Thursday, August 29, 2013

e-wallet


Introduction

A Digital Wallet also known as e-wallet allows users to make electronic transactions quickly and securely. A Digital Wallet functions much like a physical wallet. The digital wallet is a method of storing various forms of electronic money (e-cash), the digital wallet has also evolved into a service that provides internet users with a convenient way to store and use online shopping information.



Abstract:


Using the basic concepts of Embedded Systems, an idea for changing the future of Cards (Banking, Petro, Health, Televoice, etc.) is proposed in this paper. Requirement of a special card reader, limited lifetime, acceptance being the main disadvantages of today's traditional cards, led to the design of e-Wallet. The main objective of e-Wallet is to make paperless money transaction easier.

 The main idea behind this paper is to bring in a cheaper, more versatile and much more easily usable kind of a card. Using this e-Wallet the transaction procedure can be as simple as: the customer goes to the point of sale (POS), does the purchasing and when it comes to the payment, the customer submits his e-Wallet to vender who connects it to his terminal (PC).

The vender displays the billing information to the customer who finalizes it. The amount in the e-Wallet is updated accordingly. Later at periodic intervals, the vender intimates the bank (in case of credit cards) which transfers the amount from the customer'(s) account to his. The advantages of e-Wallet are its ease of use (doesn't require a separate card reader), ease of maintenance, flexibility, safety, being the primary ones. 

The designing of the card is similar to any other embedded card. The designing cost of the card (e-Wallet) being as low as the price of a pizza. There are ample enhancements to this application from credit cards to televoice cards. Unlike traditional cards which are application oriented, all the applications' software can be embedded into this e-Wallet which provides multi-functionality.

What Is an eWallet?

Once you have been online for a few weeks or months, you will have an online identity. You may need and use quite a few online passwords and pins, along with personalized billing and shipping information. Not only do you need to enter your personal and financial data at each site, but you also have to remember and secure that information. An e-wallet is a convenient, secure place to store data related to your online identities. Once you start using one, you will wonder how you ever managed without it.


Misconceptions

Many popular browsers, including Internet Explorer and Firefox have some basic built-in e-wallet functions. However, storing your information in a browser is not as secure as using a separate program that is specifically designed for this task. In addition, if you change browsers, you may not have access to your data. Browsers also store your passwords in a separate location from your form data. In some cases, you need an add-on to store personal data that you need for completing forms. With few exceptions, these days, you will have a separate email program where you store email addresses for your contacts.

Function

E-wallets can store your passwords, credit card numbers, email contacts and vital data like your driver's license or social security numbers. You may have your personal data recorded in several disparate locations, including your browser, spreadsheets, a PDA and on paper. Not only is it inconvenient to manage your online experience this way, but it can also be risky. Paper can get lost or waterlogged. Trying to remember and update your email contacts and credit card information can be overwhelming. An e-wallet allows you to unify and store the information that you need. You will only need to remember one password to unlock your encrypted data.

Features

A consumer e-wallet is a standalone software application that you can download and install on your computer, PDA or Smartphone. Some of the most popular e-wallet software programs also allow you to store photos and maps. You can often customize the software's data entry options to fit your needs. Many retailers also provide credit card data e-wallets to their customers. These have limited features. They mainly store billing and shipping information.

Security

A good e-wallet uses strong encryption for stored data. The user also needs to enter a password to open the stored files. Some e-wallets employ additional password security features such as a limit on failed password attempts. Once this limit is reached, the user will be locked out.

Considerations

Syncing and backup options are important. Keeping a file separate gives you peace of mind and recovery options when you lose access to the original files, or the device stops working. The option to use your e-wallet on multiple electronic devices makes the software more useful. To simplify your life, you should choose ane-wallet that you can run from a USB flash drive, along with your Smartphone and a desktop or laptop.

How to use an e-wallet

The sites where e-wallet services are available generally have the following few easy steps to get started.

What are the benefits?

The sites where e-wallet services are available generally have the following few easy steps to get started.
Ease of use without having to enter your debit/credit card details for every online transaction.
For some sites there is no minimum amount and you can deposit an amount as low as Rs 10.
You can pass on the benefits of your e-wallet to your friends and family as well.
There is no chance of a decline of payment since e-wallet is a prepaid account.

What are the risks?

Revealed passwords can lead to theft.
There is no facility of refund; the amount is only redeemable against a purchase.

Where can you use E-Wallets?

Online Grocery Stores

Big Basket.com, a Bangalorebased online food and grocery store, offers an e-wallet facility for a simple payment option. The e-wallet on this site can be filled up with any sum of money, starting from as low as Rs 10. The maximum money that can be stored on Big Basket's e-wallet is Rs 10,000.

Utility Payments

Paying the electricity bill, phone bill, mobile bill and even booking a seat at the theatre can now be done with OxiCash. Your OxiCash e-wallet can be filled and recharged using net banking, debit cards and credit cards or even cash payments at OxiCash retail outlets.

Fly prepaid

If you are planning a vacation and fear spending the saved money elsewhere you can save up with, Lusso Trip's e-wallet facility. Customers generally keep a Rs 10,000 balance on their e-wallet and save up as much as Rs 1 lakh to book tickets when they want to.

E-wallet on mobile

Airtel Money transforms the mobile phone into a convenient wallet. The digitised money can be used on several shopping sites like ebay.in, Home Shop 18, Myntra and Book My Show. All one needs to have is an Airtel connection.

Buying Online

E-commerce major Flipkart was one among the first few to start am e-wallet service in 2011. Flipkart introduced e-wallet service to its customers, in addition to their cash-on-delivery option. Consumers can create an e-wallet and fill it up to Rs 10,000 at a time.

Recharging Mobile Phones

At Munkey.in, an e-wallet service, a mobile recharge can be done automatically on an auto disconnect missed call to their number. A customer can also go for scheduled recharge option where a filled e-wallet can recharge a number or DTH connection on set times of the month.

Read more:

 http://www.ehow.com/about_5133015_ewallet.html#ixzz2dNVc3iaY
http://articles.economictimes.indiatimes.com/2013-06-14/news/39976342_1_e-wallet-facility-airtel-money-flipkart
http://en.wikipedia.org/wiki/Digital_wallet

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDEQFjAA&url=http%3A%2F%2Finfo2myfriends.blog.com%2Ffiles%2F2010%2F11%2Fe-Wallet-%25E2%2580%2593-THE-FUTURE-OF-CARDS.doc&ei=838fUs-dComO7Aat74HgCQ&usg=AFQjCNF4iC756ysF8TY8lEFRlT90_8XcgQ&sig2=u6PE8Y_zztJsdqUmMDpLNA&bvm=bv.51495398,d.ZGU



Thursday, August 8, 2013

ZIGBEE | Seminar Topic


ZIGBEE ABSTRACT

ZigBee wireless mesh technology makes wireless sensor and control network applications practical. Cost-effective, simple-touse, capable of very long product functionality from a pair of standard alkaline cells, it is meant for developers who want either to get rid of the tether that their product must use or provide a new level of functionality to their products with wireless communications. The ZigBee Specification takes advantage of the IEEE STD 802.15.4 wireless protocol as the basic communications method, and expands on this with a robust mesh network, applications profiles and device descriptions as well as interoperability and compliance testing.

Refered From :http://www.techopedia.com/definition/4390/zigbee

Definition - What does ZigBee mean?

ZigBee is an open global standard for wireless technology designed to use low-power digital radio signals for personal area networks. ZigBee operates on the IEEE 802.15.4 specification and is used to create networks that require a low data transfer rate, energy efficiency and secure networking. It is employed in a number of applications such as building automation systems, heating and cooling control and in medical devices. ZigBee is designed to be simpler and less expensive than other personal are network technologies such as Bluetooth.

Techopedia explains ZigBee

ZigBee is a cost- and energy-efficient wireless network standard. It employs mesh network topology, allowing it provide high reliability and a reasonable range.One of ZigBee's defining features is the secure communications it is able to provide. This is accomplished through the use of 128-bit cryptographic keys. This system is based on symmetric keys, which means that both the recipient and originator of a transaction need to share the same key. These keys are either pre-installed, transported by a "trust center" designated within the network or established between the trust center and a device without being transported. Security in a personal area network is most crucial when ZigBee is used in corporate or manufacturing networks.

Why choose Zigbee?

• Reliable and self healing
• Supports large number of nodes
• Easy to deploy
• Very long battery life
• Secure
• Low cost
• Can be used globally


The 802 Wireless Space



Sensors & Controls:
Home Automation
Commercial/Industrial Automation
Remote Metering
Automotive Networks
Interactive Toys
Active RFID/ asset tracking
Medical



Zigbee specification

The ZigBee Alliance is an association of companies working together to enable reliable, cost-effective, low-power, wirelessly networked, monitoring and control products based on an open global standard.

Advantages of ZigBee over proprietary solutions?


  • Product interoperability
  • Vendor independence
  • Increased product innovation as a result of industry standardization
  • A common platform is more cost effective than creating a new proprietary solution from scratch every time
  • Companies can focus their energies on finding and serving customers


If you want to download the Zigbee specifiaction please follow the link below:

https://zigbeealliance.org/



Many in the industry are calling for a wireless networking standard that can deliver device-level communications for sensing, data acquisition, and control applications. Will the ZigBee standard make this a reality?


Jon Adams, The ZigBee Alliance


The new ZigBee protocol provides an open standard for low-power wireless networking of monitoring and control devices. Working with the IEEE 802.15.4 standard—which focuses on low-rate personal area networking and defines the lower protocol layers (i.e., the physical layer, or PHY, and the medium access control layer, or MAC)—ZigBee

Figure 1.


ZigBee uses the IEEE 802.15.4 physical and MAC (medium access control) layers to provide standards-based, reliable wireless data transfer. ZigBee adds network structure, routing, and security (e.g., key management and authentication) to complete the communications suite. On top of this robust wireless engine, ZigBee profiles provide target applications with the interoperability and intercompatibility required to allow similar products from different manufacturers to work seamle defines the upper layers of the protocol stack, from network to application, including application profiles. Think of 802.15.4 as the physical radio and ZigBee as the logical network and application software (see Figure 1). ZigBee uses the license-free ISM bands, which provide unrestricted geographic use.

The new standard targets home and building control, automation, security, consumer electronics, PC peripherals, medical monitoring, and toys. These applications require a technology that offers long battery life, reliability, automatic or semiautomatic installation, the ability to easily add or remove network nodes, signals that can pass through walls and ceilings, and low system cost.

ZigBee and the underlying 802.15.4 standard offer the system designer several classes of devices: the reduced-functionality device (RFD), the full-functional device (FFD), and the network coordinator. All ZigBee networks have at least one RFD or FFD and a network coordinator. Most sensor applications fall natively into the RFD class, with extended networks making use of both FFDs and network coordinators to form bridges and links required by the network topology. ZigBee networks can form autonomously, based on connectivity and function.
Data Reliability

Reliable data delivery is critical to ZigBee applications. The underlying 802.15.4 standard provides strong reliability through several mechanisms at multiple layers. For example, it uses 27 channels in three separate frequency bands (see Figure 2).

Figure 2.


 IEEE 802.15.4 provides three frequency bands for communications. Global utility, propagation, path loss, and data rate differences let ZigBee profile developers optimize system performance.



The 2.4 GHz band is used worldwide and has 16 channels and a maximum over-the-air data rate of 250 Kbps. Lower frequency bands are also specified. The 902–928 MHz band serves the Americas and much of the Pacific Rim, with 10 channels and a burst rate of 40 Kbps. European applications use one channel in the 868–870 MHz band, which provides 20 Kbps burst rate. This rich assortment of frequencies lets applications with the appropriate hardware configuration adjust in real time to local interference and/or propagation conditions.

Once on a specific channel, the 802.15.4 radio relies on a number of mechanisms to ensure reliable data transmission. First, the PHY layer uses binary phase shift keying (BPSK) in the 868/915 MHz bands and offset quadrature phase shift keying (O-QPSK) at 2.4 GHz. Both are robust and simple forms of modulation that work well in low SNR environments.

The information is coded onto the carrier with direct sequence spread spectrum (DSSS), an inherently robust method of improving multipath performance and receiver sensitivity through signal processing gain. The receiver sensitivity and selectivity is well suited for inexpensive silicon processes, with most vendors promising to meet or beat the standard. The size of the data payload ranges from 0 to 104 bytes, more than enough to meet most sensor needs. Figure 3 shows the construction of the data frame, also called a data packet.

Figure 3.

 The data packet is one of four packet structures provided in 802.15.4/ZigBee. In the MAC protocol data unit, the data payload is appended with source and destination addresses, a sequence number to allow the receiver to recognize that all packets transmitted have been received, frame control bytes that specify the network environment and other important parameters, and finally a frame check sequence that lets the receiver verify that the packet was received uncorrupted. This MAC frame is appended to a PHY synchronization and PHY header, which provides a robust mechanism for the receiver to quickly recognize and decode the received packet.



After receiving a data packet, the receiver performs a 16-bit cyclic redundancy check (CRC) to verify that the packet was not corrupted in transmission. With a good CRC, the receiver can automatically transmit an acknowledgement packet (depending on application and network needs), allowing the transmitting station to know that the data were received in an acceptable form. If the CRC indicates the packet was corrupt, the packet is dropped and no acknowledgement is transmitted. When a developer configures the network to expect acknowledgement, the transmitting station will retransmit the original packet a specified number of times to ensure successful packet delivery. If the path between the transmitter and receiver has become less reliable or a network failure has occurred, ZigBee provides the network with self-healing capabilities when alternate paths (if physically available) can be established autono-mously.

Battery Life

In many applications, you can’t afford to make regular trips back to a sensor to change the battery. Ideally, the sensor is good for the life of the battery.

The basic 802.15.4 node is fundamentally efficient in terms of battery performance. You can expect battery lifetimes from a few months to many years as a result of a host of system power-saving modes and battery-optimized network parameters, such as a selection of beacon intervals, guaranteed time slots, and enablement/disablement options.

Consider a typical security application, such as a magnetic reed switch door sensor. The sensor itself consumes almost no electricity; it’s the radio that uses the bulk of the power. The sensor is configured to have a “heartbeat” at 1 min. intervals and to immediately send a message when an event occurs. Assuming dozens of events per day, analysis shows that the sensor can still outlast an alkaline AAA battery. The configuration allows the network to update the sensor parameters remotely, change its reporting interval, or perform other remote functions and still have (theoretical) battery longevity well beyond the shelf life.

The network configuration plays an important part in the equation; most networks are expected to be stars or cluster trees rather than true meshes (see Figure 4), allowing the individual client devices to conserve battery energy.

Figure 4.
 Star networks are the most common, basic structure with broad utility. For larger physical environments, the cluster tree is a good way to aggregate multiple basic star networks into one larger network. Some applications will make best use of the mesh structure, which provides alternate route flexibility and the capability for the network to heal itself when intermediate nodes are removed or RF paths change.



Nodes that form the hubs or coordinator routes in the cluster tree can take advantage of beacon-based operation for synchronization across a widely dispersed network with only moderate impact on their own battery life.

Cost

System, individual node, service, and battery costs are all important. ZigBee and 802.15.4 maximize utility over this multidimensional space. There is sufficient flexibility in both standards to provide the sensor system developer with an assortment of tradeoffs to optimize cost with respect to system performance. For example, battery life can be optimized at the expense of service interval, and node cost and complexity can be traded for network complexity.

First-generation silicon is only now getting to the early adopters, and the system simplicity and the underlying flexibility of 802.15.4 promise that system developers will find ZigBee-based platforms more cost effective (at the same unit volumes) than Bluetooth or proprietary bidirectional wireless solutions. While platform hardware cost is always a critical part of the overall system cost, you must also consider the less tangible costs of system maintenance, flexibility, and battery life.

Transmission Range

ZigBee relies on the basic 802.15.4 standard to establish radio performance. As a short-range wireless standard, 802.15.4 doesn’t try to compete with high-powered transmitters but instead excels in the ultra-long battery life and low transmitter power. The standard specifies transmitter output power at a nominal –3 dBm (0.5 mW), with the upper limit controlled by the regulatory agencies of the region in which the sensor is used. At –3 dBm output, single-hop ranges of 10 to more than 100 m are reasonable, depending on the environment, antenna, and operating frequency band.

Instead of pure power, ZigBee augments the basic 802.15.4 simple transmitter and protocol with an extensible, sophisticated network function that allows multi-hop and flexible routing, providing communication ranges that can exceed the basic single-hop. Indeed, depending on the data latency re-quirements, you can practically create networks that use dozens of hops, with cumulative ranges inthe hundreds to thousands of meters. Networks can have star, cluster tree, or mesh structures; each comes with its own strengths.

Data Rate

It may not be obvious why a simple temperature or intrusion sensor needs to transmit data at 250 Kbps (at 2.4 GHz) or even 20 Kbps (at 868 MHz), but the reason becomes clear when you consider the need to prolong battery life. Even when the sensor is transmitting only a few bits or bytes, the system can be more efficient if it transmits and receives the data quickly. For instance, a 0.5 mW transmitter consumes many milliwatts whether it’s transmitting 100 or 100,000 bps. For any given quantity of data, transmitting at a higher data rate allows the system to shut down the transmitter and receiver more quickly, saving significant power.

Higher data rates at a given power level mean there’s less energy per transmitted bit, which generally implies reduced range. But both 802.15.4 and ZigBee value battery life more than raw range and provide mechanisms to improve range while always concentrating on battery life.
Data Latency

Sensor systems have a broad range of data-latency requirements. If sensor data are needed within tens of milliseconds, as op-posed to dozens of seconds, the requirement places different demands on the type and extent of the intervening network. For many sensor applications, data latency is less critical than battery life or data reliability.

For simple star networks (many clients, one network coordinator), ZigBee can provide latencies as low as ~16 ms in a beacon-centric network, using guaranteed time slots to prevent interference from other sensors. You can further reduce latencies to several milliseconds if you forego the beacon environment and are willing to risk potential interference from accidental data collision with other sensors on the network.

Data latency can also affect battery life. Generally, if you relax data-latency requirements, you can assume that the battery life of the client nodes will increase. This is even truer of network hubs, which are required to coordinate and supervise the network.

Consider a simple network that has de-manding latency requirements (e.g., a wireless computer keyboard and mouse). The user expects that a keyboard stroke or mouse movement will be reflected on screen in one or two screen-refresh intervals, generally between 16 and 32 ms. For this kind of star network, you can achieve data latency that beats this requirement.
Size

As silicon processes and radio technology progress, transceiver systems shrink in physical size. Forty years ago, a simple radio transceiver was the size of a shoebox and weighed 10 kg. Today, a similar transceiver might easily fit inside a thimble. In the case of ZigBee systems, the radio transceiver has become a single piece of silicon, with a few passive components and a relatively noncritical board design.

Microcontrollers that have native ability to interface with sensors (e.g., built-in digital I/O and A/D converters) have eclipsed even the radio’s rapid reduction in size. Today, the 8-bit MCU that hosts the application may already include dozens of kilobytes of flash memory, RAM, and various hardware-based timer functions, along with the ability to interface directly to the radio transceiver IC. The MCU requires only a few external passive components to be fully functional.

With the minimal overhead added by a ZigBee transceiver, the MCU can often continue to host the application along with the ZigBee protocol. Therefore, the silicon system size of a ZigBee solution (excluding sensors or batteries) is generally smaller than the batteries themselves. This compact form factor lends itself well to innovative uses of radio technology in sensor applications. Cer-tainly, with the advances in silicon-based sensors that have been coming to market over the past five years, it’s practical to design entire systems that take up <10%–20% of the volume of current-generation batteries. In-tegration is the key here, and even higher levels of integration are planned for future ZigBee and 802.15.4 platforms.

Data Security

It’s important to provide your sensor network with adequate security to prevent the data from being compromised, stolen, or tampered with. IEEE 802.15.4 provides authentication, encryption, and integrity services for wireless systems that allow systems developers to apply security levels as required. These include no security, access control lists, and 32-bit to 128-bit AES encryption with authentication. This security suite lets the developer pick and choose the security necessary for theapplication, providing a manageable tradeoff against data volume, battery life, and system processing power requirements. The IEEE 802.15.4 standard doesn’t provide a mechanism for moving security keys around a network; this is where ZigBee comes in.

The ZigBee security toolbox consists of key management features that let you safely manage a network remotely. For those systems where data security is not critical (e.g., a set of sensors monitoring microclimates in a forest), you may decide not to implement security features but instead optimize battery life and reduce system cost. For the developer of an industrial or military perimeter security sensor system, data security—and more importantly the ability to defend against sensor masking or spoofing—may have the higher priority. In many ZigBee-approved applications, security will already be a seamless part of the overall system.

Conclusion

ZigBee and the underlying 802.15.4 communications technology could form the basis of future wireless sensors, offering data reliability, long battery life, lower system costs, and good range through flexible networking. IEEE 802.15.4 is ready for release, and the ZigBee network, security, and profile specifications are scheduled to be released latter in the year. The first products are expected in the first half of 2004. ZigBee membership is open to all.