Coin Slot Machine PDF
Coin Slot Machine PDF
Coin Slot Machine PDF
that they need. PisoNet became popular because it credentials. A RADIUS software enables the remote
offers benefits like easy maintenance, no need for access to a network, it receives request and
additional man power, can utilize space, and the authenticates the request as shown in Figure 2. The
customer can access sites and other apps cheaply. user or a machine sends a request to raspberry pi in
Reference [4] shows that in Maxcom Taiwan, the form of password and username. The RADIUS
“Tap Coin Wi-Fi Hotspot Pay Terminal” is very software checks that the information is correct using
popular. The technology is a coin operated WiFi authentication schemes. The user’s proof of
hotspot pay terminal which is a fee-based or free- identification is verified along with other
registration WiFi solution designed to help all indoor information stored in the database in the MySQL.
venue owners (e.g. coffee shops, retail stores, chain Once the identification was verified, the RADIUS
shops). It provides the visitors an immediate WiFi software will send back the ip address of the site that
hotspot service, by connecting with xDSL/cable the user is requesting.
modem or 3G/4G network (optional backup
connection, only for model WIFI-B202) wherein the password and username ok??
customers tap their smartphone on the kiosk screen. Browser Captive Portal SQL
A coin is also inserted to access the internet RADIUS
user or inserts the
depending on how long the customer wishes to surf machine system asks verifies the
username
the internet. sends for username and password
and username in the
access password
The project is based on the idea of the pisonet reques database
and the tap coin WiFi Hotspot of Maxcom.
However in this project, a raspberry pi 2 platform
and an open source captive portal are used which
significantly cuts down the cost of the technology.
Figure 3. Authentication Process of the Internet
Access Credentials
3. Methodology
3.3 Web Log-in Redirection Page
The following discussion describes the materials
and processes used in the development of the project.
CoovaChilli is an open-source software access
controller, based on the popular, but now obsolete,
3.1 Hardware Components Interconnection
ChiliSpot project. This software provides a captive
portal/walled garden environment and uses RADIUS
Figure 1 outlines the interconnection of the for access provisioning. CoovaChilli software was
hardware components of the project. As seen in used in this project as captive portal or web log-in
figure 1, it is composed of a raspberry pi which redirection page. Figure 3 shows the block diagram
serves as the system platform and a dongle to allow of the how the web log-in redirection page works.
access to wireless broadband. Contained in the
raspberry pi are LINUX operating system, PUTTY
(programming language for raspberry pi), a Python
program for random password generation and User CoovaChilli
RADIUS
printing, and a MySQL database for access
authentication.
The system consists of a thermal printer that project require the entry of the username and
prints the randomized unique username and password generated by the system before accessing
password that will be used as log-in credentials in the Internet.
order to access the internet. Python program was Even when a simple captive portal is used in a
used to randomly generate password and username free public-access network, certain people may
repeatedly connect, using the network on an almost
continuous basis to download music, videos, or other
large files. This activity, called bandwidth hogging,
can be minimized by additional programming in the
captive portal. Such programming can control the
speed at which large files are downloaded, limit the
size (in kilobytes or megabytes) of files that can be
downloaded, restrict the number of downloads that
can occur in a single session, or block connection to
Web sites commonly used for downloading large
files. This is called bandwidth throttling or traffic
shaping which can also be found in this project.
6. Acknowledgements
7. References
[1] Lack, Rex (August 2009). Managing the Testing Process:
Practical Tools and Techniques for Managing Hardware
and Software Testing. Hoboken, NJ: Wiley. ISBN 0-470-
40415-9
[2] ISO. 2013. Retrieved 2014-10-14.S. Zhang, C. Zhu, J. K.
O. Sin, and P. K. T. Mok, “A novel ultrathin elevated
channel low-temperature poly-Si TFT,” IEEE Electron
Device Lett., vol. 20, pp. 569–571, Nov. 1999.
[3] ISO/IEC/IEEE DIS 29119-4 Software and Systems
Engineering - Software Testing - Part 4- Test
Techniques. ISO. 2013. Retrieved 2014-10-14.
[4] MaxCom. (2012) MaxCom homepage on Phil. [Online].
Available: http://www.ri.maxcom.com/en
[5] Cimperman, Rob (2006). UAT Defined: A Guide to
Practical User Acceptance Testing. Pearson Education.
pp. Chapter 2. ISBN9780132702621