Developing a zigbee wireless network and controlling it through the internet

Download
2009
Kaynar, Kerem
The aim of this thesis is to develop a network, whose nodes communicate with the ZigBee wireless network protocol, and control this network with a PC through the Internet. One of the nodes of this network is designed to be master node. The other nodes are slave nodes. The master node can be connected to an Ethernet connected to the Internet. A PC can communicate with the master node via a specific web application over the Internet. The communication between a web server, in which the specific web application is loaded, and the master node is performed using a specific application protocol working over TCP/IP and defined in this thesis. The master node controls the slave nodes of the wireless network formed according to the commands given by the user of a PC over the Internet. The master node contains an implementation of the ZigBee stack along with a suitable application software to communicate with the slave nodes. The master node also contains an implementation of the TCP/IP stack along with a suitable application software to communicate with a web server in which the specific web application is loaded. The slave nodes contain an implementation of the ZigBee stack along with a suitable application software to communicate with the master node. For each type of node, appropriate hardware which is compliant with the software contained by that type of node is used. Each type of node uses microcontroller-based hardware.

Suggestions

Execution of distributed database queries on a HPC system
Önder, İbrahim Seçkin; Coşar, Ahmet; Department of Computer Engineering (2010)
Increasing performance of computers and ability to connect computers with high speed communication networks make distributed databases systems an attractive research area. In this study, we evaluate communication and data processing capabilities of a HPC machine. We calculate accurate cost formulas for high volume data communication between processing nodes and experimentally measure sorting times. A left deep query plan executer has been implemented and experimentally used for executing plans generated by ...
Secure communication channel mechanisms for isolated networks
Karadağ, Gökdeniz; Özgit, Attila; Department of Computer Engineering (2009)
Current network security solutions are consisted of a single host, with network interfaces of the host connected to protected and external networks at the same time. This design ensures security by restricting traffic flow to a single point, where it can be examined and acted on by a set of rules. However, this design also has a flaw and a single point of failure, that being the vulnerabilities in the security device itself. An adversary would have unhindered access to protected networks if a vulnerability ...
Improving throughput by traffic aware routing in non-transparent ieee 802.16j networks
Tekdoğan, Rıdvan; Şener, Cevat; Department of Computer Engineering (2010)
WiMAX is one of the rising communications technology which enables last mile broadband mobile wireless Internet connectivity. IEEE Std 802.16-2009 is the last accepted standard which targets mobile and fixed wireless broadband access. The standard defines two types of stations which are base and mobile stations. A base station has a wired connection to backhaul network and gives broadband wireless service to mobile stations. IEEE 802.16j standard which is an amendment to IEEE 802.16, introduces Multihop Rel...
Automatic composition of semantic web services with the abductive event calculus
Kırcı, Esra; Çiçekli, Fehime Nihan; Department of Computer Engineering (2008)
In today's world, composite web services are widely used in service oriented computing, web mashups and B2B Applications etc. Most of these services are composed manually. However, the complexity of manually composing web services increase exponentially with the increase in the number of available web services, the need for dynamically created/updated/discovered services and the necessity for higher amount of data bindings and type mappings in longer compositions. Therefore, current highly manual web servic...
Design and implementation of an open security architecture for a software-based security module
Kaynar, Kaan; Özgit, Attila; Department of Computer Engineering (2009)
Main purpose of this thesis work is to design a comprehensive and open security architecture whose desired parts could be realized on a general-purpose embedded computer without any special cryptography hardware. The architecture provides security mechanisms that implement known cryptography techniques, operations of some famous network security protocols and appropriate system security methods. Consequently, a server machine may offload a substantial part of its security processing tasks to an embedded com...
Citation Formats
K. Kaynar, “Developing a zigbee wireless network and controlling it through the internet,” M.S. - Master of Science, Middle East Technical University, 2009.