Professional Documents
Culture Documents
D.ASWITHA(20D41A0221)
ABSTRACT
Home automation is an important part of modern life because it monitors and controls electrical devices in the home as well as other
aspects of the digital home, which is expected to be the standard for the future home. The home appliance control system allows the
homeowner to remotely control devices such as the stove, refrigerator, air conditioner, and lighting while also monitoring the house's
status. A personal digital device, such as a laptop, PDA, telephone, or even a cell phone, can be used for monitoring and control. The
Power-Line Communication (PLC) protocol for data transmission is one of the technologies widely used by homeowners to connect
the home controller with the appliances.
When one was using more electricity in the house, such Once power line network is selected as the preferred
as running the washer and dryer, the network slowed method to create anetwork within a home, the next thing to
down. Intelogis includes line-conditioning power strips consider is what type of setup will work best for your home.
with its network kit and encourages you to insert them There are 8 most preferred ways to setup a power line
between the wall outlet and your computer equipment to network.
help reduce the amount of electrical line noise.
1.Two computers sharing internet access through a router.
V.HOW TO INSTALL
The physical connection between each computer and the
intelogis power line networks uses the computer’s
parallel port. A wall device is plugged directly into the
electrical outlet. A parallel cable is plugged into the wall
device and into the parallel port of the computer. The
power-line network must be the last item connected to
the parallel port. For this reason, if you have anything
else connected to the parallel port, such as a scanner or
Zip drive, it must have a pass-through for the parallel
port. Unless you have a second parallel port on your
computer, your printer must be connected to the network
through a wall of its own.
IX.
SECURITY METHODS
XVIII. CONCLUSION