You are on page 1of 7

For assignments help please contact / Whatsapp

+919626956700

Project report

Implementing a Cloud system for


information sharing in the real time –
with the use of RASPBERRY PI

`1
Introduction

An embedded system is the system based purely on hardware and the computerization concepts
covering them. Thus in this system the hardware is the core and we have complete governance
by means of the software outside them, and the imitation with them are mainly they are to
perform certain tasks which have been pre-programmed in them and they are not having the
full power like the computers able to perform multiple tasks at the same time. Thus they are
limited by the highly specialized requirement of only one or few objectives. It is the role of the
system engineers and the designers to optimize the design by going in for the improvement in
the several phases, thus produce a good looking product with simplicity in design and
efficiency at the peak. (Cheah Jun Hong , et al., 2012)
Thus once an optimal and scalable design is created they go in in for the mass production all
over the global to make the unique idea sellable all over the world like automatic water
irrigation system, automation of the security systems, nuclear reactor controllers, traffic
automation, etc.

Raspberry pi
Thus in this process we can create or mirror a simple mirroring system with the Raspberry pi
which functions similar to a server and all the other connected to it as the clients in the process.
All the other syst4ems connected to it will now be able to access the files recorded and stored
(Real time information) immediately in a LIVE way, as once the data gets converted to digital
format it gets stored in the hard disk which is immediately accessible to the other systems once
they enter the authentication information, and enter the next screen to access page where all
the necessary files can be down loaded. In this application the main focus is on the use of the
B PLUS model of the RP kit which has advanced features for the mobile communications
enabled with the support of the ZIG BEE protocols

`2
Related Works & Validity of my
work

My work is very close to the works of Srinivasan, et al., (2010) wherein they have created a
home security system using the IOT. But the change I have planned is to go in for the
implementation of the security by using the Raspberry pi kit B plus version of the boards which
is more advanced and deployment of the Ardino technologies and the zig bee technologies
will refine this form others. It also deploys fault tolerance by the use of the mesh topologies
and going in for the advanced sensors helps in capture of any movements and detection of the
threats at any time, with mobile alerts and pictures shared among all the group of people within
the specific home range as they could receive immediate help from all the possible sources
rather than depending only on the emergency help lines.

Methodology
Here we adopt an exploratory research where e begun the idea with an scratch design and
expand it further based on the available resources with the constraints on time and money.

`3
A master slave N/W is created by using the Raspberry pi as the master and other computers
connected to it as the slaves. They all are strongly connected to the internet Wi fi technologies
for communication (use of the Zig Bee protocols for the remote communication)
And they also use the Wireless routers, Zig Bee (S one)
Using this automatic self - discovery and creation of dynamic paths is possible

Proposed system architecture

`4
As shown above in the system diagram these are used to create an environment with is devoid
of all the messy wires and creates a virtual wire free environment for the advanced
communication between the servers and the clients.

The main research objective


The main aim of this research is to create more secure and low cost robust cloud applications
(Private) mainly to address the real time issues like home security. This should be cheaper and
advanced using the technologies like Zig bee and wireless sensors which consumes much lesser
power. This system must boast of additional security features, creation of the logs, prevention
of the intrusion and focus on the fault tolerance using the advanced mesh systems. (Su, et al.,
2016)

Limitations of the study


1. Time
2. Cost
3. Incorporating more features with in the given time

`5
Implementation:

In this process we have used the cameras and also the web cam as the source to capture the
home locality and thus this stores all the images and videos. This is again transmitted to the
computer and then passed to the corresponding network as LIVE feed at the same time is also
stored in the cloud data base servers at the different locations which can be downloaded and
viewed later by the authorized users. The saved videos can thus be downloaded by the users,
sent to the other people in email or as google drive messages.

`6
References:

1. Cheah Jun Hong , Lew Kim Luong , See Yuen Chark , “Building Automation through
Web Interface” , IEEE Conference on Sustainable Utilization and Development in
Engineering and Technology, (2012).
2. David Baker, (15 Jan 2019). How ZigBee Compares in Wireless Home Automation,
[ONLINE] Available: http://www.control4.com/blog/2013/08/how-zigbee-compares-
inwireless-home-automation
3. Godha, R., Prateek, S., and Kataria, N. (2014). Home Automation: Access Control for
IoT Devices. International Journal of Scientific and Research Publications, Vol49, No.
10.

For assignments help please contact / Whatsapp


+919626956700

`7

You might also like