Wifi Extender With Monitoring System
Wifi Extender With Monitoring System
It Project
By:
2023
CHAPTER I
INTRODUCTION
In recent years, the concept of the Internet gained immense popularity, and for good reason.
technology has transformed the way we interact with our environment and the devices within it. IoT
encompasses a network of interconnected devices, sensors, and systems that communicate with each other
to provide real-time data and automation. This connectivity has permeated our daily lives, influencing
everything from smart homes and cities to healthcare, transportation, and industry.
offers an exciting realm of possibilities, allowing us to enhance the functionality of everyday objects
and systems. One such application that has seen significant growth is the development of DIY IoT
projects that cater to specific needs and preferences. This project, "DIY IoT-Based WiFi Extender with
CCTV Camera," is one such endeavor that combines the power of IoT and wireless technology to solve a
common problem: improving WiFi coverage and enhancing security through a home-made solution.
Internet offers an exciting realm of possibilities, allowing us to enhance the functionality of everyday
objects and systems. One such application that has seen significant growth is the development of DIY IoT
projects that cater to specific needs and preferences. This project, "DIY IoT-Based WiFi Extender with
Cloud Storage ," is one such endeavor that combines the power of IoT and wireless technology to solve a
common problem: improving WiFi coverage and enhancing security through a home-made solution.
The importance of a WiFi connection in our homes cannot be overstated. It connects us to the
world, allowing us to work, learn, entertain, and stay connected with our loved ones. However, most of us
have experienced WiFi dead zones within our homes – areas where the signal strength is weak, and
connectivity is unreliable. These dead zones can be frustrating, hindering our productivity and enjoyment.
Moreover, home security is another paramount concern. The need to monitor our surroundings and
safeguard our homes has led to the rise of CCTV (Closed Circuit Television) cameras. These cameras
offer a sense of security by providing surveillance capabilities, allowing homeowners to keep an eye on
their property, even when they are away.
1.5 SCOPE OF THE STUDY
The Scope of the project is to Provide an overview of the increasing demand for extended WiFi
coverage and the need for efficient monitoring solutions and Design, develop, and implement a WiFi
extender with a monitoring system integrated with cloud storage for general purpose like saving those
important files and etc. and also it will Enhance the existing WiFi infrastructure to improve coverage,
performance, and user experience.
Enhanced Connectivity: Improve the overall performance of the home WiFi network by
extending its reach, providing reliable and high-speed internet access in previously weak signal
areas.
FOREIGN STUDIES
Recently, the unmanned aerial vehicles (UAV) under the umbrella of the Internet of Things (IoT) in smart
cities and emerging communities have become the focus of the academic and industrial science
community. On this basis, UAVs have been used in many military and commercial systems as emergency
transport and air support during natural disasters and epidemics. In such previous scenarios, boosting
wireless signals in remote or isolated areas would need a mobile signal booster placed on UAVs, and, at
the same time, the data would be secured by a secure decentralized database. This paper contributes to
investigating the possibility of using a wireless repeater placed on a UAV as a mobile booster for weak
wireless signals in isolated or rural areas in emergency situations and that the transmitted information is
protected from external interference and manipulation. The working mechanism is as follows: one of the
UAVs detect a human presence in a predetermined area with the thermal camera and then directs the
UAVs to the location to enhance the weak signal and protect the transmitted data. The methodology of
localization and clusterization of the UAVs is represented by a swarm intelligence localization (SIL)
optimization algorithm. At the same time, the information sent by UAV is protected by blockchain
technology as a decentralization database. According to realistic studies and analyses of UAVs
localization and clusterization, the proposed idea can improve the amplitude of the wireless signals in far
regions. In comparison, this database technique is difficult to attack. The research ultimately supports
emergency transport networks, blockchain, and IoT services.
LOCAL STUDIES
Nowadays, there is a significant increase in the number of various wearable heart monitoring devices,
ranging from simple pulse monitors and HR monitors, to portable Holter monitors. Although Holter
monitors are used only to collect data, it still remains the most used device. Data processing and analysis
are performed offline, making the device impractical for continual monitoring and early detection of
heart diseases. Although widely used, they are not suitable for long time monitoring due to their limited
power supply. Monitoring patient’s HR within hospital or his home requires the use of sensors attached
by wires to the medical devices, which limits the patient's activity. As an alternative, wireless devices are
suitable for remote patient monitoring, giving him the freedom of movement. The HR is continuously
measured by the proposed system using custom developed devices. The results may be wirelessly
transmitted to central monitoring station by using Bluetooth or WiFi nodes, but they are more
expensive, consume more power, require installing an expensive infrastructure, and are useful for high
bandwidth applications. Another Bluetooth limitation is that the standard allows only a limited number
of nodes. These issues make WiFi and Bluetooth nodes unsuitable for widespread wireless monitoring of
patient’s HR. As an alternative, wireless sensor networks, containing compact sensor nodes and having
low power consumption, represent a cost-effective solution. The ZigBee is similar to Bluetooth but is
simpler, has a lower data rate, and less power consumption, making it suitable for indoor applications..
SYNTHESIS TABLE
This chapter deals with the method and techniques used by the researchers in conducting the study. The
researchers utilize different ideas. information to learn and understand what is IPS, it’s importance and its
advantages. It discusses the integration of software and hardware and the contribution of IPS in our
organization.
e. SDLC Approach
The SDLC Approach used in this study is Waterfall Model, This model is simple and easy to
understand and use. It is easy to manage due to right rigidity of the model-each phase has
specific deliverables and a review process in this model phases are processed and completed one
at phases do not understood overlap. It work’s well and requirements are very well understood.
Requirements Gathering:
Define the requirements for the WiFi extender and monitoring system.
Specify the desired features, performance criteria, and compatibility requirements.
Determine the cloud storage specifications, including data types, storage capacity, and access
controls
System Design:
Develop a detailed design for the WiFi extender hardware and firmware.
Design the monitoring system's architecture, and user interface.
Plan the integration of cloud storage, defining data structures, API usage, and security measures.
Development:
Begin the development of the WiFi extender hardware and firmware according to the
specifications.
Implement the monitoring system software, incorporating the chosen sensors and designing the
user interface.
Integrate the cloud storage functionality into the system, ensuring secure data transfer and
storage.
Testing:
Conduct unit testing for individual components of the WiFi extender, monitoring system, and
cloud storage integration.
Perform integration testing to ensure seamless interaction between different modules.
Carry out system testing to validate the overall functionality and performance against the
defined requirements.
Deployment:
Prepare the system for deployment by finalizing the hardware and software configurations.
Create installation packages and documentation for end-users.
Deploy the WiFi extender and monitoring system in a controlled environment to verify its
performance in real-world conditions.
Maintenance:
Address any issues or bugs identified during deployment.
Provide ongoing support for users and continuously monitor system performance.
Consider user feedback for future enhancements or updates.