Nowadays The Development Of The Unmanned Information Technology Essay

Nowadays the development of the remote-controlled aerial vehicle is steadily increasing. It has got a batch of attending from research community particularly in defence engineering. UAV platform will shortly be offering new alternate for user necessitating high spacial declaration imagination deliver in near-real clip ( Herwitz, et al. , 2003 ) . One of the cardinal challenges is the development of a suited telemetry system ( Herwitz, et al. , 2003 ) . The major strength for a telemetry system on UAV imaging platform is its low cost, easiness of usage, and high informations transportation rate.

Not merely research in development of the UAV, the development in conveying and having informations through radio LAN has besides increased steadily and it has got a batch of attending from the research community.

Both developments in UAV and radio LAN web led to the creative activity of a set of applications such as risky environment geographic expedition, environmental monitoring, military trailing and reconnaissance surveillance.

Two most of import characteristics of a transmittal device are transmittal scope and information rate. Normally the information transferred by the sender for a short scope is little in size and requires low bandwidth for transmittal intents. For long scope transmittal it would necessitate high bandwidth.

This undertaking is thesis will discourse and depict in item about the image reassigning in real-time or about real-time application. The description includes how to implement the FPGA as a little Personal computer and how the operating system is developed.

This undertaking is fundamentally about reassigning an image and having back the image in real-time or about real-time application.

1.2 Problem Statement

When catastrophes happen such as temblor or inundation, speedy response is required to study the catastrophe country to maintain line of life. Observation of plantation required for some distance country needed in research will easy be obtained without the demand to blow a batch of clip. A web system of remote-controlled winging observation automaton can be used in this job to study catastrophe country or position for plantation growing in the countries for research. Quick response from the UAV will salvage life and cost.

The information that need to be transmitted in this undertaking are assumed to be big image informations and it should be in real-time or almost-real clip application. Thus it is rather ambitious and complicated to develop a dependable system for reassigning the image informations in wireless mode.

1.3 Objective

The chief aim of this undertaking is to convey informations ( an image ) and receive the transmitted information at a land station in real-time or about existent clip.

1.4 Research Scope

This undertaking does non merely necessitate device, it besides involves programming portion ( package ) . It is chiefly about how to incorporate the device and the package together by agencies of communicating faculty for informations transmittal and response.

The Scopess of this undertaking are as followerss:

This paradigm is for conveying and having informations ( an image )

RF is to be used in this paradigm

Scope of the image transportation for the paradigm is 300 m

Performing analysis in line-of-sight radio local country web ( LOS-WLAN )

1.5 Thesis Outline

This thesis consists of five chapters. The first chapter briefly describes about the undertaking. Get downing with overview, job statement, nonsubjective, range of the undertaking and ended with thesis lineation.

Second chapter is the reappraisal on the old research related to this undertaking and other research in the same field. It includes what is UAV, RF, web, WLANs, and how the image is transferred. All beginnings that is describes in this chapter will layout the guideline in developing this undertaking.

Following chapter is discoursing the suited method to be used. This chapter includes the account on how the transmittal devices are combined with FPGA. Here, the executions of FPGA as a little Personal computer are done to impart the informations beginning to the transmittal device.

Chapter 4 consists of consequence and treatment of the paradigm. The elaborate treatment is made to guarantee if the paradigm meet the aim.

Last chapter is Chapter 5. It contains the drumhead about this undertaking and besides some proposal for better public presentation in the hereafter works.

Chapter 2

Literature Review

2.1 Overview

This chapter will supply the in-depth literature reappraisal about the subject that are associate to the undertaking. It has been separated into several subdivisions which will explicate about the things related to the undertaking. First portion is the account about the informations gaining control ( transition of informations into digital or electrics signifier ) . Second portion is about the real-time informations gaining control and followed by the application of informations transportation and their use in UAVs. Third portion is about web communicating. Before the terminal of this chapter, the debut to FPGA and its history are written, and at the really terminal are some radio devices which is included in the hunt for the best device to be used for the image transportation.

2.2 Data gaining control

After some hunt for the information gaining control have been made through many hunt engines, such as it is learnt that some companies support informations capturing service. Most of these companies bound their informations capturing activities to document scanning and informations entry activities including printed and handwritten paperss and procedure the informations in several linguistic communications with regard to their clients. For illustration, the company that supports this type of service is OpenWorld Data ( OPENWORLD DATA, 2009 ) . These companies provide AIDSs to other companies in their processing of informations from paper-based signifier to electronic based signifier.

However, there are still have other methods of informations gaining control with specialised hardware and package applications. With the development engineerings presents, other methods and thoughts have been implemented. For illustration, application of the informations gaining control in UAVs. There are hardware and package involved in capturing an image from air and conveying the captured informations to the receiving system at the base. There are many more applications that use informations gaining control.

2.2.1 Real-time Data Capture ( RTDC )

Real-time Data Capture is dedicated to the development and bringing of automatic designation and informations gaining control solution that are speedy to deploy, easy to keep, and to the full integrated. ( Call uping your informations gaining control, 2007 )

Medium storage will be used after some considerable informations taken from a existent universe through the informations capturing. For a real-time information gaining control this recording procedure is performed and the computation is presented back in existent clip, which mean we can reexamine the informations captured in real-time without waiting clip. Real-time informations gaining control offers to many solutions such as nomadic solutions in security patrol, wellness and safety, plus trailing, location services, audit direction, and ERP integrating.

From research that has been done, for the range of the undertaking, definition of real-time that will be used is taken from It states that real-time is defined as an event where ‘the combined reaction and operation-time of a undertaking on current events or input, is no longer than the maximal hold allowed ‘ (, 2006 ) . This would deduce a real-time response is defined by the user demand of the system, which could be randomly set harmonizing to these demands.

ALSO READ  Payroll System Essay

Therefore, for this undertaking a real-time response would necessitate to be displayed particularly if the information captured was taken from a rough environment to salvage lives of many people. It would be the best communicating can be used if the state of affairs is in rough environment. It could besides be used for researches.

There are techniques and applications that have been implementing in assorted systems in many Fieldss. In medical field, particularly in the surgery environment real-time informations gaining control has been implemented, called practical surgery. Development in this field has increased the opportunity of successful operation. The method relies on the artworks hardware for proving the interpenetration between a practical deformable organ and a stiff tool controlled by the user ( Lombardo, 2004 ) .

In biometrics, there have been many applications of automated informations capturing, some of which include the trailing of assorted animate beings like giants, seals, and sea polo-necks ( Porcupine Caribou Herd Satellite Collar Project, 2009 ) . By utilizing a Global Positioning Device ( GPS ) that is attached to the animate being, it helps to track these animate beings, and the transmittals by the GPS are tracked by orbiter. Many facets that involve critical state of affairss utilizing the RTDC, such as air traffic control ( ATC ) and military bid. In the air traffic control, the accountants have to organize agenda flights for both entrance and surpassing. All of these flights must be matched to the available blowouts that are appropriate to the size of the aircraft every bit good as the sum of fuel left. Without the accountant that controls all those parts, it could take to black effects.

In military bids, to win brushs and conflict it depends on the incoming information by which decision-maker could do a important determination about the state of affairs. In both state of affairss, real-time communicating would be used.

2.3 UAV

Development of the UAVs ( Unmanned Aerial Vehicles ) , outfitted with independent control devices has progressed rapidly in recent old ages. It has been referred in many ways, either robotic aircraft, remotely piloted vehicle ( RPV ) , drone, robot plane and pilotless aircraft, are few of such names ( Bone & A ; Bolkcom, 2003 ) . UAV means the aircraft that flies without human crew on board of the aircraft. It is normally used in military applications. However the use of the UAV in research and for observation besides increases towards the twelvemonth. UAV platforms will shortly be offering new options for users necessitating high spacial declaration imagination delivered in close real-time.

It comes in 2 assortments:

Controlled from a distant location

Fly autonomously based on per-programmed flight fields utilizing more complex dynamic mechanization system.

Figure 2.1: A MQ-9 Reaper, a hunter-killer surveillance UAV

There are several types of UAV:

Target and Decoy

This type of UAV is supplying land and aerial gunnery a mark that stimulates an enemy aircraft or missile.


Supplying battlefield intelligence and it is really utile for military usage.


Has an onslaught capableness for bad missions.

Research and development

For farther development of UAV, engineerings are to be integrated into field deploy UAV aircraft.

Civil and Commercial UAVs

Design for civil and commercial applications.

2.4 Network

A web can be anything from a simple aggregation of computing machines at one location that have been tied together utilizing a peculiar connectivity medium ( such as Cu wire ) to a elephantine planetary web such as the cyberspace, that uses a figure of different connectivity media, including orbiter engineerings ( Habraken, 2001 ) .

A web is n’t defined by its media. Rather, a web is defined by the services and entree to resources it provides its user.

From WEBOPEDIA, there are 5 types of computing machine webs ( WEBOPEDIA, 2010 ) :

Local-area-network ( LANs )

The computing machines are geographically close together ( that is, in the same edifice ) .

Wide-area web ( WANs )

The computing machines are farther apart and are connected by telephone lines or wireless moving ridges.

Campus-area web ( CANs )

The computing machines are within a limited geographical country, such as campus or military base.

Metropolitan-area web

A information web designed for a town or metropolis.

Home-area web ( HANs )

A web contained within a user ‘s place that connects a individual ‘s digital device.

Several intents for the computing machine web are:

Facilitating communicating.

Peoples can link to each other easy by linking to the web. The connexion was through the electronic mail, instant messaging, picture calls and etc.

Sharing hardware

Printing a papers becomes easy through the web. The papers can be printed out by the pressman through the shared web pressman.

Sharing files, information and information

The capableness of supplying entree to informations and information on shared storage devices can be offered through the web environment, but merely the authorised users can entree the information and information.

Sharing package

By connected to a web, user may run application plans on the distant computing machines.

2.4.1 IEEE 802.11 Wireless Local Area Networks ( WLAN )

IEEE ( Institute of Electrical and Electronic Engineers ) is best known for the criterions it develops for the electronics, computing machine, and networking industries. The IEEE 802.11 criterions trade with radio LANs by specifying physical bed options for wireless transmittal and the MAC bed protocol. The IEEE 802.11 allows for multiple transition strategy, high information rates and the ability to supply a radio system for all parts of the universes.

By utilizing the IEEE 802.11WLAN, there will be no hard overseas telegram installing, no furniture to repositing and no walls to be drilled through. It is possible that between 2 separate edifices, average people are able to pass on with each other through wireless LAN. It becomes an alternate to traditional wired solution.

WLANs are webs with RF as medium, and it has its ain alone engineerings, devices, and applications. It provides wireless networking over the distance.

There are 2 types of WLANs. First is the engineering that provides connectivity to the substructure web and the other one is the engineering that provides connectivity of one device to another or an ad hoc web ( Price, 2007 ) . For this undertaking WLAN that provide the connectivity of one device to another is used.

The flexibleness to travel and widen web or brand alterations has made the WLANs web suited or the best web that can supply in hard wiring countries.

2.4.2 Benefits of WLAN

Others benefits of WLANs:


The possibility to entree real-time information while covering with client is enhanced with a WLAN.

Short-run Use

Allows users to deploy capablenesss on an as-needed footing without concern for the cost justification for wired solution.

Speed of Development

WLANs permit speedy connectivity to the web. Forming and disbanding work groups can be done easy with WLANs. The complexness and long rhythm clip of traveling new nodes into and out of wired LANs introduce monolithic on-going operational costs compared to the flexibleness of wireless fond regard, where the operational cost is about nothing.

ALSO READ  Storage Virtualisation Evolution In Modern Data Centers Information Technology Essay

Difficult wiring environment

Sometimes the state of affairss do non allow to utilize the wire. Even if it can be done it will be dearly-won and the installing of the wire would be difficult or hard due to the environment. Disaster recovery, for illustration, can do immediate and effectual usage of WLANs in the country to garner informations and coordinate alleviation attempts. ( Prasad & A ; Prasad, 2005 )

2.4.3 Ad hoc Network

An ad hoc web is besides known as peer-to-peer web, whose connexion is established for the continuance of one session and no base station ( centralized waiter ) is needed. This means that ad hoc web does non trust on any fixed substructure, therefore the hosts rely on each other to maintain the web connected. This connexion method is the most frequently associated.

In Latin, ad hoc literally means “ for this intent merely ” and therefore it is normally for impermanent usage. Consequently, the term has been applied to future office or place webs in which new device can be rapidly added, for illustration, the proposed Bluetooth engineering in which devices communicate with the computing machine and possibly other device utilizing wireless transmittal.

2.4.4 Peer-to-Peer

Peer-to-peer connexion is one of the ways to link to the web. It provides a simple and low-priced method because it does non necessitate a waiter. In a peer-to-peer web, the computing machines on web map as equals ( Habraken, 2001 ) . A equal computing machine fundamentally acts as a client and a waiter computing machine ( Habraken, 2001 ) . The architecture of Windows peer-to-peer web in Windows XP is shown in the figure below ( Microsoft Corporation, 2003 ) .

Figure 1: Windows Peer-to-Peer Networking architecture

Figure 2.2: Windows peer-to-peer web in Windows XP

It consists of the undermentioned constituent:


A set of affiliated nodes knows as graph, that provides implosion therapy and reproduction of informations across the web.


Security bed provided by default on top of a graph. The Grouping constituent uses the Group Security and Group Security Service Provider ( SSP ) subcomponents ( Microsoft Corporation, 2003 ) .

NSP – Name Service Provider

Component provides a mechanism to entree an randomly name service supplier ( Microsoft Corporation, 2003 ) . For this peer-to-peer networking, it uses the NPS interface to entree PNRP.

Peer Name Resolution Protocol ( PNRP )

This portion of constituent is to supply name declaration to peer-to-peer web.

Identity Manager

It is used for enabling the direction and creative activity of peer-to-peer individualities.

Microsoft TCP/IP version 6 protocol

It provides conveyance to Windows per-to-peer networking to run.

2.5 Field Programmable Gate Array ( FPGA )

From the FPGA Designer ‘s Quickstart Guide ( GU0101 ( v1.2 ) November 30, 2005 ) , it has mentioned that applied scientists have quickly changed pallet to work with over these last 50 old ages. The debut of the transistor in 1947 heralded the reaching of solid-state electronics, furthering the development of binary – or digital electronics. With the execution of multiple transistors on a individual piece of Si in 1959 the integrated circuit ( IC ) was born. With it, came the application of Boolean logic – a signifier of algebra where all values are cut down to true or false – giving the computing machine age.

Growth in the size and the functionality of application specific ICs, corresponds to the growing in the size and capablenesss of programmable logic. Larger programmable devices typically have their functionality arranged as an array of general intent logic blocks, with programmable interconnectednesss between them. These are known as Field Programmable gate Arrays ( FPGAs )

Field programmable Gate Array ( FPGAs ) represent reconfigurable calculating engineering ( Reseda, 2000 ) , which is in some ways ideally suited for picture processing. FPGAs normally consist of a system of logic blocks and some sum of Random Access Memory ( RAM ) , all wired together utilizing a huge array of interconnects. The logic can be rewired with a different design depends on the interior decorator likes.

There are 2 package that been used in the FPGA. It was produce by Altera. There are 2 ways to programming the board. First is by usage JTAG scheduling and second is by usage AS scheduling.

hypertext transfer protocol: //

Figure 2.3: The FPGA scheduling procedure

2.6 Wireless Device

This portion shows some device that has been explored in seeking the best portion for the undertaking.

2.6.1 WIT 2411

It is a 2.4 GHz Spread Spectrum Wireless Industrial Transceiver. This device provides dependable radio connectivity for either point-to-point or multi point application. Frequency skiping dispersed spectrum engineering guarantee maximal opposition to notice and multipath attenuation and hardiness in the presence of interfacing signal, while operation in the 2.4 GHz ISM set allows license-free usage and worldwide conformity.

Figure 2.4


Multipath attenuation, imperviously frequence skiping engineering with 43 frequence channels

Supports point-to-point or multipoint applications

Meets FCC regulations 15.247 and ETS 300.328 for world-wide license-free operation

Superior scope to 802.11 radio LAN devices

Low power 3.3v CMOS signals

Built-in informations scrambling reduces possibility of listen ining

Smart power direction

Selectable 8 mW or 18 mW transmit power.

2.6.2 CL4424

This device is use the Frequency-Hopping Spread Spectrum ( FHSS ) wireless designed for license-free operation in 2.4 GHz ISM set.

Figure 2.5: Chlorine 4424

Transceiver public presentation:

Transmission scope: up to 500 pess indoors, up to 1 stat mi line-of-sight

Data rate: up to 115.2 Kbps

Power Consumption ( at 12 V DC ) : 102 ma

Receiver Sensitivity: 100 dBm typical @ 576 kbps RF Data Rate

2.6.3 Data Bridge TM

Data Bridge is a wireless I/O transceiver faculty used point-to-point bridging of parallel, digital and UART informations. Two faculties automatically link together and map as a radio overseas telegram, bridging both sides through a low-latency, full-duplex radio RF nexus.

Figure 2.6: Data Bridge Board

Figure 2.7: Wireless Digital and Analog I/O Bridge


Easy Point-to-Point Wireless

Analog Digital, and Serial Bridge

UART Data Transmission and receiver

2.4 GHz Frequency Hopping

6 Digital Inputs and 6 Digital Output

Up to 4 kilometers scope

Operational at 2.7 – 3.6 Volt

2.6.4 RJ11

IT is a devices to convey informations via digital cellular This merchandise is merely stop up a standard line into the device port and ready to be used. This device radio informations modem operates in CDMA double manner, back uping both circuit-switched and 1xRTT packet-switched services.

Figure 2.8: NEMA-4x Enclosure for Harsh Conditions

Features and specification:

Analog informations transmittal

Easy set up

9-16 VDC @ 2A

LED Indexs

800MHZ or 1900MHz

Chapter 3


3.1 Overview

In this chapter, the inside informations about the advancement will be explains. It includes how the hardware and package are integrated together to bring forth a to the full working system. Hardware design is an FPGA integrate transceiver unit where information ( an image ) are sent/received. For the package portion, it besides includes the FPGAs where it acts as a little computing machine that wants to direct the informations through the sender. The package that FPGAs usage will be described briefly. The cryptography at the FPGAs has to do it maps like what the nonsubjective requires. Due to the above double maps, the FPGAs can be divided into 2 parts, hardware and package.

ALSO READ  Road To Cloud Computing For Cookson Electronics Information Technology Essay

3.2 Flow chart

Figure 3.1: Flow Chart

The above flow chart is for the whole undertaking thesis. It uses a different types of boxed because it represents the different actions taken during the procedure.

Figure 3.2: Basic Flowchart Symbols

3.3 Hardware

There are 2 types of hardware to be used for the undertaking. The first 1 is the transceiver and the 2nd 1 is the FPGA. The job is which transceiver to be chosen for appropriate informations transmittal and how will it be implemented utilizing the FPGA portion. Chapter 4 will be discoursing how the FPGA is programmed.


For this paradigm, the transceiver that has been chosen is from AEROCOMM Wireless Module. It is One hundred fifty 4424. This transceiver has been chosen because of several factors. First is the interfacing protocol. One hundred fifty 4424 is a Data Communication Equipment ( DCE ) and it can be used to interface a Data Terminal Equipment ( DTE ) by utilizing a consecutive series overseas telegram ( void modem ) . The interface protocols for the merchandise back up the RS-232 and RS-485, which is provided at purchase. For this undertaking, the information ( an image ) that is to be sent can be channeled to the sender utilizing the RS-232 or RS-485 consecutive interfaces.

Figure 3.3: Front View of CL 4424

Figure 3.4: Back View CL 4424 RS-232

RS-232 uses a individual ended informations transmittal protocol. The signals are represented by electromotive force degree with regard to a system common ( power/logic land ) .

Figure 3.5: RS – 232 Connection

Figure 3.6: DCE to DTE Interface RS-485

RS-485 uses a Differential Data Transmissions that can assist invalidate the consequence of land displacements and induced noise signals that can look as common manner electromotive force on a web.

If these interfaces were used, the convertor to change over RS-485 to RS-232 will be needed. The suggestion for the convertor is a B & A ; B Electronic 4WSD9R. Network Topologies

Network topologies refer to the form of the web, or the web bed. For the communicating faculty that we need to construct, it merely requires point-to-point transmittal. For the intent of the undertaking, these transceivers are non merely back uping point-to-point web topologies, but besides supports for point-to-multipoint web.

Figure 3.7: Point-to-Point Network

Figure 3.8: Point-to-Multipoint Network RF Transceiver

The transition used by an RF transceiver is Frequency Hopping Spread Spectrum transition. By utilizing the specific indistinguishable hop form in the web, the unit “ hops ” from frequence to frequency many times per second. The Frequency-Hopping Spread Spectrum ( FHSS ) wireless designed for license-free operates in the 2.4 GHz ISM set. Power unit

Communication and information processing require power to be supplied to each corresponding device. For the chosen transceiver, the power unit required is 7V DC to 18V DC. Features

Other characteristics that the CL 4424 provides are:

Durable industrial class enclosure

Transparent operation, supports any bequest system

Transmits around corners, through walls

Reliable communicating up to 115.2 Kbps

3.3.2 FPGA

FPGA is implemented in this paradigm as a little Personal computer. Some images are saved inside it. The FPGA acts as a client that wants to direct informations in the WLAN communicating. The information will change over into an electrical signifier ( signal ) and sent to the transceiver through the USB, RS 232 overseas telegram, etc.

Figure 3.9: Position of FPGA

3.4 Software

This subdivision will be explicate the cryptography of FPGA. FPGA is chosen because it can be programmed to what the interior decorator wants.

3.4.1 FPGA Software

The platform that has been used by this board is Quartus II produced by Altera. With the package it is possible to reprogram the FPGA at any clip, and it is possible to alter the non-volatile informations stored in the consecutive EEPROM bit. There are 2 ways to plan the board either by utilizing Joint Test Action Group ( JTAG ) scheduling and Active Serial ( AS ) scheduling. JTAG Programing

The JTAG was named after the IEEE criterions Join Test Action Group, the constellation spot watercourse would be downloaded straight into the Cyclone II FPGA through the USB-Blaster circuitry. AS Programing

In AS Programming, the constellation spot watercourse is downloaded into the Altera EPCS4 consecutive EEPROM bit. The EEPROM provides non-volatile storage for the spot watercourse, retaining the information even when the power of the board is turned off.

3.5 Developing FPGA

Stairss for design procedure for the FPGA:

Figure 3.10: FPGA Programing Measure by measure

Normally the user will utilize Verilog or VHDL. Verilog is a hardware description linguistic communication ( HDL ) and it is similar to C. VHDL stands for Very High Speed Integrated Circuit Hardware Description Language.

For the undertaking I has decided to utilize a VHDL. For the coding it can be developed by utilizing software-to-hardware transition strategy, which can change over C codification to VHDL or MATLAB codification to VHDL, which means MATLAB or C can be used.

3.6 Drumhead

This chapter has explained the inside informations about methodological analysis attack for the paradigm. It explains how it will work and how their connexion to each other. The hardware and package that are used in this paradigm have been elaborated in item. The findings/result of the research will be explained in the following chapter.

[ 1 ] ( 2006 ) . Retrieved October 5, 2010, from hypertext transfer protocol: // hypertext transfer protocol: //

[ 2 ] Bone, E. , & A ; Bolkcom, C. ( 2003 ) . Unmanned Aerial Vechicle: Background and issues for Congress. Washington: Congressional Research Service The Library of Congress 101.

[ 3 ] Habraken, J. ( 2001 ) . Absolute Beginer ‘s Guidance to Networking, Third Edition. United States of America: QUE.

[ 4 ] Herwitz, S. R. , Leung, G. J. , Aoyagi, M. , Billings, R. L. , Wei, M. Y. , Dunagan, S. E. , et Al. ( 2003 ) . WIRELESS LAN FOR OPERATION OF HIGH RESOLUTION IMAGING PAYLOAD ON A HIGH ALTITUDE SOLAR-POWERED UNMANNED AERIAL VEHICLE. Int’l telementring Conference. IEEE.

[ 5 ] Konami, k. ( 2007 ) . Prospect and Recent Research & A ; Development for Civil usage Autonomous Unmanned Aircraft as UAV and MAV. Journal of System Design and Dynamics.

[ 6 ] Lombardo, J. C. ( 2004 ) . Real-time hit Detection for Virtual Surgery.

[ 7 ] Microsoft Corporation. ( 2003 ) . Retrieved september 27, 2010, from Microsoft TechNet Web site: hypertext transfer protocol: //

[ 8 ] Call uping your informations gaining control. ( 2007 ) . Retrieved October 6, 2010, from hypertext transfer protocol: // : hypertext transfer protocol: //

[ 9 ] OPENWORLD DATA. ( 2009 ) . Retrieved October 4, 2010, from Welcome to OpenWorld Data: hypertext transfer protocol: //

[ 10 ] Porcupine Caribou Herd Satellite Collar Project. ( 2009 ) . Retrieved October 6, 2010, from hypertext transfer protocol: //

[ 11 ] Prasad, A. R. , & A ; Prasad, N. R. ( 2005 ) . 802.11 WLANs and IP Networking. Boston, London: ARECH HOUSE.

[ 12 ] Price, R. ( 2007 ) . Fundamentalss of radio networking. New York: McGraw-Hill.

[ 13 ] Reseda. ( 2000 ) . Virtual Computer Corporation. What is Reconfigureable Calculating.

[ 14 ] WEBOPEDIA. ( 2010 ) . Retrieved September 29, 2010, from hypertext transfer protocol: //

[ 15 ] WEBOPEDIA. ( 2010 ) . Retrieved October 5, 2010, from hypertext transfer protocol: //