Question: Project: Using Agile Techniques, the students will design a Personal Environment Network. This will involve each student identifying and classifying which components need addressing and

Project:

Using Agile Techniques, the students will design a Personal Environment

Network. This will involve each student identifying and classifying which

components need addressing and how, using Agile development, this will be

achieved. The final outcomes of this will a document or documents

addressing these components, (Communication, planning, modeling,

construction and deployment).

The final outcome of this will a document or documents addressing these

components

1) Communication

2) Planning

3) Modeling

4) Construction

5) Deployment.

Fundamental components to deliver in the project Report will have these 7 sections:

Project planning

Use case development (1) Item identification and location

2) ad-hoc social networking

3) ad-hoc phone services (vs. cellular phone service))

Requirement gathering (requirements documentation)

Rapid design (design documentation/data flow design)

Code generation (no coding needed) can have objects and method explained

Testing (testing scenarios)

Area of work:

Using Agile Techniques, the students will design a Personal Environment

Network, this will involve discussion collaboration among the class

students as they identify and classify which components need addressing and

how, using Agile development, this will be achieved. The final outcomes of

this will a document or documents addressing these components,

(Communication, planning, modeling, construction and deployment).

Overview:

A personal Environment Network is a network of ad-hoc device (cell phones

or other WIFI wireless devices) that organize themselves into an active

network to exchange information that is determined by each individual

device. The application that allows the information exchange is responsible

for security, look and feel and protocol. The underlining communication

protocol is also part of the application. Furthermore, the application is

capable of routing thru a node to get a link to a node outside an original node

transmission range. These devices do not need any cell tower requirements,

although it is possible.

According to Wikipedia these devices follow this definition:

A mobile ad hoc network (MANET), is a self-configuring infrastructure-less

network of mobile devices connected by wireless links. ad hoc is Latin and

means "for this purpose".

Each device in a MANET is free to move independently in any direction,

and will therefore change its links to other devices frequently. Each must

forward traffic unrelated to its own use, and therefore be a router. The

primary challenge in building a MANET is equipping each device to

continuously maintain the information required to properly route traffic.

Such networks may operate by themselves or may be connected to the larger

Internet. MANETs are a kind of wireless ad hoc networks that usually has a

routable networking environment on top of a Link Layer ad hoc network.

The growth of laptops and 802.11/Wi-Fi wireless networking have made

MANETs a popular research topic since the mid-1990s. Many academics

papers evaluate protocols and their abilities, assuming varying degrees of

Mobility within a bounded space, usually with all nodes within a few hops

of each other.

Different protocols are then evaluated based on measure such as the packet

drop rate, the overhead introduced by the routing protocol, end-to-end

packet delays, network throughput etc.

Additional information:

Beacons transmit data. Personal Environment Network (PEN) does not need cell tower. No internet or intranet. Network is created from phone and they become the network. Phones as our router and it configure itself based on all the device around it. Everything you do is in the cell phone devices. Sensor on everything and PEN is the connection. No WI-FI.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!