Keywords : TCP/IP


Home Automation Management with WLAN (802.11g) and RF Remote Control

Mahmood S. Majeed; Abdulsattar M. Khidhir; Firas A. Yosif

AL-Rafidain Journal of Computer Sciences and Mathematics, 2009, Volume 6, Issue 1, Pages 111-124
DOI: 10.33899/csmj.2009.163770

The home automation becomes important, because it gives the user the comfort and ease for using the home devices. The implementation and design of wireless home automation control use two methods, WLAN technology and RF remote control handheld to control selective home devices with integral security and protected system. The devices have been distributed in two rooms, each room has own board, these boards are connected to the desktop personal computer (PC) through one serial port RS-232 via microcontroller. The software consists of Assembly Language for programming microcontroller (AT89C51and AT89C2051) and Visual Basic Language that use to communicate between PC and two boards, also it use to design Graphical User Interface (GUI) which involving all devices needed to display in Home PC screen .  The system is low cost and flexible with the increasing variety of devices to be controlled.
 
 

Protection Data-in-Motion Stored in Database System

Laheeb Mohammad Ibrahim; Mohammed Zaki Hasan

AL-Rafidain Journal of Computer Sciences and Mathematics, 2005, Volume 2, Issue 2, Pages 47-56
DOI: 10.33899/csmj.2005.164083

In this project, a simple model of the client/server relational database has been designed through using the idea of the SQL (Structure Query Language) server, and the single file of the database by the Micro software Access 2000.
We also configure the TCP/IP (Transform Control Protocol/Internet Protocol) to make connection between two computers, on one of these computers, Windows 2000 NT Adv. Sever has been installed, and which is considered to be the server computer, and the other installed by the Windows NT XP Professional as the client computer.
Finally, a normal security environment must be built to protect the information, or data-in-motion between two computers in order to increase the level of security to an acceptable level.