Infrastructure, software and applications
(SaaS). Cloud based platforms help to connect to the things around us so that we can
access anything at any time and any place in a user friendly manner using customized
portals and in built applications (SaaS). Hence, cloud acts as a front end to access IoT.
Applications that interact with devices like sensors have special requirements of huge
storage to store big data, huge computation power to enable the real time processing of the
data i.e information, and high speed network to stream audio or video.
In this project, we describe how IoT and Cloud computing can work together
to provide automation of domestic things so as to reduce human intervention and save time
and energy.
3
1.2 IoT (INTERNET OF THINGS)
The internet of things (IoT) can be described as the technology in which the
actual physical entities (electronic devices) with data sensing, processing & self adoption
capacity can be used to interact with other such device and process that data to take an
intelligent decision which will prove useful for our daily day to day life . IOT is defined as
an environment in which objects (devices) are given unique identifiers and the ability to
transfer data over a network without having human-to-human or human-to-computer
interaction.
The IOT is being formed from two words internet and things which combine
means any object or person which can be distinguishable by the real world can be
connected to global system of interconnected computer networks and governs by standard
protocol. They defined IOT as “An open and comprehensive network of intelligent objects
that have the capacity to auto organize, share information, data and resources, reacting and
acting in face of situations and changes in the environment” The internet of things is a new
era of intelligence computing and it is providing a privilege to communicate around the
world. The objective of IOT is anything, anyone, anytime, anyplace, any service and any
network,
1.3 ADVANTAGES OF HOME AUTOMATION SYSTEM
In recent years, wireless systems like Wi-Fi have become more and more
common in home networking. Also in home and building automation systems, the use of
wireless technologies gives several advantages that could not be achieved using a wired
network only.
1) Reduced installation costs: First and foremost, installation costs are significantly
reduced since no cabling is necessary. Wired solutions require cabling, where material as
well as the professional laying of cables (e.g. into walls) is expensive.
2) System scalability and easy extension: Deploying a wireless network is especially
advantageous when, due to new or changed requirements, extension of the network is
necessary. In contrast to wired installations, in which cabling extension is tedious. This
makes wireless installations a seminal investment.
4
3) Aesthetical benefits: Apart from covering a larger area, this attribute helps to full
aesthetical requirements as well. Examples include representative buildings with all-glass
architecture and historical buildings where design or conservatory reasons do not allow
lying of cables.
4) Integration of mobile devices: With wireless networks, associating mobile devices such
as PDAs and Smartphone with the automation system becomes possible everywhere and at
any time, as a device's exact physical location is no longer crucial for a connection (as long
as the device is in reach of the network). For all these reasons, wireless technology is not
only an attractive choice in renovation and refurbishment, but also for new installations.
5
CHPATER 2
LITERATURE SURVEY
6
LITERATURE SURVEY
2.1 LITERATURE REVIEWS
The Internet of Things (IoT) is the interconnection of uniquely identifiable
embedded computing devices within the existing Internet framework. Typically, IoT is
expected to offer advanced connectivity of devices and systems, and services that goes
beyond M2M i.e. machine-to-machine communications and covers a variety of protocols,
various domains, and applications. The interconnection of all these embedded devices
which also includes smart objects is expected to lead in automation in nearly all fields
enabling advanced applications like a Smart Grid. According to Gartner, there will be
nearly 26 billion devices on the Internet of Things by 2020.
ABI Research has estimated that more than 30 billion devices will be
wirelessly connected to the Internet of Things by 2020.According to the recent survey and
study done by Pew Research Internet Project, a huge majority of the technology experts
and engaged Internet users who responded 83 percent agreed with the conception that the
Internet of Things, embedded, wearable computing will have widespread and beneficial
effects by 2025.It is clear that the IoT will consist of a very large number of devices being
connected to the Internet.
The Internet of Things (loT) refers to uniquely recognizable objects and their
virtual representations in an Internet-like structure. Internet of Things refer to day-to-day
objects, which are understandable, distinguishable, locatable, addressable, and or
controllable via the Internet using RFID, wireless LAN, wide-area network, or other
means. These objects include not only the day to day usable electronic devices or the
products of higher technological development such as vehicles and equipment, but also
include various things like food, clothing, shelter; materials, their parts, and subassemblies;
7
commodities and luxury items; boundaries, landmarks, and monuments; and all the
miscellany of commerce and culture. Ubiquitous computing refers to a new genre of
computing in which the computer completely permeates the life of the user. Internet of
Things (IoT) will comprise of billions of devices that can sense, communicate, calculate
and potentially actuate. Data streams coming from these devices will challenge the
traditional approaches to data management and contribute to the emerging paradigm of Big
Data. IoT has burst onto the stage, interconnecting everyday objects over the Internet,
which acts as everlasting sources of information. The occurrence has required a
combination of three developments.
2.2 IoT ELEMENTS
There are mainly three components of IOT a) Hardware - made up of sensors,
actuators and embedded communication hardware b) Middleware - on demand storage and
computing tools for data analytics and c) Presentation - novel easy to understand
visualization and interpretation tools which can be widely accessed on different platforms
and which can be designed for different applications[6]. In this section, we discuss a few
enabling technologies in these categories which will make up the three components stated
above.
2.2.1 Cloud Storage
Cloud computing is the practice of using remote servers on the internet to
manage, store and process data instead of using a personal computer. Cloud computing is a
general term that is better divided into three categories: Infrastructure-as-a-Service,
Platform-as-a-Service, and Software-as-a-Service. IaaS (or utility computing) follows a
traditional utilities model, providing servers and storage on demand with the consumer
paying accordingly. PaaS allows for the construction of applications within a provider’s
framework, like Google’s App Engine. SaaS enables customers to use an application on
demand via a browser. A common example of cloud computing is Gmail, where you can
access your stored data from any computer with internet access. Here we are using Gmail
for the storage of the data.
8
2.2.2 Wi-Fi or WiFi is a technology for wireless local area networking with devices
based on the IEEE 802.11 standards. Wi-Fi is a trademark of the Wi-Fi Alliance, which
restricts the use of the term Wi-Fi Certified to products that successfully complete
interoperability certification testing.
Devices that can use Wi-Fi technology include personal computers, video-
game consoles, smart phones, digital cameras, tablet computers, digital audio players and
modern printers. Wi-Fi compatible devices can connect to the Internet via a WLAN
network and a wireless access point. Such an access point (or hotspot) has a range of about
20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small
as a single room with walls that block radio waves, or as large as many square kilometres
achieved by using multiple overlapping access points.
Depiction of a device sending information wirelessly to another device, both
connected to the local network, in order to print a document
Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5 gigahertz
(6 cm) SHF ISM radio bands. Having no physical connections, it is more vulnerable to
attack than wired connections, such as Ethernet.
2.2.3 Wireless Sensor Networks (WSN)
A WSN is a wireless network consisting of spatially distributed autonomous
devices using sensors to cooperatively monitor physical or environmental conditions, such
as temperature, sound, vibration, pressure, motion or pollutants, at different locations
(Wikipedia). Formed by hundreds or thousands of notes that communicate with each other
and pass data along from one to another. A wireless sensor network is an important
element in IoT paradigm. Sensor nodes may not have global ID because of the large
amount of overhead and large number of sensors. WSN based on IoT has received
remarkable attention in many areas, such as military, homeland security, healthcare,
precision agriculture monitoring, manufacturing, habitat monitoring, forest fire and flood
detection and so on [16]. Sensors mounted to a patient’s body are monitoring the responses
to the medication, so that doctors can measure the effects of the medicines.
9
2.2.4 Addressing schemes
The ability to uniquely identify Things is critical for the success of IoT. This
will not only allow us to uniquely identify billions of devices but also to control remote
devices through the Internet. The few most critical features of creating a unique address
are: uniqueness, reliability, persistence and scalability. Every element that is already
connected and those that are going to be connected must be identified by their unique
identification, location and functionalities. The current IPv4 may support to an extent
where a group of cohabiting sensor devices can be identified geographically, but not
individually. The Internet Mobility attributes in the IPV6 may alleviate some of the device
identification problems; however, the heterogeneous nature of wireless nodes, variable data
types, concurrent operations and confluence of data from devices exacerbates the problem
further. Persistent network functioning to channel the data traffic ubiquitously and
relentlessly is another aspect of IoT. Although, the TCP/IP takes care of this mechanism by
routing in a more reliable and efficient way, from source to destination, the IoT faces a
bottleneck at the interface between the gateway and wireless sensor devices. Furthermore,
the scalability of the device address of the existing network must be sustainable. The
addition of networks and devices must not hamper the performance of the network, the
functioning of the devices, the reliability of the data over the network or the effective use
of the devices from the user interface [12]. To address these issues, the Uniform Resource
Name (URN) system is considered fundamental for the development of IoT. URN creates
replicas of the resources that can be accessed through the URL. With large amounts of
spatial data being gathered, it is often quite important to take advantage of the benefits of
metadata for transferring the information from a database to the user via the Internet [12].
IPv6 also gives a very good option to access the resources uniquely and remotely. Another
critical development in addressing is the development of a light-weight IPv6 that will
enable addressing home appliances uniquely
2.2.5 ITU Architecture
According to the recommendations of the International Telecommunication
Union (ITU), the network, Architecture Internet of Things consists of
(a) The Sensing Layer
10
(b) The Access Layer
(c) The Network Layer
(d) The Middleware Layer
(e) The Application Layers
Fig 2.1: Reference model in network and data communication.
These are like the Open Systems Interconnection (OSI) reference model in network and
data communication.
11
2.2.6 Layers of System
The reference architecture for the internet of things consists of a set of
components. Layers can be realized by means of specific technologies, and we will discuss
options for realizing each component. There are also some cross-cutting/vertical layers
such as access/identity management the layers are :
2.2.6.1 The Device Layer
The bottom layer of the architecture is the device layer. Devices can be of
various types, but in order to be considered as IoT devices, they must have some
communications that either indirectly or directly attaches to the Internet.
2.2.6.2 The Communication Layer
The communication layer supports the connectivity of the devices. There are
multiple potential protocols for communication between the devices and the cloud. The
most well known three potential protocols are Figure: 4. Reference Architecture for IOT
2.2.6.3 The Aggregation/Bus Layer
An important layer of the architecture is the layer that aggregates and brokers
communications. This is an important layer for three reasons:
1. The ability to support an HTTP server and/or an MQTT broker to talk to the devices
2. The ability to aggregate and combine communications from different devices and to
route communications to a specific device (possibly via a gateway)
3. The ability to bridge and transform between different protocols, e.g. to offer HTTP
based APIs that are mediated into an MQTT message going to the device. The
aggregation/bus layer provides these capabilities as well as adapting into legacy protocols.
The bus layer may also provide some simple correlation and mapping from different
correlation models (e.g. mapping a device ID into an owner’s ID or vice-versa).
12
2.2.6.4 The Event Processing and Analytical Layer
This layer takes the events from the bus and provides the ability to process and
act upon these events. A core capability here is the requirement to store the data into a
database. This may happen in three forms. The traditional model here would be to write a
server side application, e.g. this could be a JAX-RS application backed by a database.
However, there are many approaches where we can support more agile approaches. The
first of these is to use a big data analytics platform. This is a cloud-scalable platform that
supports technologies such as Apache Hadoop to provide highly scalable map reduce
analytics on the data coming from the devices. The second approach is to support complex
event processing to initiate near real-time activities and actions based on data from the
devices and from the rest of the system.
2.2.6.5 Device Management
Device management (DM) is handled by two components. A server-side
system (the device manager) communicates with devices via various protocols and
provides both individual and bulk control of devices. It also remotely manages software
and applications deployed on the device. It can lock and/or wipe the device if necessary.
The device manager works ind conjunction with the device management agents. There are
multiple different agents for different platforms and device types.
13
CHAPTER 3
PROPOSED HOME MONITORING SYSTEM
14
PROPOSED HOME MONITORING SYSTEM
Fig 3.1: Block diagram of proposed Home Automation system.
The proposed model of the home monitoring system is as shown in the figure.
The model consists of different sensors like temperature and humidity. The sensor network
is connected to the internet through WiFi. The sensor data are sent to the web server and
stored in the cloud. The data can be analyzed anywhere any time. In the proposed model
the temperature and humidity in the house is monitored. The temperature and humidity
detection is stored in cloud for analysis. The user can also monitor the electric appliances
through the internet via web server.
The end user can use their mobile phone or personal computer to log into the
system through the web server. An initial check is performed for whether the hardware
device is ON or not. Only if the Hardware is authorized and ON then the user is
15
authenticated. Once the authentication is done successfully the user is able to see the data
signals of the Hardware machine. At the hardware machine the SL driver program will
continuously track for the change in the status & will accordingly send the signals to the
Circuit. The data from the handheld is sent to the Web Server in a string format, where the
Web – site is hosted. On the server the status is stored in the database in their respective
device field. At the Hardware end, the circuit drive program a web page is [retrieve.aspx]
is used to retrieve the status of the devices in a timely pattern [every 10sec]. These changes
come in to form of cookies [temporary internet files] from the web server & are stored on
the computer in the name of the web site. Hence every 10 sec as the page refreshes the
new cookie values are updated. The cookie values are read from the program using the VB
component GETINERNETCOOKIE after a fixed delay. As the program receives any
change in the Device values it send the control signal [binary data] accordingly to the
required data pin of the parallel port.
3.1 PROPOSED SYSTEM’S FUNCTIONS
The proposed home automation system has the capabilities to control the
following components in users home and monitor the following alarms:
• Temperature and humidity
The proposed model of the home automation system is as shown in the figure.
The model consists of number of sensors. Initially all the sensors are connected to the
internet through Wi-Fi. When the connection is established in on web page we provide
virtual switches to operate the connected devices. Also it will start reading the parameters
of devices to shows the graph of current verses time for each device. If problem found it
report to cloud server. Here user can modify some settings and see the devices
functionality and working.
The system allows the user to monitor various standards such as temperature
and humidity from a smart phones and PC from anywhere in the world through an internet
connection. In this project we proposed a Novel technique that will give us best results and
provides Notifications to the user if problem occurs in any device.
16
3.2 OUTPUT
Fig 3.2: Sample output of recorded data from sensor on the server.
17
CHAPTER 4
PROCESS AND REQUIREMENT
18
PROCESS AND REQUIREMENTS
4.4 INTERFACE DESIGN OF SERVER AND
HARDWARE
4.4.1 Front End Design:
This is provided by the IoT service providing sites. Here we are using service
of thingspeak.com.
Fig. 4.1: Front end interface of IoT service providing site.
19
It provides us the graphical representation of the data from the home; send
through the sensor networks. The MATLAB code is preinstalled in the site and it process
the data and accordingly generate the graphs, which can be seen after we login into the
channel we have reserved in the service site “thingspeak.com”.
4.4.2 Database Storage
The system generates forms to collect data and stores the responses in a
database. This storage facility is also provided by the services providing site
“thingspeak.com” only. This data can be seen for further analysis using GOOGLE
SPREAD SHEET.
4.5 SOFTWAREWARE REQUIREMENT
4.5.1 Arduino Compiler:
The Arduino IDE is a cross-platform application written in Java, and is derived
from the IDE for the Processing programming language and the Wiring project. It is
designed to introduce programming to artists and other newcomers unfamiliar with
software development. It includes a code editor with features such as syntax highlighting,
brace matching, and automatic indentation, and is also capable of compiling and uploading
programs to the board with a single click. There is typically no need to edit make files or
run programs on a command-line interface. Although building on command-line is
possible if required with some third-party tools such a The Arduino IDE comes with a
C/C++ library called "Wiring" (from the project of the same name), which makes many
common input/output operations much easier. Arduino programs are written in C/C++.
20
Fig. 4.2: Arduino platform software
4.6 PCB CONSTRUCTION:
4.7.1 PCB Layout
No device can work if its connections are not according to specification, and if
the proper resistance, capacitance, inductance etc. are not connected to the place where
required. Thus a PCB designer has to first think of the very possible combination of
voltages that are required by the circuit and make them available at points where they are
needed with the minimum use of jumpers and keeping the circuit size compact and yet
effective.
The layout of PCB has to incorporate all the information on the board before
one can go on the artwork preparation. This means that a concept, which clearly defines all
the details of the circuitry and partly of final equipment, is a prerequisite before the actual
layout can start.
For PCB layout, the following points ought to be considered carefully
 . Record size of components used.
 Overall area covered is normally kept rectangular or square.
21
 Vcc and ground lines should be provided at the sides to facilitate external connection.
 Input and output terminals may be placed giving through to external connection.
 Make a rough sketch placing components and interconnect components with jumpers.
 Do not place components pointing in differed direction unless needed. Make them
parallel to the either side of the board.
 Make the neat final scaled sketch on the inch graph sheet.
 Lines mounted are of uniform width.
 Invest the layout to confirm that all the components are connected properly and given
sufficient place in the layout.
22
4.6.2 Tracing
After the circuit layout has been prepared on the tracing paper, inverting the
tracing paper onto the PCB so that the side that had been traced faces the PCB copper
coating. Then trace the layout onto the PCB placing a carbon paper in between the two.
4.6.3 Painting
Paint can also be done on the PCB however it must be uniformly applied. Use
0 number painting brushes for painting PCB layout.
4.6.4 Etching
In all PCBs, etching is the most important step. The final copper pattern is
formed by selective removal of all unwanted copper which is not protected by an etch
resist. Amongst the Enchants, FeCl3 (Ferric Chloride) is commonly used for small PCBs
where etching is only out carried out occasionally for a small number of boards.
For etching, the solution is made, wherein sample and standard solution are in 2*1
dilutions. In order to increases the copper dissolution capacity and to bring the etching time
slightly down, HCL is added. Etching temperature should be in the ranges of 20°C to
45°C. FeCl3 is an enchant used in small-scale PCB production. In high volume production
FeCl3 is of not much importance because it cannot be generated and it attacks the common
metal each resist.
4.6.5 Procedure
To etch copper and Ferric Chloride is used. In order to increase the copper
dissolving capacity and to bring the etching time slightly down, often HCL is added. HCL
acts simultaneously against excessive sludge formation.
After etching is over the Ferric Chloride contained surface should be first
cleaned by spraying water, which is not enough. Then we dip it in a 5% (by volume) in the
solution of oxalic acid to remove iron and copper salts and final water rinsed vigorously.
Then we rinse it by using petrol so that the paint comes out and copper remains intact
where the paint was applied. The copper acts as conduction path for flow of signals.
The high corrosive nature of Ferric chloride leads to short etching time and
avoid under etching.
23
4.6.6 Chemistry
Due to hydrolysis reaction, free acid is formed which reacts with copper.
FeCl3+3H2O = Fe(OH)3+3HCl
The copper is oxidized by Ferric ion forming cuprous chloride.
4.6.7 Drilling
Drilling of holes for mounting components is important mechanical operation
in PCB production process. The importance of hole drilling into PCB’s has further gone up
with electronic components miniaturization. After rinsing drilling is done using bit as per
the circuit provided. The diameters of holes generally accepted are as follows.
1. D = 0.8 mm
2. D =1.1 mm
3. D = 1.5 mm
4. D = 3.2 mm
Where,
D = Hole diameter.
Component Mounting
 Before mounting any components, examine the PCB carefully for any cracks, beaks or
other defects in conduction paths.
 The leads of components like resistors and capacitors should be fully inserted into the
mounting holes taking care to mount the components so that any information written
on the components is clearly visible.
 Carefully cut the leads of components so that about 3 mm of the end extended beyond
the wiring side of the PCB. The ends of the leas are bent at right angles to make a firm
contact with the surface where it is to be soldered.
24
 In case of semiconductor devices like transistors and diodes, the length of the leads
extending above the component side of the PCB should be about 1 cm. if transistor
leads are too short we use a base. Metal cap should touch if they are not at ground
potential. The right terminals should be at right certain components like transformers,
potentiometers and variable capacitors, which are meant for use with PCB, are
provided with pin type terminals that can be simply inserted into the hole in the PCB
and soldered.
25
4.6.8 Soldering:
PCB soldering required proper soldering technique, as explained below:
 A light duty soldering iron of 25W or 30 W rating should be used to prevent damage to
the printed circuit wiring due to excessive heating. The tip of soldering iron should not
have an oxide coating. Clean it using sand paper.
 Do not use excess solder to avoid solder flouring to adjacent conducing paths forming
bridges, which cause short circuits.
 Clean the surface of traces before you start soldering. It is advisable to use flux.
Layout of desired circuit diagram and preparation is first and most important
operation in any printed circuit board manufacturing process. First of all layout of
component side is to be made in accordance with available components dimensions. The
following points are to be observed while forming the layout of P.C.B:
 Between two components, sufficient space should be maintained.
 High wattage/max, dissipated components should be mounted at a sufficient distance
from semiconductors and electrolytic capacitors.
4.8 PCB Layout
Fig 4.3: Actual PCB layout
26
CHAPTER 5
PROGRAMING CODE
27
PROGRAMMING CODE
#include <SoftwareSerial.h>
SoftwareSerial espSerial = SoftwareSerial(5,6);
// arduino RX pin=5 arduino TX pin=6 connect the arduino RX pin to esp8266
module TX pin-connect the arduino TX pin to esp8266 module RX pin
#include <DHT.h>
#define DHTPIN 8 // Connect the signal pin of DHT11 sensor to digital pin 5
#define DHTTYPE DHT11
DHT dht(DHTPIN, DHTTYPE);
String apiKey = "7PJSCC8ZM2NST9X0";
// replace with your channel's thingspeak WRITE API key
String ssid="Redmi"; // Wifi network SSID
String password ="Kulwansh"; // Wifi network password
boolean DEBUG=true;
//=================================================== showResponce
void showResponse(int waitTime)
{
long t=millis();
char c;
while (t+waitTime>millis()){
if (espSerial.available()){
c=espSerial.read();
28
if (DEBUG) Serial.print(c);
}
}
}
//===============================================================
boolean thingSpeakWrite(float value1, float value2)
{
String cmd = "AT+CIPSTART="TCP","";
// TCP connection
cmd += "184.106.153.149";
// api.thingspeak.com
cmd += "",80";
espSerial.println(cmd);
if (DEBUG) Serial.println(cmd);
if(espSerial.find("Error"))
{
if (DEBUG) Serial.println("AT+CIPSTART error");
return false;
}
String getStr = "GET /update?api_key="; // prepare GET string
getStr += apiKey;
getStr +="&field1=";
getStr += String(value1);
getStr +="&field2=";
getStr += String(value2);
// getStr +="&field3=";
// getStr += String(value3);
// ...
getStr += "rnrn"; // send data length
cmd = "AT+CIPSEND=";
29
cmd += String(getStr.length());
espSerial.println(cmd);
if (DEBUG) Serial.println(cmd);
delay(100);
if(espSerial.find(">"))
{
espSerial.print(getStr);
if (DEBUG) Serial.print(getStr);
}
Else
{
espSerial.println("AT+CIPCLOSE");
// alert user
if (DEBUG) Serial.println("AT+CIPCLOSE");
return false;
}
return true;
}
//===============================================================
================= setup
void setup()
{
DEBUG=true; // enable debug serial
Serial.begin(9600);
dht.begin(); // Start DHT sensor
espSerial.begin(115200);
// Enable this line to reset the module;
espSerial.println("AT+RST");
//showResponse(1000);
30
espSerial.println("AT+CWMODE=1");
// set esp8266 as client
showResponse(1000);
espSerial.println("AT+CWJAP=""+ssid+"",""+password+"""); // set your home
router SSID and password
showResponse(5000);
if (DEBUG) Serial.println("Setup completed");
}
//===============================================================
======= loop
void loop()
{
// Read sensor values
float t = dht.readTemperature();
float h = dht.readHumidity();
if (isnan(t) || isnan(h)) {
if (DEBUG) Serial.println("Failed to read from DHT");
}
else {
if (DEBUG) Serial.println("Temp="+String(t)+" *C");
if (DEBUG) Serial.println("Humidity="+String(h)+" %");
thingSpeakWrite(t,h);
// Write values to thingspeak
}
// thingspeak needs 15 sec delay between updates,
delay(20000);
}
31
CHAPTER 6
RESULTS AND REPRESENTATION
32
RESULTS AND REPRESENTATIONS
6.1 REPRESENTATION
We have measured temperature and humidity. We have set time by which it
continuously senses temperature and Humidity. In the screenshot we have shown the result
senses temperature and humidity after every 5 seconds.
Fig 5.1: Channels saved on the server.
This screen shows the channels allotted to record and represent the data
collected from the sensors. We can design different channels for different process within
the same server.
We can select the desired channel for desired task and monitoring.
33
6.2 RESULT
The figure 5.2 shows the actual recorded data of the sensors. The first graphical
representation shows the Temperature Vs Time graph and the second graphical
representation shows the Humidity Vs Time graph.
We can also include the Temperature Vs Humidity graph in the same screen for further
analysis.
Fig 5.2: This is the results from our system.
34
CHAPTER 7
CONCLUSION AND FUTURE WORK
35
CONCLUSIONS AND FUTURE WORK
7.1 CONCLUSION
The home automation using Internet of Things has been experimentally proven
to work satisfactorily by connecting simple appliances to it and the appliances were
successfully controlled remotely through internet. The designed system not only monitors
the sensor data, like temperature and humidity but can also actuates a process according to
the requirement, for example switching on the light when it gets dark. It also stores the
sensor parameters in the webpage (database) in a timely manner. This will help the user to
analyze the condition of various parameters in the home anytime anywhere.
7.2 FUTURE WORK
Using this system as framework, the system can be expanded to include
various other options which could include home security feature like capturing the photo of
a person moving around the house and storing it onto the cloud. This will reduce the data
storage than using the CCTV camera which will record all the time and stores it. The
system can be expanded for energy monitoring, or weather stations. This kind of a system
with respective changes can be implemented in the hospitals for disable people or in
industries where human invasion is impossible or dangerous, and it can also be
implemented for environmental monitoring.
36
CHAPTER 8
REFERNCES
37
REFERENCES
[1] Asaad M. J. Al-Hindawi, Ibraheem Talib, “Experimentally Evaluation of GPS/GSM Based System
Design”, Journal of Electronic Systems, Volume 2 Number, 2 June, 2012.
[2] Kunal Maurya , Mandeep Singh, Neelu Jain, “Real Time Vehicle Tracking System using GSM and GPS
Technology- An Anti-theft Tracking System”, International Journal of Electronics and Computer Science
Engineering, ISSN 2277-1956/V1N3-1103-1107 .
[3] Vikram Kulkarni & Viswaprakash Babu, “embedded smart car security system on face detection”, special
issue of IJCCT, ISSN (Online) : 2231-0371, ISSN(Print):0975-7449,volume-3, issue-1.
[4] Chen, H., Chiang, Y. Chang, F. H. Wang, Toward Real-Time Precise Point Positioning: Differential GPS
Based on IGS Ultra Rapid Product, SICE Annual Conference, The Grand Hotel, Taipei, Taiwan August 18-
21, (2010).
[5] R.S Gaonkar, “Microprocessor Architecture Programming and Application”, Wiley Eastern Ltd, New
Delhi.
[6] Krishna Kant, “Microprocessor and microcontroller”, Eastern Company Edition, New Delhi 2007.
[7] Daniel. W. Lewis, “Fundamental of embedded software”, prentice hall of India, 2004.
[8] William Stalling, “Wireless Communication and Networks”, 2nd edition, prentice hall of India, 2005.

Weitere ähnliche Inhalte

Was ist angesagt?

Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoTFURQAN M LODHI
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsTarika Verma
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research DirectionsRavindra Dastikop
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsSumanPramanik7
 
Iot architecture
Iot architectureIot architecture
Iot architectureAnam Iqbal
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
 
Energy Efficiency in Internet of Things
Energy Efficiency in Internet of ThingsEnergy Efficiency in Internet of Things
Energy Efficiency in Internet of ThingsNiclas Maier
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research DirectionsDavide Nardone
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of ThingsBrian Pereira
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformationSANDEEP MITTAPALLY
 

Was ist angesagt? (20)

Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoT
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 
Iot
IotIot
Iot
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research Directions
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
 
Energy Efficiency in Internet of Things
Energy Efficiency in Internet of ThingsEnergy Efficiency in Internet of Things
Energy Efficiency in Internet of Things
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
 
Lecture 16
Lecture 16Lecture 16
Lecture 16
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 

Ähnlich wie Home monitoring system using io t

Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxBharat Tank
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Biniam Behailu
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptxttyu2
 
Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningDr.R. Gunavathi Ramasamy
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industryAgitAjey
 
Internet of things
Internet of thingsInternet of things
Internet of thingsTamojit Das
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsIRJET Journal
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfgopinathcreddy
 
What is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdfWhat is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdfAntenna Manufacturer Coco
 

Ähnlich wie Home monitoring system using io t (20)

Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
Chapter 4 - EMTE.pptx
Chapter 4 - EMTE.pptxChapter 4 - EMTE.pptx
Chapter 4 - EMTE.pptx
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine Learning
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industry
 
IoT
IoTIoT
IoT
 
IJET-V2I6P24
IJET-V2I6P24IJET-V2I6P24
IJET-V2I6P24
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
Chapter~4.pptx
Chapter~4.pptxChapter~4.pptx
Chapter~4.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
 
What is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdfWhat is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdf
 

Kürzlich hochgeladen

Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 

Kürzlich hochgeladen (20)

Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 

Home monitoring system using io t

  • 2. 2 INTRODUCTION 1.1. OVERVIEW Internet of Things (IoT) is a concept that visualizes all objects around us as part of internet. Internet of things coverage is very wide and includes variety of objects like smart phones, digital cameras, sensors, etc. Once all these devices are connected to each other, they enable more and more smart processes and services that support our basic needs, economies, environment, health etc. Such large number of devices connected to internet provides many kinds of services and produce huge amount of data and information. Cloud computing is a one such model for on-demand access to a shared pool of configurable resources ( compute, networks, servers, storage applications, services, software etc.) that can be easily provisioned as Infrastructure, software and applications (SaaS). Cloud based platforms help to connect to the things around us so that we can access anything at any time and any place in a user friendly manner using customized portals and in built applications (SaaS). Hence, cloud acts as a front end to access IoT. Applications that interact with devices like sensors have special requirements of huge storage to store big data, huge computation power to enable the real time processing of the data i.e information, and high speed network to stream audio or video. In this project, we describe how IoT and Cloud computing can work together to provide automation of domestic things so as to reduce human intervention and save time and energy.
  • 3. 3 1.2 IoT (INTERNET OF THINGS) The internet of things (IoT) can be described as the technology in which the actual physical entities (electronic devices) with data sensing, processing & self adoption capacity can be used to interact with other such device and process that data to take an intelligent decision which will prove useful for our daily day to day life . IOT is defined as an environment in which objects (devices) are given unique identifiers and the ability to transfer data over a network without having human-to-human or human-to-computer interaction. The IOT is being formed from two words internet and things which combine means any object or person which can be distinguishable by the real world can be connected to global system of interconnected computer networks and governs by standard protocol. They defined IOT as “An open and comprehensive network of intelligent objects that have the capacity to auto organize, share information, data and resources, reacting and acting in face of situations and changes in the environment” The internet of things is a new era of intelligence computing and it is providing a privilege to communicate around the world. The objective of IOT is anything, anyone, anytime, anyplace, any service and any network, 1.3 ADVANTAGES OF HOME AUTOMATION SYSTEM In recent years, wireless systems like Wi-Fi have become more and more common in home networking. Also in home and building automation systems, the use of wireless technologies gives several advantages that could not be achieved using a wired network only. 1) Reduced installation costs: First and foremost, installation costs are significantly reduced since no cabling is necessary. Wired solutions require cabling, where material as well as the professional laying of cables (e.g. into walls) is expensive. 2) System scalability and easy extension: Deploying a wireless network is especially advantageous when, due to new or changed requirements, extension of the network is necessary. In contrast to wired installations, in which cabling extension is tedious. This makes wireless installations a seminal investment.
  • 4. 4 3) Aesthetical benefits: Apart from covering a larger area, this attribute helps to full aesthetical requirements as well. Examples include representative buildings with all-glass architecture and historical buildings where design or conservatory reasons do not allow lying of cables. 4) Integration of mobile devices: With wireless networks, associating mobile devices such as PDAs and Smartphone with the automation system becomes possible everywhere and at any time, as a device's exact physical location is no longer crucial for a connection (as long as the device is in reach of the network). For all these reasons, wireless technology is not only an attractive choice in renovation and refurbishment, but also for new installations.
  • 6. 6 LITERATURE SURVEY 2.1 LITERATURE REVIEWS The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet framework. Typically, IoT is expected to offer advanced connectivity of devices and systems, and services that goes beyond M2M i.e. machine-to-machine communications and covers a variety of protocols, various domains, and applications. The interconnection of all these embedded devices which also includes smart objects is expected to lead in automation in nearly all fields enabling advanced applications like a Smart Grid. According to Gartner, there will be nearly 26 billion devices on the Internet of Things by 2020. ABI Research has estimated that more than 30 billion devices will be wirelessly connected to the Internet of Things by 2020.According to the recent survey and study done by Pew Research Internet Project, a huge majority of the technology experts and engaged Internet users who responded 83 percent agreed with the conception that the Internet of Things, embedded, wearable computing will have widespread and beneficial effects by 2025.It is clear that the IoT will consist of a very large number of devices being connected to the Internet. The Internet of Things (loT) refers to uniquely recognizable objects and their virtual representations in an Internet-like structure. Internet of Things refer to day-to-day objects, which are understandable, distinguishable, locatable, addressable, and or controllable via the Internet using RFID, wireless LAN, wide-area network, or other means. These objects include not only the day to day usable electronic devices or the products of higher technological development such as vehicles and equipment, but also include various things like food, clothing, shelter; materials, their parts, and subassemblies;
  • 7. 7 commodities and luxury items; boundaries, landmarks, and monuments; and all the miscellany of commerce and culture. Ubiquitous computing refers to a new genre of computing in which the computer completely permeates the life of the user. Internet of Things (IoT) will comprise of billions of devices that can sense, communicate, calculate and potentially actuate. Data streams coming from these devices will challenge the traditional approaches to data management and contribute to the emerging paradigm of Big Data. IoT has burst onto the stage, interconnecting everyday objects over the Internet, which acts as everlasting sources of information. The occurrence has required a combination of three developments. 2.2 IoT ELEMENTS There are mainly three components of IOT a) Hardware - made up of sensors, actuators and embedded communication hardware b) Middleware - on demand storage and computing tools for data analytics and c) Presentation - novel easy to understand visualization and interpretation tools which can be widely accessed on different platforms and which can be designed for different applications[6]. In this section, we discuss a few enabling technologies in these categories which will make up the three components stated above. 2.2.1 Cloud Storage Cloud computing is the practice of using remote servers on the internet to manage, store and process data instead of using a personal computer. Cloud computing is a general term that is better divided into three categories: Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service. IaaS (or utility computing) follows a traditional utilities model, providing servers and storage on demand with the consumer paying accordingly. PaaS allows for the construction of applications within a provider’s framework, like Google’s App Engine. SaaS enables customers to use an application on demand via a browser. A common example of cloud computing is Gmail, where you can access your stored data from any computer with internet access. Here we are using Gmail for the storage of the data.
  • 8. 8 2.2.2 Wi-Fi or WiFi is a technology for wireless local area networking with devices based on the IEEE 802.11 standards. Wi-Fi is a trademark of the Wi-Fi Alliance, which restricts the use of the term Wi-Fi Certified to products that successfully complete interoperability certification testing. Devices that can use Wi-Fi technology include personal computers, video- game consoles, smart phones, digital cameras, tablet computers, digital audio players and modern printers. Wi-Fi compatible devices can connect to the Internet via a WLAN network and a wireless access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square kilometres achieved by using multiple overlapping access points. Depiction of a device sending information wirelessly to another device, both connected to the local network, in order to print a document Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Having no physical connections, it is more vulnerable to attack than wired connections, such as Ethernet. 2.2.3 Wireless Sensor Networks (WSN) A WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations (Wikipedia). Formed by hundreds or thousands of notes that communicate with each other and pass data along from one to another. A wireless sensor network is an important element in IoT paradigm. Sensor nodes may not have global ID because of the large amount of overhead and large number of sensors. WSN based on IoT has received remarkable attention in many areas, such as military, homeland security, healthcare, precision agriculture monitoring, manufacturing, habitat monitoring, forest fire and flood detection and so on [16]. Sensors mounted to a patient’s body are monitoring the responses to the medication, so that doctors can measure the effects of the medicines.
  • 9. 9 2.2.4 Addressing schemes The ability to uniquely identify Things is critical for the success of IoT. This will not only allow us to uniquely identify billions of devices but also to control remote devices through the Internet. The few most critical features of creating a unique address are: uniqueness, reliability, persistence and scalability. Every element that is already connected and those that are going to be connected must be identified by their unique identification, location and functionalities. The current IPv4 may support to an extent where a group of cohabiting sensor devices can be identified geographically, but not individually. The Internet Mobility attributes in the IPV6 may alleviate some of the device identification problems; however, the heterogeneous nature of wireless nodes, variable data types, concurrent operations and confluence of data from devices exacerbates the problem further. Persistent network functioning to channel the data traffic ubiquitously and relentlessly is another aspect of IoT. Although, the TCP/IP takes care of this mechanism by routing in a more reliable and efficient way, from source to destination, the IoT faces a bottleneck at the interface between the gateway and wireless sensor devices. Furthermore, the scalability of the device address of the existing network must be sustainable. The addition of networks and devices must not hamper the performance of the network, the functioning of the devices, the reliability of the data over the network or the effective use of the devices from the user interface [12]. To address these issues, the Uniform Resource Name (URN) system is considered fundamental for the development of IoT. URN creates replicas of the resources that can be accessed through the URL. With large amounts of spatial data being gathered, it is often quite important to take advantage of the benefits of metadata for transferring the information from a database to the user via the Internet [12]. IPv6 also gives a very good option to access the resources uniquely and remotely. Another critical development in addressing is the development of a light-weight IPv6 that will enable addressing home appliances uniquely 2.2.5 ITU Architecture According to the recommendations of the International Telecommunication Union (ITU), the network, Architecture Internet of Things consists of (a) The Sensing Layer
  • 10. 10 (b) The Access Layer (c) The Network Layer (d) The Middleware Layer (e) The Application Layers Fig 2.1: Reference model in network and data communication. These are like the Open Systems Interconnection (OSI) reference model in network and data communication.
  • 11. 11 2.2.6 Layers of System The reference architecture for the internet of things consists of a set of components. Layers can be realized by means of specific technologies, and we will discuss options for realizing each component. There are also some cross-cutting/vertical layers such as access/identity management the layers are : 2.2.6.1 The Device Layer The bottom layer of the architecture is the device layer. Devices can be of various types, but in order to be considered as IoT devices, they must have some communications that either indirectly or directly attaches to the Internet. 2.2.6.2 The Communication Layer The communication layer supports the connectivity of the devices. There are multiple potential protocols for communication between the devices and the cloud. The most well known three potential protocols are Figure: 4. Reference Architecture for IOT 2.2.6.3 The Aggregation/Bus Layer An important layer of the architecture is the layer that aggregates and brokers communications. This is an important layer for three reasons: 1. The ability to support an HTTP server and/or an MQTT broker to talk to the devices 2. The ability to aggregate and combine communications from different devices and to route communications to a specific device (possibly via a gateway) 3. The ability to bridge and transform between different protocols, e.g. to offer HTTP based APIs that are mediated into an MQTT message going to the device. The aggregation/bus layer provides these capabilities as well as adapting into legacy protocols. The bus layer may also provide some simple correlation and mapping from different correlation models (e.g. mapping a device ID into an owner’s ID or vice-versa).
  • 12. 12 2.2.6.4 The Event Processing and Analytical Layer This layer takes the events from the bus and provides the ability to process and act upon these events. A core capability here is the requirement to store the data into a database. This may happen in three forms. The traditional model here would be to write a server side application, e.g. this could be a JAX-RS application backed by a database. However, there are many approaches where we can support more agile approaches. The first of these is to use a big data analytics platform. This is a cloud-scalable platform that supports technologies such as Apache Hadoop to provide highly scalable map reduce analytics on the data coming from the devices. The second approach is to support complex event processing to initiate near real-time activities and actions based on data from the devices and from the rest of the system. 2.2.6.5 Device Management Device management (DM) is handled by two components. A server-side system (the device manager) communicates with devices via various protocols and provides both individual and bulk control of devices. It also remotely manages software and applications deployed on the device. It can lock and/or wipe the device if necessary. The device manager works ind conjunction with the device management agents. There are multiple different agents for different platforms and device types.
  • 13. 13 CHAPTER 3 PROPOSED HOME MONITORING SYSTEM
  • 14. 14 PROPOSED HOME MONITORING SYSTEM Fig 3.1: Block diagram of proposed Home Automation system. The proposed model of the home monitoring system is as shown in the figure. The model consists of different sensors like temperature and humidity. The sensor network is connected to the internet through WiFi. The sensor data are sent to the web server and stored in the cloud. The data can be analyzed anywhere any time. In the proposed model the temperature and humidity in the house is monitored. The temperature and humidity detection is stored in cloud for analysis. The user can also monitor the electric appliances through the internet via web server. The end user can use their mobile phone or personal computer to log into the system through the web server. An initial check is performed for whether the hardware device is ON or not. Only if the Hardware is authorized and ON then the user is
  • 15. 15 authenticated. Once the authentication is done successfully the user is able to see the data signals of the Hardware machine. At the hardware machine the SL driver program will continuously track for the change in the status & will accordingly send the signals to the Circuit. The data from the handheld is sent to the Web Server in a string format, where the Web – site is hosted. On the server the status is stored in the database in their respective device field. At the Hardware end, the circuit drive program a web page is [retrieve.aspx] is used to retrieve the status of the devices in a timely pattern [every 10sec]. These changes come in to form of cookies [temporary internet files] from the web server & are stored on the computer in the name of the web site. Hence every 10 sec as the page refreshes the new cookie values are updated. The cookie values are read from the program using the VB component GETINERNETCOOKIE after a fixed delay. As the program receives any change in the Device values it send the control signal [binary data] accordingly to the required data pin of the parallel port. 3.1 PROPOSED SYSTEM’S FUNCTIONS The proposed home automation system has the capabilities to control the following components in users home and monitor the following alarms: • Temperature and humidity The proposed model of the home automation system is as shown in the figure. The model consists of number of sensors. Initially all the sensors are connected to the internet through Wi-Fi. When the connection is established in on web page we provide virtual switches to operate the connected devices. Also it will start reading the parameters of devices to shows the graph of current verses time for each device. If problem found it report to cloud server. Here user can modify some settings and see the devices functionality and working. The system allows the user to monitor various standards such as temperature and humidity from a smart phones and PC from anywhere in the world through an internet connection. In this project we proposed a Novel technique that will give us best results and provides Notifications to the user if problem occurs in any device.
  • 16. 16 3.2 OUTPUT Fig 3.2: Sample output of recorded data from sensor on the server.
  • 18. 18 PROCESS AND REQUIREMENTS 4.4 INTERFACE DESIGN OF SERVER AND HARDWARE 4.4.1 Front End Design: This is provided by the IoT service providing sites. Here we are using service of thingspeak.com. Fig. 4.1: Front end interface of IoT service providing site.
  • 19. 19 It provides us the graphical representation of the data from the home; send through the sensor networks. The MATLAB code is preinstalled in the site and it process the data and accordingly generate the graphs, which can be seen after we login into the channel we have reserved in the service site “thingspeak.com”. 4.4.2 Database Storage The system generates forms to collect data and stores the responses in a database. This storage facility is also provided by the services providing site “thingspeak.com” only. This data can be seen for further analysis using GOOGLE SPREAD SHEET. 4.5 SOFTWAREWARE REQUIREMENT 4.5.1 Arduino Compiler: The Arduino IDE is a cross-platform application written in Java, and is derived from the IDE for the Processing programming language and the Wiring project. It is designed to introduce programming to artists and other newcomers unfamiliar with software development. It includes a code editor with features such as syntax highlighting, brace matching, and automatic indentation, and is also capable of compiling and uploading programs to the board with a single click. There is typically no need to edit make files or run programs on a command-line interface. Although building on command-line is possible if required with some third-party tools such a The Arduino IDE comes with a C/C++ library called "Wiring" (from the project of the same name), which makes many common input/output operations much easier. Arduino programs are written in C/C++.
  • 20. 20 Fig. 4.2: Arduino platform software 4.6 PCB CONSTRUCTION: 4.7.1 PCB Layout No device can work if its connections are not according to specification, and if the proper resistance, capacitance, inductance etc. are not connected to the place where required. Thus a PCB designer has to first think of the very possible combination of voltages that are required by the circuit and make them available at points where they are needed with the minimum use of jumpers and keeping the circuit size compact and yet effective. The layout of PCB has to incorporate all the information on the board before one can go on the artwork preparation. This means that a concept, which clearly defines all the details of the circuitry and partly of final equipment, is a prerequisite before the actual layout can start. For PCB layout, the following points ought to be considered carefully  . Record size of components used.  Overall area covered is normally kept rectangular or square.
  • 21. 21  Vcc and ground lines should be provided at the sides to facilitate external connection.  Input and output terminals may be placed giving through to external connection.  Make a rough sketch placing components and interconnect components with jumpers.  Do not place components pointing in differed direction unless needed. Make them parallel to the either side of the board.  Make the neat final scaled sketch on the inch graph sheet.  Lines mounted are of uniform width.  Invest the layout to confirm that all the components are connected properly and given sufficient place in the layout.
  • 22. 22 4.6.2 Tracing After the circuit layout has been prepared on the tracing paper, inverting the tracing paper onto the PCB so that the side that had been traced faces the PCB copper coating. Then trace the layout onto the PCB placing a carbon paper in between the two. 4.6.3 Painting Paint can also be done on the PCB however it must be uniformly applied. Use 0 number painting brushes for painting PCB layout. 4.6.4 Etching In all PCBs, etching is the most important step. The final copper pattern is formed by selective removal of all unwanted copper which is not protected by an etch resist. Amongst the Enchants, FeCl3 (Ferric Chloride) is commonly used for small PCBs where etching is only out carried out occasionally for a small number of boards. For etching, the solution is made, wherein sample and standard solution are in 2*1 dilutions. In order to increases the copper dissolution capacity and to bring the etching time slightly down, HCL is added. Etching temperature should be in the ranges of 20°C to 45°C. FeCl3 is an enchant used in small-scale PCB production. In high volume production FeCl3 is of not much importance because it cannot be generated and it attacks the common metal each resist. 4.6.5 Procedure To etch copper and Ferric Chloride is used. In order to increase the copper dissolving capacity and to bring the etching time slightly down, often HCL is added. HCL acts simultaneously against excessive sludge formation. After etching is over the Ferric Chloride contained surface should be first cleaned by spraying water, which is not enough. Then we dip it in a 5% (by volume) in the solution of oxalic acid to remove iron and copper salts and final water rinsed vigorously. Then we rinse it by using petrol so that the paint comes out and copper remains intact where the paint was applied. The copper acts as conduction path for flow of signals. The high corrosive nature of Ferric chloride leads to short etching time and avoid under etching.
  • 23. 23 4.6.6 Chemistry Due to hydrolysis reaction, free acid is formed which reacts with copper. FeCl3+3H2O = Fe(OH)3+3HCl The copper is oxidized by Ferric ion forming cuprous chloride. 4.6.7 Drilling Drilling of holes for mounting components is important mechanical operation in PCB production process. The importance of hole drilling into PCB’s has further gone up with electronic components miniaturization. After rinsing drilling is done using bit as per the circuit provided. The diameters of holes generally accepted are as follows. 1. D = 0.8 mm 2. D =1.1 mm 3. D = 1.5 mm 4. D = 3.2 mm Where, D = Hole diameter. Component Mounting  Before mounting any components, examine the PCB carefully for any cracks, beaks or other defects in conduction paths.  The leads of components like resistors and capacitors should be fully inserted into the mounting holes taking care to mount the components so that any information written on the components is clearly visible.  Carefully cut the leads of components so that about 3 mm of the end extended beyond the wiring side of the PCB. The ends of the leas are bent at right angles to make a firm contact with the surface where it is to be soldered.
  • 24. 24  In case of semiconductor devices like transistors and diodes, the length of the leads extending above the component side of the PCB should be about 1 cm. if transistor leads are too short we use a base. Metal cap should touch if they are not at ground potential. The right terminals should be at right certain components like transformers, potentiometers and variable capacitors, which are meant for use with PCB, are provided with pin type terminals that can be simply inserted into the hole in the PCB and soldered.
  • 25. 25 4.6.8 Soldering: PCB soldering required proper soldering technique, as explained below:  A light duty soldering iron of 25W or 30 W rating should be used to prevent damage to the printed circuit wiring due to excessive heating. The tip of soldering iron should not have an oxide coating. Clean it using sand paper.  Do not use excess solder to avoid solder flouring to adjacent conducing paths forming bridges, which cause short circuits.  Clean the surface of traces before you start soldering. It is advisable to use flux. Layout of desired circuit diagram and preparation is first and most important operation in any printed circuit board manufacturing process. First of all layout of component side is to be made in accordance with available components dimensions. The following points are to be observed while forming the layout of P.C.B:  Between two components, sufficient space should be maintained.  High wattage/max, dissipated components should be mounted at a sufficient distance from semiconductors and electrolytic capacitors. 4.8 PCB Layout Fig 4.3: Actual PCB layout
  • 27. 27 PROGRAMMING CODE #include <SoftwareSerial.h> SoftwareSerial espSerial = SoftwareSerial(5,6); // arduino RX pin=5 arduino TX pin=6 connect the arduino RX pin to esp8266 module TX pin-connect the arduino TX pin to esp8266 module RX pin #include <DHT.h> #define DHTPIN 8 // Connect the signal pin of DHT11 sensor to digital pin 5 #define DHTTYPE DHT11 DHT dht(DHTPIN, DHTTYPE); String apiKey = "7PJSCC8ZM2NST9X0"; // replace with your channel's thingspeak WRITE API key String ssid="Redmi"; // Wifi network SSID String password ="Kulwansh"; // Wifi network password boolean DEBUG=true; //=================================================== showResponce void showResponse(int waitTime) { long t=millis(); char c; while (t+waitTime>millis()){ if (espSerial.available()){ c=espSerial.read();
  • 28. 28 if (DEBUG) Serial.print(c); } } } //=============================================================== boolean thingSpeakWrite(float value1, float value2) { String cmd = "AT+CIPSTART="TCP",""; // TCP connection cmd += "184.106.153.149"; // api.thingspeak.com cmd += "",80"; espSerial.println(cmd); if (DEBUG) Serial.println(cmd); if(espSerial.find("Error")) { if (DEBUG) Serial.println("AT+CIPSTART error"); return false; } String getStr = "GET /update?api_key="; // prepare GET string getStr += apiKey; getStr +="&field1="; getStr += String(value1); getStr +="&field2="; getStr += String(value2); // getStr +="&field3="; // getStr += String(value3); // ... getStr += "rnrn"; // send data length cmd = "AT+CIPSEND=";
  • 29. 29 cmd += String(getStr.length()); espSerial.println(cmd); if (DEBUG) Serial.println(cmd); delay(100); if(espSerial.find(">")) { espSerial.print(getStr); if (DEBUG) Serial.print(getStr); } Else { espSerial.println("AT+CIPCLOSE"); // alert user if (DEBUG) Serial.println("AT+CIPCLOSE"); return false; } return true; } //=============================================================== ================= setup void setup() { DEBUG=true; // enable debug serial Serial.begin(9600); dht.begin(); // Start DHT sensor espSerial.begin(115200); // Enable this line to reset the module; espSerial.println("AT+RST"); //showResponse(1000);
  • 30. 30 espSerial.println("AT+CWMODE=1"); // set esp8266 as client showResponse(1000); espSerial.println("AT+CWJAP=""+ssid+"",""+password+"""); // set your home router SSID and password showResponse(5000); if (DEBUG) Serial.println("Setup completed"); } //=============================================================== ======= loop void loop() { // Read sensor values float t = dht.readTemperature(); float h = dht.readHumidity(); if (isnan(t) || isnan(h)) { if (DEBUG) Serial.println("Failed to read from DHT"); } else { if (DEBUG) Serial.println("Temp="+String(t)+" *C"); if (DEBUG) Serial.println("Humidity="+String(h)+" %"); thingSpeakWrite(t,h); // Write values to thingspeak } // thingspeak needs 15 sec delay between updates, delay(20000); }
  • 31. 31 CHAPTER 6 RESULTS AND REPRESENTATION
  • 32. 32 RESULTS AND REPRESENTATIONS 6.1 REPRESENTATION We have measured temperature and humidity. We have set time by which it continuously senses temperature and Humidity. In the screenshot we have shown the result senses temperature and humidity after every 5 seconds. Fig 5.1: Channels saved on the server. This screen shows the channels allotted to record and represent the data collected from the sensors. We can design different channels for different process within the same server. We can select the desired channel for desired task and monitoring.
  • 33. 33 6.2 RESULT The figure 5.2 shows the actual recorded data of the sensors. The first graphical representation shows the Temperature Vs Time graph and the second graphical representation shows the Humidity Vs Time graph. We can also include the Temperature Vs Humidity graph in the same screen for further analysis. Fig 5.2: This is the results from our system.
  • 35. 35 CONCLUSIONS AND FUTURE WORK 7.1 CONCLUSION The home automation using Internet of Things has been experimentally proven to work satisfactorily by connecting simple appliances to it and the appliances were successfully controlled remotely through internet. The designed system not only monitors the sensor data, like temperature and humidity but can also actuates a process according to the requirement, for example switching on the light when it gets dark. It also stores the sensor parameters in the webpage (database) in a timely manner. This will help the user to analyze the condition of various parameters in the home anytime anywhere. 7.2 FUTURE WORK Using this system as framework, the system can be expanded to include various other options which could include home security feature like capturing the photo of a person moving around the house and storing it onto the cloud. This will reduce the data storage than using the CCTV camera which will record all the time and stores it. The system can be expanded for energy monitoring, or weather stations. This kind of a system with respective changes can be implemented in the hospitals for disable people or in industries where human invasion is impossible or dangerous, and it can also be implemented for environmental monitoring.
  • 37. 37 REFERENCES [1] Asaad M. J. Al-Hindawi, Ibraheem Talib, “Experimentally Evaluation of GPS/GSM Based System Design”, Journal of Electronic Systems, Volume 2 Number, 2 June, 2012. [2] Kunal Maurya , Mandeep Singh, Neelu Jain, “Real Time Vehicle Tracking System using GSM and GPS Technology- An Anti-theft Tracking System”, International Journal of Electronics and Computer Science Engineering, ISSN 2277-1956/V1N3-1103-1107 . [3] Vikram Kulkarni & Viswaprakash Babu, “embedded smart car security system on face detection”, special issue of IJCCT, ISSN (Online) : 2231-0371, ISSN(Print):0975-7449,volume-3, issue-1. [4] Chen, H., Chiang, Y. Chang, F. H. Wang, Toward Real-Time Precise Point Positioning: Differential GPS Based on IGS Ultra Rapid Product, SICE Annual Conference, The Grand Hotel, Taipei, Taiwan August 18- 21, (2010). [5] R.S Gaonkar, “Microprocessor Architecture Programming and Application”, Wiley Eastern Ltd, New Delhi. [6] Krishna Kant, “Microprocessor and microcontroller”, Eastern Company Edition, New Delhi 2007. [7] Daniel. W. Lewis, “Fundamental of embedded software”, prentice hall of India, 2004. [8] William Stalling, “Wireless Communication and Networks”, 2nd edition, prentice hall of India, 2005.