dc.contributor.advisor |
Kotze, B.J. |
|
dc.contributor.advisor |
Vermaak, H.J. |
|
dc.contributor.author |
De Bruyn, Daniel Nicholas |
|
dc.contributor.other |
Central University of Technology, Free State. Faculty of Engineering, Information and Communication Technology. School of Electrical and Computer Systems Engineering |
|
dc.date.accessioned |
2014-10-15T17:35:48Z |
|
dc.date.available |
2014-10-15T17:35:48Z |
|
dc.date.issued |
2010 |
|
dc.identifier.uri |
http://hdl.handle.net/11462/132 |
|
dc.description |
Thesis (M. Tech.(Electrical Engineering)) -- Central University of technology, Free State, 2010 |
en_US |
dc.description.abstract |
This dissertation gives an overview of the research done in developing a protocol to synchronise information in a secure wireless mesh network. Alternative methods to control wireless devices were investigated in the non-controlled frequency spectrum.
The aim of the research was to develop a protocol that can be loaded on a micro-controller with limited intelligence, controlling endpoints. The protocol minimises human interference and automatically negotiates which device becomes the master controller. The device is able to discover and locate neighbour devices in range. The device has the capability to be stationary or mobile and host multiple control endpoints.
Control endpoints can be digital or analogue, input or output, and belongs to a group like security, lighting or irrigation. These capabilities can change according to the solution’s requirements. Control endpoints with the same capabilities must be able to establish a connection between each other. An endpoint has a user-friendly name and can update the remote endpoint with the description. When a connection is established both endpoints update each other with their user-friendly name and their status. A local endpoint can trigger a certain action on a receiving control point.
The system was tested with a building monitoring system because it is static and a less expensive choice, thus making the evaluation more suitable. A simulator for a personal computer was developed to evaluate the new protocol. Finally, the protocol was implemented and tested on a micro-controller platform. |
en_US |
dc.format.extent |
1 566 825 bytes |
|
dc.format.mimetype |
application/pdf |
|
dc.language.iso |
en_US |
en_US |
dc.publisher |
[Bloemfontein?] : Central University of Technology, Free State |
|
dc.subject |
Central University of Technology, Free State - Dissertations |
en_US |
dc.subject |
Wireless communication systems - Security measures |
en_US |
dc.subject |
Computer networks - Security measures |
en_US |
dc.subject |
Computer network protocols |
en_US |
dc.subject |
Synchronization |
en_US |
dc.subject |
Dissertations, academic - South Africa - Bloemfontein |
en_US |
dc.title |
Investigation and development of a system for secure synchronisation in a wireless mesh network |
en_US |
dc.type |
Thesis |
en_US |
dc.rights.holder |
Central University of Technology, Free State |
|