A basic RFID system consists of main two elements an interrogator and a transponder

Executive summary Table of contents Historical over view The World War II was the root in discovering the radio frequency identification technology, the concept of the radar used by the big nations participating in the war, was discovered by Sir Robert Alexander Watson-watt a Scottish physicist in 1935, there was a problem in identifying the plans until the Germans radar crew discovered that if the plan changed direction it change the radio signal reflected back. In the 1960s scientist and academics from around the globe managed in developing radio frequency energy and use it to identify objects remotely, that was good news for organizations, company’s began commercializing the anti theft system that uses radio waves in order to keep track of goods. The 1970s was the innovative era of he RFIDs, deferent organizations helped in developing the technology, Charles Walton a US entrepreneur patented a passive transponder used to unlock doors without the key he then went to licensed the technology to lock makers and security companies. In the same decade the US government was also working on RFID technology, the Energy Department asked a national laboratory to develop a tracking system for nuclear material the concept of putting a transponder in a van or a truck and readers at the secure facilities, the antenna at the gate would alert the transponder on the van and then

  • Word count: 1380
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Intellectual Property

Terms of Reference Intellectual Property Assignment The scenario is that my colleague, Mr.P.Taylor, and I have been employed by a company that specifies in developing software and our head of department, Mr.C.Roberts, has asked us to produce a briefing report. The report will outline the main points relating to Intellectual Property Law and the possible protections such law can afford to the company. Elements that will be included within the report are explanations about copyright, patent and confidential information, as well as a diagram of the Civil and Criminal Court and a case, with a paraphrased precedent. There will also be an introduction giving a very brief explanation into the topic being addressed, and a conclusion that will answer the introduction. Contents Introduction 3 Copyright 4 Definition 4 Explanation 4 Example 5 Patent 6 Definition 6 Explanation 6 Example 7 Confidential Information 8 Definition 8 Explanation 8 Example 8 Civil and Criminal Court 9 A Case with paraphrased precedent 11 Definitions 11 Precedent 11 Stare decisis 11 'Separate but equal' 11 Conclusion 12 Sources of Information 13 Introduction Intellectual Property Law, also referred to as IP, includes 4 main aspects, which are Copyright, Patent, Trade Marks and Designs. The 2 elements that will be focused on in this report are Copyright and Patent, and also a third

  • Word count: 2833
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Local Area Networks (LANs).

They are Local Area Networks (LANs) that use electromagnetic airwaves as their transmission medium. Instead of the technical issues associated with twisted-pair, Co-axial and fiber-optic wires, the organization must adapt to the differences of radio based communication. The basic components of an 802.11 WLAN (wireless LAN) include one or more stations and an AP (access point). A station is usually a laptop with a wireless Network interface card. An AP provides the wireless link between the stations and a wired LAN, or it may only relay packets from one station to another. The 802.11 standard supports three methods using the physical layer for transmitting data through space. One uses infrared light, and the other two-use spread-spectrum-radio (radio frequency). Radio: (penetrates indoor walls & surfaces) Wideband / Spread Spectrum: 1. FHSS (Frequency Hopping) 2. DSSS (Direct Sequence) 3. Infrared (blocked by solid objects) The FHSS (frequency-hopping spread-spectrum): Has the advantage of a relatively simple design, but it has an upper bandwidth of only 2 Mbps under FCC rules in the U.S. Because FHSS does not support data rates greater than 2 Mbps it is not used in the IEEE standard, 802.11b. The DSSS (direct-sequence spread-spectrum): This method allows for much higher data rates by dividing the 2.4-GHz band into 14 22 MHz channels. In DSSS, the data is

  • Word count: 1303
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

System Specification

HCI Assignment 1 Part 1 What the system will do and why The system will be created especially for those that cannot make regular trips to the bank, in particularly elderly user using a shared computer. The system will allow users to access their personal bank account online from a shared computer. They will be able to view an up-to-date statement including the current balance and recent transactions. They will also be able to transfer money to different bank accounts allowing money to be managed easier. Standing orders and direct debits can also be set up on the system so bills can easily be paid with out even leaving the home. Direct debits will allow bills to be paid constantly with out having to remember to pay them. The system will allow the user to have complete control over their bank account allowing them to change personal details, cancel cheques, standing orders and direct debits. Users may also apply for loans, insurance, credit cards etc online without having to get up and go to the bank making money management much easier. Important Characteristics of Users Each user must have a HSBC current bank account signed up to internet banking. Each user will be over the age of 16 as only over 16 may have a current bank account. User may be using a shared computer to access their account. User may be elderly and find it hard to remember a long number which has no

  • Word count: 1918
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Software Development

HASSL Software Development Functional specification for the CUSSMOS System City University has asked us to create a new security system, the CUSSMOS. The current system is subject to too many material losses in the buildings, "theft", mainly committed by intruders. You want a security systems that allows you to know who is in the building and where at any moment. It also has to be able to detect intruders. You require the system to be simple to use, provide maximum security but with causing the less inconvenience possible. It is a complicated system to design as it has to cover every single area of the buildings at all time but it has to be discrete, not too "eye-catching". This system as to detect movement in the buildings and have the ability to identify the person that is moving. It also has to detect people who do not carry a CUSSCard and alert security straight away to be able to intercept the individual. The main Computer (CUSSBASE) has to keep record of every cardholder's identity. The CUSSENSEs have to be powerful enough to cover every possible area. For the moment, City University operates with a swipe-card and manual card check system. People who enter the buildings are asked to show their City University ID to a member of staff. To enter certain areas such as the computer labs, people have to swipe their card, and if their ID is valid, the door will unlock.

  • Word count: 895
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Network Design

Table of Contents Introduction 3 Assumptions 4 Network Plan 5 Main diagram 5 Internet Connectivity 7 Servers 10 First floor 14 Second floor 17 Third floor 19 Forth floor 23 Fifth floor 25 Sixth floor 27 VoIP 29 Cabling 31 Wireless access 34 Linking the Campus 36 IP Addressing 39 Standardization 40 Structured Cabling Standards (ANSI/TIA/EIA-568) 40 Backup Plans 43 Limitations 44 Bibliography 45 Conclusion 47 Introduction APIIT Law School is established to provide law degrees in Sri-Lanka from end of 2009.This new law school will be established in a newly purchased 5 floor building nearby the APIIT main City campus. The business interaction and the IT infrastructure of the new law school will be independent from the main campus. The proposed computer network should be able to provide high speed access to the internet and also a connection between main campus and the new law school also should be established .the sharing of the network also should be controlled according to the different users . The proposed network should be crash proof and should consist of backup plans in case of a network failure. Assumptions o The assumption that cost in not a major issue was taken into consideration. o We assumed that single point failures will not occur often. o We also assumed that there are no technological constraints. Network Plan Figure 1 - Law

  • Word count: 5213
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Individual_Project_Proposal

Individual Project Proposal Project title Implementation of a Security Wireless LAN for the company Key words Wireless; Network Security; Capital Portal; pfSense Problem definition Nowadays, information technology updates second by second. Wide range of business software application systems are designed to cater diversified business needs. Especially for the wireless network, it can be save a lot cable. For this reason, it has been spreading rapidly around the campus, café, airport etc. Unfortunately, many implementations are being done without attention to issues of security and authentication. As a result, most wireless networks are set up so that anyone with proper equipment can access the network, even from outside the building. Anyone with the improper tools can also spy on traffic. They can see WEP key or password as well as other data. These dangers are not just theoretical. Tools to tap nearby wireless networks are widely available, even for palmtop devices. A whole subculture has sprung up of people going around, scanning for open wireless nodes, and publicizing them to people who want free wireless access. Global aim Base on the above problem. I want to setup a more and reliable wireless method for our visitors do a couple of things of my company. It is called "captive portal". There are little points why I want to do it. One, it helps us to be a hospitable

  • Word count: 1885
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay