Vous êtes sur la page 1sur 40

EMBEDDED BASED INDUSTRIAL PROCESS

MONITORING THROUGH WIRELESS


COMMUNICATION OVER IOT

A PROJECT REPORT

Submitted by

MD SHAIFULLAH GOUHAR (0001307007)


DIPANKAR PANDIT (0001307016)
Under the guidance of

MR.J. S. PRASATH

In partial fulfillment for the award of the degree


Of

B.TECH

IN

ELECTRONICS AND INSTRUMENTATION ENGINEERING

HINDUSTAN INSTITUTE OF TECHNOLOGY AND SCIENCE,


CHENNAI - 603 103
MAY, 2017

1
EMBEDDED BASED INDUSTRIAL PROCESS
MONITORING THROUGH WIRELESS
COMMUNICATION OVER IOT

A PROJECT REPORT

Submitted by

MD SHAIFULLAH GOUHAR (0001307007)


DIPANKAR PANDIT (0001307016)
Under the guidance of
MR J.S. PRASATH

In partial fulfillment for the award of the degree


Of
B.TECH
IN
ELECTRONICS AND INSTRUMENTATION ENGINEERING

HINDUSTAN INSTITUTE OF TECHNOLOGY AND SCIENCE,


CHENNAI - 603 103
MAY, 2017

2
HINDUSTAN INSTITUTE OF TECHNOLOGY & SCIENCE

BONAFIDE CERTIFICATE

Certified that this project report “EMBEDDED BASED INDUSTRIAL PROCESS


MONITORING THROUGH WIRELESS COMMUNICATION OVER IOT” is
the bonafide work of MDSHAIFULLAH GOUHAR (0001307007), DIPANKAR
PANDIT (0001307016) who carried out the project work under my supervision
during the academic year 2016-2017.

SIGNATURE SIGNATURE

HEAD OF THE DEPARTMENT SUPERVISOR

INTERNAL EXAMINER EXTERNAL EXAMINER

Name: ________________________ Name: ________________________

Designation:_____________________ Designation:_____________________

Institution Name:___________________

Project Viva - voce conducted on ___________

3
ACKNOWLEDGEMENT

The satisfaction that companies the successful completion of any task would be incomplete without
mentioning the people who made it possible, whose constant guidance and encouragement crowned
our effort with success.
I would like to express our sincere and grateful thanks to our Chancellor………Vice-
Chancellor…………, Pro Vice-Chancellor…………………and Dean-Engineering……………….
We would like to express our sincere thanks to……………., Head of Department,
Electronics and Instrumentation Engineering, Hindustan University for his generous support
and guidance from time to time. We thank the project Co-coordinator MR. S. JANAKIRAMAN,
Hindustan Institute of Science and Technology for the ample of facilities made available to
proceed with the project work.
I would like to express our sincere thanks to MR J. S. PRASATH our guide for the project
for his excellent suggestions and encouragement throughout the project.
We would like to express our sincere thanks to all of our staff members of the Department of
Electronics and Instrumentation who gave many suggestions for the valuable help provided by them
throughout our degree course.
I admit that this project would not have been possible without the constant support and
encouragement of faculties.

4
ABSTRACT

The main objective of the project is to monitor the industrial process through embedded
based wireless communication. The proposed work which allows monitoring the industrial process
through internet. Here we are implementing Raspberry pi in such a way so that data from field
devices can be acquired and monitored wirelessly. The proposed Scheme for this project is Wireless
data transmission with data encryption and decryption. Data confidentiality is adopted to stop an
unauthorized access of data being transmitted. The flame sensors are duly interfaced to the
Raspberry Pi. Raspberry Pi is programmed to collect the sensor data and send through Wi-Fi
Module. At the front end, “MOBAXTERM” (software) is loaded on the computer which takes these
values and displays them on its front panel, and also logs them in the database. This project will
become useful in monitoring the processes at hazardous areas with more accuracy and better safety
using Raspberry pi.

5
TABLE OF CONTENTS

CHAPTER NO. TITLE PAGE NO

Abstract 5

1 Introduction 8

2 Literature survey 9
2.1 Raspberry pi 10
2.2 IOT 10

3 Components Required 11-17

3.1. Hardware required


3.1.1 Sensors
3.1.2Flame sensor
3.1.3Infrared sensor
3.1.4LAN
3.1.5USB
3.1.6Hotspot

3.2 Software required


3.2.1Mobaxterm
3.2.2Advanced IP Scanner
3.2.3C program
3.2.4Rasbian OS
3.2.5NOOBS
3.2.6Wiring pi
3.2.7Sd card formatter
3.2.8Win32 Disk imager

4 Existing system and proposed system 18-19

4.1 Existing system


4.2 Proposed system

6
5 Project description 20-25

5.1 Block Diagram

5.2Mode of operation
5.2.1 Wireless Communication Protocol
5.2.2 Wired Communication Protocol

5.3 Pin diagram and pin layout of Raspberry pi

6 Result and Discussion 26-38

6.1 Sample Code


6.2 Sample Screen

7 Conclusion 39

8 Reference 40

7
CHAPTER 1

INTRODUCTION

The new Raspberry Pi 3 is a power house with an upgraded CPU, more connectivity and full
backwards compatibility with the Raspberry Pi 1 and 2. The new processor chips are a 1.2GHz 64-
bit quad-core ARM Cortex-A53 CPU.
The new Raspberry Pi now includes build in Wi-Fi and
Bluetooth which will certainly help free up the some USB ports that was often previously used for
USB adapters. The Raspberry Pi 3 has 4 USB ports like the Raspberry Pi 2.
Embedded Wireless based secure monitoring of process parameters in real time. The data is received
by the field device is transmitted to the embedded system, which manipulates the data and transmit it
Over Local Server.
Data can be retrieved from any computer through local host using IP address
or web address. When web page appears a login credential is required to access processed data.
We have implemented Raspberry pi in such a way so that data from field devices can be acquired
and monitored wirelessly. The proposed Scheme for this project is Wireless data transmission with
data encryption and decryption. Data confidentiality is adopted to stop an unauthorized access of
data being transmitted. Embedded Wireless based secure monitoring of process parameters in real
time. The data is received by the field device is transmitted to the embedded system, which
manipulates the data and transmit it Over Local Server. Data can be retrieved from any computer
through local host using IP address or web address. When web page appears a login credential is
required to access processed data.

8
CHAPTER 2

LITERATURE SURVEY
Ruchi Mittal and Bhatia propose a system in which they detect irregular patterns of
sensory data with respect to time and space. They design a system which continuously queries
and monitors sensor data to detect any deviations from the norm. This is essential in detecting
a faulty sensor node and ensuring it can be quickly replaced. This system is especially helpful
when detecting environmental activity like forest re. In or- der to achieve desired results, Data
preprocessing and sensor data clustering is used. In data preprocessing, the sensor data is
cleaned by putting in missing values and removing any unwanted data. Mittal and Bhatia
analyzed this data cluster by plotting data, comparing them against expected/predicted
patterns and detect anomalies. Ye and Wang in have a WSN system which is based on IRIS
mote hardware platform which consists of ATmega 128 microprocessor, a RF230 radio chip
and external ash memory for over the air programming. The sensors are programmed to
collect and deliver sensor data periodically. Sensor data is sent on an event basis, which means
that whenever there is a sudden change in the environment, the sensor data is sent. However,
the sensors are always listening, i.e. they wait for changes in environment and report only once
a drastic change is detected. These sensors are user-denied and act based on requirement.

The Sensors used for measuring barometric pressure, ambient temperature, humidity,
wind direction, wind speed, and rainfall sensors. Once data from all the nodes are collected,
this information is transmitted to a local base station (Atmega 128) through multi-hop
transmission. This data is stored in an embedded database SQLite3 and displayed on a web-
page using TCP/IP.

Ye and Wang extend the WSN to include ZigBee technology as the wireless medium.
ZigBee is a wireless standard based on IEEE802.15.4 which is low cost, low power, low data
rate and more importantly, highly reliable and secure medium of networking. The WSN is built
using a coordinator node and several sensor nodes, a workstation and a database. Raw sensor
data is collected from multiple nodes.

9
RASPBERRY PI

Raspberry Pi is a Linux powered computer and definitely is a natural choice for IoT
applications. The reason for raspberry pi being a preferred IoT device is because it runs a complete
Linux Kernel and has direct interfaces such as Ethernet for wired internet as well as USB ports to
connect to wifi. The operating system of raspberry Pi supports modern programming languages like
python which makes IoT application development easier. Moreover, raspberry pi also has GPIOs so
it can directly connect with devices, sensors and many real world devices.

The Raspberry Pi is having a 40-Pin GPIO header, 4 x USB ports, 1x LAN port, 1x CSI and
1x Touch Screen interface, 1xhdmi port, 1xintegrated audio and video output port. The board runs
on single +5v power supply for which there is a micro-USB female connector provided.

INTERNET OF THINGS (IOT)

The Internet of Things (IoTs) can be described as connecting everyday objects like smart-
phones, Internet TVs, sensors and actuators to the Internet where the devices are intelligently linked
together enabling new forms of communication between things and people, and between things
themselves. Building IoTs has advanced significantly in the last couple of years since it has added a
new dimension to the world of information and communication technologies. Now anyone, from
anytime and anywhere can have connectivity for anything and it is expected that these connections
will extend and create an entirely advanced dynamic network of IoTs. The development of the
Internet of Things will revolutionize a number of sectors, from automation, transportation, energy,
healthcare, financial services to nanotechnology. IoTs technology can also be applied to create a new
concept and wide development space for smart homes to provide intelligence, comfort and to
improve the quality of life.

10
CHAPTER 3

COMPONENTS REQUIRED

(a) HARDWARE REQUIRED

SENSOR

A sensor is a device that detects and responds to some type of input from the physical
environment. The specific input could be light, heat, motion, moisture, pressure, or any one of a
great number of other environmental phenomena. The output is generally a signal that is converted
to human-readable display at the sensor location or transmitted electronically over a network for
reading or further processing.

Fig. 1 Block diagram of sensor

11
FLAME SENSOR

Flame detector is a sensor designed to detect and respond to the presence of a flame or fire.
When used in applications such as industrial furnaces, their role is to provide confirmation that the
furnace is properly lit; in these cases they take no direct action beyond notifying the operator or
control system. A flame detector can often respond faster and more accurately than a smoke or heat
detector due to the mechanisms it uses to detect the flame.

Fig. 2 Flame sensor schematic

12
INFRARED SENSOR

An infrared sensor is an electronic instrument which is used to sense certain characteristics of its
surroundings by either emitting and/or detecting infrared radiation. Infrared sensors are also capable
of measuring the heat being emitted by an object and detecting motion.

Fig.3 Basic design of the infrared proximity sensor

LAN

A local area network (LAN) is a group of computers and associated devices that share a
common communications line or wireless link to a server. Typically, a LAN encompasses computers
and peripherals connected to a server within a distinct geographic area such as an office or a
commercial establishment.

13
USB

USB, short for Universal Serial Bus, is an industry standard that defines cables, connectors
and communications protocols for connection, communication, and power supply
between computers and electronic devices

HOTSPOT

A hotspot is a physical location where people may obtain Internet access, typically using Wi-
Fi technology, via a wireless local area network (WLAN) using a router connected to an internet
service provider.

(b) SOFTWARE REQUIRED

MOBAXTERM

MobaXterm is an enhanced terminal for Windows with an X11 server, a tabbed SSH client
and several other network tools for remote computing (VNC, RDP, telnet, rlogin). MobaXterm
brings all the essential Unix commands to Windows desktop, in a single portable exe file which
works out of the box.

Installation

To install MobaXterm for Windows, simply go to the download link above. Because of the
frequency with which you are likely to use MobaXterm, you will likely want to create a quick-
launch icon for it as well as a desktop icon. You will also need to make sure that MobaXterm is
allowed to work through your firewall -- most likely, your computer will ask you the first time you
run the program. You should install the free version, and it is probably most convenient to download
the Installer version.

14
ADVANCED IP SCANNER
Advanced IP Scanner 2.5 is a free, fast and powerful network scanner with a user-friendly
interface. In a matter of seconds, Advanced IP Scanner can locate all the computers on your wired or
wireless local network and conduct a scan of their ports. The program provides easy access to
various network resources, such as HTTP, HTTPS, FTP and shared folders. It also enables you to
detect all the IP addresses on your Wi-Fi network.

C PROGRAM

C is a general-purpose, imperative computer programming language, supporting structured


programming, lexical variable scope and recursion, while a static type system prevents many
unintended operations. By design, C provides constructs that map efficiently to typical machine
instructions, and therefore it has found lasting use in applications that had formerly been coded
in assembly language, including operating systems, as well as various application software for
computers ranging from supercomputers to embedded systems.
C is an imperative procedural language. It was designed to be compiled using a relatively
straightforward compiler, to provide low-level access to memory, to provide language constructs that
map efficiently to machine instructions, and to require minimal run-time support.

RASPBIAN
Raspbian is a Debian-based computer operating system for Raspberry Pi. It is now officially
provided by the Raspberry Pi Foundation, as the primary operating system for the family of
Raspberry Pi single-board computers. Raspbian was created by Mike Thompson and Peter Green as
an independent project. The initial build was completed in June 2012. The operating system is still
under active development. Raspbian is highly optimized for the Raspberry Pi line's low-
performance ARM CPUs.

Raspbian uses PIXEL, Pi Improved Xwindows Environment, Lightweight as its main


desktop environment as of the latest update.

15
NOOBS

NOOBS is a way to make setting up a Raspberry Pi for the first time much, much easier. You
won’t need network access, and you won’t need to download any special imaging software. Just
head to the download page, grab a copy of the NOOBS zip file, and unpack it onto a freshly
formatted 4GB (or larger) SD card. When you boot up for the first time, you’ll see a menu
prompting you to install one of several operating systems into the free space on the card. The choice
means you can boot the Pi with a regular operating system like Raspbian.

WIRING PI

Wiring Pi is a PIN based GPIO access library written in C for the BCM2835 used in
the Raspberry Pi. It’s released under the GNU LGPLv3 license and is usable from C, C++ and RTB
(BASIC) as well as many other languages with suitable wrappers it’s designed to be familiar to
people who have used the Arduino wiring system.

SD CARD FORMATTER

The SD Card Formatter was created specifically for memory cards using the
SD/SDHC/SDXC standards. It is strongly recommended to use the SD Card Formatter instead of
formatting utilities provided with operating systems that format various types of storage media.
Using generic formatting utilities may result in less than optimal performance for your memory
cards.
The SD/SDHC/SDXC memory cards have a "Protected Area" on the card for the SD
standard's security function. The SD the SD Card Formatter does not format the "Protected Area".
Please use appropriate application software or SD-compatible device that provides SD security
function to format the "Protected Area" in the memory card.

16
WIN32 DISK IMAGER

Win32 Disk Imager is an open sourced Windows program for saving or restoring images
from removable drives like USB drives, SD Memory cards, etc. It can be used to write a bootable or
update images to a SD Flash device or USB flash device. Hence, it is extremely useful for embedded
development.

17
CHAPTER 4

EXISTING SYSTEM AND PROPOSED SYSTEM

(a)EXISTING SYSTEM

 Over RS 232 protocol

The existing data transmission takes over RS 232 protocol. In the early age of industries
Data transmission takes over RS 232 protocol.

 GPRS Protocol

The existing technology is based on GPRS technique with mobile network for wireless data
transmission .Data received from field devices are sent through GPRS module to the allotted
receiver.

Disadvantage

 Requires large length of wire.


 Costly cable.
 Requires more safety.
 Distortion may occur in output level.
 Occupy more space.
 Low efficiency.
 Poor transient response.
 Require frequent maintenance.

18
(b)PROPOSED SYSTEM

 Embedded Wireless based secure monitoring

Embedded Wireless based secure monitoring of process parameters in real time. The data is
received by the field device is transmitted to the embedded system, which manipulates the
data and transmit it Over Local Server.
Data can be retrieved from any computer through local
host using IP address or web address. When web page appears a login credential is required
to access processed data.

Advantage

 High data security.


 Low installation cost.
 High efficiency.
 Require low maintenance.
 Dual mode of operation.
 Remote access of real time processed data.
 High data processing speed.

19
CHAPTER 5

PROJECT DESCRIPTION

The overall goal of this project is to experience aspects of information security using the Raspberry
Pi and the Raspbian Linux OS. The proposed Scheme for this project is Wireless data transmission
with data Encryption and Decryption. As well as Data integrity is proposed to protect real time data
received wirelessly. Data integrity is adopted to stop an unauthorized access of data being
transmitted. For achieving this real-time scenario, a fire logging system for a remote plant operation
is taken. Here flame sensors are duly interfaced to the Raspberry Pi, data collected from the flame
sensor are constantly sent to the Raspberry Pi. Which is in turn connected to a PC through wi-fi
Module, At the front end, “MOBOXTERM” (software) is loaded on the computer which takes these
values and displays them on its front panel, and also logs them in the database (or ON in vice
versa). We have also introduced wired transmission protocol over Local Area Network which
enables operator to monitor ongoing process.

20
BLOCK DIAGRAM

Fig.4 Block diagram of Wireless &wired communication protocol

21
MODE OF OPERATION

I. Wireless Communication Protocol

1. Configure Raspberry pi for auto connectivity to wi-fi network.

2. Restart Raspberry pi.

3. Now, Raspberry will automatically connect to the configured wi-fi hotspot.

4. Type the “IP ADDRESS” of Raspberry pi in Web browser ,

An “Online Monitoring’’ page will appear on the screen.

5. Use “LOG IN CREDENTIALS” to access the real time processed data.

22
II. Wired Communication Protocol

1. Open command prompt in PC then, type “IP CONFIG”. Now copy IP ADDRESS of
“IPV4 ADDRESS”.
2. Open “ADVACED IP SCANNER”, paste IPV4 address in the search bar. Set the values 0-
255 range, click search.
3. From the search results, look for “Raspberry pi” host. Copy IP address of RASPBERRY.
4. Open “MOBAXTERM” Software.
Go to >Session>SSH.
Paste the IP ADDRESS in “REMOTE HOST” and click ok.
5. Now, LOG IN into Raspberry pi using “LOGIN CREDENTIALS”.
6. Type Command “sudo ./out”(without quotes).
7. Now, the real time processed data is displayed on the monitor.

23
PIN DIAGRAM

Fig.5 Raspberry Pi Pin Layout

24
Fig.6 Raspberry Pi Pin Configuration

Fig.7 Raspberry Pi Pin Configuration

25
CHAPTER 6

RESULT & DISCUSSION

This project is used to continuously monitor the presence of the object or to detect the person
using PIR sensor and senses the fire by using flame sensor through raspberry Pi. The data encryption
is performed in Raspberry Pi and this encrypted data is transmitted to the PC through Ethernet as
well as using hotspot. The receiver needs to enter the IP address of Raspberry Pi, login ID and
password in order to view the code and to run the code. The decrypted code is used to get the
original sensor data. The IP address, username and password are known only to the authorized users.
IT ensures security in accessing the sensor’s information. The proposed project can be used for any
industrial process data monitoring through wireless medium and achieves secure data transmission.

26
SAMPLE CODE

HTML CODE

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"


"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<!-- saved from url=(0031)http://192.168.0.199/index.html -->
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><head><meta http-equiv="Content-
Type" content="text/html; charset=windows-1252">
<title>Online Monitoring and Controlling</title>
<meta name="description" content="website description">
<meta name="keywords" content="website keywords, website keywords">

<style type="text/css">
<!--
.style4 {color: #999900}

-->
body
{ font: normal .80em 'trebuchet ms', arial, sans-serif;
background:#FDFDFA;
color: #fff;}

#main, #logo, #menubar, #site_content, #footer


{ margin-right: auto;
margin-left: auto;}

#header
27
{ background:#354334;
height: 180px;
margin-bottom: 50px;}

#logo
{ width: 900px;
position: relative;
height: 200px;}

#logo #logo_text
{
position: absolute;
top: 10px;
left: 0;
width: 807px;
height: 47px;
}

#logo h1, #logo h2


{ font: normal 300% "century gothic", arial, sans-serif;
border-bottom: 0;
text-transform: none;
margin: 0;}

#logo_text h1
{ padding: 12px 0 0 0;
color: #FF7A0F;
letter-spacing: 0.1em;}

#site_content
{ width: 858px;
margin: 0 auto 0 auto;
28
padding: 10px 20px 20px 40px;
background: #FFF;
border: 1px solid #E5E5DB;}

.sidebar
{ float: right;
width: 190px;
padding: 0 15px 20px 15px;}

.sidebar li a, .sidebar li a:hover


{ padding: 3px 0 3px 35px;
display: block;
background: transparent url(link.png) no-repeat left center;}

#content
{ text-align: left;
width: 613px;
padding: 0;}

.separator
{ width: 100%;
height: 0;
border-top: 1px solid #D9D5CF;
border-bottom: 1px solid #FFF;
margin: 0 0 20px 0;}

#footer
{ width: 916px;
font-family: sans-serif;
font-size: 90%;
height: 28px;
29
margin-top: 20px;
padding: 20px 0 5px 0;
text-align: center;
background: transparent;
color: #333;
text-transform: uppercase;
letter-spacing: 0.1em;}

table tr th, table tr td


{ text-align: left;
background: #555;
color: #FFF;
padding: 7px 4px;}

table tr td
{
color: #47433F;
border-top: 1px solid #FFF;
background-color: #FFFFFF;
}

</style><script type="text/JavaScript">
function login(frmLogin){

username = document.frmLogin.username.value
password = document.frmLogin.password.value

if (username == "1234" && password == "password")


{
return (true);

}
30
else {
alert("Invalid username/password, try again");
return (false);
}
}
</script></head>

<body>
<div id="main">
<div id="links"></div>
<div id="header">
<div id="logo">
<div id="logo_text">

<h1>ONLINE<span class="style4"> </span> MONITORING</h1>


</div>
</div>
<div id="menubar"></div>
</div>
<div id="site_content">
<div class="sidebar">
<!-- insert your sidebar items here -->
<h1>&nbsp;</h1>
<h1>&nbsp;</h1>
<ul><li></li>
</ul>
<p></p>
<p>&nbsp;</p>
<h1>&nbsp;</h1>
<p></p>
</div>
31
<div id="content">
<!-- insert the page content here -->
<h1>WELCome</h1>
<form name="frmLogin" action="sensor.html" method="post" onsubmit="return
login(this)">

<table background="./Online Monitoring and Controllingabii login


html_files/saved_resource">
<tbody><tr>
<td width="142" background="./Online Monitoring and Controllingabii login
html_files/saved_resource(1)">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</td>
<td width="310"><table style="margin-top:50px;">
<tbody><tr>
<td></td>
<td></td>
<td><div id="chardiv"></div></td>
</tr>
<tr>
<td height="44"><strong><font size="+2">UserName</font></strong></td>
<td><strong> : </strong></td>
<td><input type="text" name="username">
</td>
</tr>
<tr>
<td height="61"><strong><font size="+2">Password</font></strong></td>
<td><strong> : </strong></td>
<td><input type="password" name="password">
</td>
</tr>
32
<tr>
<td><input type="submit" value="Log in"></td><td></td><td></td>
</tr>
</tbody></table></td>
</tr>

</tbody></table>
</form>

</div>
<div id="site_content_bottom"></div>
</div>

</div>

</body></html>

33
SENSOR CODE

delay(200);
if(digitalRead(IR)==1)
{
printf("ir detect\n");
file_write("/var/www/html/ir.txt","Obstacle Detect");

}
if(digitalRead(IR)==0)
{
printf("ir not detect\n");
file_write("/var/www/html/ir.txt","Obstacle not Detect");
}

if(digitalRead(FLAME)==1)
{
printf("fire detect\n");
file_write("/var/www/html/flame.txt","Fire Detect Found");

}
if(digitalRead(FLAME)==0)
{
printf("fire not detect\n");
file_write("/var/www/html/flame.txt","Fire Detect Not Found");
}
fflush (stdout);
}
return 0 ;
}

34
SAMPLE SCREEN

Fig. 8 Hardware Connectivity

35
Fig.9 Online Monitoring Screen 1(wireless Monitoring) HTML

36
Fig.10 Online Monitoring Screen 2(Wireless Monitoring) HTML

37
Fig.11 MOBAXTERM Output (Wired Communication Protocol)

38
CHAPTER 7

CONCLUSION

It is possible to employ wireless systems for industrial process data for point-to-point
transmission. The processes at hazardous areas can be monitored accurately and better safety
using wireless monitoring system. It reduces the cable cost and its maintenance.
It protects the processed data from the third party illegal access .It ensures smooth operation

of the plant. However, the entire project was not free of problems. We had a lot of issues
with working as a team, and there were several network connectivity issues and some pretty
long nights of work. Additionally, we had some trouble initially selecting a project and then,
after we had selected a suitable project, actually getting started on it. However, we were able
to pull together in the end and complete a difficult yet interesting project. To improve our
cohesiveness, we should have been more accepting of each other's needs and skills.

39
CHAPTER 8

REFERENCES

 Surendra Mahajan, Akshay Mhasku Adagale, Chetna Sahare, Intrusion Detection System
Using Raspberry PI Honeypot in Network Security, International Journal of Engineering
Science and Computing, pp. 2792-2795, 2016.
 Amit Rana, A.S. Bhalchandra, “Machine Monitoring on Cloud using Raspberry Pi and
Internet of Things”, International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 5, Issue 1, pp. 463-466, 2016.
 Harshada Chaudhari, “Raspberry Pi Technology:A Review”, International Journal of
Innovative and Emerging Research in Engineering, Volume 2, Issue 3, 2015
 Ms. Sejal V. Gawande,Dr. Prashant R. Deshmukh, International Journal of Advanced
Research in Computer Science and Software Engineering, Volume 5, Issue 4, April 2015.
 Sneha Singh , PradnyaAnap ,YogeshBhaigade , Prof.J.P.Chavan, IP Camera Video
Surveillance using Raspberry Pi, International Journal of Advanced Research in Computer
and Communication Engineering Vol. 4, Issue 2, February 2015.
 Pritish Sachdeva and Shrutik Katchii,“A Review Paper on Raspberry Pi”,Vol.4, No.6,Dec
2014.
 D.Jeevanand,K.Keerthivasan,J.MohamedRilwan,P.Murugan “Real Time Embedded Network
Video Capture And SMS Alerting system” International Journal of Communication and
Computer Technologies,2014
 Raspberry pi education manual, Version 1.0 December 2012.
 Raspberry Pi Org. Forum [Online].Available: http: //www.raspberrypi.org/

40

Vous aimerez peut-être aussi