Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 25

Ministry of Higher Education and Scientific Research

Charmo University
College of Medical and Applied Science
Applied Computer Science Department

A Web-based tool for sulaimani


post Office
In partial fulfillment of the requirements for the degree of
BSC. degree in applied computer science

Prepared By

Hawzhin Kawa Narmin Muhammad


Shayan Muhammad Xanda Bahlul

Supervisor:
Dr. Waleed Khalid AL-Hadban

Academic year:
2021-2022
ABSTRACT

public facility that provides mail services, such as accepting letters and parcels, providing post

office boxes, and selling postage stamps, packaging, and stationery. Post offices may offer

additional services, which vary by country. These include providing and

accepting government forms (such as passport applications), and processing government services

and fees (such as road tax, postal savings, or bank fees). The chief administrator of a post office

is called a postmaster.

It contains several tasks which lead to benefit for economic in the country, saving too much time

for people and helping employees in their work. This project has been done to identify the

services and facilities for the post office to Sulaimani

I
DEDICATION

We dedicate our dissertation work to our family and many friends, also thanks for my teacher

and those who helped us. A special feeling of gratitude to our lovely parents.

II
ACKNOWLEDGMENT

First, in the name of Allah, the first thing is to thank our family and friends, and we also

thank(supervisor) Dr: walled, we were very much our colleague to who guided us in doing this

project and you thank postal staff and the delivery of sullamani who helped us for information

about the post office because of which we were able to do this thing.

His motivation and help contributed tremendously to the successful completion of the project.

III
Table of Contents

ABSTRACT IV

DEDICATION IV

ACKNOWLEDGMENT IV

LIST OF TABLES IV

LIST OF FIGURES IV

LIST OF SYMBOLS AND ABBREVATION………………………………………………… IV

Chapter 1: ……………………………………………….………………………………...1

1.1 Introduction of Internet of Things…………………………………………………………1

1.2 Asset Tracking...............................................................................................................2

1.2.1 Benefits of Asset Tracking ........................................................................................2

1.3 Bluetooth Asset Tracking…………………….....................................................................3

1.3.1 Benefits of Bluetooth Asset Tracking……………………………...……………………3

IV
1.4 Transmission Control Protocol (TCP )...............................................................................4

1.5 User Datagram Protocol(UDP)…………..........................................................................4

Chapter 2: ……………..………………………………………………………………………5

2.1 LoRaWAN Network Architecture…………………….……………………………………5

2.2 Applications of LoRa……………………….………………………………..…………….6

2.3 Advantages and Disadvantages of LoRa………………………………………………..…6

2.4 KNOT……….......................................................................................................................7

METHODOLOGY……………………………..………………………………….……………8

CONCLUSION 15

REFERENCES 16

V
LIST OF TABLE

Page Number

Table 1- Advantages and Disadvantages of LoRa …7

VI
LIST OF FIGURE

Page Numbers

Fig.1-LoRa Wan Network Architecture………………….……………..……………………5

Fig.2- KNOT RB924i-2nD-BT5&BG77….………………………………………………...8

Fig.2.1 -KNOT RB924i-2nD-BT5&BG77………..…..………………………………1

Fig.2.2-KNOT RB924i-2nD-BT5&BG77…………...………..………….……………12

Fig.2.3- GPS …………...………..………….…………………………………………13

Fig.3 -TG-BT5-IN………..………………………………..…………………………………9

Fig.4-Arduino Architecture…………………………………………………..…………….. 14

VII
LIST OF SYMBOLS AND ABBREVATION

List of Abbreviation Keywords

MT Mikrotik

IoT Internet of Things

LoRa Long Range

LoRa Wan Long Range Wide Area Network

HTTP Hypertext Transfer Protocol

HTTPS Hypertext Transfer Protocol Secure

MQTT MQ Telemetry Transport

BLE Bluetooth Row Energy

MAC Medea Area Network

VIII
Chapter 1

1.1 Introduction of Internet of Things (IoT)

The Internet of Things (IoT) is an emerging paradigm that enables the communication between

electronic devices and sensors through the internet in order to facilitate our lives. IoT use smart

devices and internet to provide innovative solutions to various challenges and issues related to

various business, governmental and public/private industries across the world [1]. IoT is

progressively becoming an important aspect of our life that can be sensed everywhere around us.

In whole, IoT is an innovation that puts together extensive variety of smart systems, frameworks

and intelligent devices and sensors . Moreover, it takes advantage of quantum and

nanotechnology in terms of storage, sensing and processing speed which were not conceivable

beforehand . Extensive research studies have been done and available in terms of scientific

articles, press reports both on internet and in the form of printed materials to illustrate the

potential effectiveness and applicability of IoT transformations. It could be utilized as a

preparatory work before making novel innovative business plans while considering the security,

assurance and interoperability. [2]

1.2 Asset tracking

Refers to the method of tracking physical assets, either by scanning barcode labels attached to

the assets or by using tags using GPS, BLE, LoRa, or RFID which broadcast their location.

These technologies can also be used for indoor tracking of persons wearing a tag. Asset tracking,

also known as asset monitoring or asset management, is a system of hardware and software that

1
logs information about tangible assets, allowing a business to verify its assets' location and

status. In addition to asset location, an asset tracking system might also track an asset's name,

type, usage, engine hours, maintenance schedule, or other information, and may send alerts to

managers when anything goes amiss.[3]

1.2.1 Benefits of Asset Tracking

1. Deter thefts and simplify insurance claims

2. Track employee travel times and location

3. Increase business efficiencies

4. Provide valuable, data-driven insights

1.3 Bluetooth Asset Tracking

In its simplest form, Bluetooth asset tracking works by using wireless technology to create

connections between an object and a tracker. These trackers are then paired with either a

smartphone or Bluetooth-enabled device, which uses two-way communication to locate the

object. Bluetooth technology essentially uses radio waves to exchange information between

devices over a short distance. As well as being able to capture the real-time location of

Bluetooth-enabled assets, the technology can also produce a report on the physical condition of

almost all enabled equipment.[4]

2
1.3.1 Benefits of Bluetooth Asset Tracking

2. A key benefit of using Bluetooth to track business assets is the ability to use two-way

communication. This feature can then allow several devices to locate one another at the

same time.

3. Another major benefit of using Bluetooth to track industrial assets is the ease of

compatibility with devices such as smartphones. This can work by data being

automatically captured by a mobile app and transferred to the cloud for processing.

4. Real-time tracking is made possible when the software application receives data from

Bluetooth hardware, such as tags and beacons. The asset tracking software can then

process this data and produce human-readable results for review.

5. Depending on the software these results could include a map of the asset’s current

location, a history of its movement, a log of employees who handled the asset and more.

1.4 Transmission Control Protocol (TCP)

TCP stands for Transmission Control Protocol and is a communication standard that allows

application programs and computer devices to exchange messages over a network. It is

designed to send packets over the Internet and successfully deliver data and messages over

the network. TCP is one of the basic standards that define the rules of the Internet and is

included in the standards of the Internet Engineering Task Force (IETF). It is one of the most

commonly used protocols in digital network communication and guarantees end-to-end data

transmission. TCP organizes data so that it can be transferred between the server and the

client. Guarantees the integrity of data sent over the network. TCP establishes a connection

3
between the source and the destination before sending the data. The connection remains

active until communication is initiated. It then breaks large amounts of data into smaller

packets while maintaining data integrity throughout the process.[5]

1.5 User Datagram Protocol (UDP)

User Datagram Protocol (UDP) is a communication protocol used throughout the Internet for

particularly time-critical transmissions such as video playback and DNS lookups. It speeds up

communication by not officially establishing a connection before the data is sent. This allows for

very fast data transmission, but can also result in packet loss during transmission, creating an

opportunity for exploitation in the form of Didoes attacks.[5]

Chapter 2

LoRa WAN Network Architecture

LoRa WAN architecture contains four major parts: end nodes, gateway, network server, and

application server. Star topology is adopted between gateways and end nodes, and a single

wireless hop is applied to communicate between these two devices. After gathering data, end

nodes are able to send messages to multiple gateways at the same time by using LoRa Radio

Frequency (RF). Cellular, Wi-Fi, and or Ethernet Backhaul then help forward the received

information in gateways to the network server, the last part which is eligible to finalize the

uploading of the packets to the application servers.[6]

4
LoRa WAN is an LPWAN standard based on an open-source MAC layer protocol brought out

by LoRa Alliance. It is able to provide local, nationwide, or global network to the battery-

powered wireless devices. LoRa WAN specifically focuses on the core demand of IoT, including

secure bidirectional communication, accessible mobility, and location identification, etc. Its

design has an extreme-easy-to-use mindset, which enables IoT users and developers to develop

and deploy the technology flexibly and rapidly[7].

Fig.1- LoRa Wan Network Architecture

2.2 Applications of LoRa :

1-Smart home And Building

2- Commercial Farming

5
3- Smart Industrial Controls

4- Healthy

5- Smart Parking

6- Energy

7-Telecom

8-Agriculture

9-Smart Cities

10-Smart Environment

11-Logistics

2.3 Advantages and Disadvantages of LoRa

This table contains information about advantages and disadvantages of LoRa, as showed in
the table below:

Advantage Disadvantage

1. It uses 868 MHz/ 915 MHz ISM bands which is 1. It can be used for applications requiring low
available world wide data rate i.e. upto about 27 Kbps.
2. It has very wide coverage range about 5 km in 2. LoRaWAN network size is limited based on
urban areas and 15 km in suburban areas. parameter called as duty cycle. It is defined as
percentage of time during which the channel
can be occupied.
3. It consumes less power and hence battery will 3. It is not ideal candidate to be used for real time
last for longer duration. applications requiring lower latency and
bounded jitter requirements.
4. Single LoRa Gateway device is designed to
take care of 1000s of end devices or nodes
5. It is widely used for M2M/IoT applications.

6
6. It uses Adaptive Data Rate technique to vary
output data rate/Rf output of end devices.

2.4 KNOT

The latest member of the MikroTik IoT product family, KNOT is a truly universal device with

outstanding connectivity options and protocol support. This is an IoT gateway that uses narrow

bandwidth and CATM technology. Due to its low cost and low bandwidth, cellular connections

are supported by a myriad of cellular providers around the world. KNOT can also monitor

onboard GPIOs, convert the Modbus protocol to TCP, and forward Bluetooth packets over

HTTPS and MQTT to TCP / IP networks. KNOT is a new addition to one of our IoT solutions.

KNOT acts as an IoT gateway (that uses Narrow Band and CAT-M technology) and uses

Bluetooth to scan broadcasted information. With the Bluetooth interface, you can use the KNOT

for asset tracking and telemetry based on Bluetooth advertisement packets. KNOT supports any

BLE tag that sends advertisement data. iBeacon, Eddystone, or any other format. It has powerful

filters for forwarding only relevant packets and ignoring others. After the gateway processes the

data that it receives, it can use an ISP connection to publish the data further to any subscriber or

server that is configured accordingly [8].

7
Methodologies

The tools we use:

 KNOT RB924i-2nD-BT5&BG77

KNOT is a new addition to one of our IoT solutions. KNOT acts as an IoT gateway (that uses Narrow

Band and CAT-M technology) and uses Bluetooth to scan broadcasted information. With the

Bluetooth interface, you can use the KNOT for asset tracking and telemetry based on Bluetooth

advertisement packets. KNOT supports any BLE tag that sends advertisement data. iBeacon,

Eddystone, or any other format. It has powerful filters for forwarding only relevant packets and

ignoring others. After the gateway processes the data that it receives, it can use an ISP connection to

publish the data further to any subscriber or server that is configured accordingly.

Fig.2-KNOT RB924i-2nD-BT5&BG77

8
 TG-BT5-IN
TG-BT5-IN is a new addition to our MikroTik equipment. It is a Bluetooth tag (a very small gadget) that can

be attached to other equipment or other belonging. Bluetooth tags play a big role in IoT topologies, where

Bluetooth is used to broadcast the data over short distances. Once installed and configured, the tag will

broadcast advertising packets in iBeacon, Eddystone, or Mikrotik telemetry (default packet format)  to the

gateway (for example, KNOT). Gateway, on the other hand, pushes the advertising packet payload to the

remote server utilizing MQTT or HTTP protocols.

Fig-3.TG-BT5-INTG-BT5-IN

Connecting Gateway with internet

1. Internet service provider is allowing hardware change and will issue an automatic IP

address;

2. Connect ISP cable to the first Ethernet port;

3. Connect the device to the power source;

4. Then Open network connections on computer and connect to MikroTik wireless network

9
5. The configuration must be done using a web browser or a mobile app over the wireless

network. We can also use a WinBox configuration tool.

6. Open https://192.168.88.1 in our web browser to start configuration, user name: admin

and there is no password by default;

7. • Click the Check for Updates button to update the RouterOS software to the latest version. An active

internet connection must be available.

8. Select a country in the quick settings of the WISP-AP menu and apply the country management

settings.

9. The antenna gain is set according to the antenna used.

10. We create a password wireless network;

11. we configure the router's password

Fig.2.1-KNOT RB924i-2nD-

BT5&BG77

10
1. The device can be mounted using provided DIN rail mount set. Designed to fit standard 35 mm x

7.5 mm DIN rails. Attach it with two provided screws to the device and attach the device to the

DIN rail. The DIN rail is not provided in the package.

2. Alternatively, it is possible to attach the device to a wall, using the provided screw holes on the

back of the unit. The device should be mounted in a way that the cable openings are pointing

downward as shown in the picture.

Powering

 Direct-input power jack (5.5 mm outside and 2 mm inside, female, pin positive plug) accepts 12-

57 V DC.

 microUSB port accepts 5 V powering.

 Ethernet port accepts 802.3af/at Power over Ethernet 12-57 V DC.

The power consumption under maximum load with attachments can reach 18 W.

Connecting to a PoE Adapter:

1. Connect the Ethernet cable from the device to the PoE+DATA port of the PoE adapter.

2. Connect an Ethernet cable from your local network (LAN) to the PoE adapter.

3. Connect the power cord to the adapter, and then plug the power cord into a power outlet.

Extension slots and ports


11
Fig.2.2-KNOT RB924i-2nD-BT5&BG77

 2.4 GHz, 802.11b/g/n, antenna gain 1.5 dBi.

 Built-in GPS module (GPS, GLONASS, BeiDou, Galileo).

 Two 10/100 Ethernet ports, supporting automatic cross/straight cable correction (Auto MDI/X).

Either straight or crossover cable can be used for connecting to other network devices. The

Ethernet port accepts 12-57 V DC power from an 802.3af/at PoE injector.

 One microUSB 2.0 port.

 One nano SIM slot.

 Bluetooth version 5.2, antenna gain 2 dBi.

GPS

NB/CAT-M

Attach your antennas to the SMA connectors:

12
Fig.2.3- GPS

Buttons and jumpers

Reset Button

 Hold this button during boot time until the LED light starts flashing, release the button to reset

RouterOS configuration (total 5 seconds).

 Keep holding for 5 more seconds, LED turns solid, release now to turn on CAP mode. The

device will now look for a Caps MAN server (total 10 seconds).

 Or keep holding the button for 5 more seconds until LED turns off, then release it to make the

Router BOARD look for Net install servers (total 15 seconds).

Regardless of the above option used, the system will load the backup Router BOOT loader if the

button is pressed before power is applied to the device. Useful for Router BOOT debugging and

recovery.

13
Arduino Architecture

Arduino is an open-source electronics platform based on easy-to-use hardware and software. We

are use an ultrasonic sensor with a buzzer and Arduino set the distance between ultrasonic sensor

and computer, when the computer move over the distance, the busser will warn you ,instead of

busser ,we can use LED light,SIM card or Wi-Fi.

Fig.4-Arduino Architecture

As a result, you can monitor your computer whenever you move from one location to another.

You can easily locate your computer's time and location by using a gateway with a Bluetooth tag

instead of checking your computer manually.

Conclusion
14
The proposed IOT Asset Tracking System with tags has been developed to ensure safety and

security, Asset Tracking System with tags can be used for both personal and business purpose.

And Real-time tracking is made possible when the software application receives data from

Bluetooth hardware, such as tags and beacons. The asset tracking software can then process this

data and produce human-readable results for review. A key benefit of using Bluetooth to track

lab assets is the ability to use two-way communication. This feature can then allow several

devices to locate one another at the same time.

Reference

15
1. Sachin Kumar , Journal of Big Data 6 , Article number: 111 (2019)

2. Bor, M., Vidler, J. E., & Roedig, U. (2016). LoRa for the Internet of Things.

3. Kim, S. J., Seo, J. H., Krishna, J., & Kim, S. J. (2008, July). Wireless sensor network based asset
tracking service. In PICMET'08-2008 Portland International Conference on Management of

Engineering & Technology (pp. 2643-2647). IEEE.

4. https://comparesoft.com/assets-tracking-software/how-bluetooth-asset-tracking-can-

enhance-tracking-in-the-workplace/

5. Behrouz, A. F., & Sophia, C. F. (2007). Data Communications and Networking. Forouzan with Sophia
Chung Fegan.

6. Yegin, A., Kramp, T., Dufour, P., Gupta, R., Soss, R., Hersent, O., ... & Sornin, N. (2020). LoRaWAN
protocol: specifications, security, and capabilities. In LPWAN Technologies for IoT and M2M

Applications (pp. 37-63). Academic Press.

7. https://lora-alliance.org/about-lorawan/

8. https://mikrotik.com/

16

You might also like