SlideShare a Scribd company logo
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976
– 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME
56
COMPUTER INDEPENDENT DEVICE FOR USB DATA TRANSFER
Mr Soamil Vora1
, Mr Monil Shah2
, Mr Jigar Kapadia3
, Ms Gautami Nadkarni4
1,2,3,4
B.E. Student (EXTC), Dwarkadas J. Sanghvi College of Engineering, Mumbai, India
ABSTRACT
Today, the need of life for many people in the world is importance of data. It has become an
inevitable part of day to day life, not only in technical field but also in non-technical fields. Our
paper discusses a modern approach towards the way the data is transferred to and fro in the USB
mass storage devices without using a computer. We have achieved this with a system that uses an
independent solution for the problem – USB to USB Bridge. The aim of the proposed system is to
remove the every time need of the computer for the data transfer. The concept of the USB to USB
Bridge will make it possible to carry out the mass data transfer anywhere, anytime. The data into the
USB mass storage device will be explored using the USB host. The touch screen displays the list of
explored files from the mass storage device. The D+ and D- are bidirectional lines, both carrying
data in a single direction in TDM manner. The portability and battery system operated are the major
advantages of this system.
Keywords— USB, FAT, Flash Disk, ARM7
I. INTRODUCTION
The need of transferring data, in minimum possible time, from one USB Flash Drive to
another has become essential after the success of USB Flash Drives or as we say ‘pen drives’. It
involves a series of processes to achieve a successful transfer when being done with the use of a
computer. Starting with locating a working computer system, connecting the Flash Drive to the USB
port, and waiting for the computer system to recognize the device after the driver has been installed,
to finally selecting the data to be transferred, and ensuring that the transfer did occur. All of this
consumes a lot of time and power too, as the computer is required to be totally functional before
transferring the data.
It is also not feasible to carry around the laptop everywhere with you when there is a much
more viable and convenient alternative.
This project aims at making the use of a computer for USB to USB data transfers antediluvian
with our model which will perform the task of transferring the data from one USB to another without
making the use of a computer system [4].
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN
ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 4, Issue 5, July – August 2013, pp. 56-62
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2013): 5.8376 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976
– 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME
57
II. REQUIREMENTS OFTHE SYSTEM
To represent this innovative idea into a real time model we have set up a few requirements that
will make the design and composition of the system clear and also ensure that the outcome is as
desired.
Requirement 1: The first and foremost need was to consider the USB protocol. This is to provide a
background of the project and also to get to know the ease of operation of the different speed modes
of the USB.
Requirement 2: The data transfer speeds should be commercially competitive.
Requirement 3: Knowing that the present technology is not economical, we require to focus on
commercially versatile technologies and cheaper alternatives to the existing ones which are not
budget friendly.
Requirement 4: Our design should cater to the market’s need especially in being of cost effective
and reduced power consumption.
III. SYSTEM ARCHITECTURE
The USB to USB data transfer device consist of following main parts:
A. Development Boards
In the implementation of this system, the development platform used is the ARM7
development board- BCM 2835. It is based on Cirrus Logic processor. The BCM 2835 is an ARM7
based system-on-a-chip design with a large peripheral set targeted to a variety of applications.
Various interfaces along with the connections in the ARM architecture are shown in figure 1.
The BCM 2835 features an advanced ARM7 processor design with an MMU that supports Linux,
Windows CE and many other embedded operating systems.
Fig 1: Development Board
The BCM 2835 has a dual port USB host which is very important for the system. The USB host
Controller Interface provides full speed serial communication ports at a baud rate of 12 Mbits/sec.
B. USB 2.0
USB is a master-slave bus with one master and multiple slaves. The master is called a host and
the slaves are the peripherals. Only the host such as a computer system has the ability to initiate the
data transfers; the slaves only respond to the host’s instructions-they never initiate transfers [1] [2].
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976
– 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME
58
The VCC and Ground are the power supply signals to the device. D+ and D- are the data
lines through which actual data transfer takes place. Both D+ and D- are bidirectional lines, both
carrying data in a single direction at a time and data is modulated into deferential voltage levels to be
transferred over them. The directions of D+ and D- are reversed in TDM manner to transmit and
receive data. USB is a master-slave bus with one master and multiple slaves. The master is called a
host and the slaves are the peripherals. The communication made by USB is based on logical
channels - known as pipes. The connections established are 1 to 1 for the endpoints in pipes. A USB
device can have 32 endpoints- two of which are reserved. So a total of 30 are present for normal use
[3].
C. ARM7
The main task of the system is high speed data transfer, which depends on the architecture and
speed of the processor. The processor should have a USB host with USB device drivers installed in it
for plugging in a mass storage device which will be used to transfer data from one device to other.
ARM7 is most suited for portable devices due to low power consumption and reasonable
performance (MIPS/watts). ARM7 processor architecture is capable of up to 130 MIPS on a
typical 0.13 µm process. The flexibility and choices in interfaces as well as robustness provided by
the ARM is very high as compared to others. This makes it an appropriate selection for the design
and building of the product.
D. Touch Screen
The touch screen displays the content of the pen-drive once we run the application
“PenDrive.sh” on the touch screen. The content of the pen-drive are shown in the tree like structure
where you can able to see the select the subfolder or the entire folder to be transfer from source pen-
drive to destination pen-drive. Once finish with the data transfer you can close the application or u
can transfer another file. If the USB drive is full then it will ask to release some memory from pen-
drive for the data transfer. Also Linux environment help to detect the virus in the pen-drive.
E. USB Host Controller
The USB Host Controller sub module is the main hardware used by both the USB Controller
Module and the File System Controller Module. It interfaces the USB flash drives and converts raw
data and information to their proper NRZI encoding as specified by the USB technical specifications.
The system uses the Raspberry pi, a programmable microcontroller and USB multi-role embedded
host/peripheral controller, which has its own Basic Input/output system and framework program.
Most of the software sub modules make use of the available framework where the functions are
already abstracted and simply need to be enabled and customized depending on the application
[6].
F. File Manager
The File Manager Sub module is responsible for all file management functions/features that are
available in the system. These features include copying a file or folder, overwrite, rename, delete,
and browsing of the source and destination flash drive.
IV. SYSTEM WORKING
The USB to USB Bridge transfer data from one pen-drive to another. The data is selected
with the help of touch screen and it can be transfer form source to destination pen-drive. Also it has
the internet option so you can transfer data on the internet and also has an audio and video port.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976
– 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME
59
A. Hardware Initialization
The USB device should be connected to the hardware after the system boots. When a
USB device is connected to the hardware, the initialization starts. Normally it takes 1 or 2 seconds to
initialize it. Consider a case when we connect the USB device to the hardware in between the boot
process, then the error comes into picture as “USB device not recognized”.
B. System Flow
The system allows the user to select files or folders/directories for copying from a source USB
drive to a user selectable directory in the destination USB drive. The USB drive has four pins. The
VCC and Ground are the power supply signals to the device. D+ and D- are the data lines through
which actual data transfer takes place. Both D+ and D- are bidirectional lines, both carrying data in a
single direction at a time and data is modulated into deferential voltage levels to be transferred over
them. The directions of D+ and D- are reversed in TDM manner to transmit and receive data. It is
connectivity with peer-to-peer communication [2].
Fig. 2 System Flow Diagram
Figure shows the system setup while figure shows the general block diagram of the system.
The system allows the user to select files or folders/directories for copying from a source flash drive
to a user selectable directory in the destination flash drive. In addition, the system is able to check if
there is sufficient memory space for the file/folder/directory to be copied onto the destination USB
drive; if not, the system requests the user to delete some files or folder/directories to free some
memory in the destination USB drive[7].
C. Start Up
The Start-up sub module handles the system start-up. It deals with the detection of the USB
devices attached to the system. The sub module checks the USB ports for USB devices and their
properties. For the system to start-up properly, there must be (1) two USB devices attached; (2) the
USB devices must fall under the Mass Storage Class (MSC) device class and (3) under the Solid
State device subclass; and (4) it must use the FAT 12/16/32 file system. If any of the conditions fail
other that the 2 USB device requirements, an error would be raised.
D. Error Bit Handling
The Error Bit Handling Sub module is responsible for adding error-checking bits to the data
about to be sent. Furthermore, the sub module also checks the received packets from the sender flash
drive for corrupted data. The sub module forwards an acknowledgement (ACK) handshake in return
if the received packet does not contain any errors.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976
– 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME
60
E. Packet Handler
The Packet Handler sub module handles all packet generation and interpretation. The sub
module generates packets without error checking bits, which will be used as either data, or command
packets depending on the command sent by the File System. Controller Module. Requests are
interpreted and the error free results and status notifications are sent as output.
F. Proposed Algorithm
The Proposed Algorithm is as follows:
i. Select the suitable development board.
ii. Check whether the OS is supported or not.
iii. Connect the USB device to check functionality.
iv. Interface the touch screen and keypad as a User interfaces.
v. Check the communication between the USB device and the board.
vi. Ex plo re the device contents on touch screen.
vii. Select a particular file, and by using the option COPY, copy that file to destination device
Move Button on touch screen.
viii. The selected file is then copied into destination USB device that is connected in one of the
two USB ports.
ix. If another copy operation is to be performed, then go to ‘step vi’.
x. Terminate the process.
G. Termination
One of the features of USB2.0 specification is that when the USB device remains un-accessed for
more than 3msec, it (the USB device) goes into the sleep mode. The USB can now be ejected once
the device.
H. Execution of Task
The following flowchart shows the stepwise flow of the execution of the task. First step
show the initialization of the system. Next step defines the initialization of the USB peripheral and
system components. The steps ahead define the exploring and selecting the operation. The second
last step shows the operation completion whereas the last step shows the termination of the process.
The flowchart of operation is as shown in the figure 3 below.
Fig. 3 Flowchart of Task Execution
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976
– 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME
61
V. PERFORMANCE AND TEST
Three tests are used to assess the performance of the system; speed of the file transfers,
accuracy of the copied files, and USB Device recognition.
A. Transfer Speed
The results from the transfer speed test show that the speed of the destination device is
constant, for all pairs of USB flash disks. The file transfer speed to the generic 16MB flash disk
averages at 199.186Kbps, the 256 MB PQI at 558.191 Kbps, the 512MB PQI at 171.376 Kbps and
the 512MB Transcend at 144.548Kbps.
B. Single File Copy Test
Single file copy test involves the average speed required to transfer a file, which is calculated by
dividing the size of the file to be transferred by the average time Large files are categorized as files
over 1024 KB while Medium files are between 20 KB and 1024 KB in size and Small files fall below
20 KB.
Fig. 4 Touch screen Showing USB Content
The Folder depth is counted starting from the subdirectory of the folder/directory concerned.
The touch screen will display the folders, sub- folders and the root folders.
Fig. 5 Showing Folder and Sub-Folder
C. File Accuracy
A transfer transaction is considered successful if, for single file copy, the file has been copied
completely. For folder copy, all the contents within the folder/directory concerned are copied
completely; this includes sub-folders and files within the folders to be copied. This test utilizes the
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976
– 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME
62
files obtained from the Transfer Speed test where they are compared to the original files
using the Message Digest Algorithm-5 (MD5). The MD5 results of the original files are
compared to the MD5 of the copied files to verify the integrity of the written data. In total, each test
file and folder is transferred 33 times. The accuracy percentage is taken using the ratio of the number
of successfully transferred files and the total number of files.’
VI. ADVANTAGES
The advantages of the system are that it is a small, lightweight and handy device powered by
5V battery. It provides support for all USB Flash devices formatted with FAT32 file System along
with support for USB 2.0 and a Plug and Go function.
VII. CONCLUSION
The USB to USB Bridge concept enables us to study the USB protocol a n d working of
the USB host along with the processor in group. The user interface system is designed to allow the
user to browse and choose specific files or folders to transfer between the source and destination
devices. The screen consists of only the important data to avoid cluttering the screen. The advantage
of this device is that it is battery operated so there is no need of power supply connection and data
transfer can take place at any place. As the system is going to work as an application of the major
system, the number of applications is limitless for the bridge.
VIII. FUTURE SCOPE
While working on the evolution of the system and exploring the peripherals that could be
interfaced with the ARM 7 we got an insight into a plethora of new features that could be added
through little alterations. Following are the things that can be done with few modifications.
Add USB host capability to embedded products.
Update Procedure for USB drive.
Connect the Video port and Audio Port so it can be work as a small battery operated laptop.
Wireless data transfer by connection to any Bluetooth enabled devices.
REFERENCES
[1] D. Anderson, D. Dzatko, “Universal Serial Bus System Architecture,” MindShare, Inc.,
2001
[2] J. Axelson, “USB COMPLETE Second Edition,” Madison, WI: Lakeview Research
LLC, 2004
[3] John Hyde, USB design, a technical introduction to USB 2.0, white papers.
[4] USB Implementers Forum Inc, www.usb.org/ interoductionusb-2.0papers/
[5] USB FlashDrive.org, “USB Flash Drives, USB Memory and Portable Computer Hard
Drive Information,” http://www.usbflashdrive.org/usbfd_overview.html, July 1, 2005
[6] Li Ying-lian, Hu Bing, “Design of transient recorder based on USB2.0”, ICECE 2010.
[7] Tushar Sawant, Prof. Sanjay Deshmukh, Shilen Jhaveri and Siddharth Bhatt, “Implementation
of USB To USB Bridge for Computer Independent Data Transfer”, International Journal of
Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 300 - 308,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWAREBASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
osamawajid
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
Ajay Mistry
 
What is Coomputer What are the parts of computer
What is Coomputer What are the parts of computer What is Coomputer What are the parts of computer
What is Coomputer What are the parts of computer
TarandeepSingh143
 
COMPUTER ORGANIZATION AND ARCHITECTURE
COMPUTER ORGANIZATION AND ARCHITECTURECOMPUTER ORGANIZATION AND ARCHITECTURE
COMPUTER ORGANIZATION AND ARCHITECTURE
Ezhil22
 
Trends in computer architecture
Trends in computer architectureTrends in computer architecture
Trends in computer architecture
muhammedsalihabbas
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
Niraj Choudhary
 
Network
NetworkNetwork
Network
Rachel Espino
 
Basic components of a computer network
Basic components of a computer  networkBasic components of a computer  network
Basic components of a computer network
Edison Francis
 
How does data flow around a computer system p3 1
How does data flow around a computer system p3 1How does data flow around a computer system p3 1
How does data flow around a computer system p3 1
lukecisco1
 
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
Sowmya Jyothi
 
About computer hardware
About computer hardwareAbout computer hardware
About computer hardware
leaderstwo
 
What is computer Introduction to Computing
What is computer Introduction  to Computing What is computer Introduction  to Computing
What is computer Introduction to Computing
Ahmad Idrees
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
Job Thomas
 
Computer hardware and networking components
Computer hardware and networking componentsComputer hardware and networking components
Computer hardware and networking components
Manpreet Singh Bedi
 
01.osdoc
01.osdoc01.osdoc
01.osdoc
Pramod Redekar
 
computer organization and architecture notes
computer organization and architecture notescomputer organization and architecture notes
computer organization and architecture notes
Upasana Talukdar
 
Fundamentals of Computer Design including performance measurements & quantita...
Fundamentals of Computer Design including performance measurements & quantita...Fundamentals of Computer Design including performance measurements & quantita...
Fundamentals of Computer Design including performance measurements & quantita...
Gaditek
 
Essential computer concepts
Essential computer conceptsEssential computer concepts
Essential computer concepts
Doc Santosh Soren
 
Itc lecture
Itc lectureItc lecture
The Computer
The ComputerThe Computer
The Computer
valenciazetalove
 

What's hot (20)

BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWAREBASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 
What is Coomputer What are the parts of computer
What is Coomputer What are the parts of computer What is Coomputer What are the parts of computer
What is Coomputer What are the parts of computer
 
COMPUTER ORGANIZATION AND ARCHITECTURE
COMPUTER ORGANIZATION AND ARCHITECTURECOMPUTER ORGANIZATION AND ARCHITECTURE
COMPUTER ORGANIZATION AND ARCHITECTURE
 
Trends in computer architecture
Trends in computer architectureTrends in computer architecture
Trends in computer architecture
 
Computer basic theory222
Computer basic theory222Computer basic theory222
Computer basic theory222
 
Network
NetworkNetwork
Network
 
Basic components of a computer network
Basic components of a computer  networkBasic components of a computer  network
Basic components of a computer network
 
How does data flow around a computer system p3 1
How does data flow around a computer system p3 1How does data flow around a computer system p3 1
How does data flow around a computer system p3 1
 
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
HARDWARE AND PC MAINTENANCE -THE COMPLETE PC-MRS SOWMYA JYOTHI REFERENCE-MIKE...
 
About computer hardware
About computer hardwareAbout computer hardware
About computer hardware
 
What is computer Introduction to Computing
What is computer Introduction  to Computing What is computer Introduction  to Computing
What is computer Introduction to Computing
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
Computer hardware and networking components
Computer hardware and networking componentsComputer hardware and networking components
Computer hardware and networking components
 
01.osdoc
01.osdoc01.osdoc
01.osdoc
 
computer organization and architecture notes
computer organization and architecture notescomputer organization and architecture notes
computer organization and architecture notes
 
Fundamentals of Computer Design including performance measurements & quantita...
Fundamentals of Computer Design including performance measurements & quantita...Fundamentals of Computer Design including performance measurements & quantita...
Fundamentals of Computer Design including performance measurements & quantita...
 
Essential computer concepts
Essential computer conceptsEssential computer concepts
Essential computer concepts
 
Itc lecture
Itc lectureItc lecture
Itc lecture
 
The Computer
The ComputerThe Computer
The Computer
 

Similar to Computer independent device for usb data transfe

Implementation of usb to usb bridge for computer independent data transfer
Implementation of usb to usb bridge for computer independent data transferImplementation of usb to usb bridge for computer independent data transfer
Implementation of usb to usb bridge for computer independent data transfer
IAEME Publication
 
Device - to - Device communication (Pen drive) without PC
Device - to - Device communication (Pen drive) without PCDevice - to - Device communication (Pen drive) without PC
Device - to - Device communication (Pen drive) without PC
Electronics - Embedded System
 
Device to-device communication (pen drive) without pc
Device to-device communication (pen drive) without pcDevice to-device communication (pen drive) without pc
Device to-device communication (pen drive) without pc
IJARIIT
 
usb protocol and its various application
usb protocol and its various applicationusb protocol and its various application
usb protocol and its various application
deosaugat144
 
Usb Wp Implementing Usb
Usb Wp Implementing UsbUsb Wp Implementing Usb
Usb Wp Implementing Usb
allankliu
 
USB, SCANNAR
USB, SCANNARUSB, SCANNAR
Design of Microcontroller based Wireless Pendrive
Design of Microcontroller based Wireless PendriveDesign of Microcontroller based Wireless Pendrive
Design of Microcontroller based Wireless Pendrive
IRJET Journal
 
Paper id 252014121
Paper id 252014121Paper id 252014121
Paper id 252014121
IJRAT
 
COMPUTER.docx
COMPUTER.docxCOMPUTER.docx
COMPUTER.docx
proshot113
 
Study of USB Device Drivers under Linux _1_
Study of USB Device Drivers under Linux _1_Study of USB Device Drivers under Linux _1_
Study of USB Device Drivers under Linux _1_
Ganesh Kamath
 
Free Hardware & Networking Slides by ITE Infotech Private Limited
Free Hardware & Networking Slides by ITE Infotech Private LimitedFree Hardware & Networking Slides by ITE Infotech Private Limited
Free Hardware & Networking Slides by ITE Infotech Private Limited
Hemraj Singh Chouhan
 
please answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdfplease answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdf
arishaenterprises12
 
Researchpaper 5-pen-pc-technology
Researchpaper 5-pen-pc-technologyResearchpaper 5-pen-pc-technology
Researchpaper 5-pen-pc-technology
Ramya Rajan
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applications
ijsrd.com
 
Information sheet 1
Information sheet 1Information sheet 1
Information sheet 1
Manolita Salagunting
 
Portable storage device management
Portable storage device managementPortable storage device management
Portable storage device management
cseij
 
Nt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer ComponentsNt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer Components
Kristi Anderson
 
Ufs whitepaper
Ufs whitepaperUfs whitepaper
Ufs whitepaper
Arasan Chip Systems
 
intro.ppt
intro.pptintro.ppt
intro.ppt
susmitapatra19
 
intro.ppt
intro.pptintro.ppt
intro.ppt
raffy ursulum
 

Similar to Computer independent device for usb data transfe (20)

Implementation of usb to usb bridge for computer independent data transfer
Implementation of usb to usb bridge for computer independent data transferImplementation of usb to usb bridge for computer independent data transfer
Implementation of usb to usb bridge for computer independent data transfer
 
Device - to - Device communication (Pen drive) without PC
Device - to - Device communication (Pen drive) without PCDevice - to - Device communication (Pen drive) without PC
Device - to - Device communication (Pen drive) without PC
 
Device to-device communication (pen drive) without pc
Device to-device communication (pen drive) without pcDevice to-device communication (pen drive) without pc
Device to-device communication (pen drive) without pc
 
usb protocol and its various application
usb protocol and its various applicationusb protocol and its various application
usb protocol and its various application
 
Usb Wp Implementing Usb
Usb Wp Implementing UsbUsb Wp Implementing Usb
Usb Wp Implementing Usb
 
USB, SCANNAR
USB, SCANNARUSB, SCANNAR
USB, SCANNAR
 
Design of Microcontroller based Wireless Pendrive
Design of Microcontroller based Wireless PendriveDesign of Microcontroller based Wireless Pendrive
Design of Microcontroller based Wireless Pendrive
 
Paper id 252014121
Paper id 252014121Paper id 252014121
Paper id 252014121
 
COMPUTER.docx
COMPUTER.docxCOMPUTER.docx
COMPUTER.docx
 
Study of USB Device Drivers under Linux _1_
Study of USB Device Drivers under Linux _1_Study of USB Device Drivers under Linux _1_
Study of USB Device Drivers under Linux _1_
 
Free Hardware & Networking Slides by ITE Infotech Private Limited
Free Hardware & Networking Slides by ITE Infotech Private LimitedFree Hardware & Networking Slides by ITE Infotech Private Limited
Free Hardware & Networking Slides by ITE Infotech Private Limited
 
please answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdfplease answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdf
 
Researchpaper 5-pen-pc-technology
Researchpaper 5-pen-pc-technologyResearchpaper 5-pen-pc-technology
Researchpaper 5-pen-pc-technology
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applications
 
Information sheet 1
Information sheet 1Information sheet 1
Information sheet 1
 
Portable storage device management
Portable storage device managementPortable storage device management
Portable storage device management
 
Nt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer ComponentsNt1310 Unit 3 Computer Components
Nt1310 Unit 3 Computer Components
 
Ufs whitepaper
Ufs whitepaperUfs whitepaper
Ufs whitepaper
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

Computer independent device for usb data transfe

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME 56 COMPUTER INDEPENDENT DEVICE FOR USB DATA TRANSFER Mr Soamil Vora1 , Mr Monil Shah2 , Mr Jigar Kapadia3 , Ms Gautami Nadkarni4 1,2,3,4 B.E. Student (EXTC), Dwarkadas J. Sanghvi College of Engineering, Mumbai, India ABSTRACT Today, the need of life for many people in the world is importance of data. It has become an inevitable part of day to day life, not only in technical field but also in non-technical fields. Our paper discusses a modern approach towards the way the data is transferred to and fro in the USB mass storage devices without using a computer. We have achieved this with a system that uses an independent solution for the problem – USB to USB Bridge. The aim of the proposed system is to remove the every time need of the computer for the data transfer. The concept of the USB to USB Bridge will make it possible to carry out the mass data transfer anywhere, anytime. The data into the USB mass storage device will be explored using the USB host. The touch screen displays the list of explored files from the mass storage device. The D+ and D- are bidirectional lines, both carrying data in a single direction in TDM manner. The portability and battery system operated are the major advantages of this system. Keywords— USB, FAT, Flash Disk, ARM7 I. INTRODUCTION The need of transferring data, in minimum possible time, from one USB Flash Drive to another has become essential after the success of USB Flash Drives or as we say ‘pen drives’. It involves a series of processes to achieve a successful transfer when being done with the use of a computer. Starting with locating a working computer system, connecting the Flash Drive to the USB port, and waiting for the computer system to recognize the device after the driver has been installed, to finally selecting the data to be transferred, and ensuring that the transfer did occur. All of this consumes a lot of time and power too, as the computer is required to be totally functional before transferring the data. It is also not feasible to carry around the laptop everywhere with you when there is a much more viable and convenient alternative. This project aims at making the use of a computer for USB to USB data transfers antediluvian with our model which will perform the task of transferring the data from one USB to another without making the use of a computer system [4]. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 5, July – August 2013, pp. 56-62 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME 57 II. REQUIREMENTS OFTHE SYSTEM To represent this innovative idea into a real time model we have set up a few requirements that will make the design and composition of the system clear and also ensure that the outcome is as desired. Requirement 1: The first and foremost need was to consider the USB protocol. This is to provide a background of the project and also to get to know the ease of operation of the different speed modes of the USB. Requirement 2: The data transfer speeds should be commercially competitive. Requirement 3: Knowing that the present technology is not economical, we require to focus on commercially versatile technologies and cheaper alternatives to the existing ones which are not budget friendly. Requirement 4: Our design should cater to the market’s need especially in being of cost effective and reduced power consumption. III. SYSTEM ARCHITECTURE The USB to USB data transfer device consist of following main parts: A. Development Boards In the implementation of this system, the development platform used is the ARM7 development board- BCM 2835. It is based on Cirrus Logic processor. The BCM 2835 is an ARM7 based system-on-a-chip design with a large peripheral set targeted to a variety of applications. Various interfaces along with the connections in the ARM architecture are shown in figure 1. The BCM 2835 features an advanced ARM7 processor design with an MMU that supports Linux, Windows CE and many other embedded operating systems. Fig 1: Development Board The BCM 2835 has a dual port USB host which is very important for the system. The USB host Controller Interface provides full speed serial communication ports at a baud rate of 12 Mbits/sec. B. USB 2.0 USB is a master-slave bus with one master and multiple slaves. The master is called a host and the slaves are the peripherals. Only the host such as a computer system has the ability to initiate the data transfers; the slaves only respond to the host’s instructions-they never initiate transfers [1] [2].
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME 58 The VCC and Ground are the power supply signals to the device. D+ and D- are the data lines through which actual data transfer takes place. Both D+ and D- are bidirectional lines, both carrying data in a single direction at a time and data is modulated into deferential voltage levels to be transferred over them. The directions of D+ and D- are reversed in TDM manner to transmit and receive data. USB is a master-slave bus with one master and multiple slaves. The master is called a host and the slaves are the peripherals. The communication made by USB is based on logical channels - known as pipes. The connections established are 1 to 1 for the endpoints in pipes. A USB device can have 32 endpoints- two of which are reserved. So a total of 30 are present for normal use [3]. C. ARM7 The main task of the system is high speed data transfer, which depends on the architecture and speed of the processor. The processor should have a USB host with USB device drivers installed in it for plugging in a mass storage device which will be used to transfer data from one device to other. ARM7 is most suited for portable devices due to low power consumption and reasonable performance (MIPS/watts). ARM7 processor architecture is capable of up to 130 MIPS on a typical 0.13 µm process. The flexibility and choices in interfaces as well as robustness provided by the ARM is very high as compared to others. This makes it an appropriate selection for the design and building of the product. D. Touch Screen The touch screen displays the content of the pen-drive once we run the application “PenDrive.sh” on the touch screen. The content of the pen-drive are shown in the tree like structure where you can able to see the select the subfolder or the entire folder to be transfer from source pen- drive to destination pen-drive. Once finish with the data transfer you can close the application or u can transfer another file. If the USB drive is full then it will ask to release some memory from pen- drive for the data transfer. Also Linux environment help to detect the virus in the pen-drive. E. USB Host Controller The USB Host Controller sub module is the main hardware used by both the USB Controller Module and the File System Controller Module. It interfaces the USB flash drives and converts raw data and information to their proper NRZI encoding as specified by the USB technical specifications. The system uses the Raspberry pi, a programmable microcontroller and USB multi-role embedded host/peripheral controller, which has its own Basic Input/output system and framework program. Most of the software sub modules make use of the available framework where the functions are already abstracted and simply need to be enabled and customized depending on the application [6]. F. File Manager The File Manager Sub module is responsible for all file management functions/features that are available in the system. These features include copying a file or folder, overwrite, rename, delete, and browsing of the source and destination flash drive. IV. SYSTEM WORKING The USB to USB Bridge transfer data from one pen-drive to another. The data is selected with the help of touch screen and it can be transfer form source to destination pen-drive. Also it has the internet option so you can transfer data on the internet and also has an audio and video port.
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME 59 A. Hardware Initialization The USB device should be connected to the hardware after the system boots. When a USB device is connected to the hardware, the initialization starts. Normally it takes 1 or 2 seconds to initialize it. Consider a case when we connect the USB device to the hardware in between the boot process, then the error comes into picture as “USB device not recognized”. B. System Flow The system allows the user to select files or folders/directories for copying from a source USB drive to a user selectable directory in the destination USB drive. The USB drive has four pins. The VCC and Ground are the power supply signals to the device. D+ and D- are the data lines through which actual data transfer takes place. Both D+ and D- are bidirectional lines, both carrying data in a single direction at a time and data is modulated into deferential voltage levels to be transferred over them. The directions of D+ and D- are reversed in TDM manner to transmit and receive data. It is connectivity with peer-to-peer communication [2]. Fig. 2 System Flow Diagram Figure shows the system setup while figure shows the general block diagram of the system. The system allows the user to select files or folders/directories for copying from a source flash drive to a user selectable directory in the destination flash drive. In addition, the system is able to check if there is sufficient memory space for the file/folder/directory to be copied onto the destination USB drive; if not, the system requests the user to delete some files or folder/directories to free some memory in the destination USB drive[7]. C. Start Up The Start-up sub module handles the system start-up. It deals with the detection of the USB devices attached to the system. The sub module checks the USB ports for USB devices and their properties. For the system to start-up properly, there must be (1) two USB devices attached; (2) the USB devices must fall under the Mass Storage Class (MSC) device class and (3) under the Solid State device subclass; and (4) it must use the FAT 12/16/32 file system. If any of the conditions fail other that the 2 USB device requirements, an error would be raised. D. Error Bit Handling The Error Bit Handling Sub module is responsible for adding error-checking bits to the data about to be sent. Furthermore, the sub module also checks the received packets from the sender flash drive for corrupted data. The sub module forwards an acknowledgement (ACK) handshake in return if the received packet does not contain any errors.
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME 60 E. Packet Handler The Packet Handler sub module handles all packet generation and interpretation. The sub module generates packets without error checking bits, which will be used as either data, or command packets depending on the command sent by the File System. Controller Module. Requests are interpreted and the error free results and status notifications are sent as output. F. Proposed Algorithm The Proposed Algorithm is as follows: i. Select the suitable development board. ii. Check whether the OS is supported or not. iii. Connect the USB device to check functionality. iv. Interface the touch screen and keypad as a User interfaces. v. Check the communication between the USB device and the board. vi. Ex plo re the device contents on touch screen. vii. Select a particular file, and by using the option COPY, copy that file to destination device Move Button on touch screen. viii. The selected file is then copied into destination USB device that is connected in one of the two USB ports. ix. If another copy operation is to be performed, then go to ‘step vi’. x. Terminate the process. G. Termination One of the features of USB2.0 specification is that when the USB device remains un-accessed for more than 3msec, it (the USB device) goes into the sleep mode. The USB can now be ejected once the device. H. Execution of Task The following flowchart shows the stepwise flow of the execution of the task. First step show the initialization of the system. Next step defines the initialization of the USB peripheral and system components. The steps ahead define the exploring and selecting the operation. The second last step shows the operation completion whereas the last step shows the termination of the process. The flowchart of operation is as shown in the figure 3 below. Fig. 3 Flowchart of Task Execution
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME 61 V. PERFORMANCE AND TEST Three tests are used to assess the performance of the system; speed of the file transfers, accuracy of the copied files, and USB Device recognition. A. Transfer Speed The results from the transfer speed test show that the speed of the destination device is constant, for all pairs of USB flash disks. The file transfer speed to the generic 16MB flash disk averages at 199.186Kbps, the 256 MB PQI at 558.191 Kbps, the 512MB PQI at 171.376 Kbps and the 512MB Transcend at 144.548Kbps. B. Single File Copy Test Single file copy test involves the average speed required to transfer a file, which is calculated by dividing the size of the file to be transferred by the average time Large files are categorized as files over 1024 KB while Medium files are between 20 KB and 1024 KB in size and Small files fall below 20 KB. Fig. 4 Touch screen Showing USB Content The Folder depth is counted starting from the subdirectory of the folder/directory concerned. The touch screen will display the folders, sub- folders and the root folders. Fig. 5 Showing Folder and Sub-Folder C. File Accuracy A transfer transaction is considered successful if, for single file copy, the file has been copied completely. For folder copy, all the contents within the folder/directory concerned are copied completely; this includes sub-folders and files within the folders to be copied. This test utilizes the
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 5, July – August (2013), © IAEME 62 files obtained from the Transfer Speed test where they are compared to the original files using the Message Digest Algorithm-5 (MD5). The MD5 results of the original files are compared to the MD5 of the copied files to verify the integrity of the written data. In total, each test file and folder is transferred 33 times. The accuracy percentage is taken using the ratio of the number of successfully transferred files and the total number of files.’ VI. ADVANTAGES The advantages of the system are that it is a small, lightweight and handy device powered by 5V battery. It provides support for all USB Flash devices formatted with FAT32 file System along with support for USB 2.0 and a Plug and Go function. VII. CONCLUSION The USB to USB Bridge concept enables us to study the USB protocol a n d working of the USB host along with the processor in group. The user interface system is designed to allow the user to browse and choose specific files or folders to transfer between the source and destination devices. The screen consists of only the important data to avoid cluttering the screen. The advantage of this device is that it is battery operated so there is no need of power supply connection and data transfer can take place at any place. As the system is going to work as an application of the major system, the number of applications is limitless for the bridge. VIII. FUTURE SCOPE While working on the evolution of the system and exploring the peripherals that could be interfaced with the ARM 7 we got an insight into a plethora of new features that could be added through little alterations. Following are the things that can be done with few modifications. Add USB host capability to embedded products. Update Procedure for USB drive. Connect the Video port and Audio Port so it can be work as a small battery operated laptop. Wireless data transfer by connection to any Bluetooth enabled devices. REFERENCES [1] D. Anderson, D. Dzatko, “Universal Serial Bus System Architecture,” MindShare, Inc., 2001 [2] J. Axelson, “USB COMPLETE Second Edition,” Madison, WI: Lakeview Research LLC, 2004 [3] John Hyde, USB design, a technical introduction to USB 2.0, white papers. [4] USB Implementers Forum Inc, www.usb.org/ interoductionusb-2.0papers/ [5] USB FlashDrive.org, “USB Flash Drives, USB Memory and Portable Computer Hard Drive Information,” http://www.usbflashdrive.org/usbfd_overview.html, July 1, 2005 [6] Li Ying-lian, Hu Bing, “Design of transient recorder based on USB2.0”, ICECE 2010. [7] Tushar Sawant, Prof. Sanjay Deshmukh, Shilen Jhaveri and Siddharth Bhatt, “Implementation of USB To USB Bridge for Computer Independent Data Transfer”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 300 - 308, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.