Integration and Implementation of the Internet of Things Through Cloud Computing by Tomar Pradeep

Integration and Implementation of the Internet of Things Through Cloud Computing by Tomar Pradeep

Author:Tomar Pradeep
Language: eng
Format: epub
Publisher: Engineering Science Reference


Wireless sensor-based technology is used in proposed solutions. The sensors are connected to the control panel via Wi-Fi connectivity. They are distributed and connected to control panels in various zones. Each zone means one device dedicatedly connected to one individual Input-Output port of the control panel. This control panel can maximum accommodate eight various sensors. Technical details are explained in the next section. The proposed solution is divided into six process flows.

Process Flow #1: Communication From Site Engineer to Network Operations Center (NOC)

The site engineer will reach the site. From there he will call NOC. A network operations center (NOC) is a centralized location used by network administrators to manage, control and monitor multiple telecom networks simultaneously. To optimize network operations across a variety of platforms, mediums and communications channels is the main function and purpose of NOC. Site engineer will be asked to provide details like his name, company name, mobile number, Aadhar number and purpose of visit. The purpose of seeking all these details is to authenticate the site engineer.

Process Flow #2: Communication From NOC to Site Engineer

Once the NOC authenticates the site engineer, the system will generate two One Time Passwords (OTP). These OTPs are received simultaneously by the site panel and site engineer’s authenticated mobile phone.

Process Flow #3: Site Engineer Inside the Site

Site engineers will use the first OTP to open the door using the electronic keyboard fitted on the telecom site’s entry door. Once the door is open, he will use a second OTP to disarm the intrusion control panel. In 3 minutes, the person has to disarm the intrusion panel using a second OTP otherwise the entrant will be treated as unauthorized visitor. The panel is disarmed so that no alarms, hooters and alerts are generated and the person can finish his task. Depending upon the type of work, a time limit is set, during which the panel will remain disarmed.

Process Flow #4: Sensors Activation

Once OTP is entered and authenticated by the control panel, the hydraulic lock is triggered. Main access door is open. As the person steps inside, the motion sensor-based camera senses the motion and gets triggered. It captures the snapshots and sends on the File Transfer Protocol (FTP) server hosted on cloud. Door sensor sends the status to the NOC. Motion sensor senses the motion and updates the status on the server. This will not generate any alarms as this is a case of authenticated entry.

Process Flow #5: After Completion of Task

When the site engineer finishes the task, he has to arm the intrusion panel by pressing a number through the keyboard of the intrusion panel. If he forgets to arm the intrusion panel and leaves the site then door sensor will trigger the intrusion panel. The intrusion panel will be armed again within 3 minutes.

Process Flow #6: Case of Forced Entry

In case of unauthenticated and forced entry inside the telecom site, the motion sensor will trigger the intrusion panel. Hooter system will be triggered by the intrusion panel. Motion sensors will trigger the camera & pictures will be captured.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.