05-07-2013, 04:56 PM
HIGH SPEED SECURED WIRELESS FILE TRANSMISSION WITH EMBEDDED CRYPTOGRAPHY
HIGH SPEED.ppt (Size: 2.81 MB / Downloads: 38)
OVERVIEW OF PROJECT
It is widely recognized that data security will play a central role in the future IT systems.
Many of those IT applications will be realized of embedded systems which rely heavily on security mechanisms.
Eg : Include security for wireless phones, wireless computing , electronic mail systems and data transmission in an embedded wireless network.
This project aims to integrate the area of wireless embedded communication systems and cryptography.
And this projects aims at creating a wireless interface device that enables transmission of data files between two computers using zigbee wireless radio modems over a secured wireless communication channels.
What is a PICmicro?
The PICmicro was originally designed around 1980 by General Instrument as a small, fast, inexpensive embedded microcontroller with strong I/O capabilities. PIC stands for "Peripheral Interface Controller".
How PICmicros are use
Remote controls, display panels, cars, appliances, weather stations, clocks, motor controllers, sensors, robots, toys, battery chargers, computer peripherals
PIC 16F877A
PIC is Pheripheral Interface Controller. The main features are as follows.
HIGH SPEED PERFORMANCE RISC CPU:-
Operating speed: 20MHz, 200ns instruction cycle.
Operating voltage: 4-5.5V.
15 interrupt source.
35 single word instructions.
SPECIAL MICROCONTROLLER FEATURES:-
Flash memory: 14.3 Kbytes.
Data SRAM: 368 bytes.
Data EEPROM: 256 bytes.
Self reprogrammable
Watchdog timer with on-chip RC oscillator.
Programmable code protection.
NETWORK PIECES
PAN COORDINATOR
Owns the network
Starts it, allows other devices to joint it
A full function devices , mains powered
ROUTERS
It route messages
Does not own or start
Scans to find a network to join , FFD, I/O
END DEVICES
Communicates with single devices
Does not own or start network
Usually battery powered.
Data Transfer Model
Data transferred from device to coordinator
• In a beacon-enable network, device finds the beacon to synchronize to the ser-frame structure. Then using slotted CSMA/CA to transmit its data.
• In a non beacon-enable network, device simply transmits its data using un-slotted CSMA/CA