Wireless Network Technologies Assignment 2
Wireless Network Technologies Assignment 2
(IT5040)
Assignment 2 - Part 2 - Section 2
Group Assignment
0
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Table of Content
1. RFID Application 2
Introduction 2
How it Works 2
Related Applications 3
Advantages of RFID 3
Disadvantages of RFID 5
Introduction to the Company 5
Application 6
Advantages of the Application 7
Disadvantages of the Application 8
1
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
1. RFID Application
Introduction
RFID stands for “radio-frequency identification” and refers to a technology whereby digital data
encoded in RFID tags or smart labels (defined below) are captured by a reader via radio waves.
RFID is similar to barcoding in that data from a tag or label are captured by a device that stores
the data in a database. RFID, however, has several advantages over systems that use barcode
asset tracking software. The most notable is that RFID tag data can be read outside the
line-of-sight, whereas barcodes must be aligned with an optical scanner.
How it Works
An RFID tag consists of an integrated circuit and an antenna. The tag is also composed of a
protective material that holds the pieces together and shields them from various environmental
conditions. The protective material depends on the application. For example, employee ID
badges containing RFID tags are typically made from durable plastic, and the tag is embedded
between the layers of plastic. RFID tags come in a variety of shapes and sizes and are either
passive or active. Passive tags are the most widely used, as they are smaller and less expensive
to implement. Passive tags must be “powered up” by the RFID reader before they can transmit
data. Unlike passive tags, active RFID tags have an onboard power supply (e.g., a battery),
thereby enabling them to transmit data at all times. For a more detailed discussion, refer to this
article: Passive RFID Tags vs. Active RFID Tags.
Smart labels differ from RFID tags in that they incorporate both RFID and barcode technologies.
They’re made of an adhesive label embedded with an RFID tag inlay, and they may also feature
a barcode and/or other printed information. Smart labels can be encoded and printed
on-demand using desktop label printers, whereas programming RFID tags are more time
consuming and requires more advanced equipment.
2
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Related Applications
RFID technology is employed in many industries to perform such task as:
● Inventory management
● Asset tracking
● Personnel tracking
● Controlling access to restricted areas
● ID Badging
● Supply chain management
● Counterfeit prevention (e.g. in the pharmaceutical industry)
Advantages of RFID
● Tracking assets and managing inventory
Keeping track of assets and materials is a challenge for most organizations –
whether it is components on a production line, finished products being dispatched,
industrial containers that need returning, or tools, laptops and other high-value
equipment that often go missing. RFID system offers a fast and reliable way to track
them without having to count each individual item.
3
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
4
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Disadvantages of RFID
● Lost Keycard
Just like traditional lock and keys, you can also forget or misplace your keycard giving you
the double headache of trying to figure out how to open your locker and tracing back
your step to find the keycard.
● Hacker Alert
An RFID system can be hacked or bypassed by someone who is tech-savvy, so they are
not totally foolproof.
One major problem is that electric RFID systems may malfunction during power outages
causing some lockers to either shut you out or worse leave the lockers open where
people may try to steal what is inside.
Requires locks being wired to a secured “server”. This computer is where access is
programmed, controlled, and logged.
If the server computer is not connected to the internet, and you have time-based access
restrictions, you will need to manually change the computer’s clock twice a year when
the time changes.
Master’s Finder company has one story building and in this building it has one boardroom which
includes a TV and an AC machine, washroom and one file rack. In addition to that, this company
has one printer machine which works with WiFi and WiFi assigned thirteen electric devices
5
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
which have been assembled on separate working tables. Also the company includes a free space
cubicle with sofas for employees to have their free time in between working hours.
Further there are four AC machines in the company and these four AC machines cover the
whole area of the company. There are two power sockets in each room.
Application
RFIDs can be used to track assets in the Master’s Finder company. For inventory management
RFIDs can be used. Inventory such as desks, tables, chairs, cupboards, printers, A/Cs, TVs, Sofa,
Book Shelves can be tracked when RFID tags are attached to them. They contain information
about the assets, identification number (code), date of acquisition, type, brand, asset name,
material, department ID and cost. This information is read by the RFID Reader. The location of
the RFID tags are tracked. The information that is read by the RFID Reader is sent to a software
application where further processing is done as per the requirements.
The Manager of the company can track the assets and determine if the assets have been
moved, removed from the premises etc in real time.
6
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
RFIDs cost only a small amount. Therefore the whole application is cheaper.
● Low power
RFIDs consume only a small amount of energy. Therefore the whole application is low
powered.
● Asset tracking
Assets tracking by geo-location is done. Asset Management is easy with the RFID
application.
● Simple Application
The user of the application can get all information of the asset by reading with the RFID
reader. This information is processed and filtering, tracking, cost management, asset
valuation and viewing is done.
There are a lot of assets in the company and all of it needs to have RFID tags to be
included in the system. It’s time consuming to get them all tagged. But since tagging is
needed to be done only one time it is not an issue.
7
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Introduction to NFC
Technology in NFC
The technology behind NFC allows a device, known as a reader, interrogator, or active device, to
create a radio frequency current that communicates with another NFC compatible device or a
small NFC tag holding the information the reader wants. Passive devices, such as the NFC tag in
smart posters, store information and communicate with the reader but do not actively read
other devices. Peer-to-peer communication through two active devices is also a possibility with
NFC. This allows both devices to send and receive information.
8
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Both businesses and individuals benefit from near field communication technology. By
integrating credit cards, subway tickets, and paper coupons all into one device, a customer can
board a train, pay for groceries, redeem coupons or store loyalty points, and even exchange
contact information all with the wave of a smartphone. Faster transaction times mean less
waiting in line and happier customers. Fewer physical cards to carry around means the
customer is less likely to lose one or have it stolen.
Related Applications
Near Field Communication utilizes electromagnetic radio fields while technologies such as
Bluetooth and Wi-Fi focus on radio transmissions instead. Lans for the future cover shopping
malls, office buildings, and even your own vehicle as potential places for NFC to help offer quick
services. In today's world, businesses are far more likely to succeed when they have access to
robust data and effective analytics. But sometimes it can be difficult to acquire good data. That's
where near-field communication (NFC) technology comes in.
NFC tags are small, stamp-like devices that enable wireless communication between an
electronic device and any item with a tag placed on it. As the name suggests, near-field
communication occurs only when enabled devices (or tags) come within just a few centimeters
of one another. It's already playing an important business role in areas like logistics,
manufacturing and human resources, enabling companies to obtain more and better data about
a variety of their operations. On the consumer side, NFC can be used for obtaining deals and
receiving personalized advertisements NFC technology is all about expanding the reach of the
digital experience, pulling in more data and creating more opportunities for interactivity with
the physical environment. In many ways, NFC is seen as a bridge between the digital and the
analog.
9
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Basic Structure
In an IT based company almost, they will work with mobile phones and devices. They will do all
of the work using a mobile phone. Then they can easily minimize the problems that occur when
working. Can easily be used to share information, to do mobile payments and interact with your
surroundings. If the employee Near field communication (NFC) technology lets smartphones
and other enabled devices communicate with other devices containing a NFC tag. Whether
swiping your smartphone at the checkout lane in the grocery store, waving it over a display at a
local museum, or bumping phones with a friend to share the latest games, near field technology
lets you pay, play, and learn easily. Explore our website to learn more about how both
individuals and businesses benefit from NFC. Using all those techniques into the company can
work more accurately than the other days. They will not be late to find the roots or else to share
the information among them easily can use NFC.
NFC transmits or receives data via radio waves. It's an established standard of wireless
communication, so if devices stick to the NFC protocols they'll be able to communicate with
each other. It differs from Bluetooth in that it functions through electromagnetic induction. This
means there can be a passive device, such as a poster or sticker, requiring no power source of
its own that can transmit data when an active device, like your smartphone, comes into contact
with it.
As an active NFC device, a smartphone can send and receive data over NFC. It encompasses the
full range - three modes - of NFC:
10
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
ABC Digital is an IT company which consists of 50 to 75 employees. ABC digital is in the business
of providing software solutions to its clients and selling computer hardware products. The
employees are mainly working under a few departments. IT department, Accounts department,
Marketing department and HR department. ABC Digital has applied NFC technology to its
company materials.
The Marketing team is fully responsible for the sales of hardware items to its customers. In
order perform this task effectively, the Marketing team has applied NFC technology to some of
its materials.
First thing ABC Digital has done is using NFC technology enabled business cards. An NFC
business card is not the same as a traditional business card. The business card need not be red
manually. The holder of an NFC business card can simply scan it using a smartphone and the
11
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
contact details i.e. email address, contact number, web address of the company will be
displayed on the screen of the phone. This makes it convenient to contact the ABC Digital’s
representative and this will help the company to increase its customer base or at least potential
customers.
The above diagram shows the ability to perform multiple tasks within a short period of time,
using an NFC technology enabled business card.
In an NFC card there's a small microchip embedded into the card, which, once scanned, sends
the signals to an NFC compatible smartphone. An NFC chip helps the reader to find out the
required information of the owner of the business card without verbally questioning. As all the
required details are fed into the chip the reader is able to browse through required information.
An NFC enabled business card is capable of performing lot of tasks including the below;
● Direct people to a registration form that will sign them up for the company’s email list.
● Direct the reader to the company web page.
● Direct the readers to alternating content.
● Direct people to the card owners contact information, Facebook page, Google Plus
Profile etc.
● Direct people to download entities' mobile apps.
● Direct people to a discount coupon or a special product that they will not find in the
open market.
● Indicate that the reader can Call, Email or Text just by tapping on the respective links.
12
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
One of the conventional ways of displaying information in a corporate office is through a Notice
Board. Notice boards are an ideal platform that allows one to put up a piece of information that
needs to be circulated among the other members of the organization. This enables news to be
communicated to a larger crowd more efficiently. That being said, manually updating the notice
board is a time-consuming task.
Therefore, ABC Digital has come up with a notice board using NFC tags. Each NFC tag is
programmed to contain the notice information requires displaying. When a notice needs to be
displayed, the user needs just to update the NFC tag. A person expecting to read the notice just
has to scan the NFC tag through their NFC enabled smartphones which downloads the notice in
document format into their handheld devices. This solution is user-friendly as the end-user can
read the notices at their own convenient time therefore, minimizes the wastage of time.
ABC Digital has applied NFC based technology to its attendance management as well. A NFC
based attendance monitoring system enables the company to track and monitor employees’
attendance accurately.
The installation cost of an NFC based attendance system is lower than other advanced
attendance systems like the fingerprint systems.
As ABC Digital uses NFC based attendance systems, it's able to process the data collected more
quickly, compared to a manual system. ABC Digital has used NFC tags on its employees’
smartphones that use NFC. Therefore, as described above using an NFC based attendance
management system would give added benefits to ABC Digital as a company.
13
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
How well it aligns with the organization and its efficiency (advantages)
As an IT related company there will be a huge chance to share documents every time via the
team members or else to see the errors or else send a message to the other member to use
some kind of apps. Rather than using all of those simply use NFC for do all those works
When an employee is too busy to type a number Just navigate to a contact in your address book
(it can be yours or somebody else's), then press your phone to the recipient's. When your
phone says “touch to beam”, just tap the display. As well as When you want to explain the
theories behind the business logic in the current implementing system you have to open a
digital rule book on devices NFC can also be used to make mobile payments from their
smartphone or smartwatch. Download Google Pay via the link, add their credit or debit card
details, then use it in any store that has a contactless payment terminal.
Security
Major chance for NFC is computer hacking or phone hacking. As portable phones ended up
more created, they ended up much like a hand-held computer, and as with computers, they
ended up inclined to infections. Programmers will need to pick up and get to these modest
computers since it contains a part of vital data all in one gadget.
14
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Examples incorporate a phone’s proprietor credit card data, charge payments, social security
data, etc. Besides, as innovation progresses, it'll get to be simpler for programmers to do this. It
is assessed that most governments might take up to 10 a long time to finally warm up to
Approach Field Communication innovation.
Many of us who would like to undertake NFC wishes that it can be utilized all over and
anywhere. However, if companies do not agree to integrate NFC into their business, consumers
will not be able to use the technology. NFC clients will not be able to utilize reward/point card
framework at their favorite coffee shop, make-up office or at any other retailer.
It is critical to note that another advantage of close field communication is that it is cheaper to
make than Bluetooth and Wi-Fi coordinate. Its equipment components are less difficult. Keep in
mind that it too expends less control than other remote communication innovations. An NFC
gadget can work without a battery utilizing as little photovoltaic cells.
Be that as it may, since NFC is additionally utilized to supplement Bluetooth, Wi-Fi Coordinate,
and Wi-Fi organizing, its taken a toll advantage is essentially misplaced. NFC isn't a perfect
standalone remote communication convention in certain applications such as in computers and
smartphones. In these occasions, the moo fetch of NFC is misplaced.
NFC is additionally expensive when compared to RFID and other sorts of electronic recognizable
proof and labeling. Following and distinguishing proof frameworks utilizing barcodes or speedy
reaction or QR codes are less demanding to create and execute than NFC. On the other hand,
standard RFID has cheaper equipment and setup costs than NFC because it could be a
less-advanced innovation.
15
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Zigbee is a wireless technology standard that defines a set of communication protocols for short
range communication. Also zigbee standard is specially built for control and sensor network.
The objective of this technology is to monitor and control devices.
Zigbee Usage in WSN based on the IEEE 802.15.4 standard, ZigBee is a global specification
created by a multivendor consortium called the ZigBee Alliance. Whereas 802.15.4 defines the
physical (PHY) and medium access control sublayer (MAC) layers of an application, ZigBee
defines the network and application layers, application framework, application profile, and the
security mechanism. ZigBee provides users in specific applications with a simple, low-cost global
network that supports a large number of nodes with an extremely low power drain on the
battery. The ZigBee stack architecture is based on the standard open systems interconnection
(OSI) seven-layer model but defines only those layers relevant to achieving functionality in the
intended market space.
Wireless links under ZigBee can operate in three license free industrial scientific medical (ISM)
frequency bands, including 868 MHz in Europe, 915 MHz in the USA and Australia, and 2.4 GHz
in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kbps. A total of 27
16
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
channels are allocated in 802.15.4, including 1 channel in the 868 MHz, 10 channels in the
915 MHz, and 16 channels in the 2.4 GHz band. The ZigBee network layer supports star, tree,
and mesh topologies. Each network must have one ZigBee coordinator (ZC) to create and
control the network. In the tree and mesh topologies, the ZigBee routers (ZRs) are used to
extend the communication range at the network level. ZigBee devices are of three types,
besides the mentioned ZC and ZR. For sensing applications, the sensors are usually programmed
as ZigBee end devices (ZED), which contain just enough functionality to communicate with their
parent node (either a ZC or ZR) and cannot relay data from other devices[8]
Our hypothetical company has used mesh topology to connectivity between sensors and
routers and finally all main routers are connected in WSN coordinator.
Zigbee uses 128-bit keys to implement its security mechanisms. A key can be associated either
to a network, being usable by both Zigbee layers and the MAC sublayer, or to a link, acquired
through pre-installation, agreement or transport. Establishment of link keys is based on a
master key which controls link key correspondence. Ultimately, at least, the initial master key
must be obtained through a secure medium (transport or pre-installation), as the security of the
whole network depends on it. Link and master keys are only visible to the application layer.
Different services use different one-way variations of the link key to avoid leaks and security
risks.
Key distribution is one of the most important security functions of the network. A secure
network will designate one special device which other devices trust for the distribution of
security keys: the trust center. Ideally, devices will have the center trust address and initial
master key preloaded; if a momentary vulnerability is allowed, it will be sent as described
17
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
above. Typical applications without special security needs will use a network key provided by
the trust center (through the initially insecure channel) to communicate.
Thus, the trust center maintains both the network key and provides point-to-point security.
Devices will only accept communications originating from a key supplied by the trust center,
except for the initial master key. The security architecture is distributed among the network
layers as follows:
The MAC sublayer is capable of single-hop reliable communications. As a rule, the security level
it is to use is specified by the upper layers.
The network layer manages routing, processing received messages and being capable of
broadcasting requests. Outgoing frames will use the adequate link key according to the routing
if it is available; otherwise, the network key will be used to protect the payload from external
devices.
The application layer offers key establishment and transport services to both ZDO and
applications.
The security levels infrastructure is based on CCM*, which adds encryption- and integrity-only
features to CCM [13]
Mesh Topology- In mesh topology each device is connected to every other device on the
network through a dedicated point-to-point link. When we say dedicated it means that the link
only carries data for the two connected devices only. Let’s say we have n devices in the network
then each device must be connected with (n-1) devices of the network. Number of links in a
mesh topology of n devices would be n(n-1)/2. [9]
18
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Company Introduction
To undertake the Wireless sensor network integration, we have taken the hypothetical company
called Master’s Finder web development company that includes ten to fifteen employees
working as IT professionals.
Figure 1
The company main floor plan consists of, working area which includes UI division and the
application division combined, and a boardroom where employees have their important
meetings/gatherings and crucial client calls that helps to improve their business and the growth
of the company in the long run. Company also has two washrooms, one free space cubicle and a
kitchen area to help the employees with their essential needs. As a habit, employees also
maintain an indoor plantation which includes houseplant pots with racks that gives employees a
satisfied and clear mindset to focus and work with their day to day tasks.
19
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Figure 2
Employees use the kitchen area to prepare their foods, mainly the lunch and other beverages
such as snacks, tea, biscuits etc. Kitchen area consists of a dining table, a fridge, a sink, a
microwave oven, electric kettle, and a set of cabins which are mostly used to store ingredients
and spices that help to cook their foods on special occasions. The exhaust fan is useful to
remove the toxic air inside of the kitchen during that time. Also the kitchen area includes a
dustbin to throw the trash collected inside the kitchen and employees make sure to check once
a week or twice a week when the dustbin is full and do the disposal accordingly.
20
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Figure 3
Overall, the company consists of several air condition machines placed across the floor and also
includes lights/ bulbs which give proper lighting throughout the company. To make sure that
there is no disturbance with the electricity which directly affects the workflow of the
employees, they have connected a generator to the main switch with a capacitor that gives
uninterrupted current flow mainly to avoid the idle time that has in between generator starts
and off.
21
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Based on the description and the thorough analysis of the floor plan of the company, we have
decided to use the mesh topology as our wireless sensor network topology. It includes, mainly
the WSN coordinator, the routers and the sensors as the main parts of the topology. All the
sensors positioned to each device are connected to the WSN coordinator via the
routers.LAN-to-LPWAN(Local Area Network to Low-Power Wide-Area Network) - Creates a
second network inside of the main network, allowing to place restrictions on any computers,
smartphones, or other items that are connected to it.
Figure 4
Sensors are connected mainly in 5 areas of the company. Main office premises, where the
employees are working during the office time (UI and Application divisions), boardroom,
washrooms, indoor plant racks and the kitchen area. These five areas are identified as crucial in
the day to day office work and also directly affects the future of the company.
22
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Figure 5
Each employee is given a wristband with a sensor to wear during the office time. Which
calculates a particular time where an employee started working and reaches the minimum
sitting time and gives a notification to stand up/walk or stretch. This mainly focuses on the good
health of the employee and can even be set up to list down all the employees health data, such
as steps he/she walked during the day, to encourage all the employees to focus on their health
as well.
Boardroom
Considering the board room, entrance door and all electrical devices of the board room have
been fixed sensor for detecting its functionalities. There are several types of functionalities
working in the boardroom. The first thing is the board room can book permission that has been
23
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
given to the employee (CEO, all team leaders and permission is given to some employee that is
mentioned in upper-level employee) through the system. System shows a working hours table
and the employee which has permission to access the boardroom can book a time slot through
the system by using their name and department name. The board room availability chart can be
viewed for all the employees and the system will display the booked time slot relevant
employee name and with his department name. After booking the board room other
employees can not access the board room and in this receiving time slot others permission
users’ ID does not work. All cleaning staff can access the meeting room for cleaning the process
before and after active hours of the boardroom.
After receiving a time slot, the five minutes before coming to the time slot book, the user sends
a message by the system according to user-selected alert formatting (mobile phone or email).
When starting the meeting all electrical devices control come under the time slot owner and all
devices work according to his/her commands. Five minutes before the end of the time slot
sends the message from the system to the time slot owner user. If the next time slot is booked
then exactly the end time all devices are auto-off and device access is offered next time slot
owner by the system. The next time slot is free the system sends the ending time slot reminding
message to the current time slot owner as usual but the system does not disconnect the device
controlling it from the current user. Then the relevant user can continue their work until the
meeting's next booking slot.
Washrooms
When an employee enters the washroom PIR (passive infrared sensor) sensor detects there is
someone in the washroom, (using the minimum length of line of sight breaks, as there is an
obstacle in between) and starts activating the lights. Same goes with the comod and the sinks
where there are sensors activating when an employee near it and goes off when they leave the
area.
24
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
For the indoor plantation that the employees maintain within the company, there are some
plants that need daily attention and as some plants need attention once a week or twice a
week, which is a bit hard to keep track of the plants that always need to keep them hydrated
continuously.
Sensors are attached to each houseplant pot that keep monitoring the moisture of the soil to a
certain level and when the moisture is dropped; they indicate that particular houseplant pot
needs attention. So that the employees can easily maintain the indoor plantation through the
sensors.
Kitchen
As it is essential to keep track of the devices/items in the kitchen area, sensors are used
accordingly to accomplish this.
Most of the electric devices in the kitchen are attached with sensors to indicate if a device is
connected to the electricity, so in a way employees can detect how many and which devices are
connected to the electricity and unplugged before they leave the office premises. It’ll mainly
help to avoid causing any damage to the devices that will mostly happen due to the high voltage
or lightning. This way the company can maintain and use the devices for a longer period of time
that also helps to save money which directly affects the company cost.
25
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
Figure 6
The kitchen has been placed in several cabins for storing the foods. Inside of this all cabins have
been fixed to detect the cabin’s temperature and its availability. For example, in these sets of
cabins, one cabin is empty. Then the system is shown whether the relevant cabin is empty with
its cabin ID and another employee can book this empty cabin through the system using a user
ID. If a particular employee books the cabin and does not store food or goods within an hour
then the system detects it and it auto cancels its reservation and shows the system that the
cabin is an empty cabin, then a different employee can book this cabin. After an employee
books a cabin by using their user ID then the cabin owner(employee) can control cabin
26
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
temperature according to their stored foods. Also, the cabin owner can change the temperature
in the 260C to 330C range.
The exhaust fan applied with another sensor which activates automatically upon checking the
density of the air within the kitchen area. When there is any toxic or heat air around the kitchen
the fan sensor detects it and activates the fan, once the air is clean the sensor sends the signal
and stops the fan.
Also within the dustbin, there is a sensor placed inside to calculate the maximum weight that
the dustbin can hold and once it reaches to its limit or gets close to the limit, the sensor detects
and makes a signal. Then employees can know when to dispose of the trash or clean the dustbin
without having the trouble to check it manually which saves time for the employees.
Generator
The Generator has been placed outdoors of the company and it has been a placed sensor to
monitor its functionality. The sensor detects hardware and technical issues of the generator
machine.
Three place electricity is the basic electricity supplier to the company to do their day to day
works. If having any failure of the main electrical system and then the system will detect that
failure. finally the main electricity supplier will become a generator machine. The system does
not move power supply directly from three place current to a generator machine. It happens
over the capacitor series. The capacitors hold the power supply for ten minutes time duration.
In this time period the sensors which are placed on the generator check whether they have any
issue from the generator system. If it has any issue then report its main control system and it is
shown on the system and give the message to the end user that after 10 minutes all electricity
power will be down. However, the issue which detects whether or not the system will show the
type of the power supply (three place or generator). On the other hand, these capacitors help
to smooth the current exchange from tree place current supply to generator current supply or
27
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
from the generator current supply to tree place current supply. The end-user will not sense the
moment of electricity supply exchange because of this capacity series. Eventually, the end-user
has only one way to know about the electricity supplier: it is a system. The System will show at
the right time who is the current electricity supplier. In exchanging from generator current to
tree place current follows the same procedure.
A/C and light systems have been controlled by using the sensor system. Here the PIR sensor is
used to detect the person. If detecting is not the person then automatically off that area lights
and AC. According to weather and temperature changes the AC temperature will update
automatically.
● No data traffic issues as there is a dedicated link between two devices which means the
link is only available for those two devices.
● Mesh topology is reliable and robust as failure of one link doesn’t affect other links and
the communication between other devices on the network.
● Mesh topology is secure because there is a point to point link thus unauthorized access
is not possible.
● 4. Fault detection is easy.
● If a node fails data can be rerouted using another path.
● A message travels from one device to another in order to reach its destination.
28
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
29
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
References
[1]"What is RFID and How Does RFID Work? - AB&R®", AB&R, 2021. [Online]. Available:
https://www.abr.com/what-is-rfid-how-does-rfid-work/. [Accessed: 24- Mar- 2021].
[3] Printingdeals.org. 2021. NFC Business Cards Explained - Printingdeals.org. [online] Available
at: <http://www.printingdeals.org/specials/nfc.html> [Accessed 22 March 2021].
[4] Ieeexplore.ieee.org. 2021. Near field application: NFC smart notice board. [online] Available
at: <https://ieeexplore.ieee.org/document/7759887> [Accessed 25 March 2021].
[7] Bravo, J., Hervás, R., Fontecha, J. and González, I., 2021. m-Health: Lessons Learned by
m-Experiences.
[8] J.-S. Lee and Y.-M. Wang, “Experimental Evaluation of ZigBee-Based Wireless Networks in
Indoor Environments,” Journal of Engineering, vol. 2013, pp. 1–9, 2013.
30
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
[9]beginnersbook.com. 2021. Computer Network Topology - Mesh, Star, Bus, Ring and Hybrid.
[online] Available at:
<https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-ring-and-hyb
rid/> [Accessed 26 March 2021].
[10]"Benefits of RFID - Why do you need RFID Solutions?", RFID systems for manufacturing,
assets, lifting & logistics, 2021. [Online]. Available: https://www.corerfid.com/rfid-technology
/what-is-rfid/benefits-of-rfid/. [Accessed: 24- Mar- 2021].
[11]"RFID: What are its Advantages and Disadvantages? - Nuesmart", Nuesmart, 2021. [Online].
Available: https://www.nuesmart.com/rfid-what-are-its-advantages-and-disadvantages/.
[Accessed: 24- Mar- 2021].
31
Wireless Network Technologies (IT5040) Assignment 2 - Part 2 - Section 2
32